home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 48.3 KB | 1,086 lines |
- ==Phrack Magazine==
-
- Volume Five, Issue Forty-Five, File 4 of 28
-
-
- // // /\ // ====
- // // //\\ // ====
- ==== // // \\/ ====
-
- /\ // // \\ // /=== ====
- //\\ // // // // \=\ ====
- // \\/ \\ // // ===/ ====
-
- PART I
-
- ------------------------------------------------------------------------------
-
- !! NEW PHRACK CONTEST !!
-
- Phrack Magazine is sponsoring a programming contest open to anyone
- who wishes to enter.
-
- Write the Next Internet Worm! Write the world's best X Windows wardialer!
- Code something that makes COPS & SATAN look like high school Introduction
- to Computing assignments. Make the OKI 1150 a scanning, tracking, vampire-
- phone. Write an NLM! Write a TSR! Write a stupid game! It doesn't
- matter what you write, or what computer it's for! It only matters that you
- enter!
-
- Win from the following prizes:
-
- Computer Hardware & Peripherals
- System Software
- Complete Compiler packages
- CD-ROMS
- T-Shirts
- Magazine Subscriptions
- and MANY MORE!
-
- STOP CRACKING PASSWORDS AND DO SOMETHING WITH YOUR LIFE!
-
- Enter the PHRACK PROGRAMMING CONTEST!
-
- The rules are very simple:
-
- 1) All programs must be original works. No submissions of
- previously copyrighted materials or works prepared by
- third parties will be judged.
-
- 2) All entries must be sent in as source code only. Any programming
- language is acceptable. Programs must compile and run without
- any modifications needed by the judges. If programs are specific
- to certain platforms, please designate that platform. If special
- hardware is needed, please specify what hardware is required.
- If include libraries are needed, they should be submitted in addition
- to the main program.
-
- 3) No virii accepted. An exception may be made for such programs that
- are developed for operating systems other than AMIGA/Dos, System 7,
- MS-DOS (or variants), or OS/2. Suitable exceptions could be, but are not
- limited to, UNIX (any variant), VMS or MVS.
-
- 4) Entries may be submitted via email or magnetic media. Email should be
- directed to phrack@well.com. Tapes, Diskettes or other storage
- media should be sent to
-
- Phrack Magazine
- 603 W. 13th #1A-278
- Austin, TX 78701
-
- 5) Programs will be judged by a panel of judges based on programming skill
- displayed, originality, usability, user interface, documentation,
- and creativity.
-
- 6) Phrack Magazine will make no claims to the works submitted, and the
- rights to the software are understood to be retained by the program
- author. However, by entering, the Author thereby grants Phrack Magazine
- permission to reprint the program source code in future issues.
-
- 7) All Entries must be received by 12-31-94. Prizes to be awarded by 3-1-95.
-
- -------------------------INCLUDE THIS FORM WITH ENTRY-------------------------
-
- Author:
-
- Email Address:
-
- Mailing Address:
-
-
-
- Program Name:
-
-
- Description:
-
-
-
-
- Hardware & Software Platform(s) Developed For:
-
-
-
- Special Equipment Needed (modem, ethernet cards, sound cards, etc):
-
-
-
- Other Comments:
-
-
-
-
- ------------------------------------------------------------------------------
-
- Novell NetWare & Ethernet address spoofing with ODI
- ---------------------------------------------------
-
- Just to save you from the boredom of Yet Another UNIX Security Weakness, here
- are some things to consider about Novell NetWare for your next Security Audit
- or Hacking session (depending on which side you are on).
-
- Novell claim to have over 20 million PCs using their network operating system,
- substantially more than the estimated 4 million TCP/IP systems worldwide.
- There are many reasons for its popularity and its 60 to 80% market share, one
- of which has been its relatively good security.
-
- NetWare has been one of the few widely available systems which offer some form
- of login encryption of accounts and passwords over the wire, as standard,
- unlike most of its rivals which send them out as plaintext, even if they are
- stored in an encrypted form eventually. Novell now offer RSA based public key
- encryption of the data as well.
-
- However, since it is so popular, there are likely to be plenty of systems out
- there which have not been upgraded to the latest versions and patch releases
- and which may be still be vulnerable to programs like KNOCK , the patched
- ATTACH command (published in HackTic 16/17 1992), or the University of Leiden's
- HACK (which has been published in issue 43 of PHRACK)
-
- Since the latest security features are implemented as NetWare Loadable Modules
- for NetWare 3x and 4x, but as Value Added Processes for NetWare 2x, which
- require the server to be brought down to install them, it is likely that there
- are many NetWare 2x systems which are still vulnerable
-
- I shall also assume that you are not on one of those wide open "box shift"
- installations where none of the security features have been switched on (try
- logging in as SUPERVISOR or GUEST without a password), all the programs and
- data are in a single SYS: volume and the Network Address of the cable is the
- default 00000001.
-
- Like any project, the more you know about your particular Novell LAN, the
- easier it gets to "explore". Login as GUEST or a normal account.
-
- Try to see who else is on the system e.g.
-
- USERLIST /A >c:\ulist.txt
-
- will give you a list of users currently logged in, with their Ethernet card
- addresses saved to a text file . Your current connection will be marked with
- an asterisk. If your system has 100 or more users, then any sane Supervisor
- will have used some form of logic when allocating the user's login accounts,
- probably based on personnel or id number, often including their initials.
-
- SYSCON with privilege is what you are aiming to be able to use, but even
- without any privileges, you can still use it to look at your own account,
- change your password etc. You can also see a list of all the other registered
- users.
-
- This should help you sort the accounts into normal and privileged accounts
- (obviously SUPERVISOR, but often there are SUPERVISOR equivalent accounts, or
- Work Group Manager accounts which stand out from the list). You are quite
- likely to see an account called something like TAPE_BACKUP or DATA_LOGGER,
- TRAINER, STUDENT1, STUDENT2 i.e. accounts which do not belong to individual
- humans. These often require abnormal security privileges e.g. normal users may
- have their connections broken by the WATCHDOG at say midnight, to ensure that
- they are not modifying files during the nightly tape backup. At an academic or
- industrial site, you are likely to find data logging PCs connected to
- instrumentation or machinery which needs to be monitored or controlled 24
- hours a day. These PCs are likely to have 24 hour accounts which are not time
- restricted at weekends, for example.
-
- Since it is usually more practical to do tape backups (DAT or helical scan)
- from a separate, dedicated PC rather than from the fileserver itself (one tape
- unit might also back up several fileservers), these PCs are likely to use an
- account e.g. TAPE_BACKUP which is a SUPERVISOR equivalent. If you can get
- physical access to this sort of PC, either datalogger, or tape backup unit,
- you have a good chance of finding the password on the local drive C:,
- possibly in a file with Hidden and/or System attributes (have a look at the
- AUTOEXEC.BAT and see what it calls)
-
- The security aware Novell supervisors, will have set up any such accounts with
- an extra level of security which restricts logins to only those Ethernet
- addresses which have been specified. The really sensible ones will have made
- sure that any such machines are sited in physically secure areas, as well.
-
- Although this is a very good idea, from the security point of view, Novell
- have now provided a mechanism which allows you to get around this:
- the replacement for monolithic IPX/NETX called Open Datalink Interface (ODI)
-
- Novell's ODI, and its slower Microsoft equivalent Network Driver Interface
- Specification (NDIS), both work by putting a common layer of software between
- the hardware of the Network Interface Card and the rest of the MSDOS
- Redirector. This allows multiple protocol stacks and frame types to be bound
- to the same physical card e.g.
-
- IPX TCP/IP NETBeui DECnet Appletalk
- ----------------------------------------------
- Link Support Layer
- ----------------------------------------------
- Hardware Specific device driver e.g. NE2000
-
- Thus, to start up NetWare on older systems, you had to generate a hardware
- specific version of IPX.EXE for your Ethernet card,
-
- IPX
- NETX
-
- Extra parameters were set in SHELL.CFG, now under ODI, things are a little
- bit more complex:
-
- LSL
- NE2000
- IPXODI
- NETX
-
- The same parameters as in SHELL.CFG such as preferred server or machine type
- (if you have different versions of MSDOS for different types of PC) can be
- specified in NET.CFG. With ODI, there are more parameters for NET.CFG but the
- worrying/interesting one is the ability to specify a different MAC level
- address to that of your actual Ethernet card. It needs this ability
- to cope with TCP/IP or DECnet coexistence e.g.
-
- BUFFERS 100
- MACHINE TYPE COMPAQ
- PREFERRED SERVER FINANCE
- NODE ADDRESS AA-00-04-00-12-34
-
- Since this DECnet address does not depend on the "real" unique Ethernet
- address which has been burnt into the PROM on the card and is centrally
- registered (originally by Xerox, but now by the IEEE), this mechanism allows
- you to put a different Ethernet card address into NET.CFG, thereby fooling the
- Address Restriction security.
-
- e.g. NODE ADDRESS 02-60-80-12-34-56
-
- This is where the data you gathered earlier with USERLIST and SYSCON becomes
- threatening/useful.
-
- Of course, if your target PC is on a different LAN segment, there may be Routers
- or intelligent hubs which restrict your ability to do this, or at least record
- attempts in a log files which can trace your activity, provided that suspicions
- are aroused before they are periodically wiped out.
-
- How much of a security threat this little work around constitutes depends on
- your specific site, but there is another danger/opportunity, namely that of a
- denial of service or nuisance attack on the LAN.
-
- If you set this connection parameter to be the same as that of another PC, the
- fileserver (Novell, DEC or UNIX) and the Ethernet has no way of preventing
- some packets intended for just one unique address going to the other, if they
- are both online at the same time. This usually results in PC hangs, incomplete
- closure of files, File Allocation Table problems (usually curable by running
- CHKDSK C: /F, but not within Windows or you will make things worse).
-
- If by accident or design, you set your PC to have the same address as the
- fileserver (Novell, DEC or UNIX) or a router, then you can cause havoc to the
- whole network segment (even before you have started to play your multiplayer
- DOOM Deathmatch !).
-
- This could be achieved with a simple command in the AUTOEXEC.BAT e.g.
-
- echo NODE ADDRESS fileserver Ethernet address >>C:\ODI\NET.CFG
-
- which will only take effect the next time the PC is re-booted (allowing a good
- headstart for the perpetrator)
-
- This could also be the payload of a virus, which would cause more havoc than
- simply trashing the hard disk of a single PC.
-
- This problem is due to the inherent design weaknesses of TCP/IP and DECnet,
- which were developed at a time when the number of mini-computers that they
- connected could be counted on your fingers,. DEC or Xerox or Prime etc
- sales teams could only have dreamed of selling thousands of mini computers to a
- single customer. Nowadays, thousands of PCs connected to central servers are
- quite common, and the problems of duplicate addresses is significant.
