Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implementation of VPN and Proxy Checker #85

Closed
Sporesirius opened this issue Apr 11, 2018 · 9 comments
Closed

Implementation of VPN and Proxy Checker #85

Sporesirius opened this issue Apr 11, 2018 · 9 comments
Assignees
Labels
enhancement p:low Low Priority Issue

Comments

@Sporesirius
Copy link
Contributor

Sporesirius commented Apr 11, 2018

Implementation of VPN and Proxy Checker

Forum
https://forum.teaspeak.de/index.php?threads/vpn-blocker.129/

Function
Checks if a user is using a VPN or a proxy.

Command suggestion
b_client_vpncheck_bypass

Service
https://vpnblocker.net/

@Sporesirius Sporesirius changed the title Implementation of VPN Checker Implementation of VPN and Proxy Checker Apr 11, 2018
@Bluscream
Copy link
Contributor

Bluscream commented Apr 11, 2018

If at all it's b_client_vpncheck_bypass since it's a boolean.

Also there are plenty of bots out there that already have vpn checking

  • vpn checker by gzpro
  • sprummlbot
  • ispvalidator plugin for pytson and ts3audiobot

Just to name a few

Sent from my TAB 2 A10 using FastHub

@schoerg
Copy link

schoerg commented Apr 13, 2018

vpnblocker.net seems to be very inaccurate.
does it only check VPN providers? Because servers of mine are still showing as "valid" IPs.

@WolverinDEV
Copy link
Member

If cause it just could check VPN providers.
It's nearly impossible to detect all vpn's

@Bluscream
Copy link
Contributor

Yeah the only real way would be a well maintained list of IP ranges owned by legit home ISP's and AFAIK that's not a thing yet

@schoerg
Copy link

schoerg commented Apr 13, 2018

What for anyway? if people are circumventing bans, increase the security level.

@Bluscream
Copy link
Contributor

Bluscream commented Apr 13, 2018

@schoerg thats no longer effective, there are tools that allow malicious users to increase their security level up to 800% faster than legit users.

Sent from my TAB 2 A10 using FastHub

@Bluscream Bluscream added p:low Low Priority Issue p:medium Medium Priority Issue and removed p:medium Medium Priority Issue labels Apr 20, 2018
@Bluscream Bluscream assigned WolverinDEV and unassigned WolverinDEV Apr 23, 2018
@WolverinDEV
Copy link
Member

I think its not necessary to implement someones vpn api (which is may even wrong)
I think the max clone limits for ip and hwid do a really great job :)

@ghost
Copy link

ghost commented Aug 1, 2018

As an alternative you could use this IP range list of datacenters: https://github.com/client9/ipcat/blob/master/datacenters.csv.

It is licensed under GPLv3 and would make the integration loosely coupled in comparison to an API. It may be not as good as a professional VPN detection API nor does it have complete coverage but I think it is good enough for most cases.

@WolverinDEV WolverinDEV reopened this Aug 1, 2018
@WolverinDEV
Copy link
Member

Implemented within the next version :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement p:low Low Priority Issue
Projects
None yet
Development

No branches or pull requests

4 participants