Meganet VME

2002-05-01 Thread CDR Anonymizer

/*
* You might have heard of Meganet's "Virtual Matrix Encryption." They've
* had a series of "crack this code" contests, but won't tell us how their
* code works. The program below was reverse-engineered from the shareware
* software which is available on their web site, and can decrypt VME files.
* This is not a cracking program (you need to supply the required secret
* information in order to decrypt) but maybe someone can use it to build
* one.
*
* If you try to decrypt Meganet's old encrypted challenge files with this
* code, you'll get garbage. However, it's exactly the same garbage that
* you'll get if you decrypt the files with their shareware software. This
* is not due to the much-hyped "Date Limiting Algorithm" (see below for
* details). Apparantly either a) the shareware version is broken, or
* b) Meganet decided to make certain nobody would win the challenge by
* encrypting random numbers instead of a meaningful file. This code can
* correctly decrypt files that were encrypted with the shareware version.
*/

#include 
#include 
#include 

int vme_decrypt(FILE *data_file, char *passwords[], FILE *config_file,
FILE *secret_file, FILE *out_file);

/* Test driver. Sorry there isn't a proper user interface here. */
int main()
{
  FILE *data_file, *config_file, *secret_file, *out_file;
  char *passwords[] = {
  "[EMAIL PROTECTED]",  /* sender */
  "[EMAIL PROTECTED]",  /* recipient */
  "VME Challenge 2001",  /* description */
  "", /* password */
  };
  data_file = fopen("vme2001.vme", "rb");
  config_file = fopen("vme2001.cfg", "rb");
  secret_file = fopen("vme2001.txt", "rb");
  out_file = fopen("decrypt.out", "wb");
  if ( vme_decrypt(data_file, passwords, config_file, secret_file, out_file) )
printf("Decryption failed\n");
  return 0;
}

/* There are a number of incompatible changes between
   the 2000 and 2002 versions. */
/* #define VME_2002 1 */

#define VME_NUM_PASS   4
#define VME_PASS_SIZE  0x40
#define VME_KEY_SIZE   0x10
#define VME_BUF_SIZE   0x100
#define VME_MBK_SIZE   0x8000
#define VME_MAXINT 0xu

#define SWAP(x,y) { int temp = (x); (x) = (y); (y) = temp; }
#define LROT(x,y) ( ((x)<<(y) | (x)>>(8-(y))) & 0xff )
#define RROT(x,y) ( ((x)>>(y) | (x)<<(8-(y))) & 0xff )
#define VME_RAND(r)   ( (r)=((r)*0x19660du+0x3c6ef35fu)&VME_MAXINT )
#define VME_RAND8(r)  ( (r)=((r)*0x0d+0x5f)&0xff )

struct vme_state {
  int num_funcs, have_secret, key_xor, randb1, randb10;
  unsigned main_key;
  unsigned char func_order[VME_KEY_SIZE], key_order[VME_KEY_SIZE];
  unsigned char key3[VME_KEY_SIZE];
  unsigned char stk[VME_BUF_SIZE], key1[VME_BUF_SIZE], key2[VME_BUF_SIZE];
  unsigned char perm1[VME_BUF_SIZE], perm2[VME_BUF_SIZE];
  unsigned char invperm2[VME_BUF_SIZE], mul[VME_BUF_SIZE];
  unsigned char rmbk1[VME_BUF_SIZE], rmbk2[VME_BUF_SIZE];
  unsigned char rmbk3[VME_BUF_SIZE], rmbk4[VME_BUF_SIZE];
  unsigned char mbk1[VME_MBK_SIZE], mbk2[VME_MBK_SIZE];
  unsigned char mbk3[VME_MBK_SIZE], mbk4[VME_MBK_SIZE];
};

static int vme_load_config(FILE *config_file, struct vme_state *vme);
static int vme_load_stk(FILE *data_file, struct vme_state *vme);
static int vme_main_init(FILE *data_file, char *passwords[],
FILE *secret_file, struct vme_state *vme);
static void vme_key_init(struct vme_state *vme);
static void vme_mbk_init(FILE *secret_file, struct vme_state *vme);
static void vme_decrypt_loop(FILE *data_file, FILE *out_file,
struct vme_state *vme);
static int vme_table1(int c, int n, int k, struct vme_state *vme);
static int vme_table2(int c, int n, unsigned rand);

int vme_decrypt(FILE *data_file, char *passwords[], FILE *config_file,
FILE *secret_file, FILE *out_file)
{
  struct vme_state vme;
  if ( vme_load_config(config_file, &vme) ) return 1;
  if ( vme_load_stk(data_file, &vme) ) return 1;
  if ( vme_main_init(data_file, passwords, secret_file, &vme) ) return 1;
  vme_key_init(&vme);
  vme_mbk_init(secret_file, &vme);
  vme_decrypt_loop(data_file, out_file, &vme);
  return 0;
} /* vme_decrypt */

