| Name | Modified | Size | Downloads / Week |
|---|---|---|---|
| Bundle-torircd-rc3-28072011.zip | 2011-07-28 | 572.3 kB | |
| README.txt | 2011-07-22 | 4.4 kB | |
| Bundle-torircd-rc1-2372011.zip | 2011-07-22 | 475.8 kB | |
| Totals: 3 Items | 1.1 MB | 0 |
TOR_IRCD NETWORK 23 July 2011
This file is located here http://xqz3u5drneuzhaeo.onion/users/torirc/index.html
CONTENT
1.Introduction
2. Prerequisites
3. How it works
4.Configuration
5. Downloads & Code
6. Security Precautions
7.Application Enhancements
INTRODUCTION
The TOR_IRC netowork is a distributed IRC 'serverless' network leveraging the security provided by die TOR network, where the Gnutella web cache technology has been re-used for node discovery. This application aims to give the general public used to IRC the ability to comunicate freely without the fear of being prosecuted.
PREREQUISITES
For the TOR_IRCD to work you have to install the .Net framework 4
You have to add your onion address in the Settings.xml file.
The xml files are created on startup if they do not exist.
HOW IT WORKS
Distributed serverless IRC has been accoplished by making each client a server therefore canceling the dependency on a sentrally located server. Each client runs its own IRC server locally and connects their clients (usually one, but can be more on a lan) to this local server. The server syncronize with other nodes that are also servers via the secure and anonymous TOR network. Privoxy is required to send node list requests (via tor) to the altered skull php scripts (Gnutella technology) so that nodes can discover each other and connect accordingly.
CONFIGURATIONS
Applications
The applications on localhost required to use the TOR-IRC network is listed below
1. Your favourite IRC Client
2. The TOR-IRC Deamon
3. The Tor Network Application
4. A HTTP to TOR proxy like Privoxy
Application required within the Tor network for node discovery
1. Skulls php webcache script.
Privoxy Configuration
Privoxy needs to be configured to talk to TOR
Add the following line to the last line of the config.txt file in the Privoxy folder.
forward-socks4a / localhost:9050 .
Tor Configuration
https://www.torproject.org/docs/tor-hidden-service.html.en
Add the following lines to your torrc file
For windows
HiddenServiceDir C:\Documents and Settings\username\Application Data\hidden_service\
HiddenServicePort 6667 127.0.0.1:6666
Or Linux
HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
HiddenServicePort 6667 127.0.0.1:6666
Where the directory path can by any, but the ports has to be 6666 (TOR-IRCD) and 6667
Restart Tor.
Copy the onion address after restart into the Settings.xml file of TOR-IRCD
TORIRCD Configuration
1. Settings.xml
The TOR-IRCD application has to have your hidden service address
replace <localonoinaddress /> with your local hidden service address eg. <localonoinaddress>fh789e50fg98a.onoin:6667 </localonoinaddress>
2.Webcache.xml
The webcache has to know the location/url of the skulls cache script. Ensure that it at least have the entry for the test url location as below
<anyType xsi:type="xsd:string">http://xqz3u5drneuzhaeo.onion/users/torirc/skull/skulls/skulls.php</anyType>
GNUTELLA WEBCACHE configuration
The skulls PHP scripts has been 'hacked' to allow for onion addresses. The alpha test script is located here http://xqz3u5drneuzhaeo.onion/users/torirc/skull/skulls/skulls.php.
DOWNLOADS & CODE
The TOR_IRCD application has been created from different opensource applications found on the internet, they are. The code is in Alpha and located here - http://utovvyhaflle76gh.onion/sTORage/Bundle%2Dtorircd%2Drc1%2D2372011.zip
and here
http://xqz3u5drneuzhaeo.onion/users/torirc/Bundle-torircd-rc1-2372011.zip
The application has been written in C#.Net and VS.NET 2010
It is a proof of concept application with a beta status as of 23 July 2011.
1. FileScope
For the Gnutella webcache discovery routines.
2. IRCd.Net
For the IRCD server.
3. SmartIRCNet
For the Proxy clients and SOCKS code.
4. Skulls PHP GwebCache
Altered for onoin addresses discovery.
SECURITY PRECAUTIONS
Authorities may want to look at the files on your hard drive, it is therefore recommended that the IRC client logfiles and the TOR hidden service address be securly deleted after use.
APPLICATION ENHANCEMENTS
Future enhancements may include:
1. Commandline startup
2. Private/Public Key Session Encryption
3. Auto delete onion address and public private keys onstartup and generate new
4. Enable DCC SEND and CHAT