![]() |
||||||||||
|
|
||||||||||
Internet Relay Chat Pros, Cons and Those Pesky Bots Background When we once had to rely upon traditional means of communication such as the telephone, fax, carrier pigeon or what have you; we can now communicate instantaneously thanks to the Internet. This ease of communication has become pervasive in our everyday lives. Ask a teenager in the United States if they can remember a time when they didnt have an Internet connection and they will be hard pressed to answer. The popularity of the Internet has vast implications in todays society, mainly that people are now more interconnected than ever before. This has both positive and negative implications. In this paper, I intend to briefly discuss Internet Relay Chat (IRC) and cover some of the pros and cons of the application, along with some of the bots or interesting scripts available to anyone with a desire for knowledge and a UNIX shell account. History of IRC IRC, or Internet Relay Chat, began in 1988, when Jarkko Oikarinen, an employee at the University of Oulu, set about to develop a way to communicate based on existing Bulletin Board System (BBS technology). He hoped to develop a way to share discussions in USENET type forums as well as real-time discussions. Jarkko distributed the IRC program and its use spread within Finland, but it was not until sometime after that IRC came into widespread use. This was due to the lack of connectivity outside of Finland. IRC use really took off in 1991, when, U.S. service members used it to communicate with loved ones back home. Use of Internet relay chat today is tremendous. Researchers, students, parents and children are only a few of the types of people who communicate via IRC. As with any technology, there is also a darker side to the use of Internet relay chat as a means of communication. IRC servers have become a haven for hackers, social deviants, and others with malicious intent. This dark side will be covered briefly, later in this paper. So, how does one connect to IRC? There are a myriad of clients used to connect to IRC servers. These include applications for UNIX (type), Windows and Mac operating systems. The most common default port for IRC servers is 6667. Any search engine will turn up thousands of sites to download the client. Beginner users should use a client such as mIRC which can be downloaded at www.mirc.org due to the ease of installation and configuration. Conversely, more advanced users are attracted to products such as BitchX or PIRCH for the scalability and multiple platform support built into the software. There are literally thousands of servers available for users to connect to. Internet.org generally classifies the servers based on content or by numbers of users each server can accommodate. IRC servers therefore fall into one of six categories. These are:
Pros of IRC IRC creates an environment for instantaneous communication where users can trade ideas and information in real time. The help pages for mIRC v.5.8 states "mIRC attempts to provide a user-friendly interface for use with the Internet Relay Chat network. The IRC network is a virtual meeting place where people from all over the world can meet and talk." While this is very simplistic, it embodies what IRC is about a place for people to gather and interact. A practical application built into IRC is the ability for administrators to make chat rooms which are available only by invite. This creates a private space for conversations to take place. Therefore, a good corporate use for IRC would be as a means for isolated branch operations to communicate with headquarters and vice versa. It is a cost effective alternative to phone, fax and other traditional means of communication. All one needs is a PC, an Internet connection and the ability to download the IRC client. Another interesting feature of IRC is the direct client to client (DCC) suite. These functions allow users to bypass the IRC server by establishing direct connections with one another. Within the functionality of the suite is the DCC send which allows one user to directly send another user a file, the DCC chat which allows two users to establish a private chat session via a peer-to-peer connection. There are downsides to the DCC usage that will be discussed in the Cons of IRC section. IRC networks are configured in a way to create redundancy and reliability. If a user connects to mclean.va.us.undernet.org and joins a room #vintagecars users in the same chat room can be connecting from any myriad of other servers. Because of the sheer number of servers available, a user can be virtually guaranteed of a connection at any given time. This is advantageous to users who need consistent connectivity, but IRC servers will typically allow only a fixed number of connections from outside of its domain. Therefore in order to assure a connection, it is best for the user to find a server near them. Cons of IRC Because there is no over-arching authority to act as a watchdog governing