Copy Link
Add to Bookmark
Report

The Winner ANSI Team 05

eZine's profile picture
Published in 
The Winner ANSI Team
 · 26 Apr 2019

  

Ph1l3 #oo5 [TWaT]

/( )\ /( )\
/ \/ \ / \ / \
\/\ /\/_ _ ______ \ \ /\ / /__ ______ ______ ______ ______
/ \ | \ / \ / \ / > \ \ / ___ \
< > | > \ / \/ | | > | |
\ / | /\ | __ \ \ /\/\ / / \ /\ | /\ |___ \ /
\/ |/ \|/ \/ \/ \/ \ / / \|/ \| \/ | |\ \
A N S i T E A M
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
kRadkRadkrAdkrAdkRadkrAdKRadKraDkRAdkRaDkRADkraDkradKRADKrAdkRaDkRAdkraDKrAd!
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
101 ways to subvert the infrastructre, lesson 1.

Pompus Pilots's Underground Guide to USENET(P.P.U.G.U)
By Pompus Pilot

Alright boys and girls, can you say NNTP? Thats the protcol that USENET runs
on. Its very easy to access usenet through telneting to port 119. I have a
file called Maas-info-nntp. I am going to quote it in this article. BTW if
you see an address labeled as a NNTP server that means its a usenet server,
and you should try to telnet to it at 119, public NNTP servers are hard to
come by and if anyone has one that works and has a.b.p.e please leave
voicemail at. 1800-241-7337 VMB:1371 Guest box:1111. The cool thing about
public NNTP servers is if you have TIN or RN installed all you have to set
NNTPSERVER = NNTP.SERVER.ADDRESS and run RTIN. it works really well


But there are alternatives, such as gopher to usenet servers. A good one is
usage.csd.unsw.oz.au port 4320. All you need to access them is a gopher
client and the ability to telnet. just type gopher usage.csd.unsw.oz.au 4320.
One advantage is with gopher you dont have nasty little .newsrc files telling
which newsgroups you read. and if you combine it with unpost. (just archie
for unpost.tar.Z). With unpost you just s each message out to a file and cat
all the files into a big file and run unpost on it and will sort it out, they
message dont even have to be in order or all together. I dont know how I got
along with out it. IT even has a dos version.

Another cool service involving USENET is anonymous email usenet posting
services. I am going to include a list of them along with instuctions on how
to use them. One cool idea is to funky email(telnet anywhere at port 25 and
fake it) a anonymous usenet poster and put it in non-anoymous mode. you make
it look its coming from the person you want to fuck, then subscribe them to
every huge mailing list you can manage. Some good ideas are the athruian
legand mailing list, any binary mailing lists especially picture mailing
lists and any alt.sex subgroup(especially something really perverse) email
digest mailing list. This will cause the the NET to bomb your target for you
in a way that is almost impossible to be traced. Nothing pisses off a
sysadmin more than someone who fills up there harddrive so full of smut that
it crashes the system. It makes the person look bad and causes them serious
problems, espeically if they get there internet email through a bbs/internet
email gateway like the fidonet gateway, then every sysop along the chain from
the gateway to the local bbs will be pissed. If it happens enough the local
email node will be taken out of the mail network. It is a seroius attack on
someone. Also you can funky email in their name on mist.test or alt.test with
the subject test and in the body request everyone email who reads it reply,
Alot of people will fall for it. Use the NET against it self, twist the
infrastructure back onto its self. Whether or not you can make the system
do your bidding, instead of nibbling at its heels snatching bits of access
and time slices, is the true test of real "hacker" (I hate to use this
overusered and misunderstand typecast but I like to think in indealized terms). Its like using a chrome box so
you can go through any red light. oh well start the aformentioned files.

HERE is the email to usnet posting services they have anonymous and
nonanoymous posting cabiilty.
begin now. (cut here)
********************************************************************
This message is being sent to you automatically in response to the
message you sent to usura@xs4all.nl with subject "remailer-help".

I have an automated mail handling program installed on my account
usura@xs4all.nl which will take any message with the proper headers
and automatically re-send it anonymously. You can use this by
sending a message to usura@xs4all.nl, with the header Anon-To:
<address>, the address that you want to send anonymously to. If you
can't add headers to your mail, you can place two colons on the
first line of your message, and then the Anon-To line. Follow that
with a blank line, and then begin your message. For Example:

> From: joe@site.com
> To: usura@xs4all.nl
> Subject: Anonymous Mail
>
> ::
> Anon-To: beth@univ.edu
>
> This is some anonymous mail.

The above would be delivered to beth@univ.edu anonymously. All
headers in the original message are removed, with the exception of
the Subject (and Content-Type, if present). She would not know that
it came from Joe, nor would she be able to reply to the message.
However, there are a few ways that the true identity of the sender
could be found. First, if many anonymous messages were sent,
someone could compare the times that the messages were sent with the
times that 'joe' was logged in. However, this can be prevented by
instructing the remailer to delay the message, by using the
Latent-Time header:

> From: joe@site.com
> To: usura@xs4all.nl
> Subject: Anonymous Mail
>
> ::
> Anon-To: beth@univ.edu
> Latent-Time: +1:00
>
> This is some anonymous mail.

The message would be delayed one hour from when it is sent. It is
also possible to create a random delay by adding an r to the time
(ie +1:00r), which would have the message be delivered at a random
time, but not more than an hour. It is also possible to delay the
message until a specific time. For example, "Latent-Time: 18:00"
would delay the message until 6 PM, Central European Time. Times
must be in 24-hour format.

Another problem is that some mailers automatically insert a
signature file. Of course, this usually contains the senders email
address, and so would reveal their identity. The remailer software
can be instructed to remove a signature file with the header
"Cutmarks:". Any line beginning with the same text at in the
cutmarks header, and any lines following it will be removed.