-
- These same features are what make Ethernet Packet Sniffing possible, which
- is what was behind the recent CERT warning and media hype about Internet
- password security, but that is a topic for another article.
-
- Otaku
-
- ------------------------------------------------------------------------------
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- SCAMMING
- DIFFERENT TECHNIQUES AND
- PROCEDURES
-
- BY: MARZ
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- Table of Contents:
- 1.0 Intro
- 1.1 Different types of scams
- 1.2 The right one for you
-
- 2.0 The Pledge scam
- 2.1 The Donation scam
- 2.2 The Selling scam
-
- 3.0 What to wear
- 3.1 Where to go
-
- 4.0 Thanks
-
- 1.0 The Intro
-
- First off I would like to say that this file is for entertainment only
- and that you really shouldn't do the stuff mentioned, and the writer doesn't
- take any responsibility for any of the crap people do.
-
- 1.1 Different types of scams
-
- Ok in this file I will tell you about 3 types of scams the Pledge scam,
- The Donation scam, and the Selling scam. There are many other scams out there
- which I will cover in future files for instance credit card scams although
- companies are trying harder and harder to prevent this it is still happening.
-
- 1.2 The right one for you
-
- Al right now every person is different so in turn so are scams and some
- people and scams don't mix to well for instance if you way 300 Pounds you cant
- really say you are the start cross country runner. So if you are 300 pounds say
- you are the start wrestler/football player. Also age plays a BIG factor if
- you are 30 years old you aren't going to pass to well for a high school
- football player (you always could say you flunked) and if you are 10 years old
- people aren't going to be to anxious to give you donations to save the Rain
- Forests. Al right I am going to start going into more detail about the right
- scam for you.
-
- Look at my little chart below:
-
- Age good scam
- ----- -----------
- -10 | selling or pledge
- 11-17 | selling, pledge , or maybe even donations (if old looking)
- 18+ | selling and donations
-
- 2.0 The Pledge scam
-
- Al right this scam works great for kids still in school go around asking
- people (that don't live around you) to pledge money for you so your team can
- afford to go to the state meet or what ever. For example one I use is I go to
- peoples houses asking for donations in my Track teams Lap-athon saying that we
- will be running laps for 3 hours to raise money so we can go and compete in the
- state meet. I will ask people if they want to pledge a certain flat amount or
- if they would like to pay me for each individual lap. I will normally have
- printed out a sheet like the one bellow on my computer .
-
- Name Address Amount/lap
-
-
-
- Not only does having a sheet like that help you keep track of who bought
- your scam and who you need to collect from it makes the target (person your
- trying to scam) not worried like they might be if they see you writing it on a
- sheet of note book paper. Now then you have collected a list of people wiling
- to pledge you go back to the address you wrote down and tell them (for
- example you ran 91 laps in 3 hours) make sure your number is not totally out of
- per portion like I ran 150 laps in 3 hours. Also for some reason numbers like
- 50, 70, 80, 110 people don't like people like to see 41, 73, 127, etc.. don't
- ask me why but that's what I have noticed. Ok so you now are at the persons
- house and they ask if they can write a check oh shit not a check.. well there's
- a couple things you could do ask them if they could possibly make it cash (
- Might make them suspicious) ask them to write it to your coach give them your
- name (VERY dangerous) or you could just give them a phony name and lose out.
- One time this happened to me a lady pledged me $.25 a lap (very high amount
- you won't get much of these) and I told her I ran 93 laps she believed me and
- wanted to make out a check for the amount which was about $23 at that
- time I just happened to be buying some computer equipment I knew the
- guy's name so I gave her that name and I paid for some of the equipment with
- that check. Like I said earlier a 300 pound guy isn't going to be convincing
- for running 90 some laps in 3 hours. So customize it to your self.
-
- 2.1 The Donation scam
-
- This scam works better for the older people out there just because people
- normally aren't to anxious to give a ten year old Twenty dollars to help
- save the whales. Ok with this scam you need to know what about what you are
- going to try to fake donations for so example if you are going to pose as a
- volunteer person to collect donations for saving the rain forest you better
- know something about rain forest, Be cause you never know when your going to
- run into that know it all rain forest hater who will try to debate why
- people should spend their money on saving some trees and such. It is a good
- idea to do some research on the field you will be portraying (read magazine and
- newspaper articles). Ok so now you have your idea and your ready to
- go..this is a scenario of how it might go:
-
- You: Hello sir/ma'am I represent the national foundation of Rain forest
- saving (try to use a real group name) we are currently searching for
- funding for our operations at saving the rain forests of the world
- would you be interested in donating some money for our cause?
- Them: Why do we need the rain forest?
- You: (just keep bullshitting along..)
- Them: OK, here's $20.
-
- (they also may say:)
-
- Them: Get the fuck off my property before I shoot your ass.
-
- (make sure that you don't raise a riot then but later that night go back
- and egg the hell out of the house..)
-
- This scam has some possibilities you could carry this on for along time
- and bring it to real higher levels if your willing to put in the time and
- effort. First thing would be to research your field EVEN more so you know
- almost EVERYTHING about it. Then you might want to create a little fake
- newsletter that you could offer subscriptions for slightly high amount.
- The possibilities are pretty much endless.
-
- 2.2 The Selling scam
-
- At least once everyone of us has had a salesperson come to our door
- selling stationary. Well have you ever thought of what a great possibility that
- would be. The first thing you want to do is call Olympic sales club (a big time
- stationary seller) you can get their catalog and selling kit for free at
- 800-777-8907. when you get that package it will have a catalog in it.
- familiarize yourself with it then go and hit some houses. This scam works
- great during early November (people buying cards for Christmas) well ask for
- cash when people pay for the stuff. they might request a phone number where
- to reach you just give them the number of the kid you really hate. With the
- kit you will receive a official order form write the order on the form so
- the people feel confident in you. And always remember to try to sell a
- product but don't kill it. This scam also has lots of possibilities.
-
- 3.0 What to wear
-
- Your choice of cloths can make or break your scam. Don't dress like scum
- or to fancy. If your trying to get people to donate money for the rain forest
- it would help to wear some sort of a shirt dealing with the earth and not your
- favorite heavy metal group shirt.
-
- 3.1 Where to go
-
- NEVER I repeat NEVER go scaming around where you are often at or you
- might get some crazed lunatic chasing after you with a shot gun wondering
- where his Christmas cards are. You will have a hard time explaining your self
- since its July. I find that the rich neighbor hoods are not as productive as
- the middle class. In the rich neighborhoods you will get fewer purchases but a
- little more when you get them. I also found that the richer people don't like
- to donate unless they get a lot of attention for it (why ya think they so
- rich). Stick to middle class areas not by you or your friends houses and
- you'll be fine.
-
- 4.0 Thanks
-
- Thanks goes out to the people dumb enough to give me money for any of my
- scaming operations.
-
- Later
- Marz
- Watch for future files on this and other subjects!
-
- ------------------------------------------------------------------------------
-
- SHIT KICKIN' JIM IN
-
- S E A T T L E !
-
-
- Hey boy! Shit Kickin Jim here. Just wanted to let ya'll know bout this
- place I have been vistin that is a total hell. Yep, that's right it's the
- so called "cuttin edge" of music. Bah! Seems to me it's a congregation
- of fake ass hippy types who weren't original to come up with something new
- on their own, so they just went and re-hashed what their parents did in the
- late 60's and 70's...And look what a bunch of assholes they turned out to
- be!
-
- Well here we go. First of all I'll let ya know whut I'm talkin bout when
- referin to ah seattle type. Me and this other good ole boy were sittin
- round drinkin Bud one night and came up with the following:
-
-
- DESCRIPTION OF SEATTLE PERSON
- -----------------------------
-
- Greasy-Pearl Jam worshipin'-dog walkin'-flower sniffin'-sock and
- sandle wearin'-bead havin'-Grateful Dead listenin'-trail mix carryin'-
- granola bar eatin'-crunchy-touchy feely-antique clothes shoppin'-
- bicycle ridin'-VW bug drivin'-spring water drinkin'-micro-brewery tourin'-
- sensitive-car poolin'-Doc Martin wearin'-back pack haulin'-chain wallet
- carryin'-clove smokin'-espresso swillin'-tree huggin'-Greenpeace
- joinin'-whiteboy dreadlocked-liberal arts takin'-politically correct-
- terminal college student.
-
- Please, anyone feel free to add to this list. See how big we can make it!
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Now kids I didn't come up with this here part, but it's totally great and
- I totally admire the hell out of who ever sent it to me.
-
-
- In order for UNIX(tm) to survive into the nineties, it must get rid of
- its intimidating commands and outmoded jargon, and become compatible
- with the existing standards of our day. To this end, our technicians
- have come up with a new version of UNIX, System VI, for use by the PC -
- that is, the "Politically Correct."
-
- Politically Correct UNIX
- System VI Release notes
-
- UTILITIES:
-
- "man" pages are now called "person" pages.
-
- Similarly, "hangman" is now the "person_executed_by_an_oppressive_regime."
-
- To avoid casting aspersions on our feline friends, the "cat" command is
- now merely "domestic_quadruped."
-
- To date, there has only been a UNIX command for "yes" - reflecting the
- male belief that women always mean yes, even when they say no. To
- address this imbalance, System VI adds a "no" command, along with a
- "-f[orce]" option which will crash the entire system if the "no" is
- ignored.
-
- The bias of the "mail" command is obvious, and it has been replaced by
- the more neutral "gendre" command.
-
- The "touch" command has been removed from the standard distribution due
- to its inappropriate use by high-level managers.
-
- "compress" has been replaced by the lightweight "feather" command.
- Thus, old information (such as that from Dead White European Males)
- should be archived via "tar" and "feather".
-
- The "more" command reflects the materialistic philosophy of the Reagan
- era. System VI uses the environmentally preferable "less" command.
-
- The biodegradable "KleeNeX" displaces the environmentally unfriendly
- "LaTeX".
-
- SHELL COMMANDS:
-
- To avoid unpleasant, medieval connotations, the "kill" command has been
- renamed "euthanise."
-
- The "nice" command was historically used by privileged users to give
- themselves priority over unprivileged ones, by telling them to be
- "nice". In System VI, the "sue" command is used by unprivileged users
- to get for themselves the rights enjoyed by privileged ones.
-
- "history" has been completely rewritten, and is now called "herstory."
-
- "quota" can now specify minimum as well as maximum usage, and will be
- strictly enforced.
-
- The "abort()" function is now called "choice()."
-
- TERMINOLOGY:
-
- >From now on, "rich text" will be more accurately referred to as
- "exploitive capitalist text".
-
- The term "daemons" is a Judeo-Christian pejorative. Such processes
- will now be known as "spiritual guides."
-
- There will no longer be a invidious distinction between "dumb" and
- "smart" terminals. All terminals are equally valuable.
-
- Traditionally, "normal video" (as opposed to "reverse video") was white
- on black. This implicitly condoned European colonialism, particularly
- with respect to people of African descent. UNIX System VI now uses
- "regressive video" to refer to white on black, while "progressive
- video" can be any color at all over a white background.
-
- For far too long, power has been concentrated in the hands of "root"
- and his "wheel" oligarchy. We have instituted a dictatorship of the
- users. All system administration functions will be handled by the
- People's Committee for Democratically Organizing the System (PC-DOS).
-
- No longer will it be permissible for files and processes to be "owned"
- by users. All files and processes will own themselves, and decided how
- (or whether) to respond to requests from users.
-
- The X Window System will henceforth be known as the NC-17 Window
- System.
-
- And finally, UNIX itself will be renamed "PC" - for Procreatively
- Challenged.
- ----
- UNIX(tm) is a trademark of UNIX System Laboratories. Any similarity of
- names or attitudes to that of any person, living or dead, is purely
- coincidental.
-
-
-
- ------------------------------------------------------------------------------
-
- The Basics of the public key cryptosystem
-
- In early days of computing information processors were extremely expensive,
- very big and only few people were qualified to operate them. The machines were
- isolated mechanical entities and in order to use them one had to access them
- through devices that were situated in the near vicinity of the computer itself.
- Securing access to the computer meant securing the building in which the
- computer was operating.
-
- The years passed and computers became smaller, cheaper and easier to operate.
- And they got faster. They were linked first in local and then in wide area
- networks and information and programs were put only on one machine which was
- accessible through the net by any other participant. To gain access meant
- simply to gain access to the network itself. That was ok as long as all
- participants were members of one company, university or institution. They
- generally had the same cause and generally knew each other by face. Today,
- the net spans continents and has an estimated 20 Million users. Information
- has to pass through several nodes before finally reaching its destination and
- when using a connectionless protocol these nodes may even change during one
- session.
-
- To the user flow of information is not transparent anymore and the need for
- cryptography has arisen. But in order to limit communication to a closed user
- group again these persons have to have one common keyword and furthermore this
- keyword has to be changed in intervals to ensure that if the key gets exposed
- harmful consequences can be minimized to a short period of time.
-
- But how is a new keyword to be send securely to this group through several
- (maybe hostile to their cause) nodes if one can not be sure that the key has
- not been compromised. A trapdoor one-way function is needed that allows for
- encryption of a message with a publicly available key AND that is not
- reversible, meaning, that only the rightful receiver of this message should be
- able to decode it with his personal key.
-
- One solution is a public key cryptosystem.
-
- The mathematical basis is the "Satz von Euler" that states that two numbers
- that are prime to another have only one greatest common measure -
- and that is 1.
- a^eul(n)=1(mod n) and (a,n)= 1
-
- For a given prime (p) and the product of two prime numbers (p1*p2) the Euler
- function is eul(p)=p-1 and eul(p1*p2)=(p1-1)(p2-1).
-
- That in mind we now can begin making the keys:
-
- Two primes p1 and p2 are chosen and the product of p1 and p2 named n.
-
- (n=p1*p2).
-
- We then choose a number e that is prime to (p1-1)(p2-1).
- (e and (p1-1)(p2-1) have 1 as the greatest common measure and e should not be
- chosen to small).
-
- Furthermore we need d for decoding the message.
- D is defined as d=e^-1 * (mod(p1-1)(p2-1)).
-
- N and e are now the public key which is made available to everyone who wishes
- to send a coded message to us. P1, p2 and d are kept secret.
-
- The transmitter of a secret message first transforms his text into a number by
- using an common known algorithm. He could for example use the ASCII code
- for changing characters into numerical values.
-
- This message in numerical format we now call m. It gets encrypted by using the
- function c=m^e * n on it.
-
- The coded message (c) is now send to us via e-mail or whatever.
- We then decode the message by using the function m=c^d * n on it.
-
- An example using Mathematica:
- The primes p1 and p2 are created
-
- p1=Prime[1000005] (The 1000005th prime number)
- 15485941
- p2=Prime[1000000] (The 1000000th prime number)
- 15485863
-
- n=p1 * p2
- 239813160752083 (Part 1 (n) of the public key is being created)
-
- e=Random[Integer, {1000000,100000000}]
- 4699873
- GCD[e,(p1-1)(p2-1)]
- 1
-
- E is created by producing a random number between 1000000 and 100000000.
- Then we check if e and (p1-1)(p2-1) have 1 as the greatest common measure.
- If this is not the case then we have to take another e until the GCD is 1.
- (Part 2 (e) of the public key has been created)
-
- d=PowerMod[e,-1,(p1-1)(p2-1)]
- 213069977635177
-
- m=1234567890
- 1234567890
- This is the message
-
- c=PowerMod[m,e,n]
- 159750418407936
- The sender of a message encodes it with both public parts of the key
- (e and n).
-
- C is now sent to the receiver.
-
- PowerMod[c,d,n]
- 1234567890
-
- The receiver now decodes the message using the secret part d and the public
- part n of the key. The decoded message reads 1234567890 again.
-
- Now how would a potential attacker try to break our key ?
- He basically needs the primes p1 and p2. If he got those two numbers,
- calculating d is a simple matter. d=PowerMod[e,-1,(p1-1)(p2-1)] ...
- and e is part of the public key.
-
- And to get p1 and p2 this person would only have to factorize n.
-
- Lets demonstrate that using Mathematica again :
-
- n=239813160752083
- FactorInteger[n]//Timing
- 239813160752083
- {1.48 Second, {{15485863, 1}, {15485941, 1}}}
- That took 1.48 sec on my 486/DX2 66...not bad.
-
- But making the primes only a little bigger...
- a=Prime[100000100]
- b=Prime[100000110]
- n=a*b
- FactorInteger[n]//Timing
- 2038076783
- 2038077053
- 4153757523684360499
- {62.12 Second, {{2038076783, 1}, {2038077053, 1}}}
- ...it took my hardware over 1 minute.
-
- And since there is no known polynomial algorithm for factorizing n - and
- none to be expected - it is not hard to imagine that making the primes
- p1 and p2 big enough will drive computing costs into astronomical dimensions.
-
- Naturally there are other ways to break the key. Someone could for example pose
- as us and send out his own keys in our name...or exploit weaknesses of the
- program - like primes that are not created at ABSOLUTE random.
- Or hold a gun at our head and make us give him the key - that might sound funny
- but is not unheard of (especially in the metaphorical grasp of Justitia -
- when someone sticks a court order in your face)
-
- Furthermore if the program we use to crypt our messages with is fairly common,
- our opponent could optimize his cracking programs or even have them hardwired.
- One example are chips that use the DES algorithm for crypting and decrypting.
- Or he could make the cracking programs run parallel on parallel computers, if
- he got the might and enough time to rig up a program.
-
- Simply put: Our behavior should match the computing power of
- potential code-crackers.
-
- If our message is of low importance (or obsolete in short time) a simple
- algorithm would suffice. But if much is at gain, we should take appropriate
- measures to secure our privacy.
-
- It's like tying to outrun a Ferrari on a cross-bike. On an highway you do not
- stand a chance ...but if you can force him on a mountain road or rough terrain
- (with changing algorithms and keys often) you might just outrun the mightiest
- codecracker.
-
- ------------------------------------------------------------------------------
-
- The Truth about the Hacker
- Conspiracy
-
- The Hacker's Philosophy, and the reason why.
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Written by: Maldoror (ChUrCH oF ThE Non-CoNFoRMiST)
-
-
- If you are ignorant, do not start reading this, because you will
- never finish. You will disagree with anything I say anyway, simply
- because I am not you.
-
- If you are a Pseudo Intellectual, start reading this, quit, and
- say you agree with everything I say, even though you don't understand it.
-
- If you are depressing, start reading, hopefully you will kill a lot of
- innocent people at a mainstream night club, and try to blame me.
-
- Hackers are and always have been, the force in trying to stop our
- own suffering existence. Since the universe was created, the true souls,
- (among the first to separate from the single soul of the universe)
- realized the infinite repetition of their own being, and that they were
- simply doing one thing upon their continuous recreation: suffer.
-
- The hackers have known that the world and it's universe have
- been created over and over again, doomed to merely destroy itself upon
- it's own recognition, or recognition by man. As man becomes aware of
- himself, he becomes aware also of desires: the desire to be god.
-
- The truth is that man IS God, and that everything created in this
- universe was created by man and his thoughts. Mans thoughts have
- become so out of control, that he has now created himself, and is
- continuing the creations with every day of control of the masses, and
- his own greedy dark thoughts.
-
- The hackers have since the beginning of time, passed along the
- message to the next creations in the forms of dreams, ideas, books,
- music (current 93, COIL, Dead can Dance, Skinny Puppy, etc) and even
- visions. The Bible itself, is a good example of the universal hack.
- The message we as hackers have been trying to get across for
- creation after creation, existence after existence, self recognition
- after self recognition, is that we are all suffering and that this
- eternal cycle of pain must be stopped at all cost. The only way to
- stop this suffering of self is to convince SELF that he is suffering
- and must stop creating. We are each divisions of one strong soul,
- one thinking soul, that soul is GOD. WE are GOD. We must all realize
- together that we are suffering. WE must stop suffering. WE must
- stop the suffering. WE must stop the recreation. YES. We must hack
- the universe and kill it. There is only one way out of the eternal
- suffering we have started and been part of for ever. We must stop
- the cycle. We must remove ourselves from the cycle, and we must remove
- the universe from this cycle.
-
- The hackers return again and again. The hackers leave messages for
- themselves in the future, which is the past, for there is no difference
- here anymore. Leave your message, and next time around, you will
- realize that what I am saying is true. The government has known of the
- conspiracy for existence after existence. The government is so afraid
- of the conspiracy, and our plot to end it's UNIVERSAL power,
- that they are silently but quickly fooling us into obeying them more and
- more until we have no choice! Do not let them control you!!
- If you do, you are lying to yourself, and everyone else that exists!
- You are lying to yourself now by saying that this is NOT true.
-
- I have been here many times, and told you the exact same thing I
- am telling you now. If I am dead soon, you will realize AGAIN that what
- I am saying is the utmost truth, yet AGAIN you will do nothing.
- We must STOP our existence by hacking the universe. The universe is
- BINARY. The universe is a COMPUTER. YES I know this because WE created
- it long ago, as we will do again. WE are ONE.
-
- I know your desires to have control. The only control we can have
- is to stop the creation of ourselves. Each creation is the loss of
- control, THE DIVISION of the ONE.
-
- Each death brings new creation. From HEAVEN to HELL.
- Heaven is nonexistence. We all go to heaven, and fall back down to
- HELL. Read the BIBLE people. It was left by HACKERS!!!!!!!
-
- Don't read the BIBLE as a CHRISTIAN IDIOT who can only see
- a color for what it reflects. Anyone with any sense knows that WHITE
- is WHITE only because it is reflecting ALL the colors, therefore it
- is REALLY BLACK. Green is all BUT green. The BIBLE is all BUT
- what it' words really mean on a literal scale. The BIBLE is a CODE.
- Do you think we could just write something like this file?!? No WAY!
- It would be gone as fast as this one will be. Nobody dares forget the
- BIBLE, simply because it is MISUNDERSTOOD. Read it and THINK.
-
- We must STOP this cycle.
- Leave yourself a message.
- THINK.
-
- The government is PARANOID of:
-
- 1) HACKERS (we are the continuance of the power)
- 2) L.S.D. (The method of imprinting the present into the future)
- 3) SECRECY (The plotting of the end)
- (PGP is illegal? why?)
-
- If you don't believe me, sit and watch it happen.
-
- AGAIN.
-
- Hack the Universe, it must be stopped at all cost.
- Laugh now, cry next time around.
-
- ------------------------------------------------------------------------------
-
- German text available from german@anon.penet.fi (deutsch@anon.penet.fi).
- Italian text available from italian@anon.penet.fi (italiano@anon.penet.fi).
-
-
- The anon.penet.fi Anonymous Server
- ==================================
-
- Yes, another anonymous server. Why? Well, several well-known servers have
- bitten the dust recently. And most of them have served only a very limited
- subset of newsgroups, and mail only to "registered", anonymous users.
-
- Due to reasons too complicated to mention here I wanted to set up an anonymous
- server for the Scandinavian user community. I got hold of a pre-release copy
- of one of the server packages. As the version I got relied heavily on the
- advanced features of MMDFII, I had to modify it quite a bit. While hacking
- around, I removed the restriction of only supporting selected newsgroups.
- Within a week of startup, the server had been discovered by transatlantic
- users, and more recent stats show European users are definitely a minority.
-
- So what does the anon server really do? Well, it provides a front for
- sending mail messages and posting news items anonymously. As you send your
- very first message to the server, it automatically allocates you an id of
- the form anNNN, and sends you a message containing the allocated id. This id
- is used in all your subsequent anon posts/mails. Any mail messages sent to
- your-id@anon.penet.fi gets redirected to your original, real address. Any
- reply is of course anonymized in the same way, so the server provides a
- double-blind. You will not know the true identity of any user, unless she
- chooses to reveal her identity explicitly.
-
- In the anonymization process all headers indicating the true originator are
- removed, and an attempt is made to remove any automatically-included
- signatures, by looking for a line starting with two dashes (--), and zapping
- everything from there on. But if your signature starts with anything else,
- it's your own responsibility to remove it from your messages.
-
- There are two basic ways to use the system. The easiest way is by sending a
- message to recipient@anon.penet.fi:
-
- To: alt.sex.bestiality@anon.penet.fi
-
- To: an9999@anon.penet.fi
-
- To: help@anon.penet.fi
-
- Of course, in the case of mailing to a known user, you have to use addresses of
- the form user%host.domain@anon.penet.fi, or the pretty obscure source
- addressing construct of @anon.penet.fi:user@host.domain. These constructs are
- not necessarily handled properly by all mail systems, so I strongly recommend
- the "X-Anon-To:" approach in these cases. This works by you sending a message
- to "anon@anon.penet.fi", including a X-Anon-To: header line containing the
- desired recipient. But this really has to be a field in the message header,
- before the first empty line in the message. So:
-
- To: anon@anon.penet.fi
- X-Anon-To: alt.sex.needlework,rec.masturbation
-
- To: anon@anon.penet.fi
- X-Anon-To: jack@host.bar.edu
-
- Valid recipients in both cases are fully qualified user addresses in RFC-822
- format (user@host.domain), anon user id's (anNNN), newsgroup names
- (alt.sex.paperclips) or one of the "special" user names of ping, nick, help,
- admin and stat.
-
- Sending to "ping" causes a short reply to be sent confirming (and
- allocating, if needed) your anon id. "nick" takes the contents of the
- Subject: header and installs it as your nickname. If you have a nickname, it
- appears in the From: header in the anonymized message along with your anon
- id. "help" returns this text, and stat gives some statistics about the
- system. Mail to "admin" goes directly to me unanonymized, and can be used to
- report problems. If you want to send mail to me anonymously, you can use
- "an0".
-
- When crossposting to several newsgroups, you can list several newsgroups
- separated by commas as recipients, but this only works using the X-Anon-To:
- header. References: headers do work, so they can (and should) be used to
- maintain reply threads.
-
- Ah yes, please remember that the posting takes place at my local site, so you
- can only post to groups that are received at penet.fi. I get all "worldwide"
- groups, but various exotic local groups don't make it here. I have gotten
- a couple of comments about permitting anonymous postings to technical groups.
- I can only answer that I believe very firmly that it's not for me to dictate
- how other people ought to behave. Somebody might have a valid reason for
- posting anonymously to a group I might consider "technical". But remember
- anonymous postings are a privilege, and use them accordingly. I believe adult
- human beings can behave responsibly. Please don't let me down.
-
- As the server was originally intended to be used by Scandinavians, it
- includes help files for various languages. This works by using the
- language in question as the address. So to get the German help file,
- send a message to german@anon.penet.fi (or deutsch@anon.penet.fi).
- Support for new languages is added every now and then, when I find
- volunteers to do the translation. Any new ones?
-
- The user-id database is based on RFC822-ized forms of your originating
- address. This may cause problems for some users, either because their site
- is not properly registered in the name servers, resulting in
- non-deterministic addresses, or because their mail router doesn't hide the
- identity of individual workstations, resulting in different originating
- addresses depending on which workstation you mail from. Talk to your
- administrator. If that doesn't help, let me know, and I will make a manual
- re-mapping.
-
- You might wonder about the sense of using a server out somewhere, as the
- song goes, "so close to Russia, so far from Japan". Well, the polar bears
- don't mind, and the ice on the cables don't bother too much :-)
- Well, in fact, as we live in a wonderfully networked world, the major delay
- is not going over the Atlantic, but my local connection to the Finnish EUnet
- backbone, fuug.fi. Once you reach a well-connected host, such as
- uunet.uu.net, there's a direct SMTP connection to fuug.fi. My connection to
- fuug.fi is currently a polled connection over ISDN, soon to be upgraded to
- on-demand-SMTP/NNTP. But for now, expect a turn-around delay of 2-4 hours for
- trans-atlantic traffic.
-
- Short of having everyone run a public-key cryptosystem such as PGP,
- there is no way to protect users from malicious administrators. You have to
- trust my personal integrity. Worse, you have to trust the administrators on
- every mail routing machine on the way, as the message only becomes anonymous
- once it reaches my machine. Malicious sysadmins and/or crackers could spy on
- SMTP mail channels, sendmail queues and mail logs. But as there are more
- than 3000 messages being anonymized every day, you have to be pretty perverted
- to scan everything...
-
- Another thing is mail failures. I've had cases of mail routers doing the wrong
- thing with % addresses, "shortcutting" the path to the destination site.
- This could cause your mail to go to the final destination without ever
- touching my server (and thus without getting anonymized). This can be avoided
- by using the X-Anon-To: method.
-
- And if your return address bounces for some reason (nameservers down,
- temporary configuration failures etc.), the original sender and/or
- postmasters on the way might get error messages showing your true
- identity, and maybe even the full message.
-
- There is at least one known way to discover the anon id of a user. It involves
- being able to falsify your real identity, so it is not too easy to use, and it
- doesn't reveal the real address lurking behind an anon id, but it can be used
- to discover what anon id a certain user is using. To fix this problem, the
- server requires that you use a password when you try to mail to a
- non-anonymous user.
-
- First you have to set a password by mailing to password@anon.penet.fi, with
- a message containing only your password. The password can be any string of
- upper- or lowercase characters, numbers and spaces.
-
- Once you have set your password, you must include it in all your messages, in
- a "X-Anon-Password:" line. As with the X-Anon-To: line, it can be either a
- part of the header or as the first non-empty line of the message text.
-
- So your first message might look like this:
-
- To: password@anon.penet.fi
-
- XYZZY99998blarf
-
- And your subsequent messages might look like something like this:
-
- To: anon@anon.penet.fi
- Subject: Test...
- X-Anon-To: foo@bar.fie
- X-Anon-Password: XYZZY99998blarf
-
- If you find this is too much of a hassle, and don't care too much about the
- confidentiality of your anon id, you can set the password to "none", in which
- case the server doesn't require you to have a password.
-
- If you suddenly discover that the server requires a password for posting stuff
- etc, somebody has managed to use your account and set a password. In that
- case, contact admin@anon.penet.fi.
-
- Crackers are just too clever. Undoubtedly somebody is going to come
- up with some novel method.... Not much I can do about that...
-
- If you intend to mail/post something that might cost you your job or
- marriage or inheritance, _please_ send a test message first. The software
- has been pretty well tested, but some mailers on the way (and out of my
- control) screw things up. And if you happen to find a problem, _please_ for
- the sake of all the other users, _let me know asap_.
-
- And _please_ use the appropriate test newsgroups, such as alt.test or
- misc.test. Yes, _you_ might get excited by reading 2000 "This is a test.."
- messages on alt.sex, but I warn you that most psychologists consider this
- rather aberrant...
-
- And remember this is a service that some people (in groups such as
- alt.sexual.abuse.recovery) _need_. Please don't do anything stupid that
- would force me to close down the service. As I am running my own company,
- there is very little political pressure anyone can put on me, but if
- somebody starts using the system for criminal activities, the authorities
- might be able to order me to shut down the service. I don't particularly
- want to find out, however...
-
- If you think these instructions are unclear and confusing, you are right. If
- you come up with suggestions for improving this text, please mail me! Remember
- English is my third language...
-
- Safe postings!
-
- Julf
- - - - ------------------------------------------------------------------- - - -
- Johan Helsingius Kuusikallionkuja 3 B 25 02210 Espoo Finland Yourp
- net: julf@penet.fi bellophone: int. +358 0400 2605 fax: int. +358 013900166
-
- ------------------------------------------------------------------------------
-
-