[Aldaba-devel] Aldaba Server 0.1.3 and Aldaba Client 0.1.5 Released
Status: Beta
Brought to you by:
luis_mg
|
From: <ald...@go...> - 2007-12-25 00:09:06
|
Hi! I am pleased to announce the release of Aldaba Knocking Server 0.1.3 and version 0.1.5 of Aldaba Knocking Client. Please download it from Aldaba's project page in Sourceforge. http://sourceforge.net/project/showfiles.php?group_id=197837 To install follow these installation instructions: [Server http://www.aldabaknocking.com/development/install_notes_server.txt] <http://www.aldabaknocking.com/development/install_notes_server.txt%5D> [Client http://www.aldabaknocking.com/development/install_notes_client.txt] <http://www.aldabaknocking.com/development/install_notes_client.txt%5D> Please test it and report any bugs you find through the mailing list or using the trackers at Sourceforge. CHANGELOG ALDABA CLIENT: Version 0.1.5 Dec 24, 2007. - New checksum format. From now on, SPA packets will use SHA256 checksums as MD5 is not secure anymore. - SPA "command" field has been reduced from 200 bytes to 184 due to the use of SHA256 checksums that take 16 bytes more than MD5. - Added support for new encryption algorithms. Now, the following ciphers can be used to encrypt/decrypt SPA packets: - Rijndael (AES contest winner) - Twofish (AES contest third position) - Serpent (AES contest second position) - Blowfish Note that IP-Id technique needs to use blowfish because it needs ciphers with a block size of 64bits or less. CHANGELOG ALDABA SERVER: Version 0.1.3 Dec 24, 2007. - New checksum format. From now on, SPA packets will use SHA256 checksums as MD5 is not secure anymore. - SPA "command" field has been reduced from 200 bytes to 184 due to the use of SHA256 checksums that take 16 bytes more than MD5. - Added support for new encryption algorithms. Now, the following ciphers can be used to encrypt/decrypt SPA packets: - Rijndael (AES contest winner) - Twofish (AES contest third position) - Serpent (AES contest second position) - Blowfish Note that IP-Id technique needs to use blowfish because it needs ciphers with a block size of 64bits or less. - Fixed typo in --help output |