> From: sender@origin.com
> To: usura@xs4all.nl
> Subject: Anonymous Mail
>
> ::
> Anon-To: recipient@destination.com
> Cutmarks: --
>
> This line of text will be in the anonymous message.
> --
> This line of text will not be in the anonymous message.

This Cutmark feature can also be used to post a delivery notice
to a specified newsgroup. {ie. alt.anonymous.messages}]

> From: sender@origin.com
> To: usura@xs4all.nl
> Subject: MSG-id 1994.11.31
>
> ::
> Anon-Post-To: alt.anonymous.messages
> Cutmarks: *
>
> Message <1994.11.31> succesfully remailed
> *
> ::
> Anon-To: receiver@destination.com
> Cutmarks: --
>
> ##
> Subject: Anonymous Mail
>
> Hi This is some anonymous mail
> This is in
> --
> This is out

If the first message shows up at misc.test you know that the message to
receiver@destination.com succesfully was remailed.

For added security, you can encrypt your messages to the remailer
with PGP. The remailer software will decrypt the message and send
it on. Here is the remailer's public key:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3

mQCNAi4wTh8AAAEEAMb9gl6NlZHy4FdjADel4d+C+Th7+inTOV4mEsKk+N/QfJAj
BN6YPnJ9bm+Ch19FrR1KeTwrpluP6J+GdJrMkVSosvIqBPpSRgOs7nvMhnn3Tnrn
uUFZVDYslQ1wRZvFbTpCEW8TzgVhGy6HMznxEC4ttnOq8pFRFUpL3asf+toVAAUR
tC5HbG9iYWwgUmVtYWlsIFNlcnZpY2VzIEx0ZC4gPHVzdXJhQGhhY2t0aWMubmw+
=+iYx
-----END PGP PUBLIC KEY BLOCK-----

To utilize this feature, create a message with two colons on the
first line, then the Anon-To line, then any other headers, such as
cutmarks or latency, then a blank line, and then the message.
Encrypt this with the remailer's public key. Then send it to the
remailer, adding the header "Encrypted: PGP". If you forget this,
the remailer won't know that it needs to be decrypted.

> To: usura@xs4all.nl
> From: me@mysite.org
>
> ::
> Encrypted: PGP
>
> -----BEGIN PGP MESSAGE-----
> Version: 2.3a
>
> hIkCuMeAjnwmCTUBA+dfWcFk/fLRpm4ZM7A23iONxkOGDL6D0FyRi/r0P8+pH2gf
> HAi4+1BHUhXDCW2LfLfay5JwHBNMtcdbgXiQVXIm0cHM0zgf9hBroIM9W+B2Z07i
> 6UN3BDhiTSJBCTZUGQ7DrkltbgoyRhNTgrzQRR8FSQQXSo/cf4po0vCezKYAAABP
> smG6rgPhdtWlynKSZR6Gd2W3S/5pa+Qd+OD2nN1TWepINgjXVHrCt0kLOY6nVFNQ
> U7lPLDihXw/+PPJclxwvUeCSygmP+peB1lPrhSiAVA==
> =da+F
> -----END PGP MESSAGE-----

Any unencrypted text after the PGP message is also remailed. This
is to allow sending to someone who is anonymous. If you create a
PGP-encrypted message to yourself via my remailer, and then you give
it to someone, they can send you a message by sending the encrypted
message to the remailer. The remailer will then decrypt it and send
it to you. The message gets anonymized in the process, so the
sender will need to include a return address if he wants a reply.

You can use this remailer to anonymous post a message, the syntax
for that is:

> To: usura@xs4all.nl
> Subject: ignore
>
> ::
> Anon-Post-To: misc.test
>
> Test of anon message posting

You must specify a Subject, if no subject is specified the newsserver
will reject the posting. Please donnot use the "Subject: test" if testing
to a test group [ie. misc.test] but use "Subject: ignore blabla" instead.
That will prevent my mailbox from being swamped with test replies, those
are send automaticly to -any- test posting with test in its Subject-line.

For non-anonymised postings the syntax is:

> To: usura@xs4all.nl
> Subject: ignore
>
> ::
> Post-To: misc.test
>
> Test

The remailer "understands" the following commands:
anonymous remailing : {Anon-To: ,Anon-Send-To: ,Request-Remailing-To: }
non-anon remailing : {Send-To: }
anonymous posting : {Anon-Post-To: }
anon-anon posting : {Post-To: }
discard part of mail: {Cutmarks: }
time fideling : {Latent-Time: }
PGP encryption : {Encrypted: PGP}
Header Pasting : {##}, {below that you add your header info}

You can get a list of statistics on remailer usage by sending mail
to usura@xs4all.nl with "Subject: remailer-stats"

A ping-list of anonymous remailers is available by fingering
<remailer-list@kiwi.cs.berkeley.edu>.

A list of remailers and their instructions is available by fingering
<remailer-list@chaos.bsu.edu>.

This remailer is not endorsed in any way by XS4all Netwerk. I,
Alex de Joode, take no responsibility for the content of posts or
messages, and I take no responsibility for the consequences of using
my remailer. For example, if you post anonymously, and someone
manages to trace it back to you, I am not responsible. Also, I have
no way of screening mail that goes through this remailer, so I am in
no way responsible for the content of posts or mail going through.
Also, note that this remailer is experimental. Its mode of
operation is subject to change without notice. Users are advised to
check these instructions and to do test messages often.

If someone is doing something inapropriate with this remailer,
please send mail to the remailer operator, as soon as possible. The
problem can only be solved if the operator is aware of it.

If you don't want to receive anonymous mail, send me a message, and I
will add your email address to the block list.

