[加评论] 页面有问题?请点击打印板-》打印版                  [推荐此文给朋友]
[博讯主页]-> [大陆新闻] .

黑客联盟推出“六四”反网络封锁软件

【博讯2003年3月05日消息】    网络更多文章请看网络专栏

一个新型的反封锁软件日前由黑客联盟(Hacktivismo)正式推出,该软件以“六四”命名,具有隐蔽性好等性能。博讯最近提供中文说明和下载方式。现在已经有英文说明,欢迎读者朋友测试效果等反馈给博讯([email protected])。

   A new protocol for datapatriots: Well, finally! The Six/Four System developer's edition is now available for download. (博讯boxun.com)

   http://go.openflows.org/article.pl?sid=03/03/04/1233259&mode=thread

   And just for anyone who was wondering why it took so long to release, here's the skinny. We applied to the United States Department of Commerce - the guys who regulate strong crypto export - for an "official" ruling on our technology. Normally it only takes a month to process a request. But for us it was closer to four, possibly because we're l337 h4XOR5. Anyway, we received favorable ruling.

   The Six/Four System takes its name from June 4th, the date thousands of peaceful demonstrators were massacred in Tiananmen Square in China by the People's Liberation Army. The Six/Four System is a new protocol standard for decentralized peer-to-peer networks. Data between Trusted Peers and clients is tunneled using a trusted public key for data encryption and authentication. Together with the decentralized, Gnutella-like, but anonymous mode of routing in the Six/Four Network, this makes state-sponsored censorship based on either host-based access controls or content filtering ultimately impossible.

   The goal of The Six/Four System is to provide access to any information that is available through a public Internet service, especially HTTP, but also any other TCP or UDP protocol (SMTP, POP, DNS, FTP, etc.). Equipped with Six/Four library calls replacing socket calls, and Six/Four config- and host files, many network applications will be able to transparently link into the Six/Four Network. This enables users to make anonymous, securely encrypted (RSA/AES-256bit) connections to their desired destination. Internally, such connections are tunneled through Trusted Peers within the network residing on host machines in the liberal democracies.

   The Six/Four System will be released with a set of simple proxying applications. Users may run them in the background and let applications, including existing browsers, use these proxies: '64webproxy' acts as an anonymizing/content-encrypting HTTP proxy 'T64' (tunnel64) allows users to connect to a port on local host and get redirected to another port on a remote host anywhere else -- while anonymizing and encrypting his encryption transparently 'rcat' can be used as replacement of the tools netcat and telnet, while transparently forwarding any usual Internet connection to anywhere through the Six/Four network


FEATURE SET INCLUDES

   ?Mandatory, transparent military-strength two-layer encryption

   ?Generic Application-/Protocol-independent secure tunneling protocol

   ?Anonymous information retrieval and communication network

   ?Transparent communication with TCP or UDP services in real-timev

   ?Transparent and easy communication tunnels for the end user

   ?Easy and well documented API and concept for developers

   ?Anonymizing routing algorithms via random paths and history-based paths

   ?A Trusted Peer can never know who initiated a request

   ?A middle-man peer routing packets through can never know or prove if any given packet sent by his neighbor originated by that neighbor or was only routed through by that neighbor

   ?Mandatory use of Trusted Peers with Hacktivismo-approved Public Keys

   ?Tunnels to trusted peers through an untrusted peer-to-peer network

   ?Information subversion attacks by middlemen are impossible

   ?Routes to trusted peers are discovered randomly, making DoS impossible

   ?Leads to long-term effort to create anonymous applications, network infrastructure and performant, feature-enhanced implementations

   ?Modular Link Layer (for peer-to-peer connections) can be adapted to new transport-level techniques for making Six/Four traffic hard to detect

   ?The default Link Layer implementation uses strong SSL based on variable TCP ports, indistinguishable from HTTPS and TLS-enhanced protocols

   ?Access controls/Blacklists for clients can prevent from having potential hostile peers connected directly as neighbors

   ?Access controls for Trusted Peers can prevent network abuse by passively limiting the kinds of services/protocol available for anonymous tunneling


SYSTEM REQUIREMENTS

   Linux, BSD or Windows (for now, little endian only)Developers: GNU C++/CygWin G++ (possibly compatible to Visual C++) (博讯boxun.com)[博讯首发,欢迎转载,请注明出处]


博讯相关报道:
  • 美国之音:美议员提案资助研发突破网络封锁技术
  • “半遮面”软件突破中国网络封锁初试锋芒


    点击这里对此新闻发表看法

  • .
    联系我们

    Copyright © 2000-2002 Boxun News is powered by Boxun Software
    博讯是畅所欲言的场所、所有文章均不一定代表博讯立场