Copy Link
Add to Bookmark
Report
k-1ine_15
k-15-(7)-01
OoO=o=oOO=o=O=OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
OoO=o=oOO=o=O=OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
OoO=o=oOO=o=O=>
: -`- -`- OoO=o=oOO=o=O=>
; _|_--oOO--(_)--OOo--_|_ OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
| ¡ K-1ine Zine ! | OoO=o=oOO=o=O=>
! issue 15, volume 7 ¡ OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
---------O^O---- OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
;. |__|__| OoO=o=oOO=o=O=OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
|| || OoO=o=oOO=o=O=OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
ooO Ooo OoO=o=oOO=o=O= OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
OoO=o=oOO=o=O=OoO=o=oOO=o=O=LoveO=o=oOO=o=O=OoO=o=>
;`-.> May 2001 <=o=O=o=O=o=O
'Bombs Not Food'
'The Associated Press is neither radical, passionate nor accurate.'
_____________________________________________________________________________
» .- Words from the Editor -. « |
*: [-] Introduction .......................................... The Clone :*
*: (-) Contact Information ................................... The Clone :*
