Anope IRC Services

Please login or register.

Login with username, password and session length
Advanced search  

News:

Pages: [1]   Go Down

Author Topic: m_proxyscan  (Read 2946 times)

0 Members and 1 Guest are viewing this topic.

Saroj Sai

  • Anope User
  • Offline Offline
  • Posts: 6
    • Online chat
m_proxyscan
« on: June 21, 2018, 02:49:21 PM »

I am stuck at this module, If any one could help, It would be highly appreciated.

Module m_proxyscan couldn't load due to configuration problems: m_proxyscan: Unable to bind to address: Cannot assign requested address
[19:29] -OperServ- Unable to load module m_proxyscan

Quote
/*
 * m_proxyscan
 *
 * This module allows you to scan connecting clients for open proxies.
 * Note that using this will allow users to get the IP of your services.
 *
 * Currently the two supported proxy types are HTTP and SOCKS5.
 *
 * The proxy scanner works by attempting to connect to clients when they
 * connect to the network, and if they have a proxy running instruct it to connect
 * back to services. If services are able to connect through the proxy to itself
 * then it knows it is an insecure proxy, and will ban it.
 */
module
{
        name = "m_proxyscan"
 
        /*
         * The target IP services tells the proxy to connect back to. This must be a publicly
         * available IP that remote proxies can connect to.
         */
        target_ip = "127.0.0.1"
 
        /*
         * The port services tells the proxy to connect to.
         */
        target_port = 6667
 
        /*
         * The listen IP services listen on for incoming connections from suspected proxies.
         * This probably will be the same as target_ip, but may not be if you are behind a firewall (NAT).
         */
        listen_ip = "127.0.0.1"
 
        /*
         * The port services should listen on for incoming connections from suspected proxies.
         * This most likely will be the same as target_port.
         */
        listen_port = 6667
 
        /*
         * An optional notice sent to clients upon connect.
         */
        connect_notice = "We will now scan your host for insecure proxies. If you do not consent to this scan please disconnect immediately."
 
        /*
         * Who the notice should be sent from.
         */
        connect_source = "OperServ"
 
        /*
         * If set, OperServ will add infected clients to the akill list. Without it, OperServ simply sends
         * a timed G/K-line to the IRCd and forgets about it. Can be useful if your akill list is being filled up by bots.
         */
        add_to_akill = yes
 
        /*
         * How long before connections should be timed out.
         */
        timeout = 5
 
        proxyscan
        {
                /* The type of proxy to check for. A comma separated list is allowed. */
                type = "HTTP"
 
                /* The ports to check. */
                port = "80,8080"
 
                /* How long to set the ban for. */
                time = 4h
 
                /*
                 * The reason to ban the user for.
                 * %h is replaced with the type of proxy found.
                 * %i is replaced with the IP of proxy found.
                 * %p is replaced with the port.
                 */
                reason = "You have an open proxy running on your host (%t:%i:%p)"
        }
}


What should the target IP be? Is it my IRC server's IP or just I put it 127.0.0.1. What about the listen IP? Is it the same?

I guess the port is the default port of my server; 6667. Both for target and listen port?

Should there be link block on Unreal about this? Please Help!

« Last Edit: June 21, 2018, 02:51:37 PM by Saroj Sai »
Logged
Pages: [1]   Go Up