Oidentd bad IRC Ident ~

I did
[CMD=""] tcpdump -l -i tun0 | grep auth[/CMD]
then
[CMD=""]irssi -c punch.va.us.dal.net[/CMD]
I got in tcpdump:
Code:
19:57:28.117748 IP punch.va.us.dal.net.62658 > zse.auth: Flags [S], seq 823519017, win 65535, options
 [mss 1414,nop,wscale 0,nop,nop,TS val 3202287616 ecr 0,sackOK,eol], length 0
19:57:28.117842 IP zse.auth > punch.va.us.dal.net.62658: Flags [S.], seq 801830597, ack 823519018, win 65535, options 
 [mss 1414,nop,wscale 6,sackOK,TS val 1265770280 ecr 3202287616], length 0
19:57:28.247268 IP punch.va.us.dal.net.62658 > zse.auth: Flags [.], ack 1, win 65535, options
 [nop,nop,TS val 3202287745 ecr 1265770280], length 0
19:57:28.247526 IP punch.va.us.dal.net.62658 > zse.auth: Flags [P.], seq 1:15, ack 1, win 65535, options
 [nop,nop,TS val 3202287745 ecr 1265770280], length 14
19:57:28.248714 IP zse.auth > punch.va.us.dal.net.62658: Flags [P.], seq 1:32, ack 15, win 1029, options
 [nop,nop,TS val 1265770411 ecr 3202287745], length 31
19:57:28.249001 IP zse.auth > punch.va.us.dal.net.62658: Flags [F.], seq 32, ack 15, win 1029, options
 [nop,nop,TS val 1265770411 ecr 3202287745], length 0
19:57:28.376670 IP punch.va.us.dal.net.62658 > zse.auth: Flags [.], ack 33, win 65535, options
 [nop,nop,TS val 3202287876 ecr 1265770411], length 0
19:57:28.376718 IP punch.va.us.dal.net.62658 > zse.auth: Flags [F.], seq 15, ack 33, win 65535, options
 [nop,nop,TS val 3202287876 ecr 1265770411], length 0
19:57:28.376756 IP zse.auth > punch.va.us.dal.net.62658: Flags [.], ack 16, win 1029, options 
[nop,nop,TS val 1265770539 ecr 3202287876], length 0

What is in your tcpdump?
Try [CMD=""]telnet your_internet_ip 113[/CMD] from other PC, and check tcpdump.
 
That is my tcpdump when I do irssi -c punch.va.us.dal.net

Code:
istening on bge0, link-type EN10MB (Ethernet), capture size 65535 bytes
04:33:44.791022 IP punch.va.us.dal.net.42707 > 192.168.1.3.auth: Flags [S], seq 2310441118, win 65535, options [mss 1460,nop,wscale 0,nop,nop,TS val 3233308731 ecr 0,sackOK,eol], length 0
04:33:44.791043 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,TS val 3507088248 ecr 3233308731], length 0
04:33:47.790640 IP punch.va.us.dal.net.42707 > 192.168.1.3.auth: Flags [S], seq 2310441118, win 65535, options [mss 1460,nop,wscale 0,nop,nop,TS val 3233311731 ecr 0,sackOK,eol], length 0
04:33:47.790675 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,TS val 3507088248 ecr 3233311731], length 0
04:33:50.789943 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,TS val 3507088248 ecr 3233311731], length 0
04:33:50.990586 IP punch.va.us.dal.net.42707 > 192.168.1.3.auth: Flags [S], seq 2310441118, win 65535, options [mss 1460,nop,wscale 0,nop,nop,TS val 3233314931 ecr 0,sackOK,eol], length 0
04:33:50.990601 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,TS val 3507088248 ecr 3233314931], length 0
04:33:53.989940 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,TS val 3507088248 ecr 3233314931], length 0
04:33:54.190430 IP punch.va.us.dal.net.42707 > 192.168.1.3.auth: Flags [S], seq 2310441118, win 65535, options [mss 1460,sackOK,eol], length 0
04:33:54.190458 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0
04:33:57.189943 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0
04:33:57.390274 IP punch.va.us.dal.net.42707 > 192.168.1.3.auth: Flags [S], seq 2310441118, win 65535, options [mss 1460,sackOK,eol], length 0
04:33:57.390291 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0
04:34:00.389930 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0
04:34:00.590567 IP punch.va.us.dal.net.42707 > 192.168.1.3.auth: Flags [S], seq 2310441118, win 65535, options [mss 1460,sackOK,eol], length 0
04:34:00.590578 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0
04:34:03.589940 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0
04:34:06.789990 IP punch.va.us.dal.net.42707 > 192.168.1.3.auth: Flags [S], seq 2310441118, win 65535, options [mss 1460,sackOK,eol], length 0
04:34:06.790025 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0
04:34:09.789940 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0
04:34:15.789939 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0
04:34:27.789939 IP 192.168.1.3.auth > punch.va.us.dal.net.42707: Flags [S.], seq 1209949541, ack 2310441119, win 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0

