-
Notifications
You must be signed in to change notification settings - Fork 58
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Find newTrackon's scanning server IP address based on request characteristics #219
Comments
Hi! The owner of the tracker can initiate the request, so not much can be done to avoid revealing the IP that newTrackon uses to check trackers status. I could use a pool of IPs in different ASN, but that would be more expensive and operationally complex, and would only make detection a bit harder, not impossible. I could use Tor, but that's blocked by default on many networks, so it would decrease the reliability of the checks. I don't expect newTrackon's relationship with trackers to be adversarial. There's no financial incentive to run an open BitTorrent tracker, so I expect trackers operators to just be nice. Anyone can run newTrackon locally, https://newtrackon.com/ just a best-effort demonstration of the project. |
Yes, I agree with you. However, I was thinking that if I provide newTrackon with a dedicated tracker server to respond to the check, I can get a longer cumulative online time, a shorter response time, and thus a better ranking. Many TrackersLists use newTrackon's data for reference. By cheating, I can get better rankings and referrals. |
You're right, but I fail to see why anybody would do that. Running an open BitTorrent tracker is altruistic, nobody is going to profit from it, so I don't see the point in cheating. Since I'm not willing to spend effort on preventing this, if I found evidence of widespread cheating, I'd probably just shut down https://newtrackon.com/ and keep maintaining the project without the website. |
Agree with your point of view! There really is no reason to cheat. Thank you for your reply. |
Therefore, this operation is based on the premise that there is an accurate time stamp, and secondly, it needs to be screened multiple times to determine the intersection. And this way actually becomes impossible in case of intentional blocking (eg: random timestamp) |
On a whim, I thought I could identify who "newTrackon" was
Collect the characteristics of newTrackon:
newTrackon/newTrackon/scraper.py
Line 26 in da150c1
newTrackon/newTrackon/scraper.py
Lines 200 to 210 in da150c1
View the html source code of https://newtrackon.com, get the following snippet:
get
<span data-livestamp="1679661252"></span>
, this is the timestamp.Scan my log files:
convert timestamp:
I caught you!
what can we do?
No idea, I'm just exploring.
The text was updated successfully, but these errors were encountered: