-
Notifications
You must be signed in to change notification settings - Fork 54
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
expose UID in (cliconn,cliexit,nick_change) snotes #300
Comments
I'm generally in favour but the impression I get from the code is that people have tried quite hard to fix UID leaks, and I'd like to know if there's a particular technical reason for that I'm not thinking of. |
except in nick collisions which is arguably the most well exposed |
I'm not sure what the value of hiding UID is. It's exposed by SAVE, and it's not difficult to tell the UID has changed (or not) through other means (WHOIS connect time). It's not particularly meaningful data other than a shortcut to identifying that the person is the same person they were before, assuming the ircd itself wasn't restarted in the intervening time as well. |
tangential but i wonder if i should instead take this as an opportunity to make more bot-parse-friendly information-dense forms of snotes instead of trying to shoehorn UID in to cliconns/etc |
this might not be a good idea, but i'd like some discussion!
if a bot that keeps track of which users are on the network has to reboot, it has to immediately dispose of that state because it doesn't know if users have reconnected since. this could be best-effort solved by being able to compare the UID you used to know them by with the UID they currently have.
would also maybe be nice to expose this in
WHOIS
The text was updated successfully, but these errors were encountered: