By topping the leaderboard plenty of people see it and donate their IP to them. What are you gonna do, claim your own IP for yourself and go up against those behemoths? Of course you're gonna form alliances.
So basically someone is running a script iterates over the whole ipv4 range and calls the claim endpoint with each single adress in the X-Forwared-For http header once.
It used to be possible back in the days when sequence numbers were easily guessable. (You'd obviously not be able to receive, only send, so you couldn't do TLS, but TLS had hardly been invented at the time.) Now operating systems are way too good for that. :-)
On the website, there was a link to a game: https://www.familiars.io
I spent an hour playing it! It is quite good.
Is there a source code available for this game?
FWIW I asked on their Discord server, and they told me that it is closed source. :(
Does anyone know of a game similar to this with source code available? That would be cool. I have so many ideas that I would like to implement!
Holy moley, that is some high-octane dopamine right there.
Really fun game, thank you for linking it!
femboy.cat with a casual 0.2% of the internet
By topping the leaderboard plenty of people see it and donate their IP to them. What are you gonna do, claim your own IP for yourself and go up against those behemoths? Of course you're gonna form alliances.
But how do they achieve that? Do you use a lot of VPNs?
my first guess would be: server honors X-Forwarded-For where it should not?
Edit: looks like thats it: https://github.com/jart/cosmopolitan/blob/master/net/turfwar...
So basically someone is running a script iterates over the whole ipv4 range and calls the claim endpoint with each single adress in the X-Forwared-For http header once.
That only works if the proxy is sitting on localhost or a local network, just setting the header shouldn't work.
(I came here because I was curious how jart got 127 and 10, but after seeing the source is their's that's less of wonder..)
bool IsPrivateIp(uint32_t x) {
}the code doesn't consider 127.0.0.0/8 as "private". I'm curious about 10.0.0.0/8 though.*
The line just under that prevents public IPs from using that function.
you are right, I totally read that wrong. Confirmation bias strikes again!
a simple proof of the opposite is that no one's yet to exploit any of the untaken ranges that way
Embedding images on a popular page?
But according to the servers status at http://35.223.193.241:443/statusz nearly all claim requests expected to get html back not images.
There's plenty of ways around that, for instance
orI don't know, but check out the "Recent Successful Claims" on the right.
Edit: Apparently they run https://novo.tf/, a CAPTCHA service, so they're probably using that to call out to ipv4.games from their clients.
There are VPNs which use residential endpoints. You essentially use other users' IPs there.
I wouldn't be surprised if they had it call out from guns.lol or something
They’re top of the list, so at least some is seeing that and choosing to add to it.
Maybe spoofing source IPs.
can't spoof the source IP in TCP communication, as the handshake cannot happen.
With UDP you can send whatever, but obviously you won't be able to receive the response.
It used to be possible back in the days when sequence numbers were easily guessable. (You'd obviously not be able to receive, only send, so you couldn't do TLS, but TLS had hardly been invented at the time.) Now operating systems are way too good for that. :-)
Botnet maybe.
_nobody_ would waste a botnet of 9 million unique IPs like this.
Well let's not get hasty... These are valuable internet points we're talking about here.
Not if it's your own, but this would be a great opportunity to redirect a botnet hitting your severs to generate some internet points instead
it would be pretty funi though
Heng Lu at it again it seems.
(2022)
Also, submission title “Welcome to the IPv4 Games” is altered; the original title is “IPv4 Turf War”.
Previously: https://news.ycombinator.com/item?id=32790429
Somebody is obviously monopolizing ipv4 space.