Learn how easy it is to sync an existing GitHub or Google Code repo to a SourceForge project! See Demo



Zanzi Zoi

Welcome to your wiki!

This is the default page, edit it as you see fit. To add a page simply reference it within brackets, e.g.: [SamplePage].

The wiki uses Markdown syntax.

  • Zanzi Zoi
    Zanzi Zoi

    TOR_IRCD NETWORK 23 July 2011
    This file is also located here http://xqz3u5drneuzhaeo.onion/users/torirc/index.html


    2. Prerequisites
    3. How it works
    5. Downloads & Code
    6. Security Precautions
    7.Application Enhancements

    The TOR_IRC netowork is a distributed IRC 'serverless' network leveraging the security provided by die TOR network, where the Gnutella web cache technology has been re-used for node discovery. This application aims to give the general public used to IRC the ability to comunicate freely without the fear of being prosecuted.

    For the TOR_IRCD to work you have to install the .Net framework 4
    You have to add your onion address in the Settings.xml file.
    The xml files are created on startup if they do not exist.

    Distributed “serverless” IRC has been accoplished by making each client a server therefore canceling the dependency on a sentrally located server. Each client runs its own IRC server locally and connects their clients (usually one, but can be more on a lan) to this local server. The server syncronize with other nodes that are also servers via the secure and anonymous TOR network. Privoxy is required to send node list requests (via tor) to the altered skull php scripts (Gnutella technology) so that nodes can discover each other and connect accordingly.


    The applications on localhost required to use the TOR-IRC network is listed below
    1. Your favourite IRC Client
    2. The TOR-IRC Deamon
    3. The Tor Network Application
    4. A HTTP to TOR proxy like Privoxy

    Application required within the Tor network for node discovery
    1. Skulls php webcache script.

    Privoxy Configuration
    Privoxy needs to be configured to talk to TOR
    Add the following line to the last line of the config.txt file in the Privoxy folder.
    “forward-socks4a / localhost:9050 .”

    Tor Configuration
    Add the following lines to your torrc file
    For windows

    HiddenServiceDir C:\Documents and Settings\username\Application Data\hidden_service\
    HiddenServicePort 6667

    Or Linux
    HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
    HiddenServicePort 6667

    Where the directory path can by any, but the ports has to be 6666 (TOR-IRCD) and 6667
    Restart Tor.
    Copy the onion address after restart into the Settings.xml file of TOR-IRCD

    TORIRCD Configuration
    1. Settings.xml
    The TOR-IRCD application has to have your hidden service address
    replace <localonoinaddress/> with your local hidden service address eg. <localonoinaddress>fh789e50fg98a.onoin:6667 </localonoinaddress>

    The webcache has to know the location/url of the skulls cache script. Ensure that it at least have the entry for the test url location as below

    <anyType xsi:type="xsd:string">http://xqz3u5drneuzhaeo.onion/users/torirc/skull/skulls/skulls.php</anyType>

    GNUTELLA WEBCACHE configuration
    The skulls PHP scripts has been 'hacked' to allow for onion addresses. The alpha test script is located here http://xqz3u5drneuzhaeo.onion/users/torirc/skull/skulls/skulls.php.

    The TOR_IRCD application has been created from different opensource applications found on the internet, they are. The code is in Alpha and located here - http://utovvyhaflle76gh.onion/sTORage/Bundle%2Dtorircd%2Drc1%2D2372011.zip

    and here


    and here


    The application has been written in C#.Net and VS.NET 2010
    It is a proof of concept application with a beta status as of 23 July 2011.

    1. FileScope
      For the Gnutella webcache discovery routines.
    2. IRCd.Net
      For the IRCD server.
    3. SmartIRCNet
      For the Proxy clients and SOCKS code.
    4. Skulls PHP GwebCache
      Altered for onoin addresses discovery.

    Authorities may want to look at the files on your hard drive, it is therefore recommended that the IRC client logfiles and the TOR hidden service address be securly deleted after use.

    Future enhancements may include:

    1. Commandline startup
    2. Private/Public Key Session Encryption
    3. Auto delete onion address and public private keys onstartup and generate new
    4. Enable DCC SEND and CHAT
    Last edit: Zanzi Zoi 2011-07-22


Cancel   Add attachments