Rizon Explained
Rizon is an Internet Relay Chat (IRC) network. The IRC network itself ranks number 5 among the largest IRC networks.[1] [2] Rizon is popular with many anime fansubbing groups who work online, many of whom provide their content through XDCC via IRC bots in their distribution channels. It is also used by many users of eRepublik as a means of communication.[3] File sharing of other copyrighted material such as Warez is also common in some channels on the network.[4] [5] [6] [7]
Rizon IRCd
Rizon currently uses Plexus IRCd. Plexus was coded specifically with Rizon in mind and is based on ircd-hybrid. Plexus is not exclusive to Rizon as the IRCd is also used by other networks. Plexus versions 1.x and 2.x were originally coded by static & peer. Plexus 3.x was rewritten by ThaPrince and is now maintained and developed by the Rizon Dev Team.
As of the r524 release, the ability for automatic services authentication using SSL client certificates has been implemented, and was largely based on the work done by OFTC, though significant changes were made regarding server-to-server communication.
Controversy
DDoS attack against mIRCX
In early 2004 the mIRCX and Aniverse IRC networks were the victims of Denial-of-service attacks (DDoS) and were forced to shut down temporarily; Aniverse later resumed operations at a greatly reduced capacity. This in turn caused approximately 8,000–10,000 IRC users of various anime fansubbing channels to migrate to Rizon. Rizon was forced to increase its number of servers to handle the additional users. This also had the effect of making Rizon a target for DDoS attacks.
Contrary to rumors, Rizon had no part in a DDoS attack against mIRCX in 2004. Richard "Krashed" Roby was the actual perpetrator who initiated the attacks in retaliation against CJB networks for shutting down his botnet.[8] Roby was later raided by the FBI as part of Operation Cyberslam.[9] [10] Initial charges brought against Roby as part of Operation Cyberslam were dropped but he later pleaded guilty to lesser charges and was sentenced to an 18-month prison sentence.[11] [12] [13]
DDoS attacks against rival networks
On May 25, 2007, as part of conducted by the FBI, Rizon's founder, Jason Michael Downey aka "Nessun" was charged with using a botnet in 2004 to launch Denial-of-service attacks (DDoS) against other computer networks, including rival IRC networks such as IRCHighway.[14] [15] [16] [17] [18]
On June 20, 2007, Downey pleaded guilty in a US Federal court to operating a botnet "of up to 6,000 infected computers" and using it to launch DDoS attacks "From on or about June 18, 2004 through on or about September 5, 2004." Downey faced up to 24 months in prison and a fine of up to $40,000.
When asked his reasons behind performing the DDoS attacks, Downey explained to U.S. District Judge Nancy G. Edmunds that "I was doing it because I could, more than anything," and "It was a dumb thing to do."[19]
Downey was sentenced on October 23, 2007, to 12 months in prison for causing over $20,000 in losses and damages due to unlawful computer intrusion and was ordered to pay a total of $21,110 in damages to 3 companies that were affected by his DDoS attacks. After his release, Downey will have a probation term of 3 years with no computer access without prior permission and will have to perform 150 hours of community service.[20] [21] [22]
External links
Notes and References
- Web site: IRC Networks - Top 100. 2011-11-15.
- Book: Piccard. Paul. Baskin. Brian. Edwards. Craig. Spillman. George. Sachs. Marcus. Marcus Sachs. foreword by Kevin Beaver. Securing IM and P2P Applications for the Enterprise. 1st. 2005-05-01. Syngress Publishing. Rockland, Massachusetts. 978-1-59749-017-7. 371. Internet Relay Chat - Major Players of IRC.
- Book: Piccard. Paul. Baskin. Brian. Edwards. Craig. Spillman. George. Sachs. Marcus. Marcus Sachs. foreword by Kevin Beaver. Securing IM and P2P Applications for the Enterprise. 1st. 2005-05-01. Syngress Publishing. Rockland, Massachusetts. 978-1-59749-017-7. 387. IRC Networks and Security.
- Book: Wang
, Wallace
. Steal this File Sharing Book . 1st . 2004-10-25 . . . 978-1-59327-050-6 . 63 . Instant Messaging and Online Chat Rooms . Three of the most popular networks used for file trading include Undernet, Rizon, and EFnet. . registration . https://archive.org/details/stealthisfilesha00wang/page/63.