------
This mail was sent automatically.
***********************************************************************
end (cut here)

here is another file on anonymous remailers and has a complete list as well
as glabal instruction for all of them, it also includes how to chain emailers to
increase your anoyminty.

start of file (cut here)
**************************************************************************

[kiwi.cs.berkeley.edu]
Login name: remailer-list In real life: Remailer list
Directory: /private/remailer-list Shell: /usr/sww/bin/tcsh
Last login Sun Sep 18 08:50 on ttyp4 from annex-64-8.Berkee
Plan:
$remailer{"chaos"} = "<remailer@chaos.bsu.edu> cpunk hash ksub";
$remailer{"vox"} = "<remail@vox.xs4all.nl> cpunk oldpgp. post";
$remailer{"avox"} = "<anon@vox.hacktic.nl> cpunk oldpgp post";
$remailer{"extropia"} = "<remail@extropia.wimsey.com> cpunk pgp special";
$remailer{"portal"} = "<hfinney@shell.portal.com> cpunk pgp hash";
$remailer{"alumni"} = "<hal@alumni.caltech.edu> cpunk pgp hash";
$remailer{"bsu-cs"} = "<nowhere@bsu-cs.bsu.edu> cpunk hash ksub";
$remailer{"rebma"} = "<remailer@rebma.mn.org> cpunk pgp hash";
$remailer{"jpunix"} = "<remailer@jpunix.com> cpunk pgp hash latent cut post";
$remailer{"wien"} = "<remailer@ds1.wu-wien.ac.at> cpunk pgp hash nsub";
$remailer{"c2"} = "<remail@c2.org> eric pgp hash";
$remailer{"soda"} = "<remailer@csua.berkeley.edu> eric pgp. post";
$remailer{"penet"} = "<anon@anon.penet.fi> penet post";
$remailer{"ideath"} = "<remailer@ideath.goldenbear.com> cpunk hash ksub";
$remailer{"usura"} = "<usura@xs4all.nl> cpunk pgp. hash latent cut post";
$remailer{"leri"} = "<remail@leri.edu> cpunk pgp hash";
$remailer{"desert"} = "<remail@desert.xs4all.nl> cpunk pgp.";
$remailer{"underdog"} = "<lmccarth@ducie.cs.umass.edu> cpunk hash latent cut post";
catalyst@netcom.com is _not_ a remailer.

Last ping: Sun 18 Sep 94 16:00:01 PDT
remailer email address history latency uptime
-----------------------------------------------------------------------
wien remailer@ds1.wu-wien.ac.at ****-+**++** 9:31 99.99%
bsu-cs nowhere@bsu-cs.bsu.edu ****++*****+ 6:29 99.99%
c2 remail@c2.org *+****-**+*- 1:10:46 99.99%
ideath remailer@ideath.goldenbear.com *+****++*-.+ 2:54:37 99.99%
chaos remailer@chaos.bsu.edu ********#**# 1:49 99.99%
leri remail@leri.edu ******-**+*- 1:03:44 99.99%
alumni hal@alumni.caltech.edu *-********** 14:23 99.90%
soda remailer@csua.berkeley.edu ++++++++... 5:22:32 99.97%
portal hfinney@shell.portal.com *-********** 14:30 99.85%
extropia remail@extropia.wimsey.com -++-- -+++++ 1:23:13 99.69%
rebma remailer@rebma.mn.org ---*-----+- 6:19:39 99.77%
vox remail@vox.xs4all.nl .---.. --.- 11:04:20 99.50%
underdog lmccarth@ducie.cs.umass.edu **** 3:31 99.53%
penet anon@anon.penet.fi ************ 2:18:00 98.76%
jpunix remailer@jpunix.com **** *-** #* 8:03 98.70%
desert remail@desert.xs4all.nl ..--.- ---- 25:55:50 81.03%
usura usura@xs4all.nl ****** **+ 9:24 76.18%

Suggested path: c2;bsu-cs;wien
For more info: http://www.cs.berkeley.edu/~raph/remailer-list.html
[chaos.bsu.edu]
finger: remail-list: no such user.

Are you having trouble finding someone on chaos.bsu.edu? Try fingering
help@chaos.bsu.edu for a list of accounts that may be of use to you.

[chaos.bsu.edu]
For the following information, finger <username>@chaos.bsu.edu where <username>
is the name listed below.

Username Description
============== ===============================================================
academy Information on using the Indiana Academy Alumni account
anon Information on using the anonymous contact service
fortune Random fortunes
fortune.dirty Random obscene fortunes
guest Information on getting an account on chaos
info Some information about chaos
mailserv Information on using mail servers (mailing lists)
mailserv.list A list of active mail servers
ping A quick reply so you know chaos is up and running
remailer Information on using the Cypherpunks anonymous remailer
services A list of services provided to the Internet

[chaos.bsu.edu]
Login: remailer Name: Remailer Pseudo-User
Directory: /pseudo/remailer Shell: /bin/tcsh
Never logged in.
No Mail.
Plan:

** If you have any problems or complaints with regard to this anonymous **
** remailer please direct them to <remailer-admin@chaos.bsu.edu>. **

For instructions on using the BSU remailers:

finger remailer.help@chaos.bsu.edu

For instructions on using all Cypherpunks remailers:

finger remailer.help.all@chaos.bsu.edu

For a list of Cypherpunks remailers:

finger remailer.list@chaos.bsu.edu

To see the policy for the BSU remailers:

finger remailer.policy@chaos.bsu.edu

To get the Unix C source code to the BSU remailers:

FTP the file chaos.bsu.edu:/pub/development/remailer-current.tar.gz
unknown host: choas.bsu.edu
[chaos.bsu.edu]

Please report any inaccuracies in this information
to Matthew Ghio <ghio@andrew.cmu.edu>

Last Updated: September 16 1994

The Cypherpunks' remailers allow you to send anonymous mail by adding the
header Request-Remailing-To: and sending to one of the addresses listed below.
Most (but not all) of these remailers also accept Anon-To: in place of
Request-Remailing-To. These headers must be typed exactly as you see them;
most remailers are case-sensitive. Mail without these headers is either
rejected or delivered to the remailer administrators. The standard
cypherpunks anonymous remailers are:

usura@hacktic.nl
hfinney@shell.portal.com
hal@alumni.caltech.edu
nowhere@bsu-cs.bsu.edu
remailer@chaos.bsu.edu
remailer@ds1.wu-wien.ac.at
remail@c2.org
remailer@ideath.goldenbear.com
remail@leri.edu
remailer@rebma.mn.org
remail@vox.hacktic.nl
remailer@desert.xs4all.nl
lmccarth@ducie.cs.umass.edu

If you can not add the required headers, place two colons (::) on the very
first line of your message, then on the next line type Request-Remailing-To:
and the address you want to send anonymously to. Skip a line, and then
begin your message. Note that by using this method it is possible to send
a message consecutively thru more than one remailer.
Be sure to place the double colons on the first line of the message, and
skip one line following the headers. Extra blank spaces (or forgetting to
seperate the headers and message) may cause problems.

Keep in mind that many remailers only allow one recipient per message.

You can add additional headers to your message by placing two number signs (##)
at the beginning of the first line of the message body, and then add the
special headers on subsequent lines. The bsu remailers require that you
place the Subject: header in the body of the message, after the ##. The
original subject line is removed. (remail@vox.hacktic.nl does not support
this feature.)

remailer@soda.csua.berkeley.edu works slightly differently. It includes
an encrypted reply block so that people can reply to your messages. It
also requires that you use the header Anon-Send-To: to send anonymously,
and features a usenet posting service. For more information on this
remailer, finger remailer@soda.csua.berkeley.edu, or send mail to that
address with the Subject: remailer-info

remail@extropia.wimsey.com requires that you public-key encrypt your
messages with PGP. This added security prevents a hacker or nosey
sysadmin at your site from reading your outgoing mail or finding out where
it's going. This remailer is not directly connected to the internet,
so messages will be delayed about an hour.
Some of the other remailers support PGP as well.
For remailers which support both encryption and plaintext messages, identify
encrypted messages by adding a header which reads: Encrypted: PGP
Encryption keys can be found below.

The remailers at usura@hacktic.nl and lmccarth@ducie.cs.umass.edu
offer several additional features. Adding the header "Cutmarks:" will
truncate the message starting with any line that begins with the same
characters as in the Cutmarks header. This can be used to remove an
automatically-inserted signature file. Also supported is the header
"Latent-Time:". This allows a message to be delayed at the remailer
and sent out at a later time. This is useful because it prevents
people from correlating the times at which certain anonymous posts
appear with the times that you are logged in. Both absolute and
relative delays are possible. For example, "Latent-Time: 19:00"
would have the remailer hold the message until 7 PM local time and
then deliver it. Times must be in 24-hour format.
"Latent-Time: +06:30" would deliver the message six hours and thirty
minutes after it is received. The maximum permissible delay is 24
hours. These lines may be placed either in the message headers,
or following the double colon. For more information, send mail
to lmccarth@ducie.cs.umass.edu or usura@hacktic.nl, Subject: remailer-help

There is a pseudonym-based anonymous remailer at anon.penet.fi. For
information on this remailer, send mail to: help@anon.penet.fi

There is another anonymous contact service at chop.ucsd.edu.
For information on this remailer, send mail to: acs-info@chop.ucsd.edu

vox.hacktic.nl also has a anonymous account service. For more information,
send mail to remail@vox.hacktic.nl with subject "help".

Anonymous postings to usenet can be made by sending anonymous mail to one of
the following mail-to-usenet gateways:

group.name@demon.co.uk
group.name@news.demon.co.uk
group.name@bull.com
group.name@cass.ma02.bull.com
group.name@undergrad.math.uwaterloo.ca
group.name@charm.magnus.acs.ohio-state.edu
group.name@comlab.ox.ac.uk
group.name@nic.funet.fi
group.name@cs.dal.ca
group.name@ug.cs.dal.ca
group.name@paris.ics.uci.edu (removes headers)
group.name.usenet@decwrl.dec.com (Preserves all headers)

These were all verified as of August 1, but let me know if you have
problems with any of the usenet gates listed above. Also tell me if
you know of any more of these.
The mail-to-news gateways do not anonymize messages; you must use a
remailer if you want the message to be posted anonymously.
It would also be advisable to try a post to alt.test before relying on any
such system to function as expected. Also note the special syntax required
at dec.com

In addition, you can cross-post to several newsgroups by adding the header
Newsgroups: with the names of the groups you want to post to and sending it to
mail2news@demon.co.uk (Use the ## feature with the remailers to add the
header line)

Examples:

Simple Remailing:
> From: joe@site.com
> To: remail@c2.org
> Subject: Anonymous Mail
>
> ::
> Anon-To: beth@univ.edu
>
> This is some anonymous mail.

Chaining remailers:
> From: sender@origin.com
> To: remailer@rebma.mn.org
>
> ::
> Request-Remailing-To: remailer@ds1.wu-wien.ac.at
>
> ::
> Request-Remailing-To: receipient@destination.com
>
> This is an anonymous message

Adding extra headers to the output message:
> From: suzie@euronet.co.uk
> To: remailer@chaos.bsu.edu
>
> ::
> Request-Remailing-To: mail2news@demon.co.uk
>
> ##
> Subject: Ignore this test
> Newsgroups: alt.test
> Comments: This is only a test
>
> This message will be posted to alt.test!

Cutmarks and delay:
> From: sam@eric.com
> To: remailer@jpunix.com
> Subject: ignore
>
> ::
> Anon-To: alt.test@nic.funet.fi
> Latent-Time: +15:30
> Cutmarks: --
>
> This is an anonymous test.
> Note that it does not have my .sig appended to it!
>
> --
> sam@eric.com - 310-853-1212 - This is my .sig - Finger for PGP key!

The following are PGP public keys of the remailers which support encryption:

<remail@extropia.wimsey.com>
1024-bit key, Key ID B5A32F, created 1992/12/13
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3
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=I7QE
-----END PGP PUBLIC KEY BLOCK-----

Anonymous Remailer <hfinney@shell.portal.com>
510-bit key, Key ID 5620D5, created 1992/11/15
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3
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==
=arSc
-----END PGP PUBLIC KEY BLOCK-----

Remailing Service <hal@alumni.caltech.edu>
510/0BB437 1992/11/12
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3a

mQBNAisCtU0AAAEB/jNOYzN1B2YzOxlK/Zb6axoOaGlPq5I7DV9GH3hcGRN5N6Fi
T4sRLhi53Sc5rUdYDa8mFQd4tqvFG6rHcT8LtDcABRG0KlJlbWFpbGluZyBTZXJ2
aWNlIDxoYWxAYWx1bW5pLmNhbHRlY2guZWR1PokAlQIFECsGk/aoEwOvWCFMNwEB
24gEAJlpxL88gdKUxdgXCTCeFZ45bTbyiS0Mfy86iGthyuLRYjAEjJB5yerRaKDi
JNOgCTvnO+I9YyFdXnPEpvBjqVfpqHF2WCc4f7BgzBbOKg79EyiOp2/eYIQT1Fkk
cvisjRGlmHncfGgoq+OhVUw81imeSUPbv8vZyqskUU7djZKb
=4W6s
-----END PGP PUBLIC KEY BLOCK-----

Remailer (remailer@rebma.mn.org)
1024/BA80A9 1992/11/26
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3a

mQCNAisUI2QAAAEEAKgm07Hsje5KpmXYd5azk0R6AES+qK7LcofnVGojUs7GBghD
WbwrmW8oOEOhRorlShRALKeYspV4xYIw4WDkJcJxuf1B254scz1urF/Eem3zPW9b
yPAx7W/cGwvs6SouZvFcSDq4v1zApvGE9hP4szPzHeGmVr0NVNeaDK0guoCpAAUR
tCBSZW1haWxlciAocmVtYWlsZXJAcmVibWEubW4ub3JnKQ==
=/qHx
-----END PGP PUBLIC KEY BLOCK-----

Tommy the Tourist <remailer@soda.berkeley.edu>
512/5E6875 1994/04/25
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3a

mQBNAi27mNAAAAECAONCUi/9jdl0SXGhOhT4Vvgl9uOYLgbOjU5kMXEkpFQriCYC
hWfNuhH8zESs9DFTMHCXUsXYrkkm/bHdhGheaHUABRO0LlRvbW15IHRoZSBUb3Vy
aXN0IDxyZW1haWxlckBzb2RhLmJlcmtlbGV5LmVkdT4=
=aoJM
-----END PGP PUBLIC KEY BLOCK-----

vox.hacktic.nl
512/368B41 1994/04/29
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3a
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=RRIj
-----END PGP PUBLIC KEY BLOCK-----

1024/4BB86375 1994/06/03 remailer@ds1.wu-wien.ac.at
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.5

mQCNAi3u8pcAAAEEAKqUa4Ihy5KH8Q4Z5DOBRc/n/5RJUiMhbOqxRMmRq+0ycEqi
ogceTx4hksKuFa2iQe2Cre9VhB/Tq2Xf1/dSknGls10DkrpVTRoCPlJAJND6iAEA
iLZapFvwiQzQ/JVIunEjLf63UdBLGUTHqj4z7MGR++bGwn9SOX/Oy25LuGN1AAUR
tBpyZW1haWxlckBkczEud3Utd2llbi5hYy5hdIkAlQIFEC3u8/RYsqLFExS2VQEB
R9EEAIVRwgpI/CpCgptao0tVfd7xDVvFrxBnW4724caoZ3tyCEXLgbJnR250yZYZ
NKJzfsPcTzILUZ3WKAlsfdPdEaJZHsyRvBDxjdvUjLokQBqd/WyklZ4MibYu6Cod
z+PnKG0zVwA/gR+vQ4/xXw9T1oSf6YVW25bP3kkCOxR8mpHo
=Vriv
-----END PGP PUBLIC KEY BLOCK-----

1024/FD5A2D 1994/06/16 The NEXUS-Berkeley Remailer <remail@c2.org>
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3a

mQCNAi3/6FIAAAEEANggWtLprhvPDAdv503F5vChmF5jadD16dBke2yuP5iJwt0i
X0eJC7dFoimNp03Cm7pkn5SkGr3i3hjtKLQGtneKNfdp29ELisOc9wMLiBMP46q3
Sr/9RseAt5Nnt4fW2Efi6xO8QLiMVG837gd5pEpXOqJ2FMCikEMvwOz0/VotAAUR
tCtUaGUgTkVYVVMtQmVya2VsZXkgUmVtYWlsZXIgPHJlbWFpbEBjMi5vcmc+iQCV
AgUQLf/owHi7eNFdXppdAQEctAP/aK+rTQxs5J8ev1ZtnYpGZPIEezQeC8z8kRdN
jUKF7CutVLy09izYDSdonuHFyWoHtLb1RUj5fGUFhOzwmJTMlTRzEx8i2a1bKdmQ
qPGNu2iVKIitkSSVZvz7vHXM+ZUFTSC4LGWsECukEONEeyGy+ehG3ON0vx1ATqY5
/ATzPpo=
=N0yt
-----END PGP PUBLIC KEY BLOCK-----

