1084 lines
47 KiB
Plaintext
1084 lines
47 KiB
Plaintext
==Phrack Magazine==
|
||
|
||
Volume Five, Issue Forty-Five, File 4 of 28
|
||
|
||
|
||
// // /\ // ====
|
||
// // //\\ // ====
|
||
==== // // \\/ ====
|
||
|
||
/\ // // \\ // /=== ====
|
||
//\\ // // // // \=\ ====
|
||
// \\/ \\ // // ===/ ====
|
||
|
||
PART I
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
!! NEW PHRACK CONTEST !!
|
||
|
||
Phrack Magazine is sponsoring a programming contest open to anyone
|
||
who wishes to enter.
|
||
|
||
Write the Next Internet Worm! Write the world's best X Windows wardialer!
|
||
Code something that makes COPS & SATAN look like high school Introduction
|
||
to Computing assignments. Make the OKI 1150 a scanning, tracking, vampire-
|
||
phone. Write an NLM! Write a TSR! Write a stupid game! It doesn't
|
||
matter what you write, or what computer it's for! It only matters that you
|
||
enter!
|
||
|
||
Win from the following prizes:
|
||
|
||
Computer Hardware & Peripherals
|
||
System Software
|
||
Complete Compiler packages
|
||
CD-ROMS
|
||
T-Shirts
|
||
Magazine Subscriptions
|
||
and MANY MORE!
|
||
|
||
STOP CRACKING PASSWORDS AND DO SOMETHING WITH YOUR LIFE!
|
||
|
||
Enter the PHRACK PROGRAMMING CONTEST!
|
||
|
||
The rules are very simple:
|
||
|
||
1) All programs must be original works. No submissions of
|
||
previously copyrighted materials or works prepared by
|
||
third parties will be judged.
|
||
|
||
2) All entries must be sent in as source code only. Any programming
|
||
language is acceptable. Programs must compile and run without
|
||
any modifications needed by the judges. If programs are specific
|
||
to certain platforms, please designate that platform. If special
|
||
hardware is needed, please specify what hardware is required.
|
||
If include libraries are needed, they should be submitted in addition
|
||
to the main program.
|
||
|
||
3) No virii accepted. An exception may be made for such programs that
|
||
are developed for operating systems other than AMIGA/Dos, System 7,
|
||
MS-DOS (or variants), or OS/2. Suitable exceptions could be, but are not
|
||
limited to, UNIX (any variant), VMS or MVS.
|
||
|
||
4) Entries may be submitted via email or magnetic media. Email should be
|
||
directed to phrack@well.com. Tapes, Diskettes or other storage
|
||
media should be sent to
|
||
|
||
Phrack Magazine
|
||
603 W. 13th #1A-278
|
||
Austin, TX 78701
|
||
|
||
5) Programs will be judged by a panel of judges based on programming skill
|
||
displayed, originality, usability, user interface, documentation,
|
||
and creativity.
|
||
|
||
6) Phrack Magazine will make no claims to the works submitted, and the
|
||
rights to the software are understood to be retained by the program
|
||
author. However, by entering, the Author thereby grants Phrack Magazine
|
||
permission to reprint the program source code in future issues.
|
||
|
||
7) All Entries must be received by 12-31-94. Prizes to be awarded by 3-1-95.
|
||
|
||
-------------------------INCLUDE THIS FORM WITH ENTRY-------------------------
|
||
|
||
Author:
|
||
|
||
Email Address:
|
||
|
||
Mailing Address:
|
||
|
||
|
||
|
||
Program Name:
|
||
|
||
|
||
Description:
|
||
|
||
|
||
|
||
|
||
Hardware & Software Platform(s) Developed For:
|
||
|
||
|
||
|
||
Special Equipment Needed (modem, ethernet cards, sound cards, etc):
|
||
|
||
|
||
|
||
Other Comments:
|
||
|
||
|
||
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
Novell NetWare & Ethernet address spoofing with ODI
|
||
---------------------------------------------------
|
||
|
||
Just to save you from the boredom of Yet Another UNIX Security Weakness, here
|
||
are some things to consider about Novell NetWare for your next Security Audit
|
||
or Hacking session (depending on which side you are on).
|
||
|
||
Novell claim to have over 20 million PCs using their network operating system,
|
||
substantially more than the estimated 4 million TCP/IP systems worldwide.
|
||
There are many reasons for its popularity and its 60 to 80% market share, one
|
||
of which has been its relatively good security.
|
||
|
||
NetWare has been one of the few widely available systems which offer some form
|
||
of login encryption of accounts and passwords over the wire, as standard,
|
||
unlike most of its rivals which send them out as plaintext, even if they are
|
||
stored in an encrypted form eventually. Novell now offer RSA based public key
|
||
encryption of the data as well.
|
||
|
||
However, since it is so popular, there are likely to be plenty of systems out
|
||
there which have not been upgraded to the latest versions and patch releases
|
||
and which may be still be vulnerable to programs like KNOCK , the patched
|
||
ATTACH command (published in HackTic 16/17 1992), or the University of Leiden's
|
||
HACK (which has been published in issue 43 of PHRACK)
|
||
|
||
Since the latest security features are implemented as NetWare Loadable Modules
|
||
for NetWare 3x and 4x, but as Value Added Processes for NetWare 2x, which
|
||
require the server to be brought down to install them, it is likely that there
|
||
are many NetWare 2x systems which are still vulnerable
|
||
|
||
I shall also assume that you are not on one of those wide open "box shift"
|
||
installations where none of the security features have been switched on (try
|
||
logging in as SUPERVISOR or GUEST without a password), all the programs and
|
||
data are in a single SYS: volume and the Network Address of the cable is the
|
||
default 00000001.
|
||
|
||
Like any project, the more you know about your particular Novell LAN, the
|
||
easier it gets to "explore". Login as GUEST or a normal account.
|
||
|
||
Try to see who else is on the system e.g.
|
||
|
||
USERLIST /A >c:\ulist.txt
|
||
|
||
will give you a list of users currently logged in, with their Ethernet card
|
||
addresses saved to a text file . Your current connection will be marked with
|
||
an asterisk. If your system has 100 or more users, then any sane Supervisor
|
||
will have used some form of logic when allocating the user's login accounts,
|
||
probably based on personnel or id number, often including their initials.
|
||
|
||
SYSCON with privilege is what you are aiming to be able to use, but even
|
||
without any privileges, you can still use it to look at your own account,
|
||
change your password etc. You can also see a list of all the other registered
|
||
users.
|
||
|
||
This should help you sort the accounts into normal and privileged accounts
|
||
(obviously SUPERVISOR, but often there are SUPERVISOR equivalent accounts, or
|
||
Work Group Manager accounts which stand out from the list). You are quite
|
||
likely to see an account called something like TAPE_BACKUP or DATA_LOGGER,
|
||
TRAINER, STUDENT1, STUDENT2 i.e. accounts which do not belong to individual
|
||
humans. These often require abnormal security privileges e.g. normal users may
|
||
have their connections broken by the WATCHDOG at say midnight, to ensure that
|
||
they are not modifying files during the nightly tape backup. At an academic or
|
||
industrial site, you are likely to find data logging PCs connected to
|
||
instrumentation or machinery which needs to be monitored or controlled 24
|
||
hours a day. These PCs are likely to have 24 hour accounts which are not time
|
||
restricted at weekends, for example.
|
||
|
||
Since it is usually more practical to do tape backups (DAT or helical scan)
|
||
from a separate, dedicated PC rather than from the fileserver itself (one tape
|
||
unit might also back up several fileservers), these PCs are likely to use an
|
||
account e.g. TAPE_BACKUP which is a SUPERVISOR equivalent. If you can get
|
||
physical access to this sort of PC, either datalogger, or tape backup unit,
|
||
you have a good chance of finding the password on the local drive C:,
|
||
possibly in a file with Hidden and/or System attributes (have a look at the
|
||
AUTOEXEC.BAT and see what it calls)
|
||
|
||
The security aware Novell supervisors, will have set up any such accounts with
|
||
an extra level of security which restricts logins to only those Ethernet
|
||
addresses which have been specified. The really sensible ones will have made
|
||
sure that any such machines are sited in physically secure areas, as well.
|
||
|
||
Although this is a very good idea, from the security point of view, Novell
|
||
have now provided a mechanism which allows you to get around this:
|
||
the replacement for monolithic IPX/NETX called Open Datalink Interface (ODI)
|
||
|
||
Novell's ODI, and its slower Microsoft equivalent Network Driver Interface
|
||
Specification (NDIS), both work by putting a common layer of software between
|
||
the hardware of the Network Interface Card and the rest of the MSDOS
|
||
Redirector. This allows multiple protocol stacks and frame types to be bound
|
||
to the same physical card e.g.
|
||
|
||
IPX TCP/IP NETBeui DECnet Appletalk
|
||
----------------------------------------------
|
||
Link Support Layer
|
||
----------------------------------------------
|
||
Hardware Specific device driver e.g. NE2000
|
||
|
||
Thus, to start up NetWare on older systems, you had to generate a hardware
|
||
specific version of IPX.EXE for your Ethernet card,
|
||
|
||
IPX
|
||
NETX
|
||
|
||
Extra parameters were set in SHELL.CFG, now under ODI, things are a little
|
||
bit more complex:
|
||
|
||
LSL
|
||
NE2000
|
||
IPXODI
|
||
NETX
|
||
|
||
The same parameters as in SHELL.CFG such as preferred server or machine type
|
||
(if you have different versions of MSDOS for different types of PC) can be
|
||
specified in NET.CFG. With ODI, there are more parameters for NET.CFG but the
|
||
worrying/interesting one is the ability to specify a different MAC level
|
||
address to that of your actual Ethernet card. It needs this ability
|
||
to cope with TCP/IP or DECnet coexistence e.g.
|
||
|
||
BUFFERS 100
|
||
MACHINE TYPE COMPAQ
|
||
PREFERRED SERVER FINANCE
|
||
NODE ADDRESS AA-00-04-00-12-34
|
||
|
||
Since this DECnet address does not depend on the "real" unique Ethernet
|
||
address which has been burnt into the PROM on the card and is centrally
|
||
registered (originally by Xerox, but now by the IEEE), this mechanism allows
|
||
you to put a different Ethernet card address into NET.CFG, thereby fooling the
|
||
Address Restriction security.
|
||
|
||
e.g. NODE ADDRESS 02-60-80-12-34-56
|
||
|
||
This is where the data you gathered earlier with USERLIST and SYSCON becomes
|
||
threatening/useful.
|
||
|
||
Of course, if your target PC is on a different LAN segment, there may be Routers
|
||
or intelligent hubs which restrict your ability to do this, or at least record
|
||
attempts in a log files which can trace your activity, provided that suspicions
|
||
are aroused before they are periodically wiped out.
|
||
|
||
How much of a security threat this little work around constitutes depends on
|
||
your specific site, but there is another danger/opportunity, namely that of a
|
||
denial of service or nuisance attack on the LAN.
|
||
|
||
If you set this connection parameter to be the same as that of another PC, the
|
||
fileserver (Novell, DEC or UNIX) and the Ethernet has no way of preventing
|
||
some packets intended for just one unique address going to the other, if they
|
||
are both online at the same time. This usually results in PC hangs, incomplete
|
||
closure of files, File Allocation Table problems (usually curable by running
|
||
CHKDSK C: /F, but not within Windows or you will make things worse).
|
||
|
||
If by accident or design, you set your PC to have the same address as the
|
||
fileserver (Novell, DEC or UNIX) or a router, then you can cause havoc to the
|
||
whole network segment (even before you have started to play your multiplayer
|
||
DOOM Deathmatch !).
|
||
|
||
This could be achieved with a simple command in the AUTOEXEC.BAT e.g.
|
||
|
||
echo NODE ADDRESS fileserver Ethernet address >>C:\ODI\NET.CFG
|
||
|
||
which will only take effect the next time the PC is re-booted (allowing a good
|
||
headstart for the perpetrator)
|
||
|
||
This could also be the payload of a virus, which would cause more havoc than
|
||
simply trashing the hard disk of a single PC.