and I get
Code:
*** No Ident response

And when I do

Code:
$ telnet MYIP 113
Trying MYIP...
Connected to MYIP.......
Escape character is '^]'.

I get in tcpdump

Code:
4:37:31.564807 IP staticMYIP.25888 > 192.168.1.3.auth: Flags [S], seq 1628161763, win 65535, options [mss 1460,nop,wscale 6,sackOK,TS val 32838901 ecr 0], length 0
04:37:31.564826 IP 192.168.1.3.auth > staticMYIP.25888: Flags [S.], seq 3868942309, ack 1628161764, win 65535, options [mss 1460,nop,wscale 6,sackOK,TS val 4242943730 ecr 32838901], length 0
04:37:31.565159 IP staticMYIP.auth > 192.168.1.3.25888: Flags [S.], seq 3868942309, ack 1628161764, win 65535, options [mss 1460,nop,wscale 6,sackOK,TS val 4242943730 ecr 32838901], length 0
04:37:31.565177 IP 192.168.1.3.25888 > staticMYIP.auth: Flags [.], ack 1, win 1040, options [nop,nop,TS val 32838904 ecr 4242943730], length 0
04:37:31.565352 IP staticMYIP.25888 > 192.168.1.3.auth: Flags [.], ack 1, win 1040, options [nop,nop,TS val 32838904 ecr 4242943730], length 0
04:38:01.566234 IP 192.168.1.3.auth > staticMYIP.25888: Flags [F.], seq 1, ack 1, win 1040, options [nop,nop,TS val 4242973732 ecr 32838904], length 0
04:38:01.566575 IP staticMYIP.auth > 192.168.1.3.25888: Flags [F.], seq 1, ack 1, win 1040, options [nop,nop,TS val 4242973732 ecr 32838904], length 0
04:38:01.566601 IP 192.168.1.3.25888 > staticMYIP.auth: Flags [.], ack 2, win 1040, options [nop,nop,TS val 32868905 ecr 4242973732], length 0
04:38:01.566707 IP 192.168.1.3.25888 > staticMYIP.auth: Flags [F.], seq 1, ack 2, win 1040, options [nop,nop,TS val 32868905 ecr 4242973732], length 0
04:38:01.566877 IP staticMYIP.25888 > 192.168.1.3.auth: Flags [.], ack 2, win 1040, options [nop,nop,TS val 32868905 ecr 4242973732], length 0
04:38:01.567036 IP staticMYIP.25888 > 192.168.1.3.auth: Flags [F.], seq 1, ack 2, win 1040, options [nop,nop,TS val 32868905 ecr 4242973732], length 0
04:38:01.567056 IP 192.168.1.3.auth > staticMYIP.25888: Flags [.], ack 2, win 1040, options [nop,nop,TS val 4242973733 ecr 32868905], length 0
04:38:01.567347 IP staticMYIP.auth > 192.168.1.3.25888: Flags [.], ack 2, win 1040, options [nop,nop,TS val 4242973733 ecr 32868905], length 0
 
Back
Top