Global Remail Services Ltd. <usura@hacktic.nl>
1024-bit key, Key ID 1FFADA15, created 1994/07/22
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3

mQCNAi4wTh8AAAEEAMb9gl6NlZHy4FdjADel4d+C+Th7+inTOV4mEsKk+N/QfJAj
BN6YPnJ9bm+Ch19FrR1KeTwrpluP6J+GdJrMkVSosvIqBPpSRgOs7nvMhnn3Tnrn
uUFZVDYslQ1wRZvFbTpCEW8TzgVhGy6HMznxEC4ttnOq8pFRFUpL3asf+toVAAUR
tC5HbG9iYWwgUmVtYWlsIFNlcnZpY2VzIEx0ZC4gPHVzdXJhQGhhY2t0aWMubmw+
=+iYx
-----END PGP PUBLIC KEY BLOCK-----

the LERI Remailer <remail@leri.edu>
1024/E8BA9AC9 1994/08/15
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6

mQCNAi5PKIUAAAEEALGSqJdXCiE2p0xq3V5pyVFx2q5m8TLas6PDNex8nKGc7Z15
GAD1KFGbIBz77BTDLY7fZkxOf0CWjlO8sQw4ofZeJosx4gfOPWsQL3Cf2PkEY2fV
hO1rprZbLt2x3xsQPttEr5UsRw5tQJbQJnc1XBUQx3Wx++0EdPZ88ybouprJAAUR
tCN0aGUgTEVSSSBSZW1haWxlciA8cmVtYWlsQGxlcmkuZWR1Pg==
=UWc7
-----END PGP PUBLIC KEY BLOCK-----

JPUNIX.COM Anonymous Remailing Service <remailer@jpunix.com>
1024/0341F5 1994/05/04
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6

mQCNAi3HrmsAAAEEAKh/CmiLDyLau6IefmNWrip7qEbOYs17KR+nIrUkFARz0syf
mW9otNKGutKRvylMIN6AaTXwF4k/g73K15iOg9aeaOHVugt3U8T68PdVti1oCe1j
rM1UJncTG+SZ+HBZgPNUWCkT4n3aqMhT668W6ihbvFzzmXc4h/56kltUA0H1AAUR
tDxKUFVOSVguQ09NIEFub255bW91cyBSZW1haWxpbmcgU2VydmljZSA8cmVtYWls
ZXJAanB1bml4LmNvbT6JAJUCBRAt/2RVgY3YjwgVAsEBAUHsA/9nsN/pT7lMNNqN
kBnLYFNCP75R0OIRy6joU2BEbXHComZPVC4n9IHT+PFr9YbdAboqPfn6maE9NPiP
WFq2WbqcgX9d2HaMQo4kT6lZDa9cxDt6bju5i5pfzWeHOiGEg44neE4P+xvo8cTy
YVPQDnulQsvcNfooBZcg/3/9ZuzrwokAlQIFEC3/ZDH+epJbVANB9QEBckgD/3JC
m3ERiOWCKc2ssKCD7i8uEL3EVo+M5TPwpJiczIvsLqv2KpVkdryBNmL/i7tp6LL5
hzcjevAjMVjsBbZ9v7lNceNds8jIJAtMId9TP5onP2rR+t/eeYaEZdXjC7hqTp/L
EiDUBIv7VX5GgbUcElfRV8WOUDRb7cz6v44ON7tLiQCVAgUQLdTH6VOTpEThrthv
AQGf2wP/WeiMERz5ilZU4FyF+hvK6Yp1ayiqJrEm6kI4qGiZvyBYV+9R2J6sn9Nx
XNZuSVqqXpkoiTVorFyudhPRz0v4jm25J/2HK8S/DIOknoQUt84gDLHvUC3NeD2Q
2Gnu7ewUOGmFkvSAzFEy9ZwEFH4rNy+1sSH6PtWu7FuOmi0cpB0=
=XgX4
-----END PGP PUBLIC KEY BLOCK-----

Desert Anonymous Remailing Service <anon@desert.hacktic.nl>
512-bit key, Key ID 06B2A9, created 1994/04/27
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3a

mQBNAi2+t1EAAAECALUS6KI7WLBB47y5dDIN+vHAW2XLxu+ELJCNkHLKYxhAr6vY
Ku1e9oMry+bHizW8wCt0JPWMlnzZOkhZplIGsqkABRG0O0Rlc2VydCBBbm9ueW1v
dXMgUmVtYWlsaW5nIFNlcnZpY2UgPGFub25AZGVzZXJ0LmhhY2t0aWMubmw+iQBV
AgUQLb63vZRymF15lPcFAQF88AH/TdqfNlZ2uNH/CpQiy6BneDa0+FJTmBFgy5W+
wcpbsljOFFheH3zz5zA2rkpxIBoy/nd4vQ9kaa6fc1TkVMeBfokAlQIFEC2+t6C+
ZjYIMi0DBQEBT4YD/0NK9fCG8JjE0fS/0SlFshWAGSZxUYREKoQiwo8/ZPEbORHa
+a6E8mXOjy7XHVH00S8/1aOO+ji89FFY2aVNqVVDfZI53er9pZAeNSQ1mvD7isor
B3IOQ+WeKgXL/IvOEaZro0ZA/FWtry0Ty7RZbPwX4j1TkBTxlRI08e2dG7YI
=MfIT
-----END PGP PUBLIC KEY BLOCK-----


The operation of this system of remailers is a group effort which relies on
the contributions of many generous people. Please do not abuse the remailers.
If you have problems with a remailer, most of the remailer operators can be
contacted by sending mail to the remailer's address without a remailing
request header. Otherwise, follow the instructions that come in the messages
from the remailer. Do not send complaints to postmaster at the site.
Most of the remailers are run by people who are not the site administrators.
Sending to postmaster or the site admins will most likely just make them
annoyed at you, and won't get your problem resolved.

If you can run an anonymous remailer, please volunteer to do so.
Software is availiable from anonymous-FTP at
soda.berkeley.edu in the directory /pub/cypherpunks/remailer/
Other remailer software is availiable at chaos.bsu.edu
in the directory /pub/cypherpunks/remailer/
Additional information and source code can be found at ftp cs.cmu.edu
in the directory /afs/andrew.cmu.edu/usr12/mg5n/public/remailer
or contact me and I'll send you what you need.
The software can often be run on personal accounts;
Root or sysadmin access is not required in most cases.

There are two usenet forums for discussion of anonymous remailer systems,
alt.privacy.anon-server and alt.anonymous
The newsgroup alt.anonymous.messages is a 'mail-drop' for anonymous parties
to exchange encrypted messages.

The cypherpunks mailing list is a forum for discussing ways to promote
privacy via cryptography. To join, send mail to cypherpunks-request@toad.com

Additional information on the anonymous remailers is availiable from
http://www.cs.berkeley.edu/~raph/remailer-list.html
gopher://chaos.bsu.edu/

***************************************************************************
end (cut here)

here is the MAAS info file on NNTP(usenet) just thought I would include it for
refernce, the maas info file can be obatained at ftp.jcu.edu.au cd /pub/MaasInfo
. they are great internet info files.

begin (cut here)
*****************************************************************************
MaasInfo.NNTP = Instructions for accessing NetNews Transfer Protocol
servers manually for reading UseNet newsgroups. Version of 1991.Aug.25

Although the information hererin is mostly public domain, this particular
organization of the information is Copyright 1991 by Robert Elton Maas,
all rights reserved. This file is posted as trivial shareware. If it is
worth more than a dollar to you, contact the author to arrange payment by
giving the author some other information of comparable value the author
wants and/or get the file MaasInfo.SQWA which is a listing of Specific
Questions Waiting for Answers which the author has already decided
are acceptable for payment of your trivial-shareware "fee".

The author can be contacted for the next few weeks at:
REM@SUWATSON.BITNET
REM@SUWATSON.Stanford.Edu
and for a longer time at:
Robert Maas, PO Box 6641, Stanford, CA 94309
VoicePhone: 415-969-2958
and possibly also on some public bulletin boards in the San Jose area:
408-249-7916 (RealmOfWonder) ROBERT.MAAS@F212.N143.Z1.FIDONET.ORG
408-245-7726 (DarkSideOfMoon) !apple!uuwest!rem or <rem@darkside.com>


%% NNTP, ONLINE MANUAL-TELNET ACCESS

It is assumed you have an account on an InterNet computer with direct
TCP/IP access, and that said computer has a TELNET user program that lets
you connect to other TCP/IP hosts, and that said TELNET program allows
you to select some port number other than the default TELNET port.

NNTP is a protocol described in RFC977 by which a NNTP server program is
accessible to a NNTP user program. The server program has an archive of
lots of articles from lots of UseNet newsgroups, and the user program
wants to obtain copies of some of those articles on behalf of one or more
users. But the commands that the user program sends to the server program
are in plain ASCII text and are quite simple, while the data sent from
the server program to the user program are plain text headers and
contents of articles. Consequently it's possible for a user without the
services of any program except barebones TELNET to pretend to be a user
program and connect to the server program, then to manually issue
commands exactly like a user program would have, then to read the text
coming back to decide which command to issue next.

First you need to know how to use TELNET at your host, and how to select
a host and port number. On many systems you simply type TELNET followed
by the name (or internet host number) of the host followed by the number
of the port. (Omit the port number to get the normal TELNET port; but for
NNTP you *must* specify the port number.) If your TELNET program uses a
different syntax, you'll have to ask somebody local to your system.

Next you need to know the name or internet host number of some host
providing NNTP service. At present I know of only one that is available
for general InterNet usage:
Name: uakari.primate.wisc.edu
Host number: 128.104.230.12
I know about two others available to the Stanford community (ask me
privately if you are on a Stanford host and want the info). The person
who told me about NNTP servers gave me a list of a few other hosts, but
most don't currently provide NNTP service, and the rest (listed below)
haven't worked for me:
--NAME-- --INTERNET HOST NUMBER--
uafvseg.uark.edu 130.184.64.203 - Some kind of networking problem, or the machine is down
uwm.edu 129.89.2.1 - Some kind of networking problem, or the machine is down
sol.ctr.columbia.edu 128.59.64.40 - Probably a bug somewhere, perhaps on their machine
If you find that any of these actually work for you, please let me know
so I can change their status from bad to questionable. If you know of any
other NNTP servers, or how to get a complete list of them, please send
that info to the author.

Note that once you've become familar with using NNTP manually as detailed
below, presumably with the uakari server, you should try to find a server
closer to your location (unless of course you happen to be located in
Wisconsin). There is no index of NNTP servers, so you'll have to look at
headers of articles you browse and see if the point of origin happens to
be close to you. You can then check to see if that host has an NNTP
server, and if not you can contact the person who posted the article or
the Postmaster at that host to check if either of them know about other
UseNet hosts in the vicinity that might provide NNTP service.

Next you need to know the port number for NNTP service. It's 119. Thus to
connect to NNTP service at uakari.primate.wisc.edu, you say:
TELNET uakari.primate.wisc.edu 119
or if your host doesn't know that name, you say:
TELNET 128.104.230.12 119
or whatever the corresponding syntax is for the TELNET program you use.

Once you get connected, you need to select a newsgroup and then request
headers and/or bodies of messages. You may also want to have the server
print out a complete list of all newsgroups it knows about, but that is
more than 30,000 characters of text so beware!

To select a newsgroup, select a position (article number) within that
newsgroup, and look at headers and bodies of articles, you issue a
one-line command and then wait for the server to send you all the text
that results. The command lines always start with a keyword (command
name), whereas the replies always start with a numeric code then a text
message, then may have additional lines of text ending with a line
containing a single period. You may ignore the numeric reply codes unless
you want to understand the guts of the protocol or write an automated
browser.

Below are the most useful commands for browsing UseNet articles:

GROUP <NameOfGroup> -- Select a particular newsgroup, print out the Low
and High article numbers and an approximate count of articles, and set
the pointer to the first article of the group. If you now issue another
command (HEAD BODY or ARTICLE) without numeric argument, it uses the
first article. -- The very first command you issue may be rejected due to
a bug somewhere in the interface. If it says 500 Command unrecognized,
try exactly the same command a second time.