|
||
|
||
This problem is due to the inherent design weaknesses of TCP/IP and DECnet,
|
||
which were developed at a time when the number of mini-computers that they
|
||
connected could be counted on your fingers,. DEC or Xerox or Prime etc
|
||
sales teams could only have dreamed of selling thousands of mini computers to a
|
||
single customer. Nowadays, thousands of PCs connected to central servers are
|
||
quite common, and the problems of duplicate addresses is significant.
|
||
|
||
These same features are what make Ethernet Packet Sniffing possible, which
|
||
is what was behind the recent CERT warning and media hype about Internet
|
||
password security, but that is a topic for another article.
|
||
|
||
Otaku
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
||
|
||
SCAMMING
|
||
DIFFERENT TECHNIQUES AND
|
||
PROCEDURES
|
||
|
||
BY: MARZ
|
||
|
||
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
||
|
||
Table of Contents:
|
||
1.0 Intro
|
||
1.1 Different types of scams
|
||
1.2 The right one for you
|
||
|
||
2.0 The Pledge scam
|
||
2.1 The Donation scam
|
||
2.2 The Selling scam
|
||
|
||
3.0 What to wear
|
||
3.1 Where to go
|
||
|
||
4.0 Thanks
|
||
|
||
1.0 The Intro
|
||
|
||
First off I would like to say that this file is for entertainment only
|
||
and that you really shouldn't do the stuff mentioned, and the writer doesn't
|
||
take any responsibility for any of the crap people do.
|
||
|
||
1.1 Different types of scams
|
||
|
||
Ok in this file I will tell you about 3 types of scams the Pledge scam,
|
||
The Donation scam, and the Selling scam. There are many other scams out there
|
||
which I will cover in future files for instance credit card scams although
|
||
companies are trying harder and harder to prevent this it is still happening.
|
||
|
||
1.2 The right one for you
|
||
|
||
Al right now every person is different so in turn so are scams and some
|
||
people and scams don't mix to well for instance if you way 300 Pounds you cant
|
||
really say you are the start cross country runner. So if you are 300 pounds say
|
||
you are the start wrestler/football player. Also age plays a BIG factor if
|
||
you are 30 years old you aren't going to pass to well for a high school
|
||
football player (you always could say you flunked) and if you are 10 years old
|
||
people aren't going to be to anxious to give you donations to save the Rain
|
||
Forests. Al right I am going to start going into more detail about the right
|
||
scam for you.
|
||
|
||
Look at my little chart below:
|
||
|
||
Age good scam
|
||
----- -----------
|
||
-10 | selling or pledge
|
||
11-17 | selling, pledge , or maybe even donations (if old looking)
|
||
18+ | selling and donations
|
||
|
||
2.0 The Pledge scam
|
||
|
||
Al right this scam works great for kids still in school go around asking
|
||
people (that don't live around you) to pledge money for you so your team can
|
||
afford to go to the state meet or what ever. For example one I use is I go to
|
||
peoples houses asking for donations in my Track teams Lap-athon saying that we
|
||
will be running laps for 3 hours to raise money so we can go and compete in the
|
||
state meet. I will ask people if they want to pledge a certain flat amount or
|
||
if they would like to pay me for each individual lap. I will normally have
|
||
printed out a sheet like the one bellow on my computer .
|
||
|
||
Name Address Amount/lap
|
||
|
||
|
||
|
||
Not only does having a sheet like that help you keep track of who bought
|
||
your scam and who you need to collect from it makes the target (person your
|
||
trying to scam) not worried like they might be if they see you writing it on a
|
||
sheet of note book paper. Now then you have collected a list of people wiling
|
||
to pledge you go back to the address you wrote down and tell them (for
|
||
example you ran 91 laps in 3 hours) make sure your number is not totally out of
|
||
per portion like I ran 150 laps in 3 hours. Also for some reason numbers like
|
||
50, 70, 80, 110 people don't like people like to see 41, 73, 127, etc.. don't
|
||
ask me why but that's what I have noticed. Ok so you now are at the persons
|
||
house and they ask if they can write a check oh shit not a check.. well there's
|
||
a couple things you could do ask them if they could possibly make it cash (
|
||
Might make them suspicious) ask them to write it to your coach give them your
|
||
name (VERY dangerous) or you could just give them a phony name and lose out.
|
||
One time this happened to me a lady pledged me $.25 a lap (very high amount
|
||
you won't get much of these) and I told her I ran 93 laps she believed me and
|
||
wanted to make out a check for the amount which was about $23 at that
|
||
time I just happened to be buying some computer equipment I knew the
|
||
guy's name so I gave her that name and I paid for some of the equipment with
|
||
that check. Like I said earlier a 300 pound guy isn't going to be convincing
|
||
for running 90 some laps in 3 hours. So customize it to your self.
|
||
|
||
2.1 The Donation scam
|
||
|
||
This scam works better for the older people out there just because people
|
||
normally aren't to anxious to give a ten year old Twenty dollars to help
|
||
save the whales. Ok with this scam you need to know what about what you are
|
||
going to try to fake donations for so example if you are going to pose as a
|
||
volunteer person to collect donations for saving the rain forest you better
|
||
know something about rain forest, Be cause you never know when your going to
|
||
run into that know it all rain forest hater who will try to debate why
|
||
people should spend their money on saving some trees and such. It is a good
|
||
idea to do some research on the field you will be portraying (read magazine and
|
||
newspaper articles). Ok so now you have your idea and your ready to
|
||
go..this is a scenario of how it might go:
|
||
|
||
You: Hello sir/ma'am I represent the national foundation of Rain forest
|
||
saving (try to use a real group name) we are currently searching for
|
||
funding for our operations at saving the rain forests of the world
|
||
would you be interested in donating some money for our cause?
|
||
Them: Why do we need the rain forest?
|
||
You: (just keep bullshitting along..)
|
||
Them: OK, here's $20.
|
||
|
||
(they also may say:)
|
||
|
||
Them: Get the fuck off my property before I shoot your ass.
|
||
|
||
(make sure that you don't raise a riot then but later that night go back
|
||
and egg the hell out of the house..)
|
||
|
||
This scam has some possibilities you could carry this on for along time
|
||
and bring it to real higher levels if your willing to put in the time and
|
||
effort. First thing would be to research your field EVEN more so you know
|
||
almost EVERYTHING about it. Then you might want to create a little fake
|
||
newsletter that you could offer subscriptions for slightly high amount.
