Name Modified Size Downloads / Week Status
Bundle-torircd-rc3-28072011.zip 2011-07-28 572.3 kB 11 weekly downloads
README.txt 2011-07-22 4.4 kB 0
Bundle-torircd-rc1-2372011.zip 2011-07-22 475.8 kB 0
Totals: 3 Items   1.1 MB 1
TOR_IRCD NETWORK 23 July 2011 This file is located here http://xqz3u5drneuzhaeo.onion/users/torirc/index.html CONTENT 1.Introduction 2. Prerequisites 3. How it works 4.Configuration 5. Downloads & Code 6. Security Precautions 7.Application Enhancements INTRODUCTION The TOR_IRC netowork is a distributed IRC 'serverless' network leveraging the security provided by die TOR network, where the Gnutella web cache technology has been re-used for node discovery. This application aims to give the general public used to IRC the ability to comunicate freely without the fear of being prosecuted. PREREQUISITES For the TOR_IRCD to work you have to install the .Net framework 4 You have to add your onion address in the Settings.xml file. The xml files are created on startup if they do not exist. HOW IT WORKS Distributed “serverless” IRC has been accoplished by making each client a server therefore canceling the dependency on a sentrally located server. Each client runs its own IRC server locally and connects their clients (usually one, but can be more on a lan) to this local server. The server syncronize with other nodes that are also servers via the secure and anonymous TOR network. Privoxy is required to send node list requests (via tor) to the altered skull php scripts (Gnutella technology) so that nodes can discover each other and connect accordingly. CONFIGURATIONS Applications The applications on localhost required to use the TOR-IRC network is listed below 1. Your favourite IRC Client 2. The TOR-IRC Deamon 3. The Tor Network Application 4. A HTTP to TOR proxy like Privoxy Application required within the Tor network for node discovery 1. Skulls php webcache script. Privoxy Configuration Privoxy needs to be configured to talk to TOR Add the following line to the last line of the config.txt file in the Privoxy folder. “forward-socks4a / localhost:9050 .” Tor Configuration https://www.torproject.org/docs/tor-hidden-service.html.en Add the following lines to your torrc file For windows HiddenServiceDir C:\Documents and Settings\username\Application Data\hidden_service\ HiddenServicePort 6667 Or Linux HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/ HiddenServicePort 6667 Where the directory path can by any, but the ports has to be 6666 (TOR-IRCD) and 6667 Restart Tor. Copy the onion address after restart into the Settings.xml file of TOR-IRCD TORIRCD Configuration 1. Settings.xml The TOR-IRCD application has to have your hidden service address replace <localonoinaddress /> with your local hidden service address eg. <localonoinaddress>fh789e50fg98a.onoin:6667 </localonoinaddress> 2.Webcache.xml The webcache has to know the location/url of the skulls cache script. Ensure that it at least have the entry for the test url location as below <anyType xsi:type="xsd:string">http://xqz3u5drneuzhaeo.onion/users/torirc/skull/skulls/skulls.php</anyType> GNUTELLA WEBCACHE configuration The skulls PHP scripts has been 'hacked' to allow for onion addresses. The alpha test script is located here http://xqz3u5drneuzhaeo.onion/users/torirc/skull/skulls/skulls.php. DOWNLOADS & CODE The TOR_IRCD application has been created from different opensource applications found on the internet, they are. The code is in Alpha and located here - http://utovvyhaflle76gh.onion/sTORage/Bundle%2Dtorircd%2Drc1%2D2372011.zip and here http://xqz3u5drneuzhaeo.onion/users/torirc/Bundle-torircd-rc1-2372011.zip The application has been written in C#.Net and VS.NET 2010 It is a proof of concept application with a beta status as of 23 July 2011. 1. FileScope For the Gnutella webcache discovery routines. 2. IRCd.Net For the IRCD server. 3. SmartIRCNet For the Proxy clients and SOCKS code. 4. Skulls PHP GwebCache Altered for onoin addresses discovery. SECURITY PRECAUTIONS Authorities may want to look at the files on your hard drive, it is therefore recommended that the IRC client logfiles and the TOR hidden service address be securly deleted after use. APPLICATION ENHANCEMENTS Future enhancements may include: 1. Commandline startup 2. Private/Public Key Session Encryption 3. Auto delete onion address and public private keys onstartup and generate new 4. Enable DCC SEND and CHAT
Source: README.txt, updated 2011-07-22

Thanks for helping keep SourceForge clean.

Screenshot instructions:
Red Hat Linux   Ubuntu

Click URL instructions:
Right-click on ad, choose "Copy Link", then paste here →
(This may not be possible with some types of ads)

More information about our ad policies

Briefly describe the problem (required):

Upload screenshot of ad (required):
Select a file, or drag & drop file here.

Please provide the ad click URL, if possible:

Get latest updates about Open Source Projects, Conferences and News.

Sign up for the SourceForge newsletter:

JavaScript is required for this form.

No, thanks