IRCaBot 2.1.0
GPLv3 © acetone, 2021-2022
#saltr
/2026/04/23
@RN
@ReturningNovice
@StormyCloud
@T3s|4
@T3s|4_
@orignal
@postman
@zzz
%acetone
%mareki2p
%snex
+Atticfire
+FreefallHeavens
+Onn4l7h
+Onn4|7h
+Over
+fa
+marek22k
+onon_
+poriori
+profetikla
+qend-irc2p
+r00tobo
+sexy
+uberius
+uop23ip
Arch
Danny
Irc2PGuest21708
Irc2PGuest28384
Irc2PGuest66257
Irc2PGuest75631
Irc2PGuest99986
RTP_
U1F642
Watson
ahiru
anontor
cims
i2potus
interesting
justaperson
lokzz
luvme
mahlay
makoto
n2_
nilbog
not_bob_afk
pinotto
r00tobo[2]
rednode
user_ygg2__
dr|z3d > I have returned.
zzz I'll email it to you tomorrow
zzz go read the articles, but tl;dr AI bug reports are about to get really good, and it's going to take enormous resources for open source projects to address them
dr|z3d so what's your overall assessment of the report, zzz? mostly pedantic, or?
zzz mixed
zzz half real, almost all overstated severity
zzz enough real to require a serious response
nyaa2pguy are the bad botnet routers all "LU" with no address published in RI
nyaa2pguy have been working more on ntcp2 and now got to the point where inbound connections works more stable but there's so many inbound connections of LU+no ips
nyaa2pguy like 1000 inbound ntcp2 connections within 5 minutes of starting router
dr|z3d probably, nyaa2pguy
nyaa2pguy interesting
dr|z3d that's why, for now, LU routers are banned in +
dr|z3d there are maybe 20K+ LU routers that have turned up recently. don't want them polluting our netdb.
nyaa2pguy ahh okay
dr|z3d zzz will tell you it's a heavy handed response, but I'm ok with that. smells like botnet.
nyaa2pguy i had my limits set to 500 ntcp connections, increased it to 1500 and it's like 80% LU+no address
nyaa2pguy the versions are random like 0.9.56 to 0.9.67
zzz nyaa2pguy, there's several botnet groups out there, some with fairly constant behavior, some that get upgraded periodically
zzz it's not an easy problem, especially if you're starting from scratch
zzz you said you have limits on ntcp connections, that's a good start
zzz go thru and implement hard limits on _everything_ - connections, bandwidth, tunnels, queue sizes, latency, memory, netdb
zzz then some of the resources you'll also need to do soft limits (e.g. random early drop)
zzz and/or rate-of-change limits dx/dt