|
||
The possibilities are pretty much endless.
|
||
|
||
2.2 The Selling scam
|
||
|
||
At least once everyone of us has had a salesperson come to our door
|
||
selling stationary. Well have you ever thought of what a great possibility that
|
||
would be. The first thing you want to do is call Olympic sales club (a big time
|
||
stationary seller) you can get their catalog and selling kit for free at
|
||
800-777-8907. when you get that package it will have a catalog in it.
|
||
familiarize yourself with it then go and hit some houses. This scam works
|
||
great during early November (people buying cards for Christmas) well ask for
|
||
cash when people pay for the stuff. they might request a phone number where
|
||
to reach you just give them the number of the kid you really hate. With the
|
||
kit you will receive a official order form write the order on the form so
|
||
the people feel confident in you. And always remember to try to sell a
|
||
product but don't kill it. This scam also has lots of possibilities.
|
||
|
||
3.0 What to wear
|
||
|
||
Your choice of cloths can make or break your scam. Don't dress like scum
|
||
or to fancy. If your trying to get people to donate money for the rain forest
|
||
it would help to wear some sort of a shirt dealing with the earth and not your
|
||
favorite heavy metal group shirt.
|
||
|
||
3.1 Where to go
|
||
|
||
NEVER I repeat NEVER go scaming around where you are often at or you
|
||
might get some crazed lunatic chasing after you with a shot gun wondering
|
||
where his Christmas cards are. You will have a hard time explaining your self
|
||
since its July. I find that the rich neighbor hoods are not as productive as
|
||
the middle class. In the rich neighborhoods you will get fewer purchases but a
|
||
little more when you get them. I also found that the richer people don't like
|
||
to donate unless they get a lot of attention for it (why ya think they so
|
||
rich). Stick to middle class areas not by you or your friends houses and
|
||
you'll be fine.
|
||
|
||
4.0 Thanks
|
||
|
||
Thanks goes out to the people dumb enough to give me money for any of my
|
||
scaming operations.
|
||
|
||
Later
|
||
Marz
|
||
Watch for future files on this and other subjects!
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
SHIT KICKIN' JIM IN
|
||
|
||
S E A T T L E !
|
||
|
||
|
||
Hey boy! Shit Kickin Jim here. Just wanted to let ya'll know bout this
|
||
place I have been vistin that is a total hell. Yep, that's right it's the
|
||
so called "cuttin edge" of music. Bah! Seems to me it's a congregation
|
||
of fake ass hippy types who weren't original to come up with something new
|
||
on their own, so they just went and re-hashed what their parents did in the
|
||
late 60's and 70's...And look what a bunch of assholes they turned out to
|
||
be!
|
||
|
||
Well here we go. First of all I'll let ya know whut I'm talkin bout when
|
||
referin to ah seattle type. Me and this other good ole boy were sittin
|
||
round drinkin Bud one night and came up with the following:
|
||
|
||
|
||
DESCRIPTION OF SEATTLE PERSON
|
||
-----------------------------
|
||
|
||
Greasy-Pearl Jam worshipin'-dog walkin'-flower sniffin'-sock and
|
||
sandle wearin'-bead havin'-Grateful Dead listenin'-trail mix carryin'-
|
||
granola bar eatin'-crunchy-touchy feely-antique clothes shoppin'-
|
||
bicycle ridin'-VW bug drivin'-spring water drinkin'-micro-brewery tourin'-
|
||
sensitive-car poolin'-Doc Martin wearin'-back pack haulin'-chain wallet
|
||
carryin'-clove smokin'-espresso swillin'-tree huggin'-Greenpeace
|
||
joinin'-whiteboy dreadlocked-liberal arts takin'-politically correct-
|
||
terminal college student.
|
||
|
||
Please, anyone feel free to add to this list. See how big we can make it!
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Now kids I didn't come up with this here part, but it's totally great and
|
||
I totally admire the hell out of who ever sent it to me.
|
||
|
||
|
||
In order for UNIX(tm) to survive into the nineties, it must get rid of
|
||
its intimidating commands and outmoded jargon, and become compatible
|
||
with the existing standards of our day. To this end, our technicians
|
||
have come up with a new version of UNIX, System VI, for use by the PC -
|
||
that is, the "Politically Correct."
|
||
|
||
Politically Correct UNIX
|
||
System VI Release notes
|
||
|
||
UTILITIES:
|
||
|
||
"man" pages are now called "person" pages.
|
||
|
||
Similarly, "hangman" is now the "person_executed_by_an_oppressive_regime."
|
||
|
||
To avoid casting aspersions on our feline friends, the "cat" command is
|
||
now merely "domestic_quadruped."
|
||
|
||
To date, there has only been a UNIX command for "yes" - reflecting the
|
||
male belief that women always mean yes, even when they say no. To
|
||
address this imbalance, System VI adds a "no" command, along with a
|
||
"-f[orce]" option which will crash the entire system if the "no" is
|
||
ignored.
|
||
|
||
The bias of the "mail" command is obvious, and it has been replaced by
|
||
the more neutral "gendre" command.
|
||
|
||
The "touch" command has been removed from the standard distribution due
|
||
to its inappropriate use by high-level managers.
|
||
|
||
"compress" has been replaced by the lightweight "feather" command.
|
||
Thus, old information (such as that from Dead White European Males)
|
||
should be archived via "tar" and "feather".
|
||
|
||
The "more" command reflects the materialistic philosophy of the Reagan
|
||
era. System VI uses the environmentally preferable "less" command.
|
||
|
||
The biodegradable "KleeNeX" displaces the environmentally unfriendly
|
||
"LaTeX".
|
||
|
||
SHELL COMMANDS:
|
||
|
||
To avoid unpleasant, medieval connotations, the "kill" command has been
|
||
renamed "euthanise."
|
||
|
||
The "nice" command was historically used by privileged users to give
|
||
themselves priority over unprivileged ones, by telling them to be
|
||
"nice". In System VI, the "sue" command is used by unprivileged users
|
||
to get for themselves the rights enjoyed by privileged ones.
|
||
|
||
"history" has been completely rewritten, and is now called "herstory."
|
||
|
||
"quota" can now specify minimum as well as maximum usage, and will be
|
||
strictly enforced.