IRC servers, anyone can establish a server and join an IRC network. While most networks have rules of behavior, it is very difficult for the network administrators to police acts of misconduct. It is therefore very easy for anyone with a spare computer and LINUX to build an IRC server to use for mischievous purposes. As mentioned earlier, IRC allows users to establish peer-to-peer connections. This is fine as long as the data exchanged is innocuous. However, there are increasing instances of users downloading virii, trojans and other malicious code from IRC chat rooms either due to ignorance or willful disregard for appropriate security measures. Users must understand the implications of accepting any files from unknown parties. This is particularly true in IRC chat rooms where users trade .jpg, .mpeg, .bmp, and other file types. It is imperative to always be certain of the validity of the file prior to accepting it. New users who have not properly configured their IRC client to prompt them when someone tries to send a file are prime targets for malicious bots and social deviants. Not to point any fingers, there are a lot of automated scripts running rampant on IRC most notably on Undernet servers. Not to say that Undernet administrators are not working proactively to create an efficient environment, but there seems to be a lot of automated processes running in friendly chat rooms such as #hawaiichat. This may be because Undernet is configured to allow channel server bots and some people have configured these bots to conduct malicious activities. Bots Bots (short for robots) are special programs that are written to take advantage of certain IRC features. Bots can be used to either enhance or detract from the IRC experience. The original intent of bots was to enable a 24-hour presence and a remote method for maintaining control of IRC chat rooms. A bots purpose is to remain on the IRC channel at all times and provide services to members of that channel. Also, bots may provide services to the clients of a certain server, or to the users of an entire network (botnet). Scripts are programs used by clients to extend their sets of features in ways that either provide new functions for channel/ user management, or provide malicious features to disrupt others' IRC experience. Types of Bots There are basically three types of bots: War bots, Channel bots, and Bar bots. War bots are written to be malicious and cause chaos and havoc in channels. They can be used to do things like flood users, kick or ban them, add user names to K-line (do not allow) lists, etc. The use of these bots evolved from the first use as a way to play practical jokes on your friends. Today, war bots are notoriously nasty. The only good reason to use a war bot is if there is someone in your channel that is being disruptive, annoying or who is otherwise bothering you or members of your channel. Second, there are channel bots. Channel bots are a bit mundane, but can be useful. They will perform simple tasks like OP, DEOP, KICK and BAN. These bots are used to maintain the user lists, and conduct routine maintenance of the channel. Channel bots should only be used with your good friends, as they can control the bot and have it give them channel operator authority and have it kick or ban you. Lastly, there are bar bots. Bar bots can be used to conduct social activities. They can serve drinks, food, and play games. However, their actions can become annoying to channel members quickly. Bots are both useful and dangerous. They can be used to conduct any number of actions. A very interesting aspect of the bot is that they can be used together to form networks of interactive bots. This is known as a botnet. Botnets Bots can be linked together to form a botnet. This gives the bot administrators exponentially more power over resources. Basically, the administrator can talk to other people on the other bots party line, share users, channel information, and any other function if all bots have the same scripts installed. While botnets can be used for non-malicious activities, they also enable sharing of all aspects of those bots on the network. This means that the network can be used as a method of amplifying malicious activities. Summary While IRC is useful for facilitating communication, it also provides a conduit into networks for malicious activity. Administrators must remain constantly aware of the types of activities conducted within their networks. IRC is particularly difficult to monitor because of the numerous clients obtainable for download along with the thousands of servers available to connect to. References: i. www.ircbeginner.com/ircinfo/history-jarkko.html ii. www.irchelp.org/irchelp/networks/servers/ iii. www.webchat.org/sub-menu/sm-serverapp.htm iv. mIRC v 5.8 Help files v. www.braindead.net/pugetsound/dcc.asp vi. www.xcalibre.com vii. Ibid. www.xcalibre.com/ |
||||||||||
|
to top of page | to Threats & Vulnerabilities | to Reading Room Home
|
||||||||||
![]() |
||||||||||