[4148] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

IQ.ORG Cryptography Server

daemon@ATHENA.MIT.EDU (Julian Assange)
Sat Feb 6 15:09:20 1999

Date: Sun, 7 Feb 1999 06:55:08 +1100 (EST)
From: Julian Assange <proff@iq.org>
To: aucrypto@suburbia.net
Cc: aes@suburbia.net
Cc: cryptography@c2.net
Cc: coderpunks@toad.com
Cc: cypherpunks@algebra.com
Cc: lacc@suburbia.net
Cc: ukcrypto@mailbase.ox.ac.uk


Welcome to the IQ.ORG Cryptography Server (aka Blinded)!

This is a private IRC server. It exists primarily as an encrypted live
communications network for the cryptography community and friends as
represented by the following mailinglists:

	aes@suburbia.net
	aucrypto@suburbia.net
	crypt@sun.soci.niu.edu
	cryptography@c2.net
	coderpunks@toad.com
	cypherpunks@algebra.com
	lacc@suburbia.net
	ssl-users@openssl.org
	ukcrypto@mailbase.ox.ac.uk

Notable channels:

	#crypto

To start up an unencrypted session:

Point your irc client at irc.iq.org port 70. 

To start up an encrypted session:

mybox$ ssh -v -l irc -p 443 -L 6667:crypto.iq.org:70 irc.iq.org &
mybox$ irc myname localhost:6667

The above wrapped up into a shell script:

#!/bin/sh
ssh -v -l irc -p 443 -L 6667:crypto.iq.org:70 irc.iq.org irc &
sleep 15
irc -c '#crypto' $1 localhost:6667

If you add 'GatewayPorts yes' to your '~/.ssh/rc' file then other
hosts on your intranet (e.g windows boxes running mirc) can leverage
off the existing encrypted tunnel to crypto.iq.org, without the
need to run ssh on their own by using mybox:6667 as their irc
server.

Users showing up as connecting in from `crypto.iq.org' are using an
encrypted tunnel. Users from other hosts are not.

Depending on how leaky the individual irc client concerned is,
encrypted connections automatically have complete anonymity (for
the reason mentioned above). As DCC's take place directly between
clients, DCCs will not work between anonymous users.

-Julian <proff@iq.org> [on #crypto]



home help back first fref pref prev next nref lref last post