Based on the David report all these spots have as IP source address the
Static IP address of our ADSL connection at IR4T.
First of all thank's to David for these reports, they can help everyone to
understand how the operators are aware from the networks issues, and how
these networks are easy to hack.
We are pretty sure that these spot was not generated from our IP address
that we hold, we were only 2 PC connected on the network, and well Linux
firewalled, this is sure a good success of a hacking technique called IP
address spoofing. For more details probable David could be more detailed
than me, plase take a look at
http://en.wikipedia.org/wiki/IP_address_spoofing for basic informations
Analizing these Spot 9 call are not valid (WA2BKL, W3GML, KA2CBW, W4FZA,
K4ZFP, N1DXV, KD4FKO, K0HHJ, WA3FG )
Other calls are still on FCC database.
The 1x2 West Coast call (W6HJ, W7HL, W7NJ, W6RA, W6IL ) are fool call too
easy to type on the keyboard in random way, and 2 of them ( W6RA, W6IL )
claim to be in CA but the are resident (www.qrz.com ) in Oregon and Georgia,
and really belive me they was so incredible with such band condition ...
The comment "poor" in the W6HJ, K2RA spot is clearly a no USA slang origin.
Related to AA1N, K0TV, K0HA I had personally worked them and viewed the
spot few seconds after the QSO, with TNX comment. I don't really know if
these spots were sended from the respective stations or not, but really
believe me I will not surely send a spot to confirm a myself QSO !! If they
are reading this post , hope they remember it !!! A direct email will be
sended to ask them if remember such spot sending...
These brief comment is only take with care about these analyses, because IP
spoofing, IP routing, or IP masking can be easy used from smart bad guys,
that from my opinion could spend better their time enjoy radio and
contesting instead of loosing time and smiling above a possible flame
around these issues
Personally next time i wll filter all spots with @ that denote a WEB Spot,
and as suggest i vote for a banning of the WEB spot feature to avoid these
false
accusations, and this bad pratice of anonymous spots.
Best 73 de I4UFH
> On Tue, Mar 04, 2008 at 09:24:20PM -0800, Rich Hallman - N7TR wrote:
>> This is interesting....
>>
>> N7TR 21285 CX9DX 190.132.129.239
>>
>> I actually made this spot from my cluster (dxc.n7tr.com) ...But is
>> showing up here as originating from another IP. Relay?
>
> I can't tell about this particular spot, but such things commonly
> happen. The whole cluster network is not to be trusted.
>
> As an example, I noticed that DX spots made via the IRC interface of
> OH2AQ show up with a _random_ IP address of a _previous_ spotter on
> the "Originating Spots" website. This could easily lead to false
> accusations, and (although most selfspotters don't seem to care to
> hide their identitiy anyway) is a great way to send spots anonymously.
>
> It's quite a mystery to me why OH2AQ doesn't employ some simple
> means to do something against the constant abuse of the DX cluster
> network through their web/irc interfaces.
>
> 73,
> --
> Fabian Kurz, DJ1YFK * Dresden, Germany * http://fkurz.net/
> _______________________________________________
> CQ-Contest mailing list
> CQ-Contest@contesting.com
> http://lists.contesting.com/mailman/listinfo/cq-contest
_______________________________________________
CQ-Contest mailing list
CQ-Contest@contesting.com
http://lists.contesting.com/mailman/listinfo/cq-contest
|