Closed Herringway closed 3 years ago
Some also do a CTCP PING/PONG and block reg on that, iirc? Take a look into that and see whether we need to mention that at all.
Relevant bits:
also test and illustrate PING
with no params at all and see how that works.
I haven't been able to compile the server, so I'm just basing this off of reading the code, but...
pre 2.11: :server 409 nick :No origin specified
post 2.11: :server PONG server :
Some implementations use a pre-registration PING/PONG with random strings as an anti-spoof measure
Some implementations just echo PING parameters in PONG responses
These should be handled in #99.
- One client I've seen sends
PONG server :param1
to allPING param1
messages
What client is it?
From what I can tell, this behavior would result in:
with random strings as an anti-spoof measure
FYI, this is not a protection against connection spoofing, as it is commonly believed (TCP already does it, and TLS does it even better). The motivation (at least for Unreal) is to prevent non-IRC clients (eg. browsers that don't blacklist the port) from being tricked into sending stuff to IRC.
Modern day implementations of the PING/PONG messages differ from what is described in RFCs 1459 and 2812.
Some observations:
PONG server :param1
to allPING param1
messages