- Book: Piccard. Paul. Baskin. Brian. Edwards. Craig. Spillman. George. Sachs. Marcus. Marcus Sachs. foreword by Kevin Beaver. Securing IM and P2P Applications for the Enterprise. 1st. 2005-05-01. Syngress Publishing. Rockland, Massachusetts. 978-1-59749-017-7. 372. Internet Relay Chat - Major Players of IRC.
- Book: Office of the United States Trade Representative. Office of the United States Trade Representative. National Trade Estimate Report on Foreign Trade Barriers, 2006. 21st. 2006-04-21. United States Government Printing Office. 0-16-075976-5. 256.
- Web site: Office of the United States Trade Representative . Office of the United States Trade Representative . National Trade Estimate Report on Foreign Trade Barriers, 2006 . 2009-03-07 . 2006-03-31 . 263 . dead . https://web.archive.org/web/20090114211508/http://www.ustr.gov/assets/Document_Library/Reports_Publications/2006/2006_NTE_Report/asset_upload_file929_9220.pdf . January 14, 2009.
- Web site: Why irc.mircx was shut down. 8 November 2015. 20 February 2004. https://web.archive.org/web/20120925224612/http://www.anime-planet.com/forum/faq-tutorials/2742-why-irc-mircx-shut-down.html. 25 September 2012. dead.
- Web site: FBI busts alleged DDoS Mafia. 2009-03-02. Poulsen. Kevin. Kevin Poulsen. 2004-08-26. SecurityFocus.
- Web site: UNITED STATES OF AMERICA v. PAUL G. ASHLEY, JONATHAN DAVID HALL, JOSHUA JAMES SCHICHTEL, RICHARD ROBY and LEE GRAHAM WALKER. 2009-03-02. 2004-09-25.
- Hackers Admit to Wave of Attacks. 2009-03-02. Poulsen. Kevin. Wired. Kevin Poulsen. 2005-09-08. Wired News.
- Web site: Hired Internet Gun Sentenced to Two Years. 2009-03-02. Brian. Krebs. Brian Krebs. 2006-05-01. Security Fix. Washington Post.
- Web site: FooNET/HTTPD/CIT updates and information. 2009-03-02.
- Web site: UNITED STATES OF AMERICA v. D-1 JASON MICHAEL DOWNEY . 2009-03-02 . 2007-05-25 . dead . https://web.archive.org/web/20080829104026/http://www.spamsuite.com/book/export/html/150 . 2008-08-29 .
- Web site: Nessun Goes to Jail . 2009-03-02 . 2007-10-27 . IRC-Junkie.org . dead . https://web.archive.org/web/20090223233024/http://www.irc-junkie.org/2007-10-27/nessun-goes-to-jail/ . 2009-02-23 .
- Web site: Over 1 Million Potential Victims of Botnet Cyber Crime . 2009-03-02 . FBI National Press Office . 2007-06-13 . Press Release . . Jason Michael Downey of Covington, Kentucky, is charged with an Information with using botnets to send a high volume of traffic to intended recipients to cause damage by impairing the availability of such systems. (FBI Detroit) . dead . https://web.archive.org/web/20090221123138/https://www.fbi.gov/pressrel/pressrel07/botnet061307.htm . February 21, 2009 .
- Web site: FBI Announces Botnet Dragnet. 2009-03-02. O'Brien. Luke. 2007-06-13. Threat Level. Wired News.
- Web site: FBI cracks down on 'bot herders'. 2009-03-02. Acohido. Byron. 2007-06-13. USA Today.
- Web site: Nessun: "Because I Could" . 2009-03-02 . 2007-06-26 . IRC-Junkie.org . dead . https://web.archive.org/web/20090223222509/http://www.irc-junkie.org/2007-06-26/nessun-because-i-could/ . 2009-02-23 .
- Web site: "Bot Roast II" Nets 8 Individuals. 2009-03-02. FBI National Press Office. 2007-11-29. Press Release. Federal Bureau of Investigation. Downey operated Internet Relay Chat (IRC) network Rizon. Downey stated that most of the attacks he committed were on other IRC networks or on the people that operated them..
- Web site: FBI's Operation Bot Roast II nets additional indictments, sentences. 2009-03-02. Vamosi. Robert. 2007-11-29. CNET News.
- Web site: True crime: The botnet barons . 2009-03-02 . Brandt . Andrew . 2007-12-17 . . 5 . dead . https://web.archive.org/web/20080618051715/http://www.infoworld.com/article/07/12/17/50FE-busted-botmen_5.html . 2008-06-18 .