1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Oidentd bad IRC Ident ~

Discussion in 'Web and Network Services' started by enCyde, May 4, 2012.

  1. Abriel

    Abriel New Member

    Messages:
    93
    Thanks Received:
    17
    I did
    tcpdump -l -i tun0 | grep auth
    then
    irssi -c punch.va.us.dal.net
    I got in tcpdump:
    Code:
    19:57:28.117748 IP punch.va.us.dal.net.62658 > zse.auth: Flags , seq 823519017, win 65535, options
     [mss 1414,nop,wscale 0,nop,nop,TS val 3202287616 ecr 0,sackOK,eol], length 0
    19:57:28.117842 IP zse.auth > punch.va.us.dal.net.62658: Flags [S.], seq 801830597, ack 823519018, win 65535, options 
     [mss 1414,nop,wscale 6,sackOK,TS val 1265770280 ecr 3202287616], length 0
    19:57:28.247268 IP punch.va.us.dal.net.62658 > zse.auth: Flags [.], ack 1, win 65535, options
     [nop,nop,TS val 3202287745 ecr 1265770280], length 0
    19:57:28.247526 IP punch.va.us.dal.net.62658 > zse.auth: Flags [P.], seq 1:15, ack 1, win 65535, options
     [nop,nop,TS val 3202287745 ecr 1265770280], length 14
    19:57:28.248714 IP zse.auth > punch.va.us.dal.net.62658: Flags [P.], seq 1:32, ack 15, win 1029, options
     [nop,nop,TS val 1265770411 ecr 3202287745], length 31
    19:57:28.249001 IP zse.auth > punch.va.us.dal.net.62658: Flags [F.], seq 32, ack 15, win 1029, options
     [nop,nop,TS val 1265770411 ecr 3202287745], length 0
    19:57:28.376670 IP punch.va.us.dal.net.62658 > zse.auth: Flags [.], ack 33, win 65535, options
     [nop,nop,TS val 3202287876 ecr 1265770411], length 0
    19:57:28.376718 IP punch.va.us.dal.net.62658 > zse.auth: Flags [F.], seq 15, ack 33, win 65535, options
     [nop,nop,TS val 3202287876 ecr 1265770411], length 0
    19:57:28.376756 IP zse.auth > punch.va.us.dal.net.62658: Flags [.], ack 16, win 1029, options 
    [nop,nop,TS val 1265770539 ecr 3202287876], length 0
    
    


    What is in your tcpdump?
    Try telnet your_internet_ip 113 from other PC, and check tcpdump.
     
  2. enCyde

    enCyde New Member

    Messages:
    32
    Thanks Received:
    0
    That is my tcpdump when I do irssi -c punch.va.us.dal.net

    Code:
    istening on bge0, link-type EN10MB (Ethernet), capture size 65535 bytes
    04:33:44.791022 IP punch.va.us.dal.net.42707 > 192.168.1.3.auth: Flags , seq 2310441118, win 65535, options [mss 1460,nop,wscale 0,nop,nop,TS val 3233308731 ecr 0,sackOK,eol], length 0
    04:33:44.791043 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,TS val 3507088248 ecr 3233308731], length 0
    04:33:47.790640 IP punch.va.us.dal.net.42707 > 192.168.1.3.auth: Flags , seq 2310441118, win 65535, options [mss 1460,nop,wscale 0,nop,nop,TS val 3233311731 ecr 0,sackOK,eol], length 0
    04:33:47.790675 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,TS val 3507088248 ecr 3233311731], length 0
    04:33:50.789943 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,TS val 3507088248 ecr 3233311731], length 0
    04:33:50.990586 IP punch.va.us.dal.net.42707 > 192.168.1.3.auth: Flags , seq 2310441118, win 65535, options [mss 1460,nop,wscale 0,nop,nop,TS val 3233314931 ecr 0,sackOK,eol], length 0
    04:33:50.990601 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,TS val 3507088248 ecr 3233314931], length 0
    04:33:53.989940 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,TS val 3507088248 ecr 3233314931], length 0
    04:33:54.190430 IP punch.va.us.dal.net.42707 > 192.168.1.3.auth: Flags , seq 2310441118, win 65535, options [mss 1460,sackOK,eol], length 0
    04:33:54.190458 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0
    04:33:57.189943 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0
    04:33:57.390274 IP punch.va.us.dal.net.42707 > 192.168.1.3.auth: Flags , seq 2310441118, win 65535, options [mss 1460,sackOK,eol], length 0
    04:33:57.390291 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0
    04:34:00.389930 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0
    04:34:00.590567 IP punch.va.us.dal.net.42707 > 192.168.1.3.auth: Flags , seq 2310441118, win 65535, options [mss 1460,sackOK,eol], length 0
    04:34:00.590578 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0
    04:34:03.589940 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0
    04:34:06.789990 IP punch.va.us.dal.net.42707 > 192.168.1.3.auth: Flags , seq 2310441118, win 65535, options [mss 1460,sackOK,eol], length 0
    04:34:06.790025 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0
    04:34:09.789940 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0
    04:34:15.789939 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0
    04:34:27.789939 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0
    


    and I get
    Code:
    *** No Ident response


    And when I do

    Code:
    $ telnet MYIP 113
    Trying MYIP...
    Connected to MYIP.......
    Escape character is '^]'.
    


    I get in tcpdump

    Code:
    4:37:31.564807 IP staticMYIP.25888 > 192.168.1.3.auth: Flags , seq 1628161763, win 65535, options [mss 1460,nop,wscale 6,sackOK,TS val 32838901 ecr 0], length 0
    04:37:31.564826 IP 192.168.1.3.auth > staticMYIP.25888: Flags [S.], seq 3868942309, ack 1628161764, win 65535, options [mss 1460,nop,wscale 6,sackOK,TS val 4242943730 ecr 32838901], length 0
    04:37:31.565159 IP staticMYIP.auth > 192.168.1.3.25888: Flags [S.], seq 3868942309, ack 1628161764, win 65535, options [mss 1460,nop,wscale 6,sackOK,TS val 4242943730 ecr 32838901], length 0
    04:37:31.565177 IP 192.168.1.3.25888 > staticMYIP.auth: Flags [.], ack 1, win 1040, options [nop,nop,TS val 32838904 ecr 4242943730], length 0
    04:37:31.565352 IP staticMYIP.25888 > 192.168.1.3.auth: Flags [.], ack 1, win 1040, options [nop,nop,TS val 32838904 ecr 4242943730], length 0
    04:38:01.566234 IP 192.168.1.3.auth > staticMYIP.25888: Flags [F.], seq 1, ack 1, win 1040, options [nop,nop,TS val 4242973732 ecr 32838904], length 0
    04:38:01.566575 IP staticMYIP.auth > 192.168.1.3.25888: Flags [F.], seq 1, ack 1, win 1040, options [nop,nop,TS val 4242973732 ecr 32838904], length 0
    04:38:01.566601 IP 192.168.1.3.25888 > staticMYIP.auth: Flags [.], ack 2, win 1040, options [nop,nop,TS val 32868905 ecr 4242973732], length 0
    04:38:01.566707 IP 192.168.1.3.25888 > staticMYIP.auth: Flags [F.], seq 1, ack 2, win 1040, options [nop,nop,TS val 32868905 ecr 4242973732], length 0
    04:38:01.566877 IP staticMYIP.25888 > 192.168.1.3.auth: Flags [.], ack 2, win 1040, options [nop,nop,TS val 32868905 ecr 4242973732], length 0
    04:38:01.567036 IP staticMYIP.25888 > 192.168.1.3.auth: Flags [F.], seq 1, ack 2, win 1040, options [nop,nop,TS val 32868905 ecr 4242973732], length 0
    04:38:01.567056 IP 192.168.1.3.auth > staticMYIP.25888: Flags [.], ack 2, win 1040, options [nop,nop,TS val 4242973733 ecr 32868905], length 0
    04:38:01.567347 IP staticMYIP.auth > 192.168.1.3.25888: Flags [.], ack 2, win 1040, options [nop,nop,TS val 4242973733 ecr 32868905], length 0