Home
Name Modified Size InfoDownloads / Week
Bundle-torircd-rc3-28072011.zip 2011-07-28 572.3 kB
README.txt 2011-07-22 4.4 kB
Bundle-torircd-rc1-2372011.zip 2011-07-22 475.8 kB
Totals: 3 Items   1.1 MB 0
TOR_IRCD NETWORK 23 July 2011
This file is located here http://xqz3u5drneuzhaeo.onion/users/torirc/index.html

CONTENT

1.Introduction
2. Prerequisites
3. How it works
4.Configuration
5. Downloads & Code
6. Security Precautions
7.Application Enhancements

INTRODUCTION
The TOR_IRC netowork is a distributed IRC  'serverless' network leveraging the security provided by die TOR network, where the Gnutella web cache technology has been re-used for node discovery. This application aims to give the general public used to IRC the ability to comunicate freely without the fear of being prosecuted.


PREREQUISITES
For the TOR_IRCD to work you have to install the .Net framework 4
You have to add your onion address in the Settings.xml file.
The xml files are created on startup if they do not exist.


HOW IT WORKS
Distributed “serverless” IRC has been accoplished by making each client a server therefore canceling the dependency on a sentrally located server. Each client runs its own IRC server locally and connects their clients (usually one, but can be more on a lan) to this local server. The server syncronize with other nodes that are also servers via the secure and anonymous TOR network. Privoxy is required to send node list requests (via tor) to the altered skull php scripts (Gnutella technology) so that nodes can discover each other and connect accordingly.


CONFIGURATIONS

Applications
The applications on localhost required to use the TOR-IRC network is listed below
1. Your favourite IRC Client
2. The TOR-IRC Deamon
3. The Tor Network Application
4. A HTTP to TOR proxy like Privoxy

Application required within the Tor network for node discovery
1. Skulls php webcache script.

Privoxy Configuration
Privoxy needs to be configured to talk to TOR
Add the following line to the last line of the config.txt file in the Privoxy folder.
“forward-socks4a / localhost:9050 .”

Tor Configuration
https://www.torproject.org/docs/tor-hidden-service.html.en
Add the following lines to your torrc file
For windows

    HiddenServiceDir C:\Documents and Settings\username\Application Data\hidden_service\
    HiddenServicePort 6667 127.0.0.1:6666
Or Linux
    HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
    HiddenServicePort 6667 127.0.0.1:6666

Where the directory path can by any, but the ports has to be 6666 (TOR-IRCD) and 6667 
Restart Tor.
Copy the onion address after restart into the Settings.xml file of TOR-IRCD

TORIRCD Configuration
1. Settings.xml
The TOR-IRCD application has to have your hidden service address
replace   <localonoinaddress /> with your local hidden service address eg. <localonoinaddress>fh789e50fg98a.onoin:6667 </localonoinaddress>


       2.Webcache.xml
	The webcache has to know the location/url of the  skulls cache script. Ensure that it at least 	have the entry for the test url location as below

<anyType xsi:type="xsd:string">http://xqz3u5drneuzhaeo.onion/users/torirc/skull/skulls/skulls.php</anyType>

GNUTELLA WEBCACHE configuration
The skulls PHP scripts has been 'hacked' to allow for onion addresses. The alpha test script is located here http://xqz3u5drneuzhaeo.onion/users/torirc/skull/skulls/skulls.php.    


DOWNLOADS & CODE
The TOR_IRCD application has been created from different opensource applications found on the internet, they are. The code is in Alpha and located here - http://utovvyhaflle76gh.onion/sTORage/Bundle%2Dtorircd%2Drc1%2D2372011.zip

and here

http://xqz3u5drneuzhaeo.onion/users/torirc/Bundle-torircd-rc1-2372011.zip

The application has been written in C#.Net and VS.NET 2010
It is a proof of concept application with a beta status as of 23 July 2011.

1. FileScope
For the Gnutella webcache discovery routines.
2. IRCd.Net 
For the IRCD server.
3. SmartIRCNet
For the Proxy clients and SOCKS code.
4. Skulls PHP GwebCache
	Altered for onoin addresses discovery.


SECURITY PRECAUTIONS
Authorities may want to look at the files on your hard drive, it is therefore recommended that the IRC client logfiles and the TOR hidden service address be securly deleted after use.


APPLICATION ENHANCEMENTS
Future enhancements may include:

1. Commandline startup
2. Private/Public Key Session Encryption
3. Auto delete onion address and public private keys onstartup and generate new
4. Enable DCC SEND and CHAT
Source: README.txt, updated 2011-07-22