« BackWelcome to the IPv4 Gamesipv4.gamesSubmitted by chillax 19 hours ago
  • johnisgood 14 hours ago

    On the website, there was a link to a game: https://www.familiars.io

    I spent an hour playing it! It is quite good.

    Is there a source code available for this game?

    • HanClinto 9 hours ago

      Holy moley, that is some high-octane dopamine right there.

      Really fun game, thank you for linking it!

    • nicman23 16 hours ago

      femboy.cat with a casual 0.2% of the internet

      • vaylian 16 hours ago

        But how do they achieve that? Do you use a lot of VPNs?

        • maverwa 16 hours ago

          my first guess would be: server honors X-Forwarded-For where it should not?

          Edit: looks like thats it: https://github.com/jart/cosmopolitan/blob/master/net/turfwar...

          So basically someone is running a script iterates over the whole ipv4 range and calls the claim endpoint with each single adress in the X-Forwared-For http header once.

          • 3r7j6qzi9jvnve 15 hours ago

            That only works if the proxy is sitting on localhost or a local network, just setting the header shouldn't work.

            (I came here because I was curious how jart got 127 and 10, but after seeing the source is their's that's less of wonder..)

            • sgjohnson 13 hours ago

              bool IsPrivateIp(uint32_t x) {

                return (x >> 24) == 10                   /* 10.0.0.0/8  */
              
                       || (x & 0xfff00000) == 0xac100000 /* 172.16.0.0/12  */
              
                       || (x & 0xffff0000) == 0xc0a80000 /* 192.168.0.0/16  */;
              
              }

              the code doesn't consider 127.0.0.0/8 as "private". I'm curious about 10.0.0.0/8 though.*

            • viraptor 13 hours ago

              The line just under that prevents public IPs from using that function.

              • maverwa 12 hours ago

                you are right, I totally read that wrong. Confirmation bias strikes again!

              • elitepleb 15 hours ago

                a simple proof of the opposite is that no one's yet to exploit any of the untaken ranges that way

              • justusthane 6 hours ago

                I don't know, but check out the "Recent Successful Claims" on the right.

                Edit: Apparently they run https://novo.tf/, a CAPTCHA service, so they're probably using that to call out to ipv4.games from their clients.

                • nilsherzig 12 hours ago

                  Embedding images on a popular page?

                  But according to the servers status at http://35.223.193.241:443/statusz nearly all claim requests expected to get html back not images.

                  • gruez 11 hours ago

                    There's plenty of ways around that, for instance

                        <script src="https://ipv4.games/claim?name=gruez">
                    
                    or

                        <iframe src="https://ipv4.games/claim?name=gruez">
                  • adzm 10 hours ago

                    I wouldn't be surprised if they had it call out from guns.lol or something

                    • bombcar 12 hours ago

                      They’re top of the list, so at least some is seeing that and choosing to add to it.

                      • viraptor 14 hours ago

                        There are VPNs which use residential endpoints. You essentially use other users' IPs there.

                        • maldonad0 14 hours ago

                          Maybe spoofing source IPs.

                          • sgjohnson 14 hours ago

                            can't spoof the source IP in TCP communication, as the handshake cannot happen.

                            With UDP you can send whatever, but obviously you won't be able to receive the response.

                            • Sesse__ 13 hours ago

                              It used to be possible back in the days when sequence numbers were easily guessable. (You'd obviously not be able to receive, only send, so you couldn't do TLS, but TLS had hardly been invented at the time.) Now operating systems are way too good for that. :-)

                          • cedws 13 hours ago

                            Botnet maybe.

                            • sgjohnson 13 hours ago

                              _nobody_ would waste a botnet of 9 million unique IPs like this.

                              • usui 13 hours ago

                                Well let's not get hasty... These are valuable internet points we're talking about here.

                                • nilsherzig 12 hours ago

                                  Not if it's your own, but this would be a great opportunity to redirect a botnet hitting your severs to generate some internet points instead

                          • chrismorgan 13 hours ago

                            (2022)

                            Also, submission title “Welcome to the IPv4 Games” is altered; the original title is “IPv4 Turf War”.

                            Previously: https://news.ycombinator.com/item?id=32790429

                            • snvzz 13 hours ago

                              Somebody is obviously monopolizing ipv4 space.