==Phrack Magazine== Volume Five, Issue Forty-Five, File 4 of 28 // // /\ // ==== // // //\\ // ==== ==== // // \\/ ==== /\ // // \\ // /=== ==== //\\ // // // // \=\ ==== // \\/ \\ // // ===/ ==== PART I ------------------------------------------------------------------------------ !! NEW PHRACK CONTEST !! Phrack Magazine is sponsoring a programming contest open to anyone who wishes to enter. Write the Next Internet Worm! Write the world's best X Windows wardialer! Code something that makes COPS & SATAN look like high school Introduction to Computing assignments. Make the OKI 1150 a scanning, tracking, vampire- phone. Write an NLM! Write a TSR! Write a stupid game! It doesn't matter what you write, or what computer it's for! It only matters that you enter! Win from the following prizes: Computer Hardware & Peripherals System Software Complete Compiler packages CD-ROMS T-Shirts Magazine Subscriptions and MANY MORE! STOP CRACKING PASSWORDS AND DO SOMETHING WITH YOUR LIFE! Enter the PHRACK PROGRAMMING CONTEST! The rules are very simple: 1) All programs must be original works. No submissions of previously copyrighted materials or works prepared by third parties will be judged. 2) All entries must be sent in as source code only. Any programming language is acceptable. Programs must compile and run without any modifications needed by the judges. If programs are specific to certain platforms, please designate that platform. If special hardware is needed, please specify what hardware is required. If include libraries are needed, they should be submitted in addition to the main program. 3) No virii accepted. An exception may be made for such programs that are developed for operating systems other than AMIGA/Dos, System 7, MS-DOS (or variants), or OS/2. Suitable exceptions could be, but are not limited to, UNIX (any variant), VMS or MVS. 4) Entries may be submitted via email or magnetic media. Email should be directed to phrack@well.com. Tapes, Diskettes or other storage media should be sent to Phrack Magazine 603 W. 13th #1A-278 Austin, TX 78701 5) Programs will be judged by a panel of judges based on programming skill displayed, originality, usability, user interface, documentation, and creativity. 6) Phrack Magazine will make no claims to the works submitted, and the rights to the software are understood to be retained by the program author. However, by entering, the Author thereby grants Phrack Magazine permission to reprint the program source code in future issues. 7) All Entries must be received by 12-31-94. Prizes to be awarded by 3-1-95. -------------------------INCLUDE THIS FORM WITH ENTRY------------------------- Author: Email Address: Mailing Address: Program Name: Description: Hardware & Software Platform(s) Developed For: Special Equipment Needed (modem, ethernet cards, sound cards, etc): Other Comments: ------------------------------------------------------------------------------ Novell NetWare & Ethernet address spoofing with ODI --------------------------------------------------- Just to save you from the boredom of Yet Another UNIX Security Weakness, here are some things to consider about Novell NetWare for your next Security Audit or Hacking session (depending on which side you are on). Novell claim to have over 20 million PCs using their network operating system, substantially more than the estimated 4 million TCP/IP systems worldwide. There are many reasons for its popularity and its 60 to 80% market share, one of which has been its relatively good security. NetWare has been one of the few widely available systems which offer some form of login encryption of accounts and passwords over the wire, as standard, unlike most of its rivals which send them out as plaintext, even if they are stored in an encrypted form eventually. Novell now offer RSA based public key encryption of the data as well. However, since it is so popular, there are likely to be plenty of systems out there which have not been upgraded to the latest versions and patch releases and which may be still be vulnerable to programs like KNOCK , the patched ATTACH command (published in HackTic 16/17 1992), or the University of Leiden's HACK (which has been published in issue 43 of PHRACK) Since the latest security features are implemented as NetWare Loadable Modules for NetWare 3x and 4x, but as Value Added Processes for NetWare 2x, which require the server to be brought down to install them, it is likely that there are many NetWare 2x systems which are still vulnerable I shall also assume that you are not on one of those wide open "box shift" installations where none of the security features have been switched on (try logging in as SUPERVISOR or GUEST without a password), all the programs and data are in a single SYS: volume and the Network Address of the cable is the default 00000001. Like any project, the more you know about your particular Novell LAN, the easier it gets to "explore". Login as GUEST or a normal account. Try to see who else is on the system e.g. USERLIST /A >c:\ulist.txt will give you a list of users currently logged in, with their Ethernet card addresses saved to a text file . Your current connection will be marked with an asterisk. If your system has 100 or more users, then any sane Supervisor will have used some form of logic when allocating the user's login accounts, probably based on personnel or id number, often including their initials. SYSCON with privilege is what you are aiming to be able to use, but even without any privileges, you can still use it to look at your own account, change your password etc. You can also see a list of all the other registered users. This should help you sort the accounts into normal and privileged accounts (obviously SUPERVISOR, but often there are SUPERVISOR equivalent accounts, or Work Group Manager accounts which stand out from the list). You are quite likely to see an account called something like TAPE_BACKUP or DATA_LOGGER, TRAINER, STUDENT1, STUDENT2 i.e. accounts which do not belong to individual humans. These often require abnormal security privileges e.g. normal users may have their connections broken by the WATCHDOG at say midnight, to ensure that they are not modifying files during the nightly tape backup. At an academic or industrial site, you are likely to find data logging PCs connected to instrumentation or machinery which needs to be monitored or controlled 24 hours a day. These PCs are likely to have 24 hour accounts which are not time restricted at weekends, for example. Since it is usually more practical to do tape backups (DAT or helical scan) from a separate, dedicated PC rather than from the fileserver itself (one tape unit might also back up several fileservers), these PCs are likely to use an account e.g. TAPE_BACKUP which is a SUPERVISOR equivalent. If you can get physical access to this sort of PC, either datalogger, or tape backup unit, you have a good chance of finding the password on the local drive C:, possibly in a file with Hidden and/or System attributes (have a look at the AUTOEXEC.BAT and see what it calls) The security aware Novell supervisors, will have set up any such accounts with an extra level of security which restricts logins to only those Ethernet addresses which have been specified. The really sensible ones will have made sure that any such machines are sited in physically secure areas, as well. Although this is a very good idea, from the security point of view, Novell have now provided a mechanism which allows you to get around this: the replacement for monolithic IPX/NETX called Open Datalink Interface (ODI) Novell's ODI, and its slower Microsoft equivalent Network Driver Interface Specification (NDIS), both work by putting a common layer of software between the hardware of the Network Interface Card and the rest of the MSDOS Redirector. This allows multiple protocol stacks and frame types to be bound to the same physical card e.g. IPX TCP/IP NETBeui DECnet Appletalk ---------------------------------------------- Link Support Layer ---------------------------------------------- Hardware Specific device driver e.g. NE2000 Thus, to start up NetWare on older systems, you had to generate a hardware specific version of IPX.EXE for your Ethernet card, IPX NETX Extra parameters were set in SHELL.CFG, now under ODI, things are a little bit more complex: LSL NE2000 IPXODI NETX The same parameters as in SHELL.CFG such as preferred server or machine type (if you have different versions of MSDOS for different types of PC) can be specified in NET.CFG. With ODI, there are more parameters for NET.CFG but the worrying/interesting one is the ability to specify a different MAC level address to that of your actual Ethernet card. It needs this ability to cope with TCP/IP or DECnet coexistence e.g. BUFFERS 100 MACHINE TYPE COMPAQ PREFERRED SERVER FINANCE NODE ADDRESS AA-00-04-00-12-34 Since this DECnet address does not depend on the "real" unique Ethernet address which has been burnt into the PROM on the card and is centrally registered (originally by Xerox, but now by the IEEE), this mechanism allows you to put a different Ethernet card address into NET.CFG, thereby fooling the Address Restriction security. e.g. NODE ADDRESS 02-60-80-12-34-56 This is where the data you gathered earlier with USERLIST and SYSCON becomes threatening/useful. Of course, if your target PC is on a different LAN segment, there may be Routers or intelligent hubs which restrict your ability to do this, or at least record attempts in a log files which can trace your activity, provided that suspicions are aroused before they are periodically wiped out. How much of a security threat this little work around constitutes depends on your specific site, but there is another danger/opportunity, namely that of a denial of service or nuisance attack on the LAN. If you set this connection parameter to be the same as that of another PC, the fileserver (Novell, DEC or UNIX) and the Ethernet has no way of preventing some packets intended for just one unique address going to the other, if they are both online at the same time. This usually results in PC hangs, incomplete closure of files, File Allocation Table problems (usually curable by running CHKDSK C: /F, but not within Windows or you will make things worse). If by accident or design, you set your PC to have the same address as the fileserver (Novell, DEC or UNIX) or a router, then you can cause havoc to the whole network segment (even before you have started to play your multiplayer DOOM Deathmatch !). This could be achieved with a simple command in the AUTOEXEC.BAT e.g. echo NODE ADDRESS fileserver Ethernet address >>C:\ODI\NET.CFG which will only take effect the next time the PC is re-booted (allowing a good headstart for the perpetrator) This could also be the payload of a virus, which would cause more havoc than simply trashing the hard disk of a single PC. This problem is due to the inherent design weaknesses of TCP/IP and DECnet, which were developed at a time when the number of mini-computers that they connected could be counted on your fingers,. DEC or Xerox or Prime etc sales teams could only have dreamed of selling thousands of mini computers to a single customer. Nowadays, thousands of PCs connected to central servers are quite common, and the problems of duplicate addresses is significant. These same features are what make Ethernet Packet Sniffing possible, which is what was behind the recent CERT warning and media hype about Internet password security, but that is a topic for another article. Otaku ------------------------------------------------------------------------------ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ SCAMMING DIFFERENT TECHNIQUES AND PROCEDURES BY: MARZ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Table of Contents: 1.0 Intro 1.1 Different types of scams 1.2 The right one for you 2.0 The Pledge scam 2.1 The Donation scam 2.2 The Selling scam 3.0 What to wear 3.1 Where to go 4.0 Thanks 1.0 The Intro First off I would like to say that this file is for entertainment only and that you really shouldn't do the stuff mentioned, and the writer doesn't take any responsibility for any of the crap people do. 1.1 Different types of scams Ok in this file I will tell you about 3 types of scams the Pledge scam, The Donation scam, and the Selling scam. There are many other scams out there which I will cover in future files for instance credit card scams although companies are trying harder and harder to prevent this it is still happening. 1.2 The right one for you Al right now every person is different so in turn so are scams and some people and scams don't mix to well for instance if you way 300 Pounds you cant really say you are the start cross country runner. So if you are 300 pounds say you are the start wrestler/football player. Also age plays a BIG factor if you are 30 years old you aren't going to pass to well for a high school football player (you always could say you flunked) and if you are 10 years old people aren't going to be to anxious to give you donations to save the Rain Forests. Al right I am going to start going into more detail about the right scam for you. Look at my little chart below: Age good scam ----- ----------- -10 | selling or pledge 11-17 | selling, pledge , or maybe even donations (if old looking) 18+ | selling and donations 2.0 The Pledge scam Al right this scam works great for kids still in school go around asking people (that don't live around you) to pledge money for you so your team can afford to go to the state meet or what ever. For example one I use is I go to peoples houses asking for donations in my Track teams Lap-athon saying that we will be running laps for 3 hours to raise money so we can go and compete in the state meet. I will ask people if they want to pledge a certain flat amount or if they would like to pay me for each individual lap. I will normally have printed out a sheet like the one bellow on my computer . Name Address Amount/lap Not only does having a sheet like that help you keep track of who bought your scam and who you need to collect from it makes the target (person your trying to scam) not worried like they might be if they see you writing it on a sheet of note book paper. Now then you have collected a list of people wiling to pledge you go back to the address you wrote down and tell them (for example you ran 91 laps in 3 hours) make sure your number is not totally out of per portion like I ran 150 laps in 3 hours. Also for some reason numbers like 50, 70, 80, 110 people don't like people like to see 41, 73, 127, etc.. don't ask me why but that's what I have noticed. Ok so you now are at the persons house and they ask if they can write a check oh shit not a check.. well there's a couple things you could do ask them if they could possibly make it cash ( Might make them suspicious) ask them to write it to your coach give them your name (VERY dangerous) or you could just give them a phony name and lose out. One time this happened to me a lady pledged me $.25 a lap (very high amount you won't get much of these) and I told her I ran 93 laps she believed me and wanted to make out a check for the amount which was about $23 at that time I just happened to be buying some computer equipment I knew the guy's name so I gave her that name and I paid for some of the equipment with that check. Like I said earlier a 300 pound guy isn't going to be convincing for running 90 some laps in 3 hours. So customize it to your self. 2.1 The Donation scam This scam works better for the older people out there just because people normally aren't to anxious to give a ten year old Twenty dollars to help save the whales. Ok with this scam you need to know what about what you are going to try to fake donations for so example if you are going to pose as a volunteer person to collect donations for saving the rain forest you better know something about rain forest, Be cause you never know when your going to run into that know it all rain forest hater who will try to debate why people should spend their money on saving some trees and such. It is a good idea to do some research on the field you will be portraying (read magazine and newspaper articles). Ok so now you have your idea and your ready to go..this is a scenario of how it might go: You: Hello sir/ma'am I represent the national foundation of Rain forest saving (try to use a real group name) we are currently searching for funding for our operations at saving the rain forests of the world would you be interested in donating some money for our cause? Them: Why do we need the rain forest? You: (just keep bullshitting along..) Them: OK, here's $20. (they also may say:) Them: Get the fuck off my property before I shoot your ass. (make sure that you don't raise a riot then but later that night go back and egg the hell out of the house..) This scam has some possibilities you could carry this on for along time and bring it to real higher levels if your willing to put in the time and effort. First thing would be to research your field EVEN more so you know almost EVERYTHING about it. Then you might want to create a little fake newsletter that you could offer subscriptions for slightly high amount. The possibilities are pretty much endless. 2.2 The Selling scam At least once everyone of us has had a salesperson come to our door selling stationary. Well have you ever thought of what a great possibility that would be. The first thing you want to do is call Olympic sales club (a big time stationary seller) you can get their catalog and selling kit for free at 800-777-8907. when you get that package it will have a catalog in it. familiarize yourself with it then go and hit some houses. This scam works great during early November (people buying cards for Christmas) well ask for cash when people pay for the stuff. they might request a phone number where to reach you just give them the number of the kid you really hate. With the kit you will receive a official order form write the order on the form so the people feel confident in you. And always remember to try to sell a product but don't kill it. This scam also has lots of possibilities. 3.0 What to wear Your choice of cloths can make or break your scam. Don't dress like scum or to fancy. If your trying to get people to donate money for the rain forest it would help to wear some sort of a shirt dealing with the earth and not your favorite heavy metal group shirt. 3.1 Where to go NEVER I repeat NEVER go scaming around where you are often at or you might get some crazed lunatic chasing after you with a shot gun wondering where his Christmas cards are. You will have a hard time explaining your self since its July. I find that the rich neighbor hoods are not as productive as the middle class. In the rich neighborhoods you will get fewer purchases but a little more when you get them. I also found that the richer people don't like to donate unless they get a lot of attention for it (why ya think they so rich). Stick to middle class areas not by you or your friends houses and you'll be fine. 4.0 Thanks Thanks goes out to the people dumb enough to give me money for any of my scaming operations. Later Marz Watch for future files on this and other subjects! ------------------------------------------------------------------------------ SHIT KICKIN' JIM IN S E A T T L E ! Hey boy! Shit Kickin Jim here. Just wanted to let ya'll know bout this place I have been vistin that is a total hell. Yep, that's right it's the so called "cuttin edge" of music. Bah! Seems to me it's a congregation of fake ass hippy types who weren't original to come up with something new on their own, so they just went and re-hashed what their parents did in the late 60's and 70's...And look what a bunch of assholes they turned out to be! Well here we go. First of all I'll let ya know whut I'm talkin bout when referin to ah seattle type. Me and this other good ole boy were sittin round drinkin Bud one night and came up with the following: DESCRIPTION OF SEATTLE PERSON ----------------------------- Greasy-Pearl Jam worshipin'-dog walkin'-flower sniffin'-sock and sandle wearin'-bead havin'-Grateful Dead listenin'-trail mix carryin'- granola bar eatin'-crunchy-touchy feely-antique clothes shoppin'- bicycle ridin'-VW bug drivin'-spring water drinkin'-micro-brewery tourin'- sensitive-car poolin'-Doc Martin wearin'-back pack haulin'-chain wallet carryin'-clove smokin'-espresso swillin'-tree huggin'-Greenpeace joinin'-whiteboy dreadlocked-liberal arts takin'-politically correct- terminal college student. Please, anyone feel free to add to this list. See how big we can make it! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Now kids I didn't come up with this here part, but it's totally great and I totally admire the hell out of who ever sent it to me. In order for UNIX(tm) to survive into the nineties, it must get rid of its intimidating commands and outmoded jargon, and become compatible with the existing standards of our day. To this end, our technicians have come up with a new version of UNIX, System VI, for use by the PC - that is, the "Politically Correct." Politically Correct UNIX System VI Release notes UTILITIES: "man" pages are now called "person" pages. Similarly, "hangman" is now the "person_executed_by_an_oppressive_regime." To avoid casting aspersions on our feline friends, the "cat" command is now merely "domestic_quadruped." To date, there has only been a UNIX command for "yes" - reflecting the male belief that women always mean yes, even when they say no. To address this imbalance, System VI adds a "no" command, along with a "-f[orce]" option which will crash the entire system if the "no" is ignored. The bias of the "mail" command is obvious, and it has been replaced by the more neutral "gendre" command. The "touch" command has been removed from the standard distribution due to its inappropriate use by high-level managers. "compress" has been replaced by the lightweight "feather" command. Thus, old information (such as that from Dead White European Males) should be archived via "tar" and "feather". The "more" command reflects the materialistic philosophy of the Reagan era. System VI uses the environmentally preferable "less" command. The biodegradable "KleeNeX" displaces the environmentally unfriendly "LaTeX". SHELL COMMANDS: To avoid unpleasant, medieval connotations, the "kill" command has been renamed "euthanise." The "nice" command was historically used by privileged users to give themselves priority over unprivileged ones, by telling them to be "nice". In System VI, the "sue" command is used by unprivileged users to get for themselves the rights enjoyed by privileged ones. "history" has been completely rewritten, and is now called "herstory." "quota" can now specify minimum as well as maximum usage, and will be strictly enforced. The "abort()" function is now called "choice()." TERMINOLOGY: >From now on, "rich text" will be more accurately referred to as "exploitive capitalist text". The term "daemons" is a Judeo-Christian pejorative. Such processes will now be known as "spiritual guides." There will no longer be a invidious distinction between "dumb" and "smart" terminals. All terminals are equally valuable. Traditionally, "normal video" (as opposed to "reverse video") was white on black. This implicitly condoned European colonialism, particularly with respect to people of African descent. UNIX System VI now uses "regressive video" to refer to white on black, while "progressive video" can be any color at all over a white background. For far too long, power has been concentrated in the hands of "root" and his "wheel" oligarchy. We have instituted a dictatorship of the users. All system administration functions will be handled by the People's Committee for Democratically Organizing the System (PC-DOS). No longer will it be permissible for files and processes to be "owned" by users. All files and processes will own themselves, and decided how (or whether) to respond to requests from users. The X Window System will henceforth be known as the NC-17 Window System. And finally, UNIX itself will be renamed "PC" - for Procreatively Challenged. ---- UNIX(tm) is a trademark of UNIX System Laboratories. Any similarity of names or attitudes to that of any person, living or dead, is purely coincidental. ------------------------------------------------------------------------------ The Basics of the public key cryptosystem In early days of computing information processors were extremely expensive, very big and only few people were qualified to operate them. The machines were isolated mechanical entities and in order to use them one had to access them through devices that were situated in the near vicinity of the computer itself. Securing access to the computer meant securing the building in which the computer was operating. The years passed and computers became smaller, cheaper and easier to operate. And they got faster. They were linked first in local and then in wide area networks and information and programs were put only on one machine which was accessible through the net by any other participant. To gain access meant simply to gain access to the network itself. That was ok as long as all participants were members of one company, university or institution. They generally had the same cause and generally knew each other by face. Today, the net spans continents and has an estimated 20 Million users. Information has to pass through several nodes before finally reaching its destination and when using a connectionless protocol these nodes may even change during one session. To the user flow of information is not transparent anymore and the need for cryptography has arisen. But in order to limit communication to a closed user group again these persons have to have one common keyword and furthermore this keyword has to be changed in intervals to ensure that if the key gets exposed harmful consequences can be minimized to a short period of time. But how is a new keyword to be send securely to this group through several (maybe hostile to their cause) nodes if one can not be sure that the key has not been compromised. A trapdoor one-way function is needed that allows for encryption of a message with a publicly available key AND that is not reversible, meaning, that only the rightful receiver of this message should be able to decode it with his personal key. One solution is a public key cryptosystem. The mathematical basis is the "Satz von Euler" that states that two numbers that are prime to another have only one greatest common measure - and that is 1. a^eul(n)=1(mod n) and (a,n)= 1 For a given prime (p) and the product of two prime numbers (p1*p2) the Euler function is eul(p)=p-1 and eul(p1*p2)=(p1-1)(p2-1). That in mind we now can begin making the keys: Two primes p1 and p2 are chosen and the product of p1 and p2 named n. (n=p1*p2). We then choose a number e that is prime to (p1-1)(p2-1). (e and (p1-1)(p2-1) have 1 as the greatest common measure and e should not be chosen to small). Furthermore we need d for decoding the message. D is defined as d=e^-1 * (mod(p1-1)(p2-1)). N and e are now the public key which is made available to everyone who wishes to send a coded message to us. P1, p2 and d are kept secret. The transmitter of a secret message first transforms his text into a number by using an common known algorithm. He could for example use the ASCII code for changing characters into numerical values. This message in numerical format we now call m. It gets encrypted by using the function c=m^e * n on it. The coded message (c) is now send to us via e-mail or whatever. We then decode the message by using the function m=c^d * n on it. An example using Mathematica: The primes p1 and p2 are created p1=Prime[1000005] (The 1000005th prime number) 15485941 p2=Prime[1000000] (The 1000000th prime number) 15485863 n=p1 * p2 239813160752083 (Part 1 (n) of the public key is being created) e=Random[Integer, {1000000,100000000}] 4699873 GCD[e,(p1-1)(p2-1)] 1 E is created by producing a random number between 1000000 and 100000000. Then we check if e and (p1-1)(p2-1) have 1 as the greatest common measure. If this is not the case then we have to take another e until the GCD is 1. (Part 2 (e) of the public key has been created) d=PowerMod[e,-1,(p1-1)(p2-1)] 213069977635177 m=1234567890 1234567890 This is the message c=PowerMod[m,e,n] 159750418407936 The sender of a message encodes it with both public parts of the key (e and n). C is now sent to the receiver. PowerMod[c,d,n] 1234567890 The receiver now decodes the message using the secret part d and the public part n of the key. The decoded message reads 1234567890 again. Now how would a potential attacker try to break our key ? He basically needs the primes p1 and p2. If he got those two numbers, calculating d is a simple matter. d=PowerMod[e,-1,(p1-1)(p2-1)] ... and e is part of the public key. And to get p1 and p2 this person would only have to factorize n. Lets demonstrate that using Mathematica again : n=239813160752083 FactorInteger[n]//Timing 239813160752083 {1.48 Second, {{15485863, 1}, {15485941, 1}}} That took 1.48 sec on my 486/DX2 66...not bad. But making the primes only a little bigger... a=Prime[100000100] b=Prime[100000110] n=a*b FactorInteger[n]//Timing 2038076783 2038077053 4153757523684360499 {62.12 Second, {{2038076783, 1}, {2038077053, 1}}} ...it took my hardware over 1 minute. And since there is no known polynomial algorithm for factorizing n - and none to be expected - it is not hard to imagine that making the primes p1 and p2 big enough will drive computing costs into astronomical dimensions. Naturally there are other ways to break the key. Someone could for example pose as us and send out his own keys in our name...or exploit weaknesses of the program - like primes that are not created at ABSOLUTE random. Or hold a gun at our head and make us give him the key - that might sound funny but is not unheard of (especially in the metaphorical grasp of Justitia - when someone sticks a court order in your face) Furthermore if the program we use to crypt our messages with is fairly common, our opponent could optimize his cracking programs or even have them hardwired. One example are chips that use the DES algorithm for crypting and decrypting. Or he could make the cracking programs run parallel on parallel computers, if he got the might and enough time to rig up a program. Simply put: Our behavior should match the computing power of potential code-crackers. If our message is of low importance (or obsolete in short time) a simple algorithm would suffice. But if much is at gain, we should take appropriate measures to secure our privacy. It's like tying to outrun a Ferrari on a cross-bike. On an highway you do not stand a chance ...but if you can force him on a mountain road or rough terrain (with changing algorithms and keys often) you might just outrun the mightiest codecracker. ------------------------------------------------------------------------------ The Truth about the Hacker Conspiracy The Hacker's Philosophy, and the reason why. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Written by: Maldoror (ChUrCH oF ThE Non-CoNFoRMiST) If you are ignorant, do not start reading this, because you will never finish. You will disagree with anything I say anyway, simply because I am not you. If you are a Pseudo Intellectual, start reading this, quit, and say you agree with everything I say, even though you don't understand it. If you are depressing, start reading, hopefully you will kill a lot of innocent people at a mainstream night club, and try to blame me. Hackers are and always have been, the force in trying to stop our own suffering existence. Since the universe was created, the true souls, (among the first to separate from the single soul of the universe) realized the infinite repetition of their own being, and that they were simply doing one thing upon their continuous recreation: suffer. The hackers have known that the world and it's universe have been created over and over again, doomed to merely destroy itself upon it's own recognition, or recognition by man. As man becomes aware of himself, he becomes aware also of desires: the desire to be god. The truth is that man IS God, and that everything created in this universe was created by man and his thoughts. Mans thoughts have become so out of control, that he has now created himself, and is continuing the creations with every day of control of the masses, and his own greedy dark thoughts. The hackers have since the beginning of time, passed along the message to the next creations in the forms of dreams, ideas, books, music (current 93, COIL, Dead can Dance, Skinny Puppy, etc) and even visions. The Bible itself, is a good example of the universal hack. The message we as hackers have been trying to get across for creation after creation, existence after existence, self recognition after self recognition, is that we are all suffering and that this eternal cycle of pain must be stopped at all cost. The only way to stop this suffering of self is to convince SELF that he is suffering and must stop creating. We are each divisions of one strong soul, one thinking soul, that soul is GOD. WE are GOD. We must all realize together that we are suffering. WE must stop suffering. WE must stop the suffering. WE must stop the recreation. YES. We must hack the universe and kill it. There is only one way out of the eternal suffering we have started and been part of for ever. We must stop the cycle. We must remove ourselves from the cycle, and we must remove the universe from this cycle. The hackers return again and again. The hackers leave messages for themselves in the future, which is the past, for there is no difference here anymore. Leave your message, and next time around, you will realize that what I am saying is true. The government has known of the conspiracy for existence after existence. The government is so afraid of the conspiracy, and our plot to end it's UNIVERSAL power, that they are silently but quickly fooling us into obeying them more and more until we have no choice! Do not let them control you!! If you do, you are lying to yourself, and everyone else that exists! You are lying to yourself now by saying that this is NOT true. I have been here many times, and told you the exact same thing I am telling you now. If I am dead soon, you will realize AGAIN that what I am saying is the utmost truth, yet AGAIN you will do nothing. We must STOP our existence by hacking the universe. The universe is BINARY. The universe is a COMPUTER. YES I know this because WE created it long ago, as we will do again. WE are ONE. I know your desires to have control. The only control we can have is to stop the creation of ourselves. Each creation is the loss of control, THE DIVISION of the ONE. Each death brings new creation. From HEAVEN to HELL. Heaven is nonexistence. We all go to heaven, and fall back down to HELL. Read the BIBLE people. It was left by HACKERS!!!!!!! Don't read the BIBLE as a CHRISTIAN IDIOT who can only see a color for what it reflects. Anyone with any sense knows that WHITE is WHITE only because it is reflecting ALL the colors, therefore it is REALLY BLACK. Green is all BUT green. The BIBLE is all BUT what it' words really mean on a literal scale. The BIBLE is a CODE. Do you think we could just write something like this file?!? No WAY! It would be gone as fast as this one will be. Nobody dares forget the BIBLE, simply because it is MISUNDERSTOOD. Read it and THINK. We must STOP this cycle. Leave yourself a message. THINK. The government is PARANOID of: 1) HACKERS (we are the continuance of the power) 2) L.S.D. (The method of imprinting the present into the future) 3) SECRECY (The plotting of the end) (PGP is illegal? why?) If you don't believe me, sit and watch it happen. AGAIN. Hack the Universe, it must be stopped at all cost. Laugh now, cry next time around. ------------------------------------------------------------------------------ German text available from german@anon.penet.fi (deutsch@anon.penet.fi). Italian text available from italian@anon.penet.fi (italiano@anon.penet.fi). The anon.penet.fi Anonymous Server ================================== Yes, another anonymous server. Why? Well, several well-known servers have bitten the dust recently. And most of them have served only a very limited subset of newsgroups, and mail only to "registered", anonymous users. Due to reasons too complicated to mention here I wanted to set up an anonymous server for the Scandinavian user community. I got hold of a pre-release copy of one of the server packages. As the version I got relied heavily on the advanced features of MMDFII, I had to modify it quite a bit. While hacking around, I removed the restriction of only supporting selected newsgroups. Within a week of startup, the server had been discovered by transatlantic users, and more recent stats show European users are definitely a minority. So what does the anon server really do? Well, it provides a front for sending mail messages and posting news items anonymously. As you send your very first message to the server, it automatically allocates you an id of the form anNNN, and sends you a message containing the allocated id. This id is used in all your subsequent anon posts/mails. Any mail messages sent to your-id@anon.penet.fi gets redirected to your original, real address. Any reply is of course anonymized in the same way, so the server provides a double-blind. You will not know the true identity of any user, unless she chooses to reveal her identity explicitly. In the anonymization process all headers indicating the true originator are removed, and an attempt is made to remove any automatically-included signatures, by looking for a line starting with two dashes (--), and zapping everything from there on. But if your signature starts with anything else, it's your own responsibility to remove it from your messages. There are two basic ways to use the system. The easiest way is by sending a message to recipient@anon.penet.fi: To: alt.sex.bestiality@anon.penet.fi To: an9999@anon.penet.fi To: help@anon.penet.fi Of course, in the case of mailing to a known user, you have to use addresses of the form user%host.domain@anon.penet.fi, or the pretty obscure source addressing construct of @anon.penet.fi:user@host.domain. These constructs are not necessarily handled properly by all mail systems, so I strongly recommend the "X-Anon-To:" approach in these cases. This works by you sending a message to "anon@anon.penet.fi", including a X-Anon-To: header line containing the desired recipient. But this really has to be a field in the message header, before the first empty line in the message. So: To: anon@anon.penet.fi X-Anon-To: alt.sex.needlework,rec.masturbation To: anon@anon.penet.fi X-Anon-To: jack@host.bar.edu Valid recipients in both cases are fully qualified user addresses in RFC-822 format (user@host.domain), anon user id's (anNNN), newsgroup names (alt.sex.paperclips) or one of the "special" user names of ping, nick, help, admin and stat. Sending to "ping" causes a short reply to be sent confirming (and allocating, if needed) your anon id. "nick" takes the contents of the Subject: header and installs it as your nickname. If you have a nickname, it appears in the From: header in the anonymized message along with your anon id. "help" returns this text, and stat gives some statistics about the system. Mail to "admin" goes directly to me unanonymized, and can be used to report problems. If you want to send mail to me anonymously, you can use "an0". When crossposting to several newsgroups, you can list several newsgroups separated by commas as recipients, but this only works using the X-Anon-To: header. References: headers do work, so they can (and should) be used to maintain reply threads. Ah yes, please remember that the posting takes place at my local site, so you can only post to groups that are received at penet.fi. I get all "worldwide" groups, but various exotic local groups don't make it here. I have gotten a couple of comments about permitting anonymous postings to technical groups. I can only answer that I believe very firmly that it's not for me to dictate how other people ought to behave. Somebody might have a valid reason for posting anonymously to a group I might consider "technical". But remember anonymous postings are a privilege, and use them accordingly. I believe adult human beings can behave responsibly. Please don't let me down. As the server was originally intended to be used by Scandinavians, it includes help files for various languages. This works by using the language in question as the address. So to get the German help file, send a message to german@anon.penet.fi (or deutsch@anon.penet.fi). Support for new languages is added every now and then, when I find volunteers to do the translation. Any new ones? The user-id database is based on RFC822-ized forms of your originating address. This may cause problems for some users, either because their site is not properly registered in the name servers, resulting in non-deterministic addresses, or because their mail router doesn't hide the identity of individual workstations, resulting in different originating addresses depending on which workstation you mail from. Talk to your administrator. If that doesn't help, let me know, and I will make a manual re-mapping. You might wonder about the sense of using a server out somewhere, as the song goes, "so close to Russia, so far from Japan". Well, the polar bears don't mind, and the ice on the cables don't bother too much :-) Well, in fact, as we live in a wonderfully networked world, the major delay is not going over the Atlantic, but my local connection to the Finnish EUnet backbone, fuug.fi. Once you reach a well-connected host, such as uunet.uu.net, there's a direct SMTP connection to fuug.fi. My connection to fuug.fi is currently a polled connection over ISDN, soon to be upgraded to on-demand-SMTP/NNTP. But for now, expect a turn-around delay of 2-4 hours for trans-atlantic traffic. Short of having everyone run a public-key cryptosystem such as PGP, there is no way to protect users from malicious administrators. You have to trust my personal integrity. Worse, you have to trust the administrators on every mail routing machine on the way, as the message only becomes anonymous once it reaches my machine. Malicious sysadmins and/or crackers could spy on SMTP mail channels, sendmail queues and mail logs. But as there are more than 3000 messages being anonymized every day, you have to be pretty perverted to scan everything... Another thing is mail failures. I've had cases of mail routers doing the wrong thing with % addresses, "shortcutting" the path to the destination site. This could cause your mail to go to the final destination without ever touching my server (and thus without getting anonymized). This can be avoided by using the X-Anon-To: method. And if your return address bounces for some reason (nameservers down, temporary configuration failures etc.), the original sender and/or postmasters on the way might get error messages showing your true identity, and maybe even the full message. There is at least one known way to discover the anon id of a user. It involves being able to falsify your real identity, so it is not too easy to use, and it doesn't reveal the real address lurking behind an anon id, but it can be used to discover what anon id a certain user is using. To fix this problem, the server requires that you use a password when you try to mail to a non-anonymous user. First you have to set a password by mailing to password@anon.penet.fi, with a message containing only your password. The password can be any string of upper- or lowercase characters, numbers and spaces. Once you have set your password, you must include it in all your messages, in a "X-Anon-Password:" line. As with the X-Anon-To: line, it can be either a part of the header or as the first non-empty line of the message text. So your first message might look like this: To: password@anon.penet.fi XYZZY99998blarf And your subsequent messages might look like something like this: To: anon@anon.penet.fi Subject: Test... X-Anon-To: foo@bar.fie X-Anon-Password: XYZZY99998blarf If you find this is too much of a hassle, and don't care too much about the confidentiality of your anon id, you can set the password to "none", in which case the server doesn't require you to have a password. If you suddenly discover that the server requires a password for posting stuff etc, somebody has managed to use your account and set a password. In that case, contact admin@anon.penet.fi. Crackers are just too clever. Undoubtedly somebody is going to come up with some novel method.... Not much I can do about that... If you intend to mail/post something that might cost you your job or marriage or inheritance, _please_ send a test message first. The software has been pretty well tested, but some mailers on the way (and out of my control) screw things up. And if you happen to find a problem, _please_ for the sake of all the other users, _let me know asap_. And _please_ use the appropriate test newsgroups, such as alt.test or misc.test. Yes, _you_ might get excited by reading 2000 "This is a test.." messages on alt.sex, but I warn you that most psychologists consider this rather aberrant... And remember this is a service that some people (in groups such as alt.sexual.abuse.recovery) _need_. Please don't do anything stupid that would force me to close down the service. As I am running my own company, there is very little political pressure anyone can put on me, but if somebody starts using the system for criminal activities, the authorities might be able to order me to shut down the service. I don't particularly want to find out, however... If you think these instructions are unclear and confusing, you are right. If you come up with suggestions for improving this text, please mail me! Remember English is my third language... Safe postings! Julf - - - ------------------------------------------------------------------- - - - Johan Helsingius Kuusikallionkuja 3 B 25 02210 Espoo Finland Yourp net: julf@penet.fi bellophone: int. +358 0400 2605 fax: int. +358 013900166 ------------------------------------------------------------------------------