HEAD <NumberOfArticle> -- Move the pointer to the article (in the
previously-selected newsgroup) which has that number, and print out just
the header.

NEXT -- Move the pointer forward to the next more-recent article (in the
previously-selected newsgroup).

LAST -- Move the pointer backward to the next less-recent article (in the
previously-selected newsgroup). (Warning, LAST really means PREVious, so
don't get confused; don't blame me, I didn't write the command language.)

HEAD -- Without moving the pointer, print the header of the
currently-selected article.

BODY -- Without moving the pointer, print the body of the
currently-selected article.

By doing HEAD <NumberOfOldestArticle> then alternating NEXT and HEAD, you
can browse headers from oldest forward. Alternately by doing HEAD
<NumberOfNewestArticle> then alternating LAST and HEAD, you can browse
headers from newest backward. Either way, when you see an article you
want to see the body of, simply say BODY.

ARTICLE -- Without moving the pointer, print the whole (header & body) of
the currently-selected article. This may be useful if you're downloading
a whole set of articles without any prior selection. You alternate LAST
and ARTICLE, or NEXT and ARTICLE, to download articles in sequence
forward or backward in time.

LIST -- List *all* newsgroups the server knows about. As I said before,
this generates more than 30,000 characters of output, so beware! You will
want to do this only once in a very long while, and collect all the data
to a file which you then search locally from time to time.

HELP -- Print a list of available commands. Beware, don't use commands
like IHAVE or SLAVE that are supposed to be used for NNTP daemon programs
relaying articles, or POST that are supposed to be used for user-programs
posting new articles, since they are too dangerous to be used manually.
When in doubt, consult the RFC977 and avoiding anything that modifies the
state of the server in any way other than selecting your newsgroup and
article pointer. Probably you won't need any commands except the ones I
listed above.


Sample session, with comments. (Each line beginning with ;; is a comment.)

TELNET 128.104.230.12 119
;;That was the command to connect to the NNTP server.
;;Next is the junk that is typed out during connection...
VM TCP/IP Telnet R1.2.1
Connecting to 128.104.230.12, port 119
Using Line Mode...
Notes on using Telnet when in Line Mode:
- To hide Password, Hit PF3 or PF15
- To enter Telnet Command, Hit PF4-12, or PF16-24
MORE... SUWATSON
201 uakari.primate.wisc.edu NNTP server version 1.5.3 (18 Sep 88) ready
at Wed Jun 12 21:56:34 1991 (no posting).
group comp.lang.lisp
500 Command unrecognized.
;;Like I said, some bug causes it to reject the first command.
group comp.lang.lisp
211 29 3294 3323 comp.lang.lisp
;;That time it worked. I forget what 211 and 29 mean, but 3294 is the
;; number of the oldest article and 3323 is the number of the newest
;; article.
;;Let's start from the most recent and work backwards in time:
head 3323
;;That was the command, below is the resultant output...
221 3323 <1991Jun13.003122.19863@cs.cmu.edu> Article retrieved; head follows.
Path: uakari.primate.wisc.edu!zaphod.mps.ohio-state.edu!cis.ohio-state.edu!sei.c
mu.edu!fs7.ece.cmu.edu!o.gp.cs.cmu.edu!ram
From: ram+@cs.cmu.edu (Rob MacLachlan)
Newsgroups: comp.lang.lisp
Subject: Re: isqrt
Message-ID: <1991Jun13.003122.19863@cs.cmu.edu>
Date: 13 Jun 91 00:31:22 GMT
References: <676362388.61@egsgate.FidoNet.Org>
Sender: netnews@cs.cmu.edu (USENET News Group Software)
Organization: School of Computer Science, Carnegie Mellon
Lines: 77
.
;;The period on a line by itself signals that output is done.
;;Now I back up to the previous article (remember the command to go to
;; the PREVious article is LAST, not PREV), and print its header...
last
223 3322 <42376@ucbvax.BERKELEY.EDU> Article retrieved; request text separately.
head
221 3322 <42376@ucbvax.BERKELEY.EDU> Article retrieved; head follows.
Path: uakari.primate.wisc.edu!zaphod.mps.ohio-state.edu!cis.ohio-state.edu!ucbva
x!singsing.berkeley.edu!parr
From: parr@singsing.berkeley.edu (Ron Parr)
Newsgroups: comp.lang.lisp
Subject: defsystem
Message-ID: <42376@ucbvax.BERKELEY.EDU>
Date: 12 Jun 91 21:38:23 GMT
Sender: nobody@ucbvax.BERKELEY.EDU
Distribution: na
Organization: University of California at Berkeley
Lines: 12
Originator: parr@singsing.berkeley.edu
.
;;All done for this demo, so quit the server...
quit
205 uakari.primate.wisc.edu closing connection. Goodbye.
Session ended. <ENTER> to return to CMS.
Telnet terminated -- Connection closed
Ready; T=0.17/0.39 20:06:00


%% NNTP-RELATED, NEWSGROUP POSTING VIA EMAIL

How to post from InterNet to UseNet newsgroups: Each newsgroup's name
consists of words separated by periods, for example 'comp.lang.lisp'. To
post, change each period to a hyphen, for example 'comp-lang-lisp', and
mail to that mailbox on 'ucbvax.berkeley.edu'. For example, to post on
'comp.lang.lisp', send email to 'comp-lang-lisp@ucbvax.berkeley.edu'.
(The apostrophes are for quoting and are not included in the strings.)


%% NNTP, Related topics:

MaasInfo.TopIndex -- This "Index of Indexes" tells how to
get the index of RFCs and a few specific RFCs,
and where you can find at least
two indexes of public-access UseNet hosts with NetNews.


%% NNTP End.


******************************************************************************
end (cut here)
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
(C)1994 [TWaT] - The Winner ANSi Team!

← previous
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos from Google Play

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT