Rizon
Rizon is a large Internet Relay Chat (IRC) network with an average of around 20,000 users. The IRC network itself ranks number 5 among the largest IRC networks.[1][2] Rizon is popular with many anime fansubbing groups who work online, many of whom provide their content through XDCC via IRC bots in their distribution channels. It is also used by many users of eRepublik as a means of communication.[3] File sharing of other copyrighted material such as Warez is also common in some channels on the network.[4][5][6][7]
Founded | July 2002 |
---|---|
Geographic location | Europe Canada United States Asia |
Based in | Worldwide |
Website URL | rizon |
Primary DNS | irc.rizon.net |
Average users | 18,000 – 21,000 |
Average channels | 22,000 – 25,000 |
Average servers | 20 |
Content/subject | Public/Unrestricted |
Rizon IRCd
Rizon currently uses Plexus IRCd. Plexus was coded specifically with Rizon in mind and is based on ircd-hybrid. Plexus is not exclusive to Rizon as the IRCd is also used by other networks. Plexus versions 1.x and 2.x were originally coded by static & peer. Plexus 3.x was rewritten by ThaPrince and is now maintained and developed by the Rizon Dev Team.
As of the r524 release, the ability for automatic services authentication using SSL client certificates has been implemented, and was largely based on the work done by OFTC , though significant changes were made regarding server-to-server communication.
Controversy
DDoS attack against mIRCX
In early 2004 the mIRCX and Aniverse IRC networks were the victims of Denial-of-service attacks (DDoS) and were forced to shut down temporarily; Aniverse later resumed operations at a greatly reduced capacity. This in turn caused approximately 8,000–10,000 IRC users of various anime fansubbing channels to migrate to Rizon. Rizon was forced to increase its number of servers to handle the additional users. This also had the effect of making Rizon a target for DDoS attacks.
Contrary to rumors, Rizon had no part in a DDoS attack against mIRCX in 2004. Richard "Krashed" Roby was the actual perpetrator who initiated the attacks in retaliation against CJB networks for shutting down his botnet.[8] Roby was later raided by the FBI as part of Operation Cyberslam.[9][10] Initial charges brought against Roby as part of Operation Cyberslam were dropped but he later pleaded guilty to lesser charges and was sentenced to an 18-month prison sentence.[11][12][13]
DDoS attacks against rival networks
On May 25, 2007, as part of Operation: Bot Roast conducted by the FBI, Rizon's founder, Jason Michael Downey aka "Nessun" was charged with using a botnet in 2004 to launch Denial-of-service attacks (DDoS) against other computer networks, including rival IRC networks such as IRCHighway.[14][15][16][17][18]
On June 20, 2007, Downey pleaded guilty in a US Federal court to operating a botnet "of up to 6,000 infected computers" and using it to launch DDoS attacks "From on or about June 18, 2004 through on or about September 5, 2004." Downey faced up to 24 months in prison and a fine of up to $40,000.[14]
When asked his reasons behind performing the DDoS attacks, Downey explained to U.S. District Judge Nancy G. Edmunds that "I was doing it because I could, more than anything," and "It was a dumb thing to do."[19]
Downey was sentenced on October 23, 2007, to 12 months in prison for causing over $20,000 in losses and damages due to unlawful computer intrusion and was ordered to pay a total of $21,110 in damages to 3 companies that were affected by his DDoS attacks. After his release, Downey will have a probation term of 3 years with no computer access without prior permission and will have to perform 150 hours of community service.[14][15][20][21][22]
References
- "IRC Networks - Top 100". Retrieved 2011-11-15.
- Piccard, Paul; Baskin, Brian; Edwards, Craig; Spillman, George (2005-05-01). "Internet Relay Chat—Major Players of IRC". In Sachs, Marcus (ed.). Securing IM and P2P Applications for the Enterprise. foreword by Kevin Beaver (1st ed.). Rockland, Massachusetts: Syngress Publishing. p. 371. ISBN 978-1-59749-017-7.
- Piccard, Paul; Baskin, Brian; Edwards, Craig; Spillman, George (2005-05-01). "IRC Networks and Security". In Sachs, Marcus (ed.). Securing IM and P2P Applications for the Enterprise. foreword by Kevin Beaver (1st ed.). Rockland, Massachusetts: Syngress Publishing. p. 387. ISBN 978-1-59749-017-7.
- Wang, Wallace (2004-10-25). "Instant Messaging and Online Chat Rooms". Steal this File Sharing Book (1st ed.). San Francisco, California: No Starch Press. p. 63. ISBN 978-1-59327-050-6.
Three of the most popular networks used for file trading include Undernet, Rizon, and EFnet.
- Piccard, Paul; Baskin, Brian; Edwards, Craig; Spillman, George (2005-05-01). "Internet Relay Chat—Major Players of IRC". In Sachs, Marcus (ed.). Securing IM and P2P Applications for the Enterprise. foreword by Kevin Beaver (1st ed.). Rockland, Massachusetts: Syngress Publishing. p. 372. ISBN 978-1-59749-017-7.
- Office of the United States Trade Representative (2006-04-21). National Trade Estimate Report on Foreign Trade Barriers, 2006 (21st ed.). United States Government Printing Office. p. 256. ISBN 0-16-075976-5.
- Office of the United States Trade Representative (2006-03-31). "National Trade Estimate Report on Foreign Trade Barriers, 2006" (PDF). p. 263. Archived from the original (PDF) on January 14, 2009. Retrieved 2009-03-07.
- "Why irc.mircx was shut down". 20 February 2004. Archived from the original on 25 September 2012. Retrieved 8 November 2015.
- Poulsen, Kevin (2004-08-26). "FBI busts alleged DDoS Mafia". SecurityFocus. Retrieved 2009-03-02.
- "UNITED STATES OF AMERICA v. PAUL G. ASHLEY, JONATHAN DAVID HALL, JOSHUA JAMES SCHICHTEL, RICHARD ROBY and LEE GRAHAM WALKER" (PDF). 2004-09-25. Retrieved 2009-03-02.
- Poulsen, Kevin (2005-09-08). "Hackers Admit to Wave of Attacks". Wired. Wired News. Retrieved 2009-03-02.
- Brian, Krebs (2006-05-01). "Hired Internet Gun Sentenced to Two Years". Security Fix. Washington Post. Retrieved 2009-03-02.
- "FooNET/HTTPD/CIT updates and information". Retrieved 2009-03-02.
- "UNITED STATES OF AMERICA v. D-1 JASON MICHAEL DOWNEY". 2007-05-25. Archived from the original on 2008-08-29. Retrieved 2009-03-02.
- "Nessun Goes to Jail". IRC-Junkie.org. 2007-10-27. Archived from the original on 2009-02-23. Retrieved 2009-03-02.
- FBI National Press Office (2007-06-13). "Over 1 Million Potential Victims of Botnet Cyber Crime". Press Release. Federal Bureau of Investigation. Archived from the original on February 21, 2009. Retrieved 2009-03-02.
Jason Michael Downey of Covington, Kentucky, is charged with an Information with using botnets to send a high volume of traffic to intended recipients to cause damage by impairing the availability of such systems. (FBI Detroit)
- O'Brien, Luke (2007-06-13). "FBI Announces Botnet Dragnet". Threat Level. Wired News. Retrieved 2009-03-02.
- Acohido, Byron (2007-06-13). "FBI cracks down on 'bot herders'". USA Today. Retrieved 2009-03-02.
- "Nessun: "Because I Could"". IRC-Junkie.org. 2007-06-26. Archived from the original on 2009-02-23. Retrieved 2009-03-02.
- FBI National Press Office (2007-11-29). ""Bot Roast II" Nets 8 Individuals". Press Release. Federal Bureau of Investigation. Retrieved 2009-03-02.
Downey operated Internet Relay Chat (IRC) network Rizon. Downey stated that most of the attacks he committed were on other IRC networks or on the people that operated them.
- Vamosi, Robert (2007-11-29). "FBI's Operation Bot Roast II nets additional indictments, sentences". CNET News. Retrieved 2009-03-02.
- Brandt, Andrew (2007-12-17). "True crime: The botnet barons". InfoWorld. p. 5. Archived from the original on 2008-06-18. Retrieved 2009-03-02.