/*
* The configuration file gives the initial order of the functions applied
* to the data as it is encrypted.
*/
static int vme_load_config(FILE *config_file, struct vme_state *vme)
{
  int i, c, f, n, rand_state;
  if (config_file == NULL) return 1;
  fseek(config_file, 0, SEEK_SET);

  rand_state = 0xff;
  n = 0;
  for (i = 0; i < VME_KEY_SIZE; i++) {
c = getc(config_file);
if (c == EOF) return 1;
c ^= VME_RAND8(rand_state);
f  = c >> 4;
vme->func_order[i] = f;
vme->key_order[i]  = (f == 0xe) ? 0xe : c & 0xf;
if (f != 0xf) n = i;
  }

  vme->num_funcs = n + 1;
  return 0;
} /* vme_load_config */

/* 
* The enrypted file is prefixed with a 256-byte header which contains
* the Specific Transaction Key (STK) and some encoded information.
* Instead of using the manufacturer-recommended procedure to decode
* the information using the passwords, this code just does an
* exhaustive key search. You're going to bust a gut

Looking for an SSL blocking proxy

2002-04-04 Thread CDR Anonymizer

This is a multi-part message in MIME format.
---Next_Part--87L6KN4EFH0J
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

Does anyone know if there exists a tool to perform SSL at the 
firewall level instead of at the browser so that I can watch my 
charges' internet downloading? I don't want to spy on them I only 
want to spy on those that do something they're not supposed to.

As you well know, we can't have our most precious national resource, 
our children, talking to strangers about their sex lives, real or imagined. 

'Cyber' is not funny, 'cyber' is not harmless. What they _think_ is 
a 15yo high school student in Pasadena _could in fact_ be a 19yo 
college student in *their* town.

I won't abuse the system to get their hotmail passwords and read 
their mail, because we've already blocked hotmail.com and made them 
use mail and chat in which we can protect them from their baser urges. 
But they keep getting out over https:// and now there's this new 
Peek-at-booty that disguises itself as a credit card # upload.

Although we have already dusted off our nuclear evacuation manuals 
in order to teach our children what to do if the sky starts to fall, 
'duck and cover' will not cut it on the Internet. We must co-operate 
unquestioningly if we are to protect our nation's future from child 
sex predators and advocates of child sex predators.


A child's life may be in your hands at this very instant.
Think about it.

A Responsible K-12 Sysadmin

---Next_Part--87L6KN4EFH0J
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: 7bit





Looking for an SSL blocking proxy




Does anyone know if there exists a tool to perform SSL at the 
firewall level instead of at the browser so that I can watch my 
charges' internet downloading? I don't want to spy on them I only 
want to spy on those that do something they're not supposed to.

As you well know, we can't have our most precious national resource, 
our children, talking to strangers about their sex lives, real or imagined. 

'Cyber' is not funny, 'cyber' is not harmless. What they think is 
a 15yo high school student in Pasadena could in fact be a 19yo 
college student in their town.

I won't abuse the system to get their hotmail passwords and read 
their mail, because we've already blocked hotmail.com and made them 
use mail and chat in which we can protect them from their baser urges. 
But they keep getting out over https://
and now there's this new Peek-at-booty that disguises itself as a credit 
card # upload.

Although we have already dusted off our nuclear evacuation manuals 
in order to teach our children what to do if the sky starts to fall, 
'duck and cover' will not cut it on the Internet. We must co-operate 
unquestioningly if we are to protect our nation's future from child 
sex predators and advocates of child sex predators.


A child's life may be in your hands at this very instant.
Think about it.

A Responsible K-12 Sysadmin





---Next_Part--87L6KN4EFH0J--




RE: Looking for an SSL blocking proxy

2002-04-04 Thread CDR Anonymizer

First: I recognize that this post may be a troll. The poster
is clued in enough to use cpunks_anon, but too clueless to
turn off HTML posting - an odd combination. Also the language
used (eg: "we must all cooperate unquestioningly") is a bit
over the top.

Second: Don't post in HTML. It makes you look like an
idiot.

Third: The short answer is NO. You can block requests
to port 443, and maybe your firewall could try to recognize
SSL sessions on other ports and block them. But to get what
you are asking for the browser would also have to
be modified to work together with the firewall to leave https
requests clear until they got to the fw. I am not aware of any
product that does this (I am not too up on current
firewalls). 

Fourth: It is necessary that you "cooperate unquestioningly"
with this list's agenda - not only should not be blocking
access, you should be teaching your 'charges' how to use
strong cryptography, remailers, and anonymizing proxies
for their self-defense against predators, and how
to protect their real identities online. That '19-yo college
student' can't do squat if he doesn't know that his or
her corrospondent is in the same town.

Don't shield your charges: Make them invulnerable in
their own right. That is true protection, and good 
parenting.




> --
> From: CDR Anonymizer[SMTP:[EMAIL PROTECTED]]
> Reply To: [EMAIL PROTECTED]
> Sent: Thursday, April 04, 2002 2:02 PM
> To:   [EMAIL PROTECTED]
> Subject:  Looking for an SSL blocking proxy
> 
> This is a multi-part message in MIME format.
> ---Next_Part--87L6KN4EFH0J
> Content-Type: text/plain; charset=us-ascii
> Content-Transfer-Encoding: 7bit
> 
> Does anyone know if there exists a tool to perform SSL at the 
> firewall level instead of at the browser so that I can watch my 
> charges' internet downloading? I don't want to spy on them I only 
> want to spy on those that do something they're not supposed to.
> 
> As you well know, we can't have our most precious national resource, 
> our children, talking to strangers about their sex lives, real or
> imagined. 
> 
> 'Cyber' is not funny, 'cyber' is not harmless. What they _think_ is 
> a 15yo high school student in Pasadena _could in fact_ be a 19yo 
> college student in *their* town.
> 
> I won't abuse the system to get their hotmail passwords and read 
> their mail, because we've already blocked hotmail.com and made them 
> use mail and chat in which we can protect them from their baser urges. 
> But they keep getting out over https:// and now there's this new 
> Peek-at-booty that disguises itself as a credit card # upload.
> 
> Although we have already dusted off our nuclear evacuation manuals 
> in order to teach our children what to do if the sky starts to fall, 
> 'duck and cover' will not cut it on the Internet. We must co-operate 
> unquestioningly if we are to protect our nation's future from child 
> sex predators and advocates of child sex predators.
> 
> 
> A child's life may be in your hands at this very instant.
> Think about it.
> 
> A Responsible K-12 Sysadmin
> 
> ---Next_Part--87L6KN4EFH0J
> Content-Type: text/html; charset=us-ascii
> Content-Transfer-Encoding: 7bit
> 
> 
> 
> 
> 
> Looking for an SSL blocking proxy
> 
> 
> 
> 
> Does anyone know if there exists a tool to perform SSL at the 
> firewall level instead of at the browser so that I can watch my 
> charges' internet downloading? I don't want to spy on them I only 
> want to spy on those that do something they're not supposed to.
> 
> As you well know, we can't have our most precious national resource, 
> our children, talking to strangers about their sex lives, real or
> imagined. 
> 
> 'Cyber' is not funny, 'cyber' is not harmless. What they think is
> 
> a 15yo high school student in Pasadena could in fact be a 19yo 
> college student in their town.
> 
> I won't abuse the system to get their hotmail passwords and read 
> their mail, because we've already blocked hotmail.com and made them 
> use mail and chat in which we can protect them from their baser urges.
> 
> But they keep getting out over https://
> and now there's this new Peek-at-booty that disguises itself as
> a credit card # upload.
> 
> Although we have already dusted off our nuclear evacuation manuals 
> in order to teach our children what to do if the sky starts to fall, 
> 'duck and cover' will not cut it on the Internet. We must co-operate 
> unquestioningly if we are to protect our nation's future from child 
> sex predators and advocates of child sex predators.
> 
> 
> A child's life may be in your hands at this very instant.
> Think about it.
> 
> A Responsible K-12 Sysadmin
> 
> 
> 
> 
> 
> ---Next_Part--87L6KN4EFH0J--
> 
>