-
-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Channel Verification Before Bot Can Relay Messages #130
Comments
I think it should check for op or above just to make sure. Good idea though! |
This would need to be extended to |
I am more or less against this. Instead we should have smarter spam detection, throttling, and an option to flag projects on the UI. Pros:
Cons:
What I would do instead, improving on what currently exists:
Thoughts? |
A lot of clients would be affected by a netsplit, not just a Notifico bot. Perhaps ops of a channel should be allowed to remove bots via
I would argue for just ops and above being able to verify something like this, since it's a lot more standardized. I'm not sure I would give trust to
I don't like whitelisting - manual network signups (e.g. Mibbit, IRC indexers) are tedious and don't solve the problem with duplicate configs being added for one network, unless duplicate checking is separately implemented.
If someone tries to add a bot to a channel that has previously been
There could be instructions somewhere (as in a setup guide) that can tell admins to whitelist Notifico's IPs. Other than that, I don't know.
I'm with you here. 😨
Throttle them by how much? This can't be too strict without breaking announcements for bigger networks like Freenode.
Being able to see the status of Notifico bots on networks would be a big plus. 👍
That's a good idea. I was thinking that perhaps network admins could sign up their networks too. IP/port combinations could be tracked by Notifico to see what network they belong to, allowing admins to monitor which projects have hooks being sent to their network, and remove offending entries accordingly. |
Just to clarify here, the problem is that one large networks with more than one server, a netsplit between two servers can result in someone being able to take +O in that channel, completely denying the notifico bot (or use other commands). When the netsplit is resolved, the networks (depending on the IRCd) have a system to collapse and agree on the original and correct permissions. This is one of the biggest reasons I hesitate to use a system that simply relies on +O, even if it is convenient. Most (decent) bots you see require a passphrase or NICKSERV authentication and temporarily authorize a NICK for the duration of its connection. Also, if this does happen, it must happen in a PRIVMSG. Notifico will never send a non-announcement in channel nor will it ever respond to anything said in a channel. |
Notifico would need a way of communicating with the person who requested it though. Otherwise, non-opers wouldn't know what the bot's nick is. |
Perhaps there could be a way to just blacklist a certain project or user from using a channel? If you made it so an IP address could only make for say, one or two accounts max. |
I get a new IP by restarting my router or waiting until the daily reset, so this won't really work. Another option is the whitelist the IPs who are allowed to access all endpoints. But this would require quite some effort to whitelist every Jenkins, gitlab etc. server accessing notifico, also new users might want to hook with their setup.
This could be displayed on the website, which bot instance is currently serving your hook, but since bots only join after a e.g. commit triggered the hook, there might not be any bot on the network. |
This really can't happen, although it could be an option for self-hosting? Everything from routers to NASA weather balloons (not even kidding) shout out through notifico. Can't only allow whitelists.
And this is intentional - when Notifico used predictable nicks, an abuser on Freenode registered hundreds of Not-001, Not-007, etc... combinations. So the space was expanded to make this neigh impossible. We really just need better throttling and better moderation tools on the UI before we do anything else. Abusing IRC is absurdly easy, changing the bot itself won't change a thing. |
Here's my idea: Before the Notifico can officially start relaying messages in a channel, a user with +h, +o, +a, or +q must execute a command like
!notifico accept
to have it relay messages or!notifico deny
to have the channel be blacklisted until further notice. This can help prevent spam (I've seen someone use a plaintext webhook to do this) in many channels across the web.Kind regards,
AlphaTech
The text was updated successfully, but these errors were encountered: