Ph1l3 #oo5 [TWaT] /( )\ /( )\ / \/ \ / \ / \ \/\ /\/_ _ ______ \ \ /\ / /__ ______ ______ ______ ______ / \ | \ / \ / \ / > \ \ / ___ \ < > | > \ / \/ | | > | | \ / | /\ | __ \ \ /\/\ / / \ /\ | /\ |___ \ / \/ |/ \|/ \/ \/ \/ \ / / \|/ \| \/ | |\ \ A N S i T E A M =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= kRadkRadkrAdkrAdkRadkrAdKRadKraDkRAdkRaDkRADkraDkradKRADKrAdkRaDkRAdkraDKrAd! =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 101 ways to subvert the infrastructre, lesson 1. Pompus Pilots's Underground Guide to USENET(P.P.U.G.U) By Pompus Pilot Alright boys and girls, can you say NNTP? Thats the protcol that USENET runs on. Its very easy to access usenet through telneting to port 119. I have a file called Maas-info-nntp. I am going to quote it in this article. BTW if you see an address labeled as a NNTP server that means its a usenet server, and you should try to telnet to it at 119, public NNTP servers are hard to come by and if anyone has one that works and has a.b.p.e please leave voicemail at. 1800-241-7337 VMB:1371 Guest box:1111. The cool thing about public NNTP servers is if you have TIN or RN installed all you have to set NNTPSERVER = NNTP.SERVER.ADDRESS and run RTIN. it works really well But there are alternatives, such as gopher to usenet servers. A good one is usage.csd.unsw.oz.au port 4320. All you need to access them is a gopher client and the ability to telnet. just type gopher usage.csd.unsw.oz.au 4320. One advantage is with gopher you dont have nasty little .newsrc files telling which newsgroups you read. and if you combine it with unpost. (just archie for unpost.tar.Z). With unpost you just s each message out to a file and cat all the files into a big file and run unpost on it and will sort it out, they message dont even have to be in order or all together. I dont know how I got along with out it. IT even has a dos version. Another cool service involving USENET is anonymous email usenet posting services. I am going to include a list of them along with instuctions on how to use them. One cool idea is to funky email(telnet anywhere at port 25 and fake it) a anonymous usenet poster and put it in non-anoymous mode. you make it look its coming from the person you want to fuck, then subscribe them to every huge mailing list you can manage. Some good ideas are the athruian legand mailing list, any binary mailing lists especially picture mailing lists and any alt.sex subgroup(especially something really perverse) email digest mailing list. This will cause the the NET to bomb your target for you in a way that is almost impossible to be traced. Nothing pisses off a sysadmin more than someone who fills up there harddrive so full of smut that it crashes the system. It makes the person look bad and causes them serious problems, espeically if they get there internet email through a bbs/internet email gateway like the fidonet gateway, then every sysop along the chain from the gateway to the local bbs will be pissed. If it happens enough the local email node will be taken out of the mail network. It is a seroius attack on someone. Also you can funky email in their name on mist.test or alt.test with the subject test and in the body request everyone email who reads it reply, Alot of people will fall for it. Use the NET against it self, twist the infrastructure back onto its self. Whether or not you can make the system do your bidding, instead of nibbling at its heels snatching bits of access and time slices, is the true test of real "hacker" (I hate to use this overusered and misunderstand typecast but I like to think in indealized terms). Its like using a chrome box so you can go through any red light. oh well start the aformentioned files. HERE is the email to usnet posting services they have anonymous and nonanoymous posting cabiilty. begin now. (cut here) ******************************************************************** This message is being sent to you automatically in response to the message you sent to usura@xs4all.nl with subject "remailer-help". I have an automated mail handling program installed on my account usura@xs4all.nl which will take any message with the proper headers and automatically re-send it anonymously. You can use this by sending a message to usura@xs4all.nl, with the header Anon-To:
, the address that you want to send anonymously to. If you can't add headers to your mail, you can place two colons on the first line of your message, and then the Anon-To line. Follow that with a blank line, and then begin your message. For Example: > From: joe@site.com > To: usura@xs4all.nl > Subject: Anonymous Mail > > :: > Anon-To: beth@univ.edu > > This is some anonymous mail. The above would be delivered to beth@univ.edu anonymously. All headers in the original message are removed, with the exception of the Subject (and Content-Type, if present). She would not know that it came from Joe, nor would she be able to reply to the message. However, there are a few ways that the true identity of the sender could be found. First, if many anonymous messages were sent, someone could compare the times that the messages were sent with the times that 'joe' was logged in. However, this can be prevented by instructing the remailer to delay the message, by using the Latent-Time header: > From: joe@site.com > To: usura@xs4all.nl > Subject: Anonymous Mail > > :: > Anon-To: beth@univ.edu > Latent-Time: +1:00 > > This is some anonymous mail. The message would be delayed one hour from when it is sent. It is also possible to create a random delay by adding an r to the time (ie +1:00r), which would have the message be delivered at a random time, but not more than an hour. It is also possible to delay the message until a specific time. For example, "Latent-Time: 18:00" would delay the message until 6 PM, Central European Time. Times must be in 24-hour format. Another problem is that some mailers automatically insert a signature file. Of course, this usually contains the senders email address, and so would reveal their identity. The remailer software can be instructed to remove a signature file with the header "Cutmarks:". Any line beginning with the same text at in the cutmarks header, and any lines following it will be removed. > From: sender@origin.com > To: usura@xs4all.nl > Subject: Anonymous Mail > > :: > Anon-To: recipient@destination.com > Cutmarks: -- > > This line of text will be in the anonymous message. > -- > This line of text will not be in the anonymous message. This Cutmark feature can also be used to post a delivery notice to a specified newsgroup. {ie. alt.anonymous.messages}] > From: sender@origin.com > To: usura@xs4all.nl > Subject: MSG-id 1994.11.31 > > :: > Anon-Post-To: alt.anonymous.messages > Cutmarks: * > > Message <1994.11.31> succesfully remailed > * > :: > Anon-To: receiver@destination.com > Cutmarks: -- > > ## > Subject: Anonymous Mail > > Hi This is some anonymous mail > This is in > -- > This is out If the first message shows up at misc.test you know that the message to receiver@destination.com succesfully was remailed. For added security, you can encrypt your messages to the remailer with PGP. The remailer software will decrypt the message and send it on. Here is the remailer's public key: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.3 mQCNAi4wTh8AAAEEAMb9gl6NlZHy4FdjADel4d+C+Th7+inTOV4mEsKk+N/QfJAj BN6YPnJ9bm+Ch19FrR1KeTwrpluP6J+GdJrMkVSosvIqBPpSRgOs7nvMhnn3Tnrn uUFZVDYslQ1wRZvFbTpCEW8TzgVhGy6HMznxEC4ttnOq8pFRFUpL3asf+toVAAUR tC5HbG9iYWwgUmVtYWlsIFNlcnZpY2VzIEx0ZC4gPHVzdXJhQGhhY2t0aWMubmw+ =+iYx -----END PGP PUBLIC KEY BLOCK----- To utilize this feature, create a message with two colons on the first line, then the Anon-To line, then any other headers, such as cutmarks or latency, then a blank line, and then the message. Encrypt this with the remailer's public key. Then send it to the remailer, adding the header "Encrypted: PGP". If you forget this, the remailer won't know that it needs to be decrypted. > To: usura@xs4all.nl > From: me@mysite.org > > :: > Encrypted: PGP > > -----BEGIN PGP MESSAGE----- > Version: 2.3a > > hIkCuMeAjnwmCTUBA+dfWcFk/fLRpm4ZM7A23iONxkOGDL6D0FyRi/r0P8+pH2gf > HAi4+1BHUhXDCW2LfLfay5JwHBNMtcdbgXiQVXIm0cHM0zgf9hBroIM9W+B2Z07i > 6UN3BDhiTSJBCTZUGQ7DrkltbgoyRhNTgrzQRR8FSQQXSo/cf4po0vCezKYAAABP > smG6rgPhdtWlynKSZR6Gd2W3S/5pa+Qd+OD2nN1TWepINgjXVHrCt0kLOY6nVFNQ > U7lPLDihXw/+PPJclxwvUeCSygmP+peB1lPrhSiAVA== > =da+F > -----END PGP MESSAGE----- Any unencrypted text after the PGP message is also remailed. This is to allow sending to someone who is anonymous. If you create a PGP-encrypted message to yourself via my remailer, and then you give it to someone, they can send you a message by sending the encrypted message to the remailer. The remailer will then decrypt it and send it to you. The message gets anonymized in the process, so the sender will need to include a return address if he wants a reply. You can use this remailer to anonymous post a message, the syntax for that is: > To: usura@xs4all.nl > Subject: ignore > > :: > Anon-Post-To: misc.test > > Test of anon message posting You must specify a Subject, if no subject is specified the newsserver will reject the posting. Please donnot use the "Subject: test" if testing to a test group [ie. misc.test] but use "Subject: ignore blabla" instead. That will prevent my mailbox from being swamped with test replies, those are send automaticly to -any- test posting with test in its Subject-line. For non-anonymised postings the syntax is: > To: usura@xs4all.nl > Subject: ignore > > :: > Post-To: misc.test > > Test The remailer "understands" the following commands: anonymous remailing : {Anon-To: ,Anon-Send-To: ,Request-Remailing-To: } non-anon remailing : {Send-To: } anonymous posting : {Anon-Post-To: } anon-anon posting : {Post-To: } discard part of mail: {Cutmarks: } time fideling : {Latent-Time: } PGP encryption : {Encrypted: PGP} Header Pasting : {##}, {below that you add your header info} You can get a list of statistics on remailer usage by sending mail to usura@xs4all.nl with "Subject: remailer-stats" A ping-list of anonymous remailers is available by fingering . A list of remailers and their instructions is available by fingering . This remailer is not endorsed in any way by XS4all Netwerk. I, Alex de Joode, take no responsibility for the content of posts or messages, and I take no responsibility for the consequences of using my remailer. For example, if you post anonymously, and someone manages to trace it back to you, I am not responsible. Also, I have no way of screening mail that goes through this remailer, so I am in no way responsible for the content of posts or mail going through. Also, note that this remailer is experimental. Its mode of operation is subject to change without notice. Users are advised to check these instructions and to do test messages often. If someone is doing something inapropriate with this remailer, please send mail to the remailer operator, as soon as possible. The problem can only be solved if the operator is aware of it. If you don't want to receive anonymous mail, send me a message, and I will add your email address to the block list. ------ This mail was sent automatically. *********************************************************************** end (cut here) here is another file on anonymous remailers and has a complete list as well as glabal instruction for all of them, it also includes how to chain emailers to increase your anoyminty. start of file (cut here) ************************************************************************** [kiwi.cs.berkeley.edu] Login name: remailer-list In real life: Remailer list Directory: /private/remailer-list Shell: /usr/sww/bin/tcsh Last login Sun Sep 18 08:50 on ttyp4 from annex-64-8.Berkee Plan: $remailer{"chaos"} = " cpunk hash ksub"; $remailer{"vox"} = " cpunk oldpgp. post"; $remailer{"avox"} = " cpunk oldpgp post"; $remailer{"extropia"} = " cpunk pgp special"; $remailer{"portal"} = " cpunk pgp hash"; $remailer{"alumni"} = " cpunk pgp hash"; $remailer{"bsu-cs"} = " cpunk hash ksub"; $remailer{"rebma"} = " cpunk pgp hash"; $remailer{"jpunix"} = " cpunk pgp hash latent cut post"; $remailer{"wien"} = " cpunk pgp hash nsub"; $remailer{"c2"} = " eric pgp hash"; $remailer{"soda"} = " eric pgp. post"; $remailer{"penet"} = " penet post"; $remailer{"ideath"} = " cpunk hash ksub"; $remailer{"usura"} = " cpunk pgp. hash latent cut post"; $remailer{"leri"} = " cpunk pgp hash"; $remailer{"desert"} = " cpunk pgp."; $remailer{"underdog"} = " cpunk hash latent cut post"; catalyst@netcom.com is _not_ a remailer. Last ping: Sun 18 Sep 94 16:00:01 PDT remailer email address history latency uptime ----------------------------------------------------------------------- wien remailer@ds1.wu-wien.ac.at ****-+**++** 9:31 99.99% bsu-cs nowhere@bsu-cs.bsu.edu ****++*****+ 6:29 99.99% c2 remail@c2.org *+****-**+*- 1:10:46 99.99% ideath remailer@ideath.goldenbear.com *+****++*-.+ 2:54:37 99.99% chaos remailer@chaos.bsu.edu ********#**# 1:49 99.99% leri remail@leri.edu ******-**+*- 1:03:44 99.99% alumni hal@alumni.caltech.edu *-********** 14:23 99.90% soda remailer@csua.berkeley.edu ++++++++... 5:22:32 99.97% portal hfinney@shell.portal.com *-********** 14:30 99.85% extropia remail@extropia.wimsey.com -++-- -+++++ 1:23:13 99.69% rebma remailer@rebma.mn.org ---*-----+- 6:19:39 99.77% vox remail@vox.xs4all.nl .---.. --.- 11:04:20 99.50% underdog lmccarth@ducie.cs.umass.edu **** 3:31 99.53% penet anon@anon.penet.fi ************ 2:18:00 98.76% jpunix remailer@jpunix.com **** *-** #* 8:03 98.70% desert remail@desert.xs4all.nl ..--.- ---- 25:55:50 81.03% usura usura@xs4all.nl ****** **+ 9:24 76.18% Suggested path: c2;bsu-cs;wien For more info: http://www.cs.berkeley.edu/~raph/remailer-list.html [chaos.bsu.edu] finger: remail-list: no such user. Are you having trouble finding someone on chaos.bsu.edu? Try fingering help@chaos.bsu.edu for a list of accounts that may be of use to you. [chaos.bsu.edu] For the following information, finger @chaos.bsu.edu where is the name listed below. Username Description ============== =============================================================== academy Information on using the Indiana Academy Alumni account anon Information on using the anonymous contact service fortune Random fortunes fortune.dirty Random obscene fortunes guest Information on getting an account on chaos info Some information about chaos mailserv Information on using mail servers (mailing lists) mailserv.list A list of active mail servers ping A quick reply so you know chaos is up and running remailer Information on using the Cypherpunks anonymous remailer services A list of services provided to the Internet [chaos.bsu.edu] Login: remailer Name: Remailer Pseudo-User Directory: /pseudo/remailer Shell: /bin/tcsh Never logged in. No Mail. Plan: ** If you have any problems or complaints with regard to this anonymous ** ** remailer please direct them to . ** For instructions on using the BSU remailers: finger remailer.help@chaos.bsu.edu For instructions on using all Cypherpunks remailers: finger remailer.help.all@chaos.bsu.edu For a list of Cypherpunks remailers: finger remailer.list@chaos.bsu.edu To see the policy for the BSU remailers: finger remailer.policy@chaos.bsu.edu To get the Unix C source code to the BSU remailers: FTP the file chaos.bsu.edu:/pub/development/remailer-current.tar.gz unknown host: choas.bsu.edu [chaos.bsu.edu] Please report any inaccuracies in this information to Matthew Ghio Last Updated: September 16 1994 The Cypherpunks' remailers allow you to send anonymous mail by adding the header Request-Remailing-To: and sending to one of the addresses listed below. Most (but not all) of these remailers also accept Anon-To: in place of Request-Remailing-To. These headers must be typed exactly as you see them; most remailers are case-sensitive. Mail without these headers is either rejected or delivered to the remailer administrators. The standard cypherpunks anonymous remailers are: usura@hacktic.nl hfinney@shell.portal.com hal@alumni.caltech.edu nowhere@bsu-cs.bsu.edu remailer@chaos.bsu.edu remailer@ds1.wu-wien.ac.at remail@c2.org remailer@ideath.goldenbear.com remail@leri.edu remailer@rebma.mn.org remail@vox.hacktic.nl remailer@desert.xs4all.nl lmccarth@ducie.cs.umass.edu If you can not add the required headers, place two colons (::) on the very first line of your message, then on the next line type Request-Remailing-To: and the address you want to send anonymously to. Skip a line, and then begin your message. Note that by using this method it is possible to send a message consecutively thru more than one remailer. Be sure to place the double colons on the first line of the message, and skip one line following the headers. Extra blank spaces (or forgetting to seperate the headers and message) may cause problems. Keep in mind that many remailers only allow one recipient per message. You can add additional headers to your message by placing two number signs (##) at the beginning of the first line of the message body, and then add the special headers on subsequent lines. The bsu remailers require that you place the Subject: header in the body of the message, after the ##. The original subject line is removed. (remail@vox.hacktic.nl does not support this feature.) remailer@soda.csua.berkeley.edu works slightly differently. It includes an encrypted reply block so that people can reply to your messages. It also requires that you use the header Anon-Send-To: to send anonymously, and features a usenet posting service. For more information on this remailer, finger remailer@soda.csua.berkeley.edu, or send mail to that address with the Subject: remailer-info remail@extropia.wimsey.com requires that you public-key encrypt your messages with PGP. This added security prevents a hacker or nosey sysadmin at your site from reading your outgoing mail or finding out where it's going. This remailer is not directly connected to the internet, so messages will be delayed about an hour. Some of the other remailers support PGP as well. For remailers which support both encryption and plaintext messages, identify encrypted messages by adding a header which reads: Encrypted: PGP Encryption keys can be found below. The remailers at usura@hacktic.nl and lmccarth@ducie.cs.umass.edu offer several additional features. Adding the header "Cutmarks:" will truncate the message starting with any line that begins with the same characters as in the Cutmarks header. This can be used to remove an automatically-inserted signature file. Also supported is the header "Latent-Time:". This allows a message to be delayed at the remailer and sent out at a later time. This is useful because it prevents people from correlating the times at which certain anonymous posts appear with the times that you are logged in. Both absolute and relative delays are possible. For example, "Latent-Time: 19:00" would have the remailer hold the message until 7 PM local time and then deliver it. Times must be in 24-hour format. "Latent-Time: +06:30" would deliver the message six hours and thirty minutes after it is received. The maximum permissible delay is 24 hours. These lines may be placed either in the message headers, or following the double colon. For more information, send mail to lmccarth@ducie.cs.umass.edu or usura@hacktic.nl, Subject: remailer-help There is a pseudonym-based anonymous remailer at anon.penet.fi. For information on this remailer, send mail to: help@anon.penet.fi There is another anonymous contact service at chop.ucsd.edu. For information on this remailer, send mail to: acs-info@chop.ucsd.edu vox.hacktic.nl also has a anonymous account service. For more information, send mail to remail@vox.hacktic.nl with subject "help". Anonymous postings to usenet can be made by sending anonymous mail to one of the following mail-to-usenet gateways: group.name@demon.co.uk group.name@news.demon.co.uk group.name@bull.com group.name@cass.ma02.bull.com group.name@undergrad.math.uwaterloo.ca group.name@charm.magnus.acs.ohio-state.edu group.name@comlab.ox.ac.uk group.name@nic.funet.fi group.name@cs.dal.ca group.name@ug.cs.dal.ca group.name@paris.ics.uci.edu (removes headers) group.name.usenet@decwrl.dec.com (Preserves all headers) These were all verified as of August 1, but let me know if you have problems with any of the usenet gates listed above. Also tell me if you know of any more of these. The mail-to-news gateways do not anonymize messages; you must use a remailer if you want the message to be posted anonymously. It would also be advisable to try a post to alt.test before relying on any such system to function as expected. Also note the special syntax required at dec.com In addition, you can cross-post to several newsgroups by adding the header Newsgroups: with the names of the groups you want to post to and sending it to mail2news@demon.co.uk (Use the ## feature with the remailers to add the header line) Examples: Simple Remailing: > From: joe@site.com > To: remail@c2.org > Subject: Anonymous Mail > > :: > Anon-To: beth@univ.edu > > This is some anonymous mail. Chaining remailers: > From: sender@origin.com > To: remailer@rebma.mn.org > > :: > Request-Remailing-To: remailer@ds1.wu-wien.ac.at > > :: > Request-Remailing-To: receipient@destination.com > > This is an anonymous message Adding extra headers to the output message: > From: suzie@euronet.co.uk > To: remailer@chaos.bsu.edu > > :: > Request-Remailing-To: mail2news@demon.co.uk > > ## > Subject: Ignore this test > Newsgroups: alt.test > Comments: This is only a test > > This message will be posted to alt.test! Cutmarks and delay: > From: sam@eric.com > To: remailer@jpunix.com > Subject: ignore > > :: > Anon-To: alt.test@nic.funet.fi > Latent-Time: +15:30 > Cutmarks: -- > > This is an anonymous test. > Note that it does not have my .sig appended to it! > > -- > sam@eric.com - 310-853-1212 - This is my .sig - Finger for PGP key! The following are PGP public keys of the remailers which support encryption: 1024-bit key, Key ID B5A32F, created 1992/12/13 -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.3 mQCNAisrAP0AAAEEAJr3OwIfOIOoh9JndwwqFg+VyWFTAyM8S0B7wyGKI+A9sMAB mbSOIU52EszvLdZk8NH8mrOD9m3EZlt9gXOjln881RMilAunnzdXaJ6ffBKqPL+l yiefCbCo6wScVNfMSV6Di/2HMoFzVqukwRjTx8lqKt6hgy0uedtwcCemtaMvAAUR tCVSZW1haWxlciA8cmVtYWlsQGV4dHJvcGlhLndpbXNleS5jb20+iQCVAgUQK2SV p4OA7OpLWtYzAQG8eQP9F9ye/F/rXhJLNR5W/HV5k+f6E0zWSgtmTTWUYyydfJw+ lKDEDH6v+OFOFE3+fuTIL5l0zsNMSMdF5u7thSSWiwcFgaBFQF9NWmeL/uByOTSY tsB6DQSbw656SBH7c7V7jvUsPit/DubwBXZi9sOlULau3kQqXeeQxPhNE+bpMy6J AJUCBRArKwSLk3G+8Dfo40MBAXYAA/4hCVDFD0zG47pYPMg+y7NPE5LktWt2Hcwt Z4CRuT5A3eWGtG8Sd5QuHzbE4S9mD3CFn79bxZi0UDhryD8dsCG4eHiCpAcZqSvR JSkpgamdRaUQHNmMxv5goxHhRem6wXrKxZQNn5/S0NtQOrS6QKhFlGrzDIh/2ad1 J9qpyzJ/IYkARQIFECsrA9RLrSJixHgP9wEBNcEBewWpzywKk/SBDwocXebJmsT6 zug/ae78U/cu9kTX620Xcj1zqOdx9Y9Ppwem9YShaQ== =I7QE -----END PGP PUBLIC KEY BLOCK----- Anonymous Remailer 510-bit key, Key ID 5620D5, created 1992/11/15 -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.3 mQBNAisGf+IAAAEB/ieS6th8hI1QBjGpmctVvsIxZBtmpykVXc3psh0XVfH4sECS ugouk2zm/PJtt59A2E5SO3xjpDjeKlkQ745WINUABRG0LFJlbWFpbGluZyBTZXJ2 aWNlIDxoZmlubmV5QHNoZWxsLnBvcnRhbC5jb20+iQCVAgUQK3Azm4OA7OpLWtYz AQHzawQAwZPaJUR9iNwyKMDm4bRSao0uu381pq6rR3nw0RI+DSLKTXPqDaT3xBmL dVv1PVguLcoao/TRLkAheV7CIxodEiI9lAC2o6lqSXCP+vm3jYmulSgUlKafXYbj LAbZpsKRAUjCpyx0wlYmoHhkA+NZDzMcWp6/1/rM/V1i4Jbt2+GJAJUCBRArBpKv qBMDr1ghTDcBASTlBACfTqODpVub15MK5A4i6eiqU8MDQGW0P0wUovPkNjscH22l 0AfRteXEUM+nB+Xwk16RG/GdrG8r9PbWzSCx6nBYb7Fj0nPnRPtS/u69THNTF2gU 2BD0j2vZF81lEHOYy6Ixao2b6Hxmab2mRta2eTg7CV6XP3eRFDPisVqgooAWgw== =arSc -----END PGP PUBLIC KEY BLOCK----- Remailing Service 510/0BB437 1992/11/12 -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.3a mQBNAisCtU0AAAEB/jNOYzN1B2YzOxlK/Zb6axoOaGlPq5I7DV9GH3hcGRN5N6Fi T4sRLhi53Sc5rUdYDa8mFQd4tqvFG6rHcT8LtDcABRG0KlJlbWFpbGluZyBTZXJ2 aWNlIDxoYWxAYWx1bW5pLmNhbHRlY2guZWR1PokAlQIFECsGk/aoEwOvWCFMNwEB 24gEAJlpxL88gdKUxdgXCTCeFZ45bTbyiS0Mfy86iGthyuLRYjAEjJB5yerRaKDi JNOgCTvnO+I9YyFdXnPEpvBjqVfpqHF2WCc4f7BgzBbOKg79EyiOp2/eYIQT1Fkk cvisjRGlmHncfGgoq+OhVUw81imeSUPbv8vZyqskUU7djZKb =4W6s -----END PGP PUBLIC KEY BLOCK----- Remailer (remailer@rebma.mn.org) 1024/BA80A9 1992/11/26 -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.3a mQCNAisUI2QAAAEEAKgm07Hsje5KpmXYd5azk0R6AES+qK7LcofnVGojUs7GBghD WbwrmW8oOEOhRorlShRALKeYspV4xYIw4WDkJcJxuf1B254scz1urF/Eem3zPW9b yPAx7W/cGwvs6SouZvFcSDq4v1zApvGE9hP4szPzHeGmVr0NVNeaDK0guoCpAAUR tCBSZW1haWxlciAocmVtYWlsZXJAcmVibWEubW4ub3JnKQ== =/qHx -----END PGP PUBLIC KEY BLOCK----- Tommy the Tourist 512/5E6875 1994/04/25 -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.3a mQBNAi27mNAAAAECAONCUi/9jdl0SXGhOhT4Vvgl9uOYLgbOjU5kMXEkpFQriCYC hWfNuhH8zESs9DFTMHCXUsXYrkkm/bHdhGheaHUABRO0LlRvbW15IHRoZSBUb3Vy aXN0IDxyZW1haWxlckBzb2RhLmJlcmtlbGV5LmVkdT4= =aoJM -----END PGP PUBLIC KEY BLOCK----- vox.hacktic.nl 512/368B41 1994/04/29 -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.3a mQBNAi3BYrsAAAECALbhXUJWvniV9bGz67lGnXqc3BOjRwVBV9pY9V6cJEfw/UOn R9Bi0WWDelp20Z6u+CHijrq7iaRyTL2DNtw2i0EABRG0KlZvWCBSZW1haWwgU2Vy dmljZSAgIDxhbm9uQHZveC5oYWNrdGljLm5sPokAlQIFEC3H6O5Z33QUjVaRPQEB P0oEAJKp0uOhkx7uAfUQGpYLL3RlBR2xomvYdbf/ES7DMn2eAast+cO0YWkveNO1 6h+7K1/AFa3G/q2R0alOoFFYd4J/G5hn/NBdvp3KylhEC5OCe40Qb151NpkF++OE dtUPu0qd9VlQPNhFzF37sdffkuk5Uaac1/UrPJLaYDQJYIBGtCpWb1ggUmVtYWls IFNlcnZpY2UgPHJlbWFpbEB2b3guaGFja3RpYy5ubD6JAJQCBRAtx+lIWd90FI1W kT0BAaBGA/ixWSQsCYDAOw8udVKzcqzjkzcvqDXoOTeoCRCW5yKFjLq/O+jydj0+ Y6sSHgQWeNQMYuLAq3PZWi66POhrXCrQNTdu2+Ni0Zq1UpjDE6D/6bg0ujvJd+Tr rycJq8B7T81RR/nlkQNkWRji8b1GJ1QAz/NSWuskOKEgsH5fsdvL =RRIj -----END PGP PUBLIC KEY BLOCK----- 1024/4BB86375 1994/06/03 remailer@ds1.wu-wien.ac.at -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.5 mQCNAi3u8pcAAAEEAKqUa4Ihy5KH8Q4Z5DOBRc/n/5RJUiMhbOqxRMmRq+0ycEqi ogceTx4hksKuFa2iQe2Cre9VhB/Tq2Xf1/dSknGls10DkrpVTRoCPlJAJND6iAEA iLZapFvwiQzQ/JVIunEjLf63UdBLGUTHqj4z7MGR++bGwn9SOX/Oy25LuGN1AAUR tBpyZW1haWxlckBkczEud3Utd2llbi5hYy5hdIkAlQIFEC3u8/RYsqLFExS2VQEB R9EEAIVRwgpI/CpCgptao0tVfd7xDVvFrxBnW4724caoZ3tyCEXLgbJnR250yZYZ NKJzfsPcTzILUZ3WKAlsfdPdEaJZHsyRvBDxjdvUjLokQBqd/WyklZ4MibYu6Cod z+PnKG0zVwA/gR+vQ4/xXw9T1oSf6YVW25bP3kkCOxR8mpHo =Vriv -----END PGP PUBLIC KEY BLOCK----- 1024/FD5A2D 1994/06/16 The NEXUS-Berkeley Remailer -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.3a mQCNAi3/6FIAAAEEANggWtLprhvPDAdv503F5vChmF5jadD16dBke2yuP5iJwt0i X0eJC7dFoimNp03Cm7pkn5SkGr3i3hjtKLQGtneKNfdp29ELisOc9wMLiBMP46q3 Sr/9RseAt5Nnt4fW2Efi6xO8QLiMVG837gd5pEpXOqJ2FMCikEMvwOz0/VotAAUR tCtUaGUgTkVYVVMtQmVya2VsZXkgUmVtYWlsZXIgPHJlbWFpbEBjMi5vcmc+iQCV AgUQLf/owHi7eNFdXppdAQEctAP/aK+rTQxs5J8ev1ZtnYpGZPIEezQeC8z8kRdN jUKF7CutVLy09izYDSdonuHFyWoHtLb1RUj5fGUFhOzwmJTMlTRzEx8i2a1bKdmQ qPGNu2iVKIitkSSVZvz7vHXM+ZUFTSC4LGWsECukEONEeyGy+ehG3ON0vx1ATqY5 /ATzPpo= =N0yt -----END PGP PUBLIC KEY BLOCK----- Global Remail Services Ltd. 1024-bit key, Key ID 1FFADA15, created 1994/07/22 -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.3 mQCNAi4wTh8AAAEEAMb9gl6NlZHy4FdjADel4d+C+Th7+inTOV4mEsKk+N/QfJAj BN6YPnJ9bm+Ch19FrR1KeTwrpluP6J+GdJrMkVSosvIqBPpSRgOs7nvMhnn3Tnrn uUFZVDYslQ1wRZvFbTpCEW8TzgVhGy6HMznxEC4ttnOq8pFRFUpL3asf+toVAAUR tC5HbG9iYWwgUmVtYWlsIFNlcnZpY2VzIEx0ZC4gPHVzdXJhQGhhY2t0aWMubmw+ =+iYx -----END PGP PUBLIC KEY BLOCK----- the LERI Remailer 1024/E8BA9AC9 1994/08/15 -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6 mQCNAi5PKIUAAAEEALGSqJdXCiE2p0xq3V5pyVFx2q5m8TLas6PDNex8nKGc7Z15 GAD1KFGbIBz77BTDLY7fZkxOf0CWjlO8sQw4ofZeJosx4gfOPWsQL3Cf2PkEY2fV hO1rprZbLt2x3xsQPttEr5UsRw5tQJbQJnc1XBUQx3Wx++0EdPZ88ybouprJAAUR tCN0aGUgTEVSSSBSZW1haWxlciA8cmVtYWlsQGxlcmkuZWR1Pg== =UWc7 -----END PGP PUBLIC KEY BLOCK----- JPUNIX.COM Anonymous Remailing Service 1024/0341F5 1994/05/04 -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6 mQCNAi3HrmsAAAEEAKh/CmiLDyLau6IefmNWrip7qEbOYs17KR+nIrUkFARz0syf mW9otNKGutKRvylMIN6AaTXwF4k/g73K15iOg9aeaOHVugt3U8T68PdVti1oCe1j rM1UJncTG+SZ+HBZgPNUWCkT4n3aqMhT668W6ihbvFzzmXc4h/56kltUA0H1AAUR tDxKUFVOSVguQ09NIEFub255bW91cyBSZW1haWxpbmcgU2VydmljZSA8cmVtYWls ZXJAanB1bml4LmNvbT6JAJUCBRAt/2RVgY3YjwgVAsEBAUHsA/9nsN/pT7lMNNqN kBnLYFNCP75R0OIRy6joU2BEbXHComZPVC4n9IHT+PFr9YbdAboqPfn6maE9NPiP WFq2WbqcgX9d2HaMQo4kT6lZDa9cxDt6bju5i5pfzWeHOiGEg44neE4P+xvo8cTy YVPQDnulQsvcNfooBZcg/3/9ZuzrwokAlQIFEC3/ZDH+epJbVANB9QEBckgD/3JC m3ERiOWCKc2ssKCD7i8uEL3EVo+M5TPwpJiczIvsLqv2KpVkdryBNmL/i7tp6LL5 hzcjevAjMVjsBbZ9v7lNceNds8jIJAtMId9TP5onP2rR+t/eeYaEZdXjC7hqTp/L EiDUBIv7VX5GgbUcElfRV8WOUDRb7cz6v44ON7tLiQCVAgUQLdTH6VOTpEThrthv AQGf2wP/WeiMERz5ilZU4FyF+hvK6Yp1ayiqJrEm6kI4qGiZvyBYV+9R2J6sn9Nx XNZuSVqqXpkoiTVorFyudhPRz0v4jm25J/2HK8S/DIOknoQUt84gDLHvUC3NeD2Q 2Gnu7ewUOGmFkvSAzFEy9ZwEFH4rNy+1sSH6PtWu7FuOmi0cpB0= =XgX4 -----END PGP PUBLIC KEY BLOCK----- Desert Anonymous Remailing Service 512-bit key, Key ID 06B2A9, created 1994/04/27 -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.3a mQBNAi2+t1EAAAECALUS6KI7WLBB47y5dDIN+vHAW2XLxu+ELJCNkHLKYxhAr6vY Ku1e9oMry+bHizW8wCt0JPWMlnzZOkhZplIGsqkABRG0O0Rlc2VydCBBbm9ueW1v dXMgUmVtYWlsaW5nIFNlcnZpY2UgPGFub25AZGVzZXJ0LmhhY2t0aWMubmw+iQBV AgUQLb63vZRymF15lPcFAQF88AH/TdqfNlZ2uNH/CpQiy6BneDa0+FJTmBFgy5W+ wcpbsljOFFheH3zz5zA2rkpxIBoy/nd4vQ9kaa6fc1TkVMeBfokAlQIFEC2+t6C+ ZjYIMi0DBQEBT4YD/0NK9fCG8JjE0fS/0SlFshWAGSZxUYREKoQiwo8/ZPEbORHa +a6E8mXOjy7XHVH00S8/1aOO+ji89FFY2aVNqVVDfZI53er9pZAeNSQ1mvD7isor B3IOQ+WeKgXL/IvOEaZro0ZA/FWtry0Ty7RZbPwX4j1TkBTxlRI08e2dG7YI =MfIT -----END PGP PUBLIC KEY BLOCK----- The operation of this system of remailers is a group effort which relies on the contributions of many generous people. Please do not abuse the remailers. If you have problems with a remailer, most of the remailer operators can be contacted by sending mail to the remailer's address without a remailing request header. Otherwise, follow the instructions that come in the messages from the remailer. Do not send complaints to postmaster at the site. Most of the remailers are run by people who are not the site administrators. Sending to postmaster or the site admins will most likely just make them annoyed at you, and won't get your problem resolved. If you can run an anonymous remailer, please volunteer to do so. Software is availiable from anonymous-FTP at soda.berkeley.edu in the directory /pub/cypherpunks/remailer/ Other remailer software is availiable at chaos.bsu.edu in the directory /pub/cypherpunks/remailer/ Additional information and source code can be found at ftp cs.cmu.edu in the directory /afs/andrew.cmu.edu/usr12/mg5n/public/remailer or contact me and I'll send you what you need. The software can often be run on personal accounts; Root or sysadmin access is not required in most cases. There are two usenet forums for discussion of anonymous remailer systems, alt.privacy.anon-server and alt.anonymous The newsgroup alt.anonymous.messages is a 'mail-drop' for anonymous parties to exchange encrypted messages. The cypherpunks mailing list is a forum for discussing ways to promote privacy via cryptography. To join, send mail to cypherpunks-request@toad.com Additional information on the anonymous remailers is availiable from http://www.cs.berkeley.edu/~raph/remailer-list.html gopher://chaos.bsu.edu/ *************************************************************************** end (cut here) here is the MAAS info file on NNTP(usenet) just thought I would include it for refernce, the maas info file can be obatained at ftp.jcu.edu.au cd /pub/MaasInfo . they are great internet info files. begin (cut here) ***************************************************************************** MaasInfo.NNTP = Instructions for accessing NetNews Transfer Protocol servers manually for reading UseNet newsgroups. Version of 1991.Aug.25 Although the information hererin is mostly public domain, this particular organization of the information is Copyright 1991 by Robert Elton Maas, all rights reserved. This file is posted as trivial shareware. If it is worth more than a dollar to you, contact the author to arrange payment by giving the author some other information of comparable value the author wants and/or get the file MaasInfo.SQWA which is a listing of Specific Questions Waiting for Answers which the author has already decided are acceptable for payment of your trivial-shareware "fee". The author can be contacted for the next few weeks at: REM@SUWATSON.BITNET REM@SUWATSON.Stanford.Edu and for a longer time at: Robert Maas, PO Box 6641, Stanford, CA 94309 VoicePhone: 415-969-2958 and possibly also on some public bulletin boards in the San Jose area: 408-249-7916 (RealmOfWonder) ROBERT.MAAS@F212.N143.Z1.FIDONET.ORG 408-245-7726 (DarkSideOfMoon) !apple!uuwest!rem or %% NNTP, ONLINE MANUAL-TELNET ACCESS It is assumed you have an account on an InterNet computer with direct TCP/IP access, and that said computer has a TELNET user program that lets you connect to other TCP/IP hosts, and that said TELNET program allows you to select some port number other than the default TELNET port. NNTP is a protocol described in RFC977 by which a NNTP server program is accessible to a NNTP user program. The server program has an archive of lots of articles from lots of UseNet newsgroups, and the user program wants to obtain copies of some of those articles on behalf of one or more users. But the commands that the user program sends to the server program are in plain ASCII text and are quite simple, while the data sent from the server program to the user program are plain text headers and contents of articles. Consequently it's possible for a user without the services of any program except barebones TELNET to pretend to be a user program and connect to the server program, then to manually issue commands exactly like a user program would have, then to read the text coming back to decide which command to issue next. First you need to know how to use TELNET at your host, and how to select a host and port number. On many systems you simply type TELNET followed by the name (or internet host number) of the host followed by the number of the port. (Omit the port number to get the normal TELNET port; but for NNTP you *must* specify the port number.) If your TELNET program uses a different syntax, you'll have to ask somebody local to your system. Next you need to know the name or internet host number of some host providing NNTP service. At present I know of only one that is available for general InterNet usage: Name: uakari.primate.wisc.edu Host number: 128.104.230.12 I know about two others available to the Stanford community (ask me privately if you are on a Stanford host and want the info). The person who told me about NNTP servers gave me a list of a few other hosts, but most don't currently provide NNTP service, and the rest (listed below) haven't worked for me: --NAME-- --INTERNET HOST NUMBER-- uafvseg.uark.edu 130.184.64.203 - Some kind of networking problem, or the machine is down uwm.edu 129.89.2.1 - Some kind of networking problem, or the machine is down sol.ctr.columbia.edu 128.59.64.40 - Probably a bug somewhere, perhaps on their machine If you find that any of these actually work for you, please let me know so I can change their status from bad to questionable. If you know of any other NNTP servers, or how to get a complete list of them, please send that info to the author. Note that once you've become familar with using NNTP manually as detailed below, presumably with the uakari server, you should try to find a server closer to your location (unless of course you happen to be located in Wisconsin). There is no index of NNTP servers, so you'll have to look at headers of articles you browse and see if the point of origin happens to be close to you. You can then check to see if that host has an NNTP server, and if not you can contact the person who posted the article or the Postmaster at that host to check if either of them know about other UseNet hosts in the vicinity that might provide NNTP service. Next you need to know the port number for NNTP service. It's 119. Thus to connect to NNTP service at uakari.primate.wisc.edu, you say: TELNET uakari.primate.wisc.edu 119 or if your host doesn't know that name, you say: TELNET 128.104.230.12 119 or whatever the corresponding syntax is for the TELNET program you use. Once you get connected, you need to select a newsgroup and then request headers and/or bodies of messages. You may also want to have the server print out a complete list of all newsgroups it knows about, but that is more than 30,000 characters of text so beware! To select a newsgroup, select a position (article number) within that newsgroup, and look at headers and bodies of articles, you issue a one-line command and then wait for the server to send you all the text that results. The command lines always start with a keyword (command name), whereas the replies always start with a numeric code then a text message, then may have additional lines of text ending with a line containing a single period. You may ignore the numeric reply codes unless you want to understand the guts of the protocol or write an automated browser. Below are the most useful commands for browsing UseNet articles: GROUP -- Select a particular newsgroup, print out the Low and High article numbers and an approximate count of articles, and set the pointer to the first article of the group. If you now issue another command (HEAD BODY or ARTICLE) without numeric argument, it uses the first article. -- The very first command you issue may be rejected due to a bug somewhere in the interface. If it says 500 Command unrecognized, try exactly the same command a second time. HEAD -- Move the pointer to the article (in the previously-selected newsgroup) which has that number, and print out just the header. NEXT -- Move the pointer forward to the next more-recent article (in the previously-selected newsgroup). LAST -- Move the pointer backward to the next less-recent article (in the previously-selected newsgroup). (Warning, LAST really means PREVious, so don't get confused; don't blame me, I didn't write the command language.) HEAD -- Without moving the pointer, print the header of the currently-selected article. BODY -- Without moving the pointer, print the body of the currently-selected article. By doing HEAD then alternating NEXT and HEAD, you can browse headers from oldest forward. Alternately by doing HEAD then alternating LAST and HEAD, you can browse headers from newest backward. Either way, when you see an article you want to see the body of, simply say BODY. ARTICLE -- Without moving the pointer, print the whole (header & body) of the currently-selected article. This may be useful if you're downloading a whole set of articles without any prior selection. You alternate LAST and ARTICLE, or NEXT and ARTICLE, to download articles in sequence forward or backward in time. LIST -- List *all* newsgroups the server knows about. As I said before, this generates more than 30,000 characters of output, so beware! You will want to do this only once in a very long while, and collect all the data to a file which you then search locally from time to time. HELP -- Print a list of available commands. Beware, don't use commands like IHAVE or SLAVE that are supposed to be used for NNTP daemon programs relaying articles, or POST that are supposed to be used for user-programs posting new articles, since they are too dangerous to be used manually. When in doubt, consult the RFC977 and avoiding anything that modifies the state of the server in any way other than selecting your newsgroup and article pointer. Probably you won't need any commands except the ones I listed above. Sample session, with comments. (Each line beginning with ;; is a comment.) TELNET 128.104.230.12 119 ;;That was the command to connect to the NNTP server. ;;Next is the junk that is typed out during connection... VM TCP/IP Telnet R1.2.1 Connecting to 128.104.230.12, port 119 Using Line Mode... Notes on using Telnet when in Line Mode: - To hide Password, Hit PF3 or PF15 - To enter Telnet Command, Hit PF4-12, or PF16-24 MORE... SUWATSON 201 uakari.primate.wisc.edu NNTP server version 1.5.3 (18 Sep 88) ready at Wed Jun 12 21:56:34 1991 (no posting). group comp.lang.lisp 500 Command unrecognized. ;;Like I said, some bug causes it to reject the first command. group comp.lang.lisp 211 29 3294 3323 comp.lang.lisp ;;That time it worked. I forget what 211 and 29 mean, but 3294 is the ;; number of the oldest article and 3323 is the number of the newest ;; article. ;;Let's start from the most recent and work backwards in time: head 3323 ;;That was the command, below is the resultant output... 221 3323 <1991Jun13.003122.19863@cs.cmu.edu> Article retrieved; head follows. Path: uakari.primate.wisc.edu!zaphod.mps.ohio-state.edu!cis.ohio-state.edu!sei.c mu.edu!fs7.ece.cmu.edu!o.gp.cs.cmu.edu!ram From: ram+@cs.cmu.edu (Rob MacLachlan) Newsgroups: comp.lang.lisp Subject: Re: isqrt Message-ID: <1991Jun13.003122.19863@cs.cmu.edu> Date: 13 Jun 91 00:31:22 GMT References: <676362388.61@egsgate.FidoNet.Org> Sender: netnews@cs.cmu.edu (USENET News Group Software) Organization: School of Computer Science, Carnegie Mellon Lines: 77 . ;;The period on a line by itself signals that output is done. ;;Now I back up to the previous article (remember the command to go to ;; the PREVious article is LAST, not PREV), and print its header... last 223 3322 <42376@ucbvax.BERKELEY.EDU> Article retrieved; request text separately. head 221 3322 <42376@ucbvax.BERKELEY.EDU> Article retrieved; head follows. Path: uakari.primate.wisc.edu!zaphod.mps.ohio-state.edu!cis.ohio-state.edu!ucbva x!singsing.berkeley.edu!parr From: parr@singsing.berkeley.edu (Ron Parr) Newsgroups: comp.lang.lisp Subject: defsystem Message-ID: <42376@ucbvax.BERKELEY.EDU> Date: 12 Jun 91 21:38:23 GMT Sender: nobody@ucbvax.BERKELEY.EDU Distribution: na Organization: University of California at Berkeley Lines: 12 Originator: parr@singsing.berkeley.edu . ;;All done for this demo, so quit the server... quit 205 uakari.primate.wisc.edu closing connection. Goodbye. Session ended. to return to CMS. Telnet terminated -- Connection closed Ready; T=0.17/0.39 20:06:00 %% NNTP-RELATED, NEWSGROUP POSTING VIA EMAIL How to post from InterNet to UseNet newsgroups: Each newsgroup's name consists of words separated by periods, for example 'comp.lang.lisp'. To post, change each period to a hyphen, for example 'comp-lang-lisp', and mail to that mailbox on 'ucbvax.berkeley.edu'. For example, to post on 'comp.lang.lisp', send email to 'comp-lang-lisp@ucbvax.berkeley.edu'. (The apostrophes are for quoting and are not included in the strings.) %% NNTP, Related topics: MaasInfo.TopIndex -- This "Index of Indexes" tells how to get the index of RFCs and a few specific RFCs, and where you can find at least two indexes of public-access UseNet hosts with NetNews. %% NNTP End. ****************************************************************************** end (cut here) -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- (C)1994 [TWaT] - The Winner ANSi Team!