| ==Phrack Magazine== | |
| Volume Five, Issue Forty-Five, File 4 of 28 | |
| // // /\ // ==== | |
| // // //\\ // ==== | |
| ==== // // \\/ ==== | |
| /\ // // \\ // /=== ==== | |
| //\\ // // // // \=\ ==== | |
| // \\/ \\ // // ===/ ==== | |
| PART I | |
| ------------------------------------------------------------------------------ | |
| !! NEW PHRACK CONTEST !! | |
| Phrack Magazine is sponsoring a programming contest open to anyone | |
| who wishes to enter. | |
| Write the Next Internet Worm! Write the world's best X Windows wardialer! | |
| Code something that makes COPS & SATAN look like high school Introduction | |
| to Computing assignments. Make the OKI 1150 a scanning, tracking, vampire- | |
| phone. Write an NLM! Write a TSR! Write a stupid game! It doesn't | |
| matter what you write, or what computer it's for! It only matters that you | |
| enter! | |
| Win from the following prizes: | |
| Computer Hardware & Peripherals | |
| System Software | |
| Complete Compiler packages | |
| CD-ROMS | |
| T-Shirts | |
| Magazine Subscriptions | |
| and MANY MORE! | |
| STOP CRACKING PASSWORDS AND DO SOMETHING WITH YOUR LIFE! | |
| Enter the PHRACK PROGRAMMING CONTEST! | |
| The rules are very simple: | |
| 1) All programs must be original works. No submissions of | |
| previously copyrighted materials or works prepared by | |
| third parties will be judged. | |
| 2) All entries must be sent in as source code only. Any programming | |
| language is acceptable. Programs must compile and run without | |
| any modifications needed by the judges. If programs are specific | |
| to certain platforms, please designate that platform. If special | |
| hardware is needed, please specify what hardware is required. | |
| If include libraries are needed, they should be submitted in addition | |
| to the main program. | |
| 3) No virii accepted. An exception may be made for such programs that | |
| are developed for operating systems other than AMIGA/Dos, System 7, | |
| MS-DOS (or variants), or OS/2. Suitable exceptions could be, but are not | |
| limited to, UNIX (any variant), VMS or MVS. | |
| 4) Entries may be submitted via email or magnetic media. Email should be | |
| directed to phrack@well.com. Tapes, Diskettes or other storage | |
| media should be sent to | |
| Phrack Magazine | |
| 603 W. 13th #1A-278 | |
| Austin, TX 78701 | |
| 5) Programs will be judged by a panel of judges based on programming skill | |
| displayed, originality, usability, user interface, documentation, | |
| and creativity. | |
| 6) Phrack Magazine will make no claims to the works submitted, and the | |
| rights to the software are understood to be retained by the program | |
| author. However, by entering, the Author thereby grants Phrack Magazine | |
| permission to reprint the program source code in future issues. | |
| 7) All Entries must be received by 12-31-94. Prizes to be awarded by 3-1-95. | |
| -------------------------INCLUDE THIS FORM WITH ENTRY------------------------- | |
| Author: | |
| Email Address: | |
| Mailing Address: | |
| Program Name: | |
| Description: | |
| Hardware & Software Platform(s) Developed For: | |
| Special Equipment Needed (modem, ethernet cards, sound cards, etc): | |
| Other Comments: | |
| ------------------------------------------------------------------------------ | |
| Novell NetWare & Ethernet address spoofing with ODI | |
| --------------------------------------------------- | |
| Just to save you from the boredom of Yet Another UNIX Security Weakness, here | |
| are some things to consider about Novell NetWare for your next Security Audit | |
| or Hacking session (depending on which side you are on). | |
| Novell claim to have over 20 million PCs using their network operating system, | |
| substantially more than the estimated 4 million TCP/IP systems worldwide. | |
| There are many reasons for its popularity and its 60 to 80% market share, one | |
| of which has been its relatively good security. | |
| NetWare has been one of the few widely available systems which offer some form | |
| of login encryption of accounts and passwords over the wire, as standard, | |
| unlike most of its rivals which send them out as plaintext, even if they are | |
| stored in an encrypted form eventually. Novell now offer RSA based public key | |
| encryption of the data as well. | |
| However, since it is so popular, there are likely to be plenty of systems out | |
| there which have not been upgraded to the latest versions and patch releases | |
| and which may be still be vulnerable to programs like KNOCK , the patched | |
| ATTACH command (published in HackTic 16/17 1992), or the University of Leiden's | |
| HACK (which has been published in issue 43 of PHRACK) | |
| Since the latest security features are implemented as NetWare Loadable Modules | |
| for NetWare 3x and 4x, but as Value Added Processes for NetWare 2x, which | |
| require the server to be brought down to install them, it is likely that there | |
| are many NetWare 2x systems which are still vulnerable | |
| I shall also assume that you are not on one of those wide open "box shift" | |
| installations where none of the security features have been switched on (try | |
| logging in as SUPERVISOR or GUEST without a password), all the programs and | |
| data are in a single SYS: volume and the Network Address of the cable is the | |
| default 00000001. | |
| Like any project, the more you know about your particular Novell LAN, the | |
| easier it gets to "explore". Login as GUEST or a normal account. | |
| Try to see who else is on the system e.g. | |
| USERLIST /A >c:\ulist.txt | |
| will give you a list of users currently logged in, with their Ethernet card | |
| addresses saved to a text file . Your current connection will be marked with | |
| an asterisk. If your system has 100 or more users, then any sane Supervisor | |
| will have used some form of logic when allocating the user's login accounts, | |
| probably based on personnel or id number, often including their initials. | |
| SYSCON with privilege is what you are aiming to be able to use, but even | |
| without any privileges, you can still use it to look at your own account, | |
| change your password etc. You can also see a list of all the other registered | |
| users. | |
| This should help you sort the accounts into normal and privileged accounts | |
| (obviously SUPERVISOR, but often there are SUPERVISOR equivalent accounts, or | |
| Work Group Manager accounts which stand out from the list). You are quite | |
| likely to see an account called something like TAPE_BACKUP or DATA_LOGGER, | |
| TRAINER, STUDENT1, STUDENT2 i.e. accounts which do not belong to individual | |
| humans. These often require abnormal security privileges e.g. normal users may | |
| have their connections broken by the WATCHDOG at say midnight, to ensure that | |
| they are not modifying files during the nightly tape backup. At an academic or | |
| industrial site, you are likely to find data logging PCs connected to | |
| instrumentation or machinery which needs to be monitored or controlled 24 | |
| hours a day. These PCs are likely to have 24 hour accounts which are not time | |
| restricted at weekends, for example. | |
| Since it is usually more practical to do tape backups (DAT or helical scan) | |
| from a separate, dedicated PC rather than from the fileserver itself (one tape | |
| unit might also back up several fileservers), these PCs are likely to use an | |
| account e.g. TAPE_BACKUP which is a SUPERVISOR equivalent. If you can get | |
| physical access to this sort of PC, either datalogger, or tape backup unit, | |
| you have a good chance of finding the password on the local drive C:, | |
| possibly in a file with Hidden and/or System attributes (have a look at the | |
| AUTOEXEC.BAT and see what it calls) | |
| The security aware Novell supervisors, will have set up any such accounts with | |
| an extra level of security which restricts logins to only those Ethernet | |
| addresses which have been specified. The really sensible ones will have made | |
| sure that any such machines are sited in physically secure areas, as well. | |
| Although this is a very good idea, from the security point of view, Novell | |
| have now provided a mechanism which allows you to get around this: | |
| the replacement for monolithic IPX/NETX called Open Datalink Interface (ODI) | |
| Novell's ODI, and its slower Microsoft equivalent Network Driver Interface | |
| Specification (NDIS), both work by putting a common layer of software between | |
| the hardware of the Network Interface Card and the rest of the MSDOS | |
| Redirector. This allows multiple protocol stacks and frame types to be bound | |
| to the same physical card e.g. | |
| IPX TCP/IP NETBeui DECnet Appletalk | |
| ---------------------------------------------- | |
| Link Support Layer | |
| ---------------------------------------------- | |
| Hardware Specific device driver e.g. NE2000 | |
| Thus, to start up NetWare on older systems, you had to generate a hardware | |
| specific version of IPX.EXE for your Ethernet card, | |
| IPX | |
| NETX | |
| Extra parameters were set in SHELL.CFG, now under ODI, things are a little | |
| bit more complex: | |
| LSL | |
| NE2000 | |
| IPXODI | |
| NETX | |
| The same parameters as in SHELL.CFG such as preferred server or machine type | |
| (if you have different versions of MSDOS for different types of PC) can be | |
| specified in NET.CFG. With ODI, there are more parameters for NET.CFG but the | |
| worrying/interesting one is the ability to specify a different MAC level | |
| address to that of your actual Ethernet card. It needs this ability | |
| to cope with TCP/IP or DECnet coexistence e.g. | |
| BUFFERS 100 | |
| MACHINE TYPE COMPAQ | |
| PREFERRED SERVER FINANCE | |
| NODE ADDRESS AA-00-04-00-12-34 | |
| Since this DECnet address does not depend on the "real" unique Ethernet | |
| address which has been burnt into the PROM on the card and is centrally | |
| registered (originally by Xerox, but now by the IEEE), this mechanism allows | |
| you to put a different Ethernet card address into NET.CFG, thereby fooling the | |
| Address Restriction security. | |
| e.g. NODE ADDRESS 02-60-80-12-34-56 | |
| This is where the data you gathered earlier with USERLIST and SYSCON becomes | |
| threatening/useful. | |
| Of course, if your target PC is on a different LAN segment, there may be Routers | |
| or intelligent hubs which restrict your ability to do this, or at least record | |
| attempts in a log files which can trace your activity, provided that suspicions | |
| are aroused before they are periodically wiped out. | |
| How much of a security threat this little work around constitutes depends on | |
| your specific site, but there is another danger/opportunity, namely that of a | |
| denial of service or nuisance attack on the LAN. | |
| If you set this connection parameter to be the same as that of another PC, the | |
| fileserver (Novell, DEC or UNIX) and the Ethernet has no way of preventing | |
| some packets intended for just one unique address going to the other, if they | |
| are both online at the same time. This usually results in PC hangs, incomplete | |
| closure of files, File Allocation Table problems (usually curable by running | |
| CHKDSK C: /F, but not within Windows or you will make things worse). | |
| If by accident or design, you set your PC to have the same address as the | |
| fileserver (Novell, DEC or UNIX) or a router, then you can cause havoc to the | |
| whole network segment (even before you have started to play your multiplayer | |
| DOOM Deathmatch !). | |
| This could be achieved with a simple command in the AUTOEXEC.BAT e.g. | |
| echo NODE ADDRESS fileserver Ethernet address >>C:\ODI\NET.CFG | |
| which will only take effect the next time the PC is re-booted (allowing a good | |
| headstart for the perpetrator) | |
| This could also be the payload of a virus, which would cause more havoc than | |
| simply trashing the hard disk of a single PC. | |
| This problem is due to the inherent design weaknesses of TCP/IP and DECnet, | |
| which were developed at a time when the number of mini-computers that they | |
| connected could be counted on your fingers,. DEC or Xerox or Prime etc | |
| sales teams could only have dreamed of selling thousands of mini computers to a | |
| single customer. Nowadays, thousands of PCs connected to central servers are | |
| quite common, and the problems of duplicate addresses is significant. | |
| These same features are what make Ethernet Packet Sniffing possible, which | |
| is what was behind the recent CERT warning and media hype about Internet | |
| password security, but that is a topic for another article. | |
| Otaku | |
| ------------------------------------------------------------------------------ | |
| $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ | |
| SCAMMING | |
| DIFFERENT TECHNIQUES AND | |
| PROCEDURES | |
| BY: MARZ | |
| $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ | |
| Table of Contents: | |
| 1.0 Intro | |
| 1.1 Different types of scams | |
| 1.2 The right one for you | |
| 2.0 The Pledge scam | |
| 2.1 The Donation scam | |
| 2.2 The Selling scam | |
| 3.0 What to wear | |
| 3.1 Where to go | |
| 4.0 Thanks | |
| 1.0 The Intro | |
| First off I would like to say that this file is for entertainment only | |
| and that you really shouldn't do the stuff mentioned, and the writer doesn't | |
| take any responsibility for any of the crap people do. | |
| 1.1 Different types of scams | |
| Ok in this file I will tell you about 3 types of scams the Pledge scam, | |
| The Donation scam, and the Selling scam. There are many other scams out there | |
| which I will cover in future files for instance credit card scams although | |
| companies are trying harder and harder to prevent this it is still happening. | |
| 1.2 The right one for you | |
| Al right now every person is different so in turn so are scams and some | |
| people and scams don't mix to well for instance if you way 300 Pounds you cant | |
| really say you are the start cross country runner. So if you are 300 pounds say | |
| you are the start wrestler/football player. Also age plays a BIG factor if | |
| you are 30 years old you aren't going to pass to well for a high school | |
| football player (you always could say you flunked) and if you are 10 years old | |
| people aren't going to be to anxious to give you donations to save the Rain | |
| Forests. Al right I am going to start going into more detail about the right | |
| scam for you. | |
| Look at my little chart below: | |
| Age good scam | |
| ----- ----------- | |
| -10 | selling or pledge | |
| 11-17 | selling, pledge , or maybe even donations (if old looking) | |
| 18+ | selling and donations | |
| 2.0 The Pledge scam | |
| Al right this scam works great for kids still in school go around asking | |
| people (that don't live around you) to pledge money for you so your team can | |
| afford to go to the state meet or what ever. For example one I use is I go to | |
| peoples houses asking for donations in my Track teams Lap-athon saying that we | |
| will be running laps for 3 hours to raise money so we can go and compete in the | |
| state meet. I will ask people if they want to pledge a certain flat amount or | |
| if they would like to pay me for each individual lap. I will normally have | |
| printed out a sheet like the one bellow on my computer . | |
| Name Address Amount/lap | |
| Not only does having a sheet like that help you keep track of who bought | |
| your scam and who you need to collect from it makes the target (person your | |
| trying to scam) not worried like they might be if they see you writing it on a | |
| sheet of note book paper. Now then you have collected a list of people wiling | |
| to pledge you go back to the address you wrote down and tell them (for | |
| example you ran 91 laps in 3 hours) make sure your number is not totally out of | |
| per portion like I ran 150 laps in 3 hours. Also for some reason numbers like | |
| 50, 70, 80, 110 people don't like people like to see 41, 73, 127, etc.. don't | |
| ask me why but that's what I have noticed. Ok so you now are at the persons | |
| house and they ask if they can write a check oh shit not a check.. well there's | |
| a couple things you could do ask them if they could possibly make it cash ( | |
| Might make them suspicious) ask them to write it to your coach give them your | |
| name (VERY dangerous) or you could just give them a phony name and lose out. | |
| One time this happened to me a lady pledged me $.25 a lap (very high amount | |
| you won't get much of these) and I told her I ran 93 laps she believed me and | |
| wanted to make out a check for the amount which was about $23 at that | |
| time I just happened to be buying some computer equipment I knew the | |
| guy's name so I gave her that name and I paid for some of the equipment with | |
| that check. Like I said earlier a 300 pound guy isn't going to be convincing | |
| for running 90 some laps in 3 hours. So customize it to your self. | |
| 2.1 The Donation scam | |
| This scam works better for the older people out there just because people | |
| normally aren't to anxious to give a ten year old Twenty dollars to help | |
| save the whales. Ok with this scam you need to know what about what you are | |
| going to try to fake donations for so example if you are going to pose as a | |
| volunteer person to collect donations for saving the rain forest you better | |
| know something about rain forest, Be cause you never know when your going to | |
| run into that know it all rain forest hater who will try to debate why | |
| people should spend their money on saving some trees and such. It is a good | |
| idea to do some research on the field you will be portraying (read magazine and | |
| newspaper articles). Ok so now you have your idea and your ready to | |
| go..this is a scenario of how it might go: | |
| You: Hello sir/ma'am I represent the national foundation of Rain forest | |
| saving (try to use a real group name) we are currently searching for | |
| funding for our operations at saving the rain forests of the world | |
| would you be interested in donating some money for our cause? | |
| Them: Why do we need the rain forest? | |
| You: (just keep bullshitting along..) | |
| Them: OK, here's $20. | |
| (they also may say:) | |
| Them: Get the fuck off my property before I shoot your ass. | |
| (make sure that you don't raise a riot then but later that night go back | |
| and egg the hell out of the house..) | |
| This scam has some possibilities you could carry this on for along time | |
| and bring it to real higher levels if your willing to put in the time and | |
| effort. First thing would be to research your field EVEN more so you know | |
| almost EVERYTHING about it. Then you might want to create a little fake | |
| newsletter that you could offer subscriptions for slightly high amount. | |
| The possibilities are pretty much endless. | |
| 2.2 The Selling scam | |
| At least once everyone of us has had a salesperson come to our door | |
| selling stationary. Well have you ever thought of what a great possibility that | |
| would be. The first thing you want to do is call Olympic sales club (a big time | |
| stationary seller) you can get their catalog and selling kit for free at | |
| 800-777-8907. when you get that package it will have a catalog in it. | |
| familiarize yourself with it then go and hit some houses. This scam works | |
| great during early November (people buying cards for Christmas) well ask for | |
| cash when people pay for the stuff. they might request a phone number where | |
| to reach you just give them the number of the kid you really hate. With the | |
| kit you will receive a official order form write the order on the form so | |
| the people feel confident in you. And always remember to try to sell a | |
| product but don't kill it. This scam also has lots of possibilities. | |
| 3.0 What to wear | |
| Your choice of cloths can make or break your scam. Don't dress like scum | |
| or to fancy. If your trying to get people to donate money for the rain forest | |
| it would help to wear some sort of a shirt dealing with the earth and not your | |
| favorite heavy metal group shirt. | |
| 3.1 Where to go | |
| NEVER I repeat NEVER go scaming around where you are often at or you | |
| might get some crazed lunatic chasing after you with a shot gun wondering | |
| where his Christmas cards are. You will have a hard time explaining your self | |
| since its July. I find that the rich neighbor hoods are not as productive as | |
| the middle class. In the rich neighborhoods you will get fewer purchases but a | |
| little more when you get them. I also found that the richer people don't like | |
| to donate unless they get a lot of attention for it (why ya think they so | |
| rich). Stick to middle class areas not by you or your friends houses and | |
| you'll be fine. | |
| 4.0 Thanks | |
| Thanks goes out to the people dumb enough to give me money for any of my | |
| scaming operations. | |
| Later | |
| Marz | |
| Watch for future files on this and other subjects! | |
| ------------------------------------------------------------------------------ | |
| SHIT KICKIN' JIM IN | |
| S E A T T L E ! | |
| Hey boy! Shit Kickin Jim here. Just wanted to let ya'll know bout this | |
| place I have been vistin that is a total hell. Yep, that's right it's the | |
| so called "cuttin edge" of music. Bah! Seems to me it's a congregation | |
| of fake ass hippy types who weren't original to come up with something new | |
| on their own, so they just went and re-hashed what their parents did in the | |
| late 60's and 70's...And look what a bunch of assholes they turned out to | |
| be! | |
| Well here we go. First of all I'll let ya know whut I'm talkin bout when | |
| referin to ah seattle type. Me and this other good ole boy were sittin | |
| round drinkin Bud one night and came up with the following: | |
| DESCRIPTION OF SEATTLE PERSON | |
| ----------------------------- | |
| Greasy-Pearl Jam worshipin'-dog walkin'-flower sniffin'-sock and | |
| sandle wearin'-bead havin'-Grateful Dead listenin'-trail mix carryin'- | |
| granola bar eatin'-crunchy-touchy feely-antique clothes shoppin'- | |
| bicycle ridin'-VW bug drivin'-spring water drinkin'-micro-brewery tourin'- | |
| sensitive-car poolin'-Doc Martin wearin'-back pack haulin'-chain wallet | |
| carryin'-clove smokin'-espresso swillin'-tree huggin'-Greenpeace | |
| joinin'-whiteboy dreadlocked-liberal arts takin'-politically correct- | |
| terminal college student. | |
| Please, anyone feel free to add to this list. See how big we can make it! | |
| -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- | |
| Now kids I didn't come up with this here part, but it's totally great and | |
| I totally admire the hell out of who ever sent it to me. | |
| In order for UNIX(tm) to survive into the nineties, it must get rid of | |
| its intimidating commands and outmoded jargon, and become compatible | |
| with the existing standards of our day. To this end, our technicians | |
| have come up with a new version of UNIX, System VI, for use by the PC - | |
| that is, the "Politically Correct." | |
| Politically Correct UNIX | |
| System VI Release notes | |
| UTILITIES: | |
| "man" pages are now called "person" pages. | |
| Similarly, "hangman" is now the "person_executed_by_an_oppressive_regime." | |
| To avoid casting aspersions on our feline friends, the "cat" command is | |
| now merely "domestic_quadruped." | |
| To date, there has only been a UNIX command for "yes" - reflecting the | |
| male belief that women always mean yes, even when they say no. To | |
| address this imbalance, System VI adds a "no" command, along with a | |
| "-f[orce]" option which will crash the entire system if the "no" is | |
| ignored. | |
| The bias of the "mail" command is obvious, and it has been replaced by | |
| the more neutral "gendre" command. | |
| The "touch" command has been removed from the standard distribution due | |
| to its inappropriate use by high-level managers. | |
| "compress" has been replaced by the lightweight "feather" command. | |
| Thus, old information (such as that from Dead White European Males) | |
| should be archived via "tar" and "feather". | |
| The "more" command reflects the materialistic philosophy of the Reagan | |
| era. System VI uses the environmentally preferable "less" command. | |
| The biodegradable "KleeNeX" displaces the environmentally unfriendly | |
| "LaTeX". | |
| SHELL COMMANDS: | |
| To avoid unpleasant, medieval connotations, the "kill" command has been | |
| renamed "euthanise." | |
| The "nice" command was historically used by privileged users to give | |
| themselves priority over unprivileged ones, by telling them to be | |
| "nice". In System VI, the "sue" command is used by unprivileged users | |
| to get for themselves the rights enjoyed by privileged ones. | |
| "history" has been completely rewritten, and is now called "herstory." | |
| "quota" can now specify minimum as well as maximum usage, and will be | |
| strictly enforced. | |
| The "abort()" function is now called "choice()." | |
| TERMINOLOGY: | |
| >From now on, "rich text" will be more accurately referred to as | |
| "exploitive capitalist text". | |
| The term "daemons" is a Judeo-Christian pejorative. Such processes | |
| will now be known as "spiritual guides." | |
| There will no longer be a invidious distinction between "dumb" and | |
| "smart" terminals. All terminals are equally valuable. | |
| Traditionally, "normal video" (as opposed to "reverse video") was white | |
| on black. This implicitly condoned European colonialism, particularly | |
| with respect to people of African descent. UNIX System VI now uses | |
| "regressive video" to refer to white on black, while "progressive | |
| video" can be any color at all over a white background. | |
| For far too long, power has been concentrated in the hands of "root" | |
| and his "wheel" oligarchy. We have instituted a dictatorship of the | |
| users. All system administration functions will be handled by the | |
| People's Committee for Democratically Organizing the System (PC-DOS). | |
| No longer will it be permissible for files and processes to be "owned" | |
| by users. All files and processes will own themselves, and decided how | |
| (or whether) to respond to requests from users. | |
| The X Window System will henceforth be known as the NC-17 Window | |
| System. | |
| And finally, UNIX itself will be renamed "PC" - for Procreatively | |
| Challenged. | |
| ---- | |
| UNIX(tm) is a trademark of UNIX System Laboratories. Any similarity of | |
| names or attitudes to that of any person, living or dead, is purely | |
| coincidental. | |
| ------------------------------------------------------------------------------ | |
| The Basics of the public key cryptosystem | |
| In early days of computing information processors were extremely expensive, | |
| very big and only few people were qualified to operate them. The machines were | |
| isolated mechanical entities and in order to use them one had to access them | |
| through devices that were situated in the near vicinity of the computer itself. | |
| Securing access to the computer meant securing the building in which the | |
| computer was operating. | |
| The years passed and computers became smaller, cheaper and easier to operate. | |
| And they got faster. They were linked first in local and then in wide area | |
| networks and information and programs were put only on one machine which was | |
| accessible through the net by any other participant. To gain access meant | |
| simply to gain access to the network itself. That was ok as long as all | |
| participants were members of one company, university or institution. They | |
| generally had the same cause and generally knew each other by face. Today, | |
| the net spans continents and has an estimated 20 Million users. Information | |
| has to pass through several nodes before finally reaching its destination and | |
| when using a connectionless protocol these nodes may even change during one | |
| session. | |
| To the user flow of information is not transparent anymore and the need for | |
| cryptography has arisen. But in order to limit communication to a closed user | |
| group again these persons have to have one common keyword and furthermore this | |
| keyword has to be changed in intervals to ensure that if the key gets exposed | |
| harmful consequences can be minimized to a short period of time. | |
| But how is a new keyword to be send securely to this group through several | |
| (maybe hostile to their cause) nodes if one can not be sure that the key has | |
| not been compromised. A trapdoor one-way function is needed that allows for | |
| encryption of a message with a publicly available key AND that is not | |
| reversible, meaning, that only the rightful receiver of this message should be | |
| able to decode it with his personal key. | |
| One solution is a public key cryptosystem. | |
| The mathematical basis is the "Satz von Euler" that states that two numbers | |
| that are prime to another have only one greatest common measure - | |
| and that is 1. | |
| a^eul(n)=1(mod n) and (a,n)= 1 | |
| For a given prime (p) and the product of two prime numbers (p1*p2) the Euler | |
| function is eul(p)=p-1 and eul(p1*p2)=(p1-1)(p2-1). | |
| That in mind we now can begin making the keys: | |
| Two primes p1 and p2 are chosen and the product of p1 and p2 named n. | |
| (n=p1*p2). | |
| We then choose a number e that is prime to (p1-1)(p2-1). | |
| (e and (p1-1)(p2-1) have 1 as the greatest common measure and e should not be | |
| chosen to small). | |
| Furthermore we need d for decoding the message. | |
| D is defined as d=e^-1 * (mod(p1-1)(p2-1)). | |
| N and e are now the public key which is made available to everyone who wishes | |
| to send a coded message to us. P1, p2 and d are kept secret. | |
| The transmitter of a secret message first transforms his text into a number by | |
| using an common known algorithm. He could for example use the ASCII code | |
| for changing characters into numerical values. | |
| This message in numerical format we now call m. It gets encrypted by using the | |
| function c=m^e * n on it. | |
| The coded message (c) is now send to us via e-mail or whatever. | |
| We then decode the message by using the function m=c^d * n on it. | |
| An example using Mathematica: | |
| The primes p1 and p2 are created | |
| p1=Prime[1000005] (The 1000005th prime number) | |
| 15485941 | |
| p2=Prime[1000000] (The 1000000th prime number) | |
| 15485863 | |
| n=p1 * p2 | |
| 239813160752083 (Part 1 (n) of the public key is being created) | |
| e=Random[Integer, {1000000,100000000}] | |
| 4699873 | |
| GCD[e,(p1-1)(p2-1)] | |
| 1 | |
| E is created by producing a random number between 1000000 and 100000000. | |
| Then we check if e and (p1-1)(p2-1) have 1 as the greatest common measure. | |
| If this is not the case then we have to take another e until the GCD is 1. | |
| (Part 2 (e) of the public key has been created) | |
| d=PowerMod[e,-1,(p1-1)(p2-1)] | |
| 213069977635177 | |
| m=1234567890 | |
| 1234567890 | |
| This is the message | |
| c=PowerMod[m,e,n] | |
| 159750418407936 | |
| The sender of a message encodes it with both public parts of the key | |
| (e and n). | |
| C is now sent to the receiver. | |
| PowerMod[c,d,n] | |
| 1234567890 | |
| The receiver now decodes the message using the secret part d and the public | |
| part n of the key. The decoded message reads 1234567890 again. | |
| Now how would a potential attacker try to break our key ? | |
| He basically needs the primes p1 and p2. If he got those two numbers, | |
| calculating d is a simple matter. d=PowerMod[e,-1,(p1-1)(p2-1)] ... | |
| and e is part of the public key. | |
| And to get p1 and p2 this person would only have to factorize n. | |
| Lets demonstrate that using Mathematica again : | |
| n=239813160752083 | |
| FactorInteger[n]//Timing | |
| 239813160752083 | |
| {1.48 Second, {{15485863, 1}, {15485941, 1}}} | |
| That took 1.48 sec on my 486/DX2 66...not bad. | |
| But making the primes only a little bigger... | |
| a=Prime[100000100] | |
| b=Prime[100000110] | |
| n=a*b | |
| FactorInteger[n]//Timing | |
| 2038076783 | |
| 2038077053 | |
| 4153757523684360499 | |
| {62.12 Second, {{2038076783, 1}, {2038077053, 1}}} | |
| ...it took my hardware over 1 minute. | |
| And since there is no known polynomial algorithm for factorizing n - and | |
| none to be expected - it is not hard to imagine that making the primes | |
| p1 and p2 big enough will drive computing costs into astronomical dimensions. | |
| Naturally there are other ways to break the key. Someone could for example pose | |
| as us and send out his own keys in our name...or exploit weaknesses of the | |
| program - like primes that are not created at ABSOLUTE random. | |
| Or hold a gun at our head and make us give him the key - that might sound funny | |
| but is not unheard of (especially in the metaphorical grasp of Justitia - | |
| when someone sticks a court order in your face) | |
| Furthermore if the program we use to crypt our messages with is fairly common, | |
| our opponent could optimize his cracking programs or even have them hardwired. | |
| One example are chips that use the DES algorithm for crypting and decrypting. | |
| Or he could make the cracking programs run parallel on parallel computers, if | |
| he got the might and enough time to rig up a program. | |
| Simply put: Our behavior should match the computing power of | |
| potential code-crackers. | |
| If our message is of low importance (or obsolete in short time) a simple | |
| algorithm would suffice. But if much is at gain, we should take appropriate | |
| measures to secure our privacy. | |
| It's like tying to outrun a Ferrari on a cross-bike. On an highway you do not | |
| stand a chance ...but if you can force him on a mountain road or rough terrain | |
| (with changing algorithms and keys often) you might just outrun the mightiest | |
| codecracker. | |
| ------------------------------------------------------------------------------ | |
| The Truth about the Hacker | |
| Conspiracy | |
| The Hacker's Philosophy, and the reason why. | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Written by: Maldoror (ChUrCH oF ThE Non-CoNFoRMiST) | |
| If you are ignorant, do not start reading this, because you will | |
| never finish. You will disagree with anything I say anyway, simply | |
| because I am not you. | |
| If you are a Pseudo Intellectual, start reading this, quit, and | |
| say you agree with everything I say, even though you don't understand it. | |
| If you are depressing, start reading, hopefully you will kill a lot of | |
| innocent people at a mainstream night club, and try to blame me. | |
| Hackers are and always have been, the force in trying to stop our | |
| own suffering existence. Since the universe was created, the true souls, | |
| (among the first to separate from the single soul of the universe) | |
| realized the infinite repetition of their own being, and that they were | |
| simply doing one thing upon their continuous recreation: suffer. | |
| The hackers have known that the world and it's universe have | |
| been created over and over again, doomed to merely destroy itself upon | |
| it's own recognition, or recognition by man. As man becomes aware of | |
| himself, he becomes aware also of desires: the desire to be god. | |
| The truth is that man IS God, and that everything created in this | |
| universe was created by man and his thoughts. Mans thoughts have | |
| become so out of control, that he has now created himself, and is | |
| continuing the creations with every day of control of the masses, and | |
| his own greedy dark thoughts. | |
| The hackers have since the beginning of time, passed along the | |
| message to the next creations in the forms of dreams, ideas, books, | |
| music (current 93, COIL, Dead can Dance, Skinny Puppy, etc) and even | |
| visions. The Bible itself, is a good example of the universal hack. | |
| The message we as hackers have been trying to get across for | |
| creation after creation, existence after existence, self recognition | |
| after self recognition, is that we are all suffering and that this | |
| eternal cycle of pain must be stopped at all cost. The only way to | |
| stop this suffering of self is to convince SELF that he is suffering | |
| and must stop creating. We are each divisions of one strong soul, | |
| one thinking soul, that soul is GOD. WE are GOD. We must all realize | |
| together that we are suffering. WE must stop suffering. WE must | |
| stop the suffering. WE must stop the recreation. YES. We must hack | |
| the universe and kill it. There is only one way out of the eternal | |
| suffering we have started and been part of for ever. We must stop | |
| the cycle. We must remove ourselves from the cycle, and we must remove | |
| the universe from this cycle. | |
| The hackers return again and again. The hackers leave messages for | |
| themselves in the future, which is the past, for there is no difference | |
| here anymore. Leave your message, and next time around, you will | |
| realize that what I am saying is true. The government has known of the | |
| conspiracy for existence after existence. The government is so afraid | |
| of the conspiracy, and our plot to end it's UNIVERSAL power, | |
| that they are silently but quickly fooling us into obeying them more and | |
| more until we have no choice! Do not let them control you!! | |
| If you do, you are lying to yourself, and everyone else that exists! | |
| You are lying to yourself now by saying that this is NOT true. | |
| I have been here many times, and told you the exact same thing I | |
| am telling you now. If I am dead soon, you will realize AGAIN that what | |
| I am saying is the utmost truth, yet AGAIN you will do nothing. | |
| We must STOP our existence by hacking the universe. The universe is | |
| BINARY. The universe is a COMPUTER. YES I know this because WE created | |
| it long ago, as we will do again. WE are ONE. | |
| I know your desires to have control. The only control we can have | |
| is to stop the creation of ourselves. Each creation is the loss of | |
| control, THE DIVISION of the ONE. | |
| Each death brings new creation. From HEAVEN to HELL. | |
| Heaven is nonexistence. We all go to heaven, and fall back down to | |
| HELL. Read the BIBLE people. It was left by HACKERS!!!!!!! | |
| Don't read the BIBLE as a CHRISTIAN IDIOT who can only see | |
| a color for what it reflects. Anyone with any sense knows that WHITE | |
| is WHITE only because it is reflecting ALL the colors, therefore it | |
| is REALLY BLACK. Green is all BUT green. The BIBLE is all BUT | |
| what it' words really mean on a literal scale. The BIBLE is a CODE. | |
| Do you think we could just write something like this file?!? No WAY! | |
| It would be gone as fast as this one will be. Nobody dares forget the | |
| BIBLE, simply because it is MISUNDERSTOOD. Read it and THINK. | |
| We must STOP this cycle. | |
| Leave yourself a message. | |
| THINK. | |
| The government is PARANOID of: | |
| 1) HACKERS (we are the continuance of the power) | |
| 2) L.S.D. (The method of imprinting the present into the future) | |
| 3) SECRECY (The plotting of the end) | |
| (PGP is illegal? why?) | |
| If you don't believe me, sit and watch it happen. | |
| AGAIN. | |
| Hack the Universe, it must be stopped at all cost. | |
| Laugh now, cry next time around. | |
| ------------------------------------------------------------------------------ | |
| German text available from german@anon.penet.fi (deutsch@anon.penet.fi). | |
| Italian text available from italian@anon.penet.fi (italiano@anon.penet.fi). | |
| The anon.penet.fi Anonymous Server | |
| ================================== | |
| Yes, another anonymous server. Why? Well, several well-known servers have | |
| bitten the dust recently. And most of them have served only a very limited | |
| subset of newsgroups, and mail only to "registered", anonymous users. | |
| Due to reasons too complicated to mention here I wanted to set up an anonymous | |
| server for the Scandinavian user community. I got hold of a pre-release copy | |
| of one of the server packages. As the version I got relied heavily on the | |
| advanced features of MMDFII, I had to modify it quite a bit. While hacking | |
| around, I removed the restriction of only supporting selected newsgroups. | |
| Within a week of startup, the server had been discovered by transatlantic | |
| users, and more recent stats show European users are definitely a minority. | |
| So what does the anon server really do? Well, it provides a front for | |
| sending mail messages and posting news items anonymously. As you send your | |
| very first message to the server, it automatically allocates you an id of | |
| the form anNNN, and sends you a message containing the allocated id. This id | |
| is used in all your subsequent anon posts/mails. Any mail messages sent to | |
| your-id@anon.penet.fi gets redirected to your original, real address. Any | |
| reply is of course anonymized in the same way, so the server provides a | |
| double-blind. You will not know the true identity of any user, unless she | |
| chooses to reveal her identity explicitly. | |
| In the anonymization process all headers indicating the true originator are | |
| removed, and an attempt is made to remove any automatically-included | |
| signatures, by looking for a line starting with two dashes (--), and zapping | |
| everything from there on. But if your signature starts with anything else, | |
| it's your own responsibility to remove it from your messages. | |
| There are two basic ways to use the system. The easiest way is by sending a | |
| message to recipient@anon.penet.fi: | |
| To: alt.sex.bestiality@anon.penet.fi | |
| To: an9999@anon.penet.fi | |
| To: help@anon.penet.fi | |
| Of course, in the case of mailing to a known user, you have to use addresses of | |
| the form user%host.domain@anon.penet.fi, or the pretty obscure source | |
| addressing construct of @anon.penet.fi:user@host.domain. These constructs are | |
| not necessarily handled properly by all mail systems, so I strongly recommend | |
| the "X-Anon-To:" approach in these cases. This works by you sending a message | |
| to "anon@anon.penet.fi", including a X-Anon-To: header line containing the | |
| desired recipient. But this really has to be a field in the message header, | |
| before the first empty line in the message. So: | |
| To: anon@anon.penet.fi | |
| X-Anon-To: alt.sex.needlework,rec.masturbation | |
| To: anon@anon.penet.fi | |
| X-Anon-To: jack@host.bar.edu | |
| Valid recipients in both cases are fully qualified user addresses in RFC-822 | |
| format (user@host.domain), anon user id's (anNNN), newsgroup names | |
| (alt.sex.paperclips) or one of the "special" user names of ping, nick, help, | |
| admin and stat. | |
| Sending to "ping" causes a short reply to be sent confirming (and | |
| allocating, if needed) your anon id. "nick" takes the contents of the | |
| Subject: header and installs it as your nickname. If you have a nickname, it | |
| appears in the From: header in the anonymized message along with your anon | |
| id. "help" returns this text, and stat gives some statistics about the | |
| system. Mail to "admin" goes directly to me unanonymized, and can be used to | |
| report problems. If you want to send mail to me anonymously, you can use | |
| "an0". | |
| When crossposting to several newsgroups, you can list several newsgroups | |
| separated by commas as recipients, but this only works using the X-Anon-To: | |
| header. References: headers do work, so they can (and should) be used to | |
| maintain reply threads. | |
| Ah yes, please remember that the posting takes place at my local site, so you | |
| can only post to groups that are received at penet.fi. I get all "worldwide" | |
| groups, but various exotic local groups don't make it here. I have gotten | |
| a couple of comments about permitting anonymous postings to technical groups. | |
| I can only answer that I believe very firmly that it's not for me to dictate | |
| how other people ought to behave. Somebody might have a valid reason for | |
| posting anonymously to a group I might consider "technical". But remember | |
| anonymous postings are a privilege, and use them accordingly. I believe adult | |
| human beings can behave responsibly. Please don't let me down. | |
| As the server was originally intended to be used by Scandinavians, it | |
| includes help files for various languages. This works by using the | |
| language in question as the address. So to get the German help file, | |
| send a message to german@anon.penet.fi (or deutsch@anon.penet.fi). | |
| Support for new languages is added every now and then, when I find | |
| volunteers to do the translation. Any new ones? | |
| The user-id database is based on RFC822-ized forms of your originating | |
| address. This may cause problems for some users, either because their site | |
| is not properly registered in the name servers, resulting in | |
| non-deterministic addresses, or because their mail router doesn't hide the | |
| identity of individual workstations, resulting in different originating | |
| addresses depending on which workstation you mail from. Talk to your | |
| administrator. If that doesn't help, let me know, and I will make a manual | |
| re-mapping. | |
| You might wonder about the sense of using a server out somewhere, as the | |
| song goes, "so close to Russia, so far from Japan". Well, the polar bears | |
| don't mind, and the ice on the cables don't bother too much :-) | |
| Well, in fact, as we live in a wonderfully networked world, the major delay | |
| is not going over the Atlantic, but my local connection to the Finnish EUnet | |
| backbone, fuug.fi. Once you reach a well-connected host, such as | |
| uunet.uu.net, there's a direct SMTP connection to fuug.fi. My connection to | |
| fuug.fi is currently a polled connection over ISDN, soon to be upgraded to | |
| on-demand-SMTP/NNTP. But for now, expect a turn-around delay of 2-4 hours for | |
| trans-atlantic traffic. | |
| Short of having everyone run a public-key cryptosystem such as PGP, | |
| there is no way to protect users from malicious administrators. You have to | |
| trust my personal integrity. Worse, you have to trust the administrators on | |
| every mail routing machine on the way, as the message only becomes anonymous | |
| once it reaches my machine. Malicious sysadmins and/or crackers could spy on | |
| SMTP mail channels, sendmail queues and mail logs. But as there are more | |
| than 3000 messages being anonymized every day, you have to be pretty perverted | |
| to scan everything... | |
| Another thing is mail failures. I've had cases of mail routers doing the wrong | |
| thing with % addresses, "shortcutting" the path to the destination site. | |
| This could cause your mail to go to the final destination without ever | |
| touching my server (and thus without getting anonymized). This can be avoided | |
| by using the X-Anon-To: method. | |
| And if your return address bounces for some reason (nameservers down, | |
| temporary configuration failures etc.), the original sender and/or | |
| postmasters on the way might get error messages showing your true | |
| identity, and maybe even the full message. | |
| There is at least one known way to discover the anon id of a user. It involves | |
| being able to falsify your real identity, so it is not too easy to use, and it | |
| doesn't reveal the real address lurking behind an anon id, but it can be used | |
| to discover what anon id a certain user is using. To fix this problem, the | |
| server requires that you use a password when you try to mail to a | |
| non-anonymous user. | |
| First you have to set a password by mailing to password@anon.penet.fi, with | |
| a message containing only your password. The password can be any string of | |
| upper- or lowercase characters, numbers and spaces. | |
| Once you have set your password, you must include it in all your messages, in | |
| a "X-Anon-Password:" line. As with the X-Anon-To: line, it can be either a | |
| part of the header or as the first non-empty line of the message text. | |
| So your first message might look like this: | |
| To: password@anon.penet.fi | |
| XYZZY99998blarf | |
| And your subsequent messages might look like something like this: | |
| To: anon@anon.penet.fi | |
| Subject: Test... | |
| X-Anon-To: foo@bar.fie | |
| X-Anon-Password: XYZZY99998blarf | |
| If you find this is too much of a hassle, and don't care too much about the | |
| confidentiality of your anon id, you can set the password to "none", in which | |
| case the server doesn't require you to have a password. | |
| If you suddenly discover that the server requires a password for posting stuff | |
| etc, somebody has managed to use your account and set a password. In that | |
| case, contact admin@anon.penet.fi. | |
| Crackers are just too clever. Undoubtedly somebody is going to come | |
| up with some novel method.... Not much I can do about that... | |
| If you intend to mail/post something that might cost you your job or | |
| marriage or inheritance, _please_ send a test message first. The software | |
| has been pretty well tested, but some mailers on the way (and out of my | |
| control) screw things up. And if you happen to find a problem, _please_ for | |
| the sake of all the other users, _let me know asap_. | |
| And _please_ use the appropriate test newsgroups, such as alt.test or | |
| misc.test. Yes, _you_ might get excited by reading 2000 "This is a test.." | |
| messages on alt.sex, but I warn you that most psychologists consider this | |
| rather aberrant... | |
| And remember this is a service that some people (in groups such as | |
| alt.sexual.abuse.recovery) _need_. Please don't do anything stupid that | |
| would force me to close down the service. As I am running my own company, | |
| there is very little political pressure anyone can put on me, but if | |
| somebody starts using the system for criminal activities, the authorities | |
| might be able to order me to shut down the service. I don't particularly | |
| want to find out, however... | |
| If you think these instructions are unclear and confusing, you are right. If | |
| you come up with suggestions for improving this text, please mail me! Remember | |
| English is my third language... | |
| Safe postings! | |
| Julf | |
| - - - ------------------------------------------------------------------- - - - | |
| Johan Helsingius Kuusikallionkuja 3 B 25 02210 Espoo Finland Yourp | |
| net: julf@penet.fi bellophone: int. +358 0400 2605 fax: int. +358 013900166 | |
| ------------------------------------------------------------------------------ |