P2P-Zone  

Go Back   P2P-Zone > Peer to Peer
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Peer to Peer The 3rd millenium technology!

Reply
 
Thread Tools Search this Thread Display Modes
Old 07-06-03, 04:44 AM   #101
Ice
Arggggghhhhhh!!!!!
 
Ice's Avatar
 
Join Date: Mar 2001
Location: Middle Earth
Posts: 2,891
Default

Just had Diego wizzing around in my computer setting this up proper .................and he didn't nick anything either!!!

Thanks Mr D
Ice is offline   Reply With Quote
Old 07-06-03, 05:03 AM   #102
Dawn
R.I.P napho 1-31-16
 
Dawn's Avatar
 
Join Date: Dec 2000
Location: Venus
Posts: 16,723
Default

Isn't this just a glorified chat program?
__________________
I love you napho and I will weep forever..........
Dawn is offline   Reply With Quote
Old 07-06-03, 05:11 AM   #103
Ice
Arggggghhhhhh!!!!!
 
Ice's Avatar
 
Join Date: Mar 2001
Location: Middle Earth
Posts: 2,891
Default

Quote:
Originally posted by Dawn
Isn't this just a glorified chat program?
Depends on what u call glorified...........I have got all sorts of interesting stuff today Dawn
Ice is offline   Reply With Quote
Old 07-06-03, 05:24 AM   #104
Šiego
Alpha Stoner
 
Šiego's Avatar
 
Join Date: Apr 2001
Location: www.naphoria.com
Posts: 5,121
Default

No, it's a private P2P network with chat. It's really nice to get stuff from your m8tes. Good for distributing through a limited community and in a way that your ISP can't see what you are sharing. Browsing the users on the network is as easy as browsing your HDD.

If you need help Dawn I'm more than willing to get you going..


Š


__________________

   There's only one way off so you might as well enjoy the ride..
________________________________________________________

Naphoria - P2P Portal www.naphoria.com/chat

Napsterites mIRC v2 | Napsterites Chat
Šiego is offline   Reply With Quote
Old 07-06-03, 05:28 AM   #105
napho
Dawn's private genie
 
napho's Avatar
 
Join Date: May 2001
Location: the Canadian wasteland
Posts: 4,461
Default

Filesharing AND chat! How come you guys at IRC couldn't have thought of that!
napho is offline   Reply With Quote
Old 07-06-03, 05:33 AM   #106
Šiego
Alpha Stoner
 
Šiego's Avatar
 
Join Date: Apr 2001
Location: www.naphoria.com
Posts: 5,121
Default

We have that's why we have #fserv


Š
__________________

   There's only one way off so you might as well enjoy the ride..
________________________________________________________

Naphoria - P2P Portal www.naphoria.com/chat

Napsterites mIRC v2 | Napsterites Chat
Šiego is offline   Reply With Quote
Old 07-06-03, 05:37 AM   #107
napho
Dawn's private genie
 
napho's Avatar
 
Join Date: May 2001
Location: the Canadian wasteland
Posts: 4,461
Default

Quote:
Originally posted by Šiego
We have that's why we have #fserv


Š

I !get you. I knew this looked vaguely familiar.
napho is offline   Reply With Quote
Old 07-06-03, 09:51 AM   #108
Dovobis
Hey guyz
 
Join Date: Jul 2000
Location: St Louis
Posts: 2,061
Default

It's just more (Dawn)user friendly than IRC
Dovobis is offline   Reply With Quote
Old 07-06-03, 10:16 AM   #109
multi
Thanks for being with arse
 
multi's Avatar
 
Join Date: Jan 2002
Location: The other side of the world
Posts: 10,343
Default

networks only been up for for a few days
but it seems to stay together pretty well..as long as few ppl stay connected to it ...
pretty worthwhile experiment all round ..thanks everyone.....
__________________

i beat the internet
- the end boss is hard
multi is offline   Reply With Quote
Old 07-06-03, 12:20 PM   #110
multi
Thanks for being with arse
 
multi's Avatar
 
Join Date: Jan 2002
Location: The other side of the world
Posts: 10,343
Default justins blog..

not much there yet but maybe worth keeping an eye on..
__________________

i beat the internet
- the end boss is hard
multi is offline   Reply With Quote
Old 07-06-03, 01:40 PM   #111
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,013
Default

well he's being pretty damn coy and grumpy for a guy who all but announced his resignation from one of the world's largest companies...in a blog! lol.

but is he going to support waste or not. c'mon justin, inquiring minds want to know. i have a few suggestions for 1.1.

- js.
JackSpratts is offline   Reply With Quote
Old 07-06-03, 02:05 PM   #112
multi
Thanks for being with arse
 
multi's Avatar
 
Join Date: Jan 2002
Location: The other side of the world
Posts: 10,343
Default

i reckon i would be a bit grumpy too...
they axed his project....


any way i saw this somewhere..an install guide..


Guide to Installing WASTE on Windows:

1. Download the WASTE installer from below.
2. Run the installer. Select whatever directory you choose to install to.
3. When prompted to move the mouse around to generate randomness, move the mouse around until the progress bar is full.
4. The WASTE Profile Setup Wizard should appear. Enter a nickname which you want to be known as on the network.
5. Select your approximate internet connection speed, then hit Next.
6. Click 'Run key generator...' which will allow you to generate a key pair for use with WASTE.
7. Enter a password to encrypt your private key with. This will prevent someone who gains access to your computer from stealing your private key. The password should be good and hard to guess. Then hit Generate.
8. At this time you should move your mouse around in the WASTE Key Generator Window a ton in order to generate lots of randomness. You will know you have done enough when the window says "Generating key pair...". When the generation is complete, WASTE will give you a message box telling you how long it took to generate the key. Hit OK.
9. At this point you should copy your public key to the clipboard using the button labeled "Copy my public key to the clipboard" and then paste it into an email/IM/whatever to give it to the person(s) you wish to connect to.
10. You should also acquire the public key of the person(s) you wish to connect to via some means, and then click the "Import public keys..." button in order to import their keys. Once you import their keys, there should be a message in the setup wizard telling you how many keys are loaded total.
11. Hit Next.
12. (Optionally) select a path to save new files in, and path(s) to allow people access to.
13. Hit Run.
14. WASTE should open with two windows, a main "buddy-list" type window, and a "Network Status" window. Go to the text entry field at the top of the network status box, and type in the host name of the person you wish to connect to. If when you hit enter something appears for a quick flash in the host list, and then disappears, it probably means that you don't have eachothers public keys. To doublecheck what keys you have, hit Ctrl+P to go to the preferences, then go to Ne twork/Public Keys tab.
15. To browse the network, hit Alt+B to open the browser, then click the upper left icon in the browser window to refresh. You can also type in search terms in to the browser address at the top to search.

below



WASTE creates a network of hosts, making whatever connections possible, and typically routes traffic via the path of lowest latency (which effectively ends up as load-balancing, though it is far from ideal).

With at least one host outside of firewalls (or behind a firewall but having one incoming port open), a WASTE network can enable all supported services (including chat and file transfer) between any two hosts.

WASTE uses three main classes of messages: Broadcast messages, routed reply messages, and local management messages.

* Broadcast messages are sent from a host when the host wants to either notify or request information from all hosts on the network.
* Routed reply messages are sent in response to a broadcast message, routed back to the host that initially broadcast the request.
* Local management messages are sent directly between two nodes to negotiate link configuration parameters etc.

The network messaging structure is flexible and there is plenty of room for new message types to enable new services and functionality.

Each link on the network is
secured and authenticated, but messages are not secured point to point, which means a trusted user on the network can theoretically spoof and/or sniff traffic.

SECURITY INFO

WASTE builds a distributed network of hosts, and secures each link in the network. In securing each link, WASTE also authenticates each link using public keys.

WASTE also provides a mechanism for hosts on this network to exchange keys automatically with each other once a host is trusted on the network.

How WASTE Secures Links
WASTE secures the links of the WASTE network by using RSA to exchange session keys and authenticate the other end of the connection. Once the hosts have authenticated each other and both have the correct session keys, the connection is encrypted using Blowfish in PCBC mode (using different IVs for each direction of the connection). The oversimplified process for bringing a link up is (see comments in the code and the code itself for a more in depth view):

* Both sides exchange public key hashes, and verify that they know that hash
* Both sides exchange session keys and challenge-response tokens encrypted with each others public keys.
* Both sides decrypt and verify the challenge-response tokens, and begin encrypted communication (a stream of messages, each message is verified using an MD5).

There's a lot more to it than that, but that's the basic idea. The reality of it is that there is also a "Network ID/Name" feature that allows you to easily keep networks from colliding, as well as efforts to obfuscate the whole process (to make WASTE connections difficult to detect). Another unique feature is the way session keys are exchanged and combined so that in order to decrypt past (recorded) traffic, both private keys of a connection need to be recovered.

Note: It might be worth implementing WASTE using a subset of SSL, to avoid any concern of flaws in this protocol. Feedback is gladly accepted on any potential weaknesses of the negotiation. We have spent a decent amount of time analyzing this, and although we have found a few things that are not ideal (i.e. if you know public keys from a network, you can sniff some traffic and do an offline dictionary attack on the network name/ID), but overall it seems decent. The current implementation probably needs work, too.

Why WASTE requires a trusted group
Since the security in WASTE relies on encrypted links, and messages are not encrypted point to point, a node on the trusted network could easily sniff or spoof messages. So yes, your friends can spy on you. But you were not really worried about them, were you?

How WASTE Prevents Information Leakage
WASTE makes an effort to prevent information leakage. WASTE sends all traffic through the same encrypted link(s), and does not (by default) bring up or drop connections in response to any user actions. WASTE messages are sent completely inside an encrypted channel, so a snooping party would have a VERY difficult time determining what kind of traffic is being sent across a link, or where the traffic originated from, or where the traffic was headed to. And because there may be redundant paths in the network, and traffic is load balanced across those paths, it further complicates things.

In addition, WASTE has an optional saturation feature, in which connections can be saturated to a particular rate (with random data, if necessary), so that a snooping party cannot see how much real data is being moved.

How WASTE Exchanges Keys Between Trusted Hosts
In order for two WASTE hosts to connect to eachother, they need to know eachothers public keys. This can happen two ways. The first way, which is how you would initially connect to a WASTE network, is by manually exchanging public keys. This is clunky, and generally a PITA.

Once a WASTE host is on a WASTE network, however, it can (and is by default) be configured to automatically exchange public keys with other hosts on the network. This happens through the secure links of the network.

The main drawback to this is that it is very difficult to remove a key from the network. Each node on the network that that person could potentially connect to has to remove the key. This may be addressed in a future version.
__________________

i beat the internet
- the end boss is hard

Last edited by multi : 07-06-03 at 02:15 PM.
multi is offline   Reply With Quote
Old 07-06-03, 03:00 PM   #113
Šiego
Alpha Stoner
 
Šiego's Avatar
 
Join Date: Apr 2001
Location: www.naphoria.com
Posts: 5,121
Default

Cool! ta 4 d 411 (info) 


Š
__________________

   There's only one way off so you might as well enjoy the ride..
________________________________________________________

Naphoria - P2P Portal www.naphoria.com/chat

Napsterites mIRC v2 | Napsterites Chat
Šiego is offline   Reply With Quote
Old 07-06-03, 09:36 PM   #114
theknife
my name is Ranking Fullstop
 
theknife's Avatar
 
Join Date: Dec 2001
Location: Promontorium Tremendum
Posts: 4,391
Default

thanks multi...even i understood some of that

in my network status window, i can see all of you guys connected...but there 6 other ip addresses that are trying to connect - where are they coming from?
theknife is offline   Reply With Quote
Old 07-06-03, 10:16 PM   #115
multi
Thanks for being with arse
 
multi's Avatar
 
Join Date: Jan 2002
Location: The other side of the world
Posts: 10,343
Default

i dunno ,i would only be guessing...
they could be others on the network or their firewall ip or router..plus they could be the occasional person joing the network as well...i tried watching..
checking who owned what range...and it seems to be mostly harmless from what i can tell......

i think one of them is ice..because its from NZ...but not sure :)
it could be time for all of us to abandon our keys and makes some new ones..

and see if theres any change..

we have made them very public...:)

this time we could just email or pm them..

only my "multi" nicks key has been posted
-=:multi:=- hasnt been posted any where....
so if any of you who are using a key that they posted maybe generate a new one...sometime

i dont mind it like this...but its defeating the purpose of an encrypted network a little bit..sort of like locking your door when you go out and leaving the key in the lock
__________________

i beat the internet
- the end boss is hard

Last edited by multi : 07-06-03 at 10:27 PM.
multi is offline   Reply With Quote
Old 07-06-03, 11:01 PM   #116
HellBound
99
 
HellBound's Avatar
 
Join Date: Mar 2001
Posts: 1,506
Default

One of those ips would be mine. i have tried to connect a few times today and havent been able to.

I will try again tomorrow.

HellBound
__________________
I am living my life in such a way that when my feet hit the floor in the morning, Satan shudders and says, "Oh Shit, She's Awake!!"
HellBound is offline   Reply With Quote
Old 08-06-03, 02:57 AM   #117
Ice
Arggggghhhhhh!!!!!
 
Ice's Avatar
 
Join Date: Mar 2001
Location: Middle Earth
Posts: 2,891
Default

It was meeeeeeeee multi stuffed it up so much had two keys lol and yes it was you Hellbound. You couldn't get on from what I could see
Oh and this is really going to kill you Multi..... those filters you gave me...............put them in my photo editing plugins folder the program poohed itself hahahahaha I then had to do a system restore to lose them. I also lost waste ( ARRRRGGGGGGGHHHHHHH!!!) and a heap of other stuff.......the upshot being .............here we go again pmsl! hope diego dosen't go on holiday in the next few days ..........I might just need him again.

P.S. I CAN HEAR YOU SNICKERING JACK
Ice is offline   Reply With Quote
Old 08-06-03, 03:45 AM   #118
multi
Thanks for being with arse
 
multi's Avatar
 
Join Date: Jan 2002
Location: The other side of the world
Posts: 10,343
Default

whaat?

couldn't delete the folder from the plugins directory?

a system restore....icky
sorry but i really dont understand
why u had to do that..was it photoimpact that they didnt like maybe...?
anyway i will talk to u about them soon

__________________

i beat the internet
- the end boss is hard
multi is offline   Reply With Quote
Old 08-06-03, 03:57 AM   #119
Ice
Arggggghhhhhh!!!!!
 
Ice's Avatar
 
Join Date: Mar 2001
Location: Middle Earth
Posts: 2,891
Default

Quote:
Originally posted by multi
whaat?

couldn't delete the folder from the plugins directory?

a system restore....icky
sorry but i really dont understand
why u had to do that..was it photoimpact that they didnt like maybe...?
any i will talk to u about them soon

when u get a new key just try login
with one of the known ips
it should send one of us a request to authorise your key
(I have done this once already for u so i know it works.. )

couldn't delete the folder from the plugins directory?

Nope.....lol thats what happens when u dump the whole freaking lot in there in one go............... I'M TOLD MEN NEVER READ INSTRUCTIONS.

NP Multi getting quite good at this by now

Oh I also did a neat little registry trick with my musicmatch jukebox while I was at it

See you guys soon.
Ice is offline   Reply With Quote
Old 08-06-03, 07:08 AM   #120
theknife
my name is Ranking Fullstop
 
theknife's Avatar
 
Join Date: Dec 2001
Location: Promontorium Tremendum
Posts: 4,391
Default

hey multi...enlighten my feeble mind, then:

with regards to security and the posting of keys, i was under the impression that it did not matter if our keys were public, because in order for someone else to get on the network, we would also have to load their key. therefore, some intruder could have everyone's key but as long as no one loaded his key, he would never have access. this is not correct?

of course, i just woke up and if my logic is deeply flawed, feel free to point that out
theknife is offline   Reply With Quote
Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump






All times are GMT -6. The time now is 03:56 AM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
© www.p2p-zone.com - Napsterites - 2000 - 2024 (Contact grm1@iinet.net.au for all admin enquiries)