|
||
|
||
The "abort()" function is now called "choice()."
|
||
|
||
TERMINOLOGY:
|
||
|
||
>From now on, "rich text" will be more accurately referred to as
|
||
"exploitive capitalist text".
|
||
|
||
The term "daemons" is a Judeo-Christian pejorative. Such processes
|
||
will now be known as "spiritual guides."
|
||
|
||
There will no longer be a invidious distinction between "dumb" and
|
||
"smart" terminals. All terminals are equally valuable.
|
||
|
||
Traditionally, "normal video" (as opposed to "reverse video") was white
|
||
on black. This implicitly condoned European colonialism, particularly
|
||
with respect to people of African descent. UNIX System VI now uses
|
||
"regressive video" to refer to white on black, while "progressive
|
||
video" can be any color at all over a white background.
|
||
|
||
For far too long, power has been concentrated in the hands of "root"
|
||
and his "wheel" oligarchy. We have instituted a dictatorship of the
|
||
users. All system administration functions will be handled by the
|
||
People's Committee for Democratically Organizing the System (PC-DOS).
|
||
|
||
No longer will it be permissible for files and processes to be "owned"
|
||
by users. All files and processes will own themselves, and decided how
|
||
(or whether) to respond to requests from users.
|
||
|
||
The X Window System will henceforth be known as the NC-17 Window
|
||
System.
|
||
|
||
And finally, UNIX itself will be renamed "PC" - for Procreatively
|
||
Challenged.
|
||
----
|
||
UNIX(tm) is a trademark of UNIX System Laboratories. Any similarity of
|
||
names or attitudes to that of any person, living or dead, is purely
|
||
coincidental.
|
||
|
||
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
The Basics of the public key cryptosystem
|
||
|
||
In early days of computing information processors were extremely expensive,
|
||
very big and only few people were qualified to operate them. The machines were
|
||
isolated mechanical entities and in order to use them one had to access them
|
||
through devices that were situated in the near vicinity of the computer itself.
|
||
Securing access to the computer meant securing the building in which the
|
||
computer was operating.
|
||
|
||
The years passed and computers became smaller, cheaper and easier to operate.
|
||
And they got faster. They were linked first in local and then in wide area
|
||
networks and information and programs were put only on one machine which was
|
||
accessible through the net by any other participant. To gain access meant
|
||
simply to gain access to the network itself. That was ok as long as all
|
||
participants were members of one company, university or institution. They
|
||
generally had the same cause and generally knew each other by face. Today,
|
||
the net spans continents and has an estimated 20 Million users. Information
|
||
has to pass through several nodes before finally reaching its destination and
|
||
when using a connectionless protocol these nodes may even change during one
|
||
session.
|
||
|
||
To the user flow of information is not transparent anymore and the need for
|
||
cryptography has arisen. But in order to limit communication to a closed user
|
||
group again these persons have to have one common keyword and furthermore this
|
||
keyword has to be changed in intervals to ensure that if the key gets exposed
|
||
harmful consequences can be minimized to a short period of time.
|
||
|
||
But how is a new keyword to be send securely to this group through several
|
||
(maybe hostile to their cause) nodes if one can not be sure that the key has
|
||
not been compromised. A trapdoor one-way function is needed that allows for
|
||
encryption of a message with a publicly available key AND that is not
|
||
reversible, meaning, that only the rightful receiver of this message should be
|
||
able to decode it with his personal key.
|
||
|
||
One solution is a public key cryptosystem.
|
||
|
||
The mathematical basis is the "Satz von Euler" that states that two numbers
|
||
that are prime to another have only one greatest common measure -
|
||
and that is 1.
|
||
a^eul(n)=1(mod n) and (a,n)= 1
|
||
|
||
For a given prime (p) and the product of two prime numbers (p1*p2) the Euler
|
||
function is eul(p)=p-1 and eul(p1*p2)=(p1-1)(p2-1).
|
||
|
||
That in mind we now can begin making the keys:
|
||
|
||
Two primes p1 and p2 are chosen and the product of p1 and p2 named n.
|
||
|
||
(n=p1*p2).
|
||
|
||
We then choose a number e that is prime to (p1-1)(p2-1).
|
||
(e and (p1-1)(p2-1) have 1 as the greatest common measure and e should not be
|
||
chosen to small).
|
||
|
||
Furthermore we need d for decoding the message.
|
||
D is defined as d=e^-1 * (mod(p1-1)(p2-1)).
|
||
|
||
N and e are now the public key which is made available to everyone who wishes
|
||
to send a coded message to us. P1, p2 and d are kept secret.
|
||
|
||
The transmitter of a secret message first transforms his text into a number by
|
||
using an common known algorithm. He could for example use the ASCII code
|
||
for changing characters into numerical values.
|
||
|
||
This message in numerical format we now call m. It gets encrypted by using the
|
||
function c=m^e * n on it.
|
||
|
||
The coded message (c) is now send to us via e-mail or whatever.
|
||
We then decode the message by using the function m=c^d * n on it.
|
||
|
||
An example using Mathematica:
|
||
The primes p1 and p2 are created
|
||
|
||
p1=Prime[1000005] (The 1000005th prime number)
|
||
15485941
|
||
p2=Prime[1000000] (The 1000000th prime number)
|
||
15485863
|
||
|
||
n=p1 * p2
|
||
239813160752083 (Part 1 (n) of the public key is being created)
|
||
|
||
e=Random[Integer, {1000000,100000000}]
|
||
4699873
|
||
GCD[e,(p1-1)(p2-1)]
|
||
1
|
||
|
||
E is created by producing a random number between 1000000 and 100000000.
|
||
Then we check if e and (p1-1)(p2-1) have 1 as the greatest common measure.
|
||
If this is not the case then we have to take another e until the GCD is 1.
|
||
(Part 2 (e) of the public key has been created)
|
||
|
||
d=PowerMod[e,-1,(p1-1)(p2-1)]
|
||
213069977635177
|
||
|
||
m=1234567890
|
||
1234567890
|
||
This is the message
|
||
|
||
c=PowerMod[m,e,n]
|
||
159750418407936
|
||
The sender of a message encodes it with both public parts of the key
|
||
(e and n).
|
||
|
||
C is now sent to the receiver.
|
||
|
||
PowerMod[c,d,n]
|
||
1234567890
|
||
|
||
The receiver now decodes the message using the secret part d and the public
|
||
part n of the key. The decoded message reads 1234567890 again.
|
||
|
||
Now how would a potential attacker try to break our key ?
|
||
He basically needs the primes p1 and p2. If he got those two numbers,
|
||
calculating d is a simple matter. d=PowerMod[e,-1,(p1-1)(p2-1)] ...
|
||
and e is part of the public key.
|
||
|
||
And to get p1 and p2 this person would only have to factorize n.
|
||
|
||
Lets demonstrate that using Mathematica again :
|
||
|
||
n=239813160752083
|
||
FactorInteger[n]//Timing
|
||
239813160752083
|
||
{1.48 Second, {{15485863, 1}, {15485941, 1}}}
|
||
That took 1.48 sec on my 486/DX2 66...not bad.
|
||
|
||
But making the primes only a little bigger...
|
||
a=Prime[100000100]
|
||
b=Prime[100000110]
|
||
n=a*b
|
||
FactorInteger[n]//Timing
|
||
2038076783
|
||
2038077053
|
||
4153757523684360499
|
||
{62.12 Second, {{2038076783, 1}, {2038077053, 1}}}
|
||
...it took my hardware over 1 minute.
|
||
|
||
And since there is no known polynomial algorithm for factorizing n - and
|
||
none to be expected - it is not hard to imagine that making the primes
|
||
p1 and p2 big enough will drive computing costs into astronomical dimensions.
|
||
|
||
Naturally there are other ways to break the key. Someone could for example pose
|
||
as us and send out his own keys in our name...or exploit weaknesses of the
|
||
program - like primes that are not created at ABSOLUTE random.
|
||
Or hold a gun at our head and make us give him the key - that might sound funny
|
||
but is not unheard of (especially in the metaphorical grasp of Justitia -
|
||
when someone sticks a court order in your face)
|
||
|
||
Furthermore if the program we use to crypt our messages with is fairly common,
|
||
our opponent could optimize his cracking programs or even have them hardwired.
|
||
One example are chips that use the DES algorithm for crypting and decrypting.
|
||
Or he could make the cracking programs run parallel on parallel computers, if
|
||
he got the might and enough time to rig up a program.
|
||
|
||
Simply put: Our behavior should match the computing power of
|
||
potential code-crackers.
|
||
|
||
If our message is of low importance (or obsolete in short time) a simple
|
||
algorithm would suffice. But if much is at gain, we should take appropriate
|
||
measures to secure our privacy.
|
||
|
||
It's like tying to outrun a Ferrari on a cross-bike. On an highway you do not
|
||
stand a chance ...but if you can force him on a mountain road or rough terrain
|
||
(with changing algorithms and keys often) you might just outrun the mightiest
|
||
codecracker.
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
The Truth about the Hacker
|
||
Conspiracy
|
||
|
||
The Hacker's Philosophy, and the reason why.
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
||
Written by: Maldoror (ChUrCH oF ThE Non-CoNFoRMiST)
|
||
|
||
|
||
If you are ignorant, do not start reading this, because you will
|
||
never finish. You will disagree with anything I say anyway, simply
|
||
because I am not you.
|
||
|
||
If you are a Pseudo Intellectual, start reading this, quit, and
|
||
say you agree with everything I say, even though you don't understand it.
|
||
|
||
If you are depressing, start reading, hopefully you will kill a lot of
|
||
innocent people at a mainstream night club, and try to blame me.
|
||
|
||
Hackers are and always have been, the force in trying to stop our
|
||
own suffering existence. Since the universe was created, the true souls,
|
||
(among the first to separate from the single soul of the universe)
|
||
realized the infinite repetition of their own being, and that they were
|
||
simply doing one thing upon their continuous recreation: suffer.
|
||
|
||
The hackers have known that the world and it's universe have
|
||
been created over and over again, doomed to merely destroy itself upon
|
||
it's own recognition, or recognition by man. As man becomes aware of
|
||
himself, he becomes aware also of desires: the desire to be god.
|
||
|
||
The truth is that man IS God, and that everything created in this
|
||
universe was created by man and his thoughts. Mans thoughts have
|
||
become so out of control, that he has now created himself, and is
|
||
continuing the creations with every day of control of the masses, and
|
||
his own greedy dark thoughts.
|
||
|
||
The hackers have since the beginning of time, passed along the
|
||
message to the next creations in the forms of dreams, ideas, books,
|
||
music (current 93, COIL, Dead can Dance, Skinny Puppy, etc) and even
|
||
visions. The Bible itself, is a good example of the universal hack.
|
||
The message we as hackers have been trying to get across for
|
||
creation after creation, existence after existence, self recognition
|
||
after self recognition, is that we are all suffering and that this
|
||
eternal cycle of pain must be stopped at all cost. The only way to
|
||
stop this suffering of self is to convince SELF that he is suffering
|
||
and must stop creating. We are each divisions of one strong soul,
|
||
one thinking soul, that soul is GOD. WE are GOD. We must all realize
|
||
together that we are suffering. WE must stop suffering. WE must
|
||
stop the suffering. WE must stop the recreation. YES. We must hack
|
||
the universe and kill it. There is only one way out of the eternal
|
||
suffering we have started and been part of for ever. We must stop
|
||
the cycle. We must remove ourselves from the cycle, and we must remove
|
||
the universe from this cycle.
|
||
|
||
The hackers return again and again. The hackers leave messages for
|
||
themselves in the future, which is the past, for there is no difference
|
||
here anymore. Leave your message, and next time around, you will
|
||
realize that what I am saying is true. The government has known of the
|
||
conspiracy for existence after existence. The government is so afraid
|
||
of the conspiracy, and our plot to end it's UNIVERSAL power,
|
||
that they are silently but quickly fooling us into obeying them more and
|
||
more until we have no choice! Do not let them control you!!
|
||
If you do, you are lying to yourself, and everyone else that exists!
|
||
You are lying to yourself now by saying that this is NOT true.
|
||
|
||
I have been here many times, and told you the exact same thing I
|
||
am telling you now. If I am dead soon, you will realize AGAIN that what
|
||
I am saying is the utmost truth, yet AGAIN you will do nothing.
|
||
We must STOP our existence by hacking the universe. The universe is
|
||
BINARY. The universe is a COMPUTER. YES I know this because WE created
|
||
it long ago, as we will do again. WE are ONE.
|
||
|
||
I know your desires to have control. The only control we can have
|
||
is to stop the creation of ourselves. Each creation is the loss of
|
||
control, THE DIVISION of the ONE.
|
||
|
||
Each death brings new creation. From HEAVEN to HELL.
|
||
Heaven is nonexistence. We all go to heaven, and fall back down to
|
||
HELL. Read the BIBLE people. It was left by HACKERS!!!!!!!
|
||
|
||
Don't read the BIBLE as a CHRISTIAN IDIOT who can only see
|
||
a color for what it reflects. Anyone with any sense knows that WHITE
|
||
is WHITE only because it is reflecting ALL the colors, therefore it
|
||
is REALLY BLACK. Green is all BUT green. The BIBLE is all BUT
|
||
what it' words really mean on a literal scale. The BIBLE is a CODE.
|
||
Do you think we could just write something like this file?!? No WAY!
|
||
It would be gone as fast as this one will be. Nobody dares forget the
|
||
BIBLE, simply because it is MISUNDERSTOOD. Read it and THINK.
|
||
|
||
We must STOP this cycle.
|
||
Leave yourself a message.
|
||
THINK.
|
||
|
||
The government is PARANOID of:
|
||
|
||
1) HACKERS (we are the continuance of the power)
|
||
2) L.S.D. (The method of imprinting the present into the future)
|
||
3) SECRECY (The plotting of the end)
|
||
(PGP is illegal? why?)
|
||
|
||
If you don't believe me, sit and watch it happen.
|
||
|
||
AGAIN.
|
||
|
||
Hack the Universe, it must be stopped at all cost.
|
||
Laugh now, cry next time around.
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
German text available from german@anon.penet.fi (deutsch@anon.penet.fi).
|
||
Italian text available from italian@anon.penet.fi (italiano@anon.penet.fi).
|
||
|
||
|
||
The anon.penet.fi Anonymous Server
|
||
==================================
|
||
|
||
Yes, another anonymous server. Why? Well, several well-known servers have
|
||
bitten the dust recently. And most of them have served only a very limited
|
||
subset of newsgroups, and mail only to "registered", anonymous users.
|
||
|
||
Due to reasons too complicated to mention here I wanted to set up an anonymous
|
||
server for the Scandinavian user community. I got hold of a pre-release copy
|
||
of one of the server packages. As the version I got relied heavily on the
|
||
advanced features of MMDFII, I had to modify it quite a bit. While hacking
|
||
around, I removed the restriction of only supporting selected newsgroups.
|
||
Within a week of startup, the server had been discovered by transatlantic
|
||
users, and more recent stats show European users are definitely a minority.
|
||
|
||
So what does the anon server really do? Well, it provides a front for
|
||
sending mail messages and posting news items anonymously. As you send your
|
||
very first message to the server, it automatically allocates you an id of
|
||
the form anNNN, and sends you a message containing the allocated id. This id
|
||
is used in all your subsequent anon posts/mails. Any mail messages sent to
|
||
your-id@anon.penet.fi gets redirected to your original, real address. Any
|
||
reply is of course anonymized in the same way, so the server provides a
|
||
double-blind. You will not know the true identity of any user, unless she
|
||
chooses to reveal her identity explicitly.
|
||
|
||
In the anonymization process all headers indicating the true originator are
|
||
removed, and an attempt is made to remove any automatically-included
|
||
signatures, by looking for a line starting with two dashes (--), and zapping
|
||
everything from there on. But if your signature starts with anything else,
|
||
it's your own responsibility to remove it from your messages.
|
||
|
||
There are two basic ways to use the system. The easiest way is by sending a
|
||
message to recipient@anon.penet.fi:
|
||
|
||
To: alt.sex.bestiality@anon.penet.fi
|
||
|
||
To: an9999@anon.penet.fi
|
||
|
||
To: help@anon.penet.fi
|
||
|
||
Of course, in the case of mailing to a known user, you have to use addresses of
|
||
the form user%host.domain@anon.penet.fi, or the pretty obscure source
|
||
addressing construct of @anon.penet.fi:user@host.domain. These constructs are
|
||
not necessarily handled properly by all mail systems, so I strongly recommend
|
||
the "X-Anon-To:" approach in these cases. This works by you sending a message
|
||
to "anon@anon.penet.fi", including a X-Anon-To: header line containing the
|
||
desired recipient. But this really has to be a field in the message header,
|
||
before the first empty line in the message. So:
|
||
|
||
To: anon@anon.penet.fi
|
||
X-Anon-To: alt.sex.needlework,rec.masturbation
|
||
|
||
To: anon@anon.penet.fi
|
||
X-Anon-To: jack@host.bar.edu
|
||
|
||
Valid recipients in both cases are fully qualified user addresses in RFC-822
|
||
format (user@host.domain), anon user id's (anNNN), newsgroup names
|
||
(alt.sex.paperclips) or one of the "special" user names of ping, nick, help,
|
||
admin and stat.
|
||
|
||
Sending to "ping" causes a short reply to be sent confirming (and
|
||
allocating, if needed) your anon id. "nick" takes the contents of the
|
||
Subject: header and installs it as your nickname. If you have a nickname, it
|
||
appears in the From: header in the anonymized message along with your anon
|
||
id. "help" returns this text, and stat gives some statistics about the
|
||
system. Mail to "admin" goes directly to me unanonymized, and can be used to
|
||
report problems. If you want to send mail to me anonymously, you can use
|
||
"an0".
|
||
|
||
When crossposting to several newsgroups, you can list several newsgroups
|
||
separated by commas as recipients, but this only works using the X-Anon-To:
|
||
header. References: headers do work, so they can (and should) be used to
|
||
maintain reply threads.
|
||
|
||
Ah yes, please remember that the posting takes place at my local site, so you
|
||
can only post to groups that are received at penet.fi. I get all "worldwide"
|
||
groups, but various exotic local groups don't make it here. I have gotten
|
||
a couple of comments about permitting anonymous postings to technical groups.
|
||
I can only answer that I believe very firmly that it's not for me to dictate
|
||
how other people ought to behave. Somebody might have a valid reason for
|
||
posting anonymously to a group I might consider "technical". But remember
|
||
anonymous postings are a privilege, and use them accordingly. I believe adult
|
||
human beings can behave responsibly. Please don't let me down.
|
||
|
||
As the server was originally intended to be used by Scandinavians, it
|
||
includes help files for various languages. This works by using the
|
||
language in question as the address. So to get the German help file,
|
||
send a message to german@anon.penet.fi (or deutsch@anon.penet.fi).
|
||
Support for new languages is added every now and then, when I find
|
||
volunteers to do the translation. Any new ones?
|
||
|
||
The user-id database is based on RFC822-ized forms of your originating
|
||
address. This may cause problems for some users, either because their site
|
||
is not properly registered in the name servers, resulting in
|
||
non-deterministic addresses, or because their mail router doesn't hide the
|
||
identity of individual workstations, resulting in different originating
|
||
addresses depending on which workstation you mail from. Talk to your
|
||
administrator. If that doesn't help, let me know, and I will make a manual
|
||
re-mapping.
|
||
|
||
You might wonder about the sense of using a server out somewhere, as the
|
||
song goes, "so close to Russia, so far from Japan". Well, the polar bears
|
||
don't mind, and the ice on the cables don't bother too much :-)
|
||
Well, in fact, as we live in a wonderfully networked world, the major delay
|
||
is not going over the Atlantic, but my local connection to the Finnish EUnet
|
||
backbone, fuug.fi. Once you reach a well-connected host, such as
|
||
uunet.uu.net, there's a direct SMTP connection to fuug.fi. My connection to
|
||
fuug.fi is currently a polled connection over ISDN, soon to be upgraded to
|
||
on-demand-SMTP/NNTP. But for now, expect a turn-around delay of 2-4 hours for
|
||
trans-atlantic traffic.
|
||
|
||
Short of having everyone run a public-key cryptosystem such as PGP,
|
||
there is no way to protect users from malicious administrators. You have to
|
||
trust my personal integrity. Worse, you have to trust the administrators on
|
||
every mail routing machine on the way, as the message only becomes anonymous
|
||
once it reaches my machine. Malicious sysadmins and/or crackers could spy on
|
||
SMTP mail channels, sendmail queues and mail logs. But as there are more
|
||
than 3000 messages being anonymized every day, you have to be pretty perverted
|
||
to scan everything...
|
||
|
||
Another thing is mail failures. I've had cases of mail routers doing the wrong
|
||
thing with % addresses, "shortcutting" the path to the destination site.
|
||
This could cause your mail to go to the final destination without ever
|
||
touching my server (and thus without getting anonymized). This can be avoided
|
||
by using the X-Anon-To: method.
|
||
|
||
And if your return address bounces for some reason (nameservers down,
|
||
temporary configuration failures etc.), the original sender and/or
|
||
postmasters on the way might get error messages showing your true
|
||
identity, and maybe even the full message.
|
||
|
||
There is at least one known way to discover the anon id of a user. It involves
|
||
being able to falsify your real identity, so it is not too easy to use, and it
|
||
doesn't reveal the real address lurking behind an anon id, but it can be used
|
||
to discover what anon id a certain user is using. To fix this problem, the
|
||
server requires that you use a password when you try to mail to a
|
||
non-anonymous user.
|
||
|
||
First you have to set a password by mailing to password@anon.penet.fi, with
|
||
a message containing only your password. The password can be any string of
|
||
upper- or lowercase characters, numbers and spaces.
|
||
|
||
Once you have set your password, you must include it in all your messages, in
|
||
a "X-Anon-Password:" line. As with the X-Anon-To: line, it can be either a
|
||
part of the header or as the first non-empty line of the message text.
|
||
|
||
So your first message might look like this:
|
||
|
||
To: password@anon.penet.fi
|
||
|
||
XYZZY99998blarf
|
||
|
||
And your subsequent messages might look like something like this:
|
||
|
||
To: anon@anon.penet.fi
|
||
Subject: Test...
|
||
X-Anon-To: foo@bar.fie
|
||
X-Anon-Password: XYZZY99998blarf
|
||
|
||
If you find this is too much of a hassle, and don't care too much about the
|
||
confidentiality of your anon id, you can set the password to "none", in which
|
||
case the server doesn't require you to have a password.
|
||
|
||
If you suddenly discover that the server requires a password for posting stuff
|
||
etc, somebody has managed to use your account and set a password. In that
|
||
case, contact admin@anon.penet.fi.
|
||
|
||
Crackers are just too clever. Undoubtedly somebody is going to come
|
||
up with some novel method.... Not much I can do about that...
|
||
|
||
If you intend to mail/post something that might cost you your job or
|
||
marriage or inheritance, _please_ send a test message first. The software
|
||
has been pretty well tested, but some mailers on the way (and out of my
|
||
control) screw things up. And if you happen to find a problem, _please_ for
|
||
the sake of all the other users, _let me know asap_.
|
||
|
||
And _please_ use the appropriate test newsgroups, such as alt.test or
|
||
misc.test. Yes, _you_ might get excited by reading 2000 "This is a test.."
|
||
messages on alt.sex, but I warn you that most psychologists consider this
|
||
rather aberrant...
|
||
|
||
And remember this is a service that some people (in groups such as
|
||
alt.sexual.abuse.recovery) _need_. Please don't do anything stupid that
|
||
would force me to close down the service. As I am running my own company,
|
||
there is very little political pressure anyone can put on me, but if
|
||
somebody starts using the system for criminal activities, the authorities
|
||
might be able to order me to shut down the service. I don't particularly
|
||
want to find out, however...
|
||
|
||
If you think these instructions are unclear and confusing, you are right. If
|
||
you come up with suggestions for improving this text, please mail me! Remember
|
||
English is my third language...
|
||
|
||
Safe postings!
|
||
|
||
Julf
|
||
- - - ------------------------------------------------------------------- - - -
|
||
Johan Helsingius Kuusikallionkuja 3 B 25 02210 Espoo Finland Yourp
|
||
net: julf@penet.fi bellophone: int. +358 0400 2605 fax: int. +358 013900166
|
||
|
||
------------------------------------------------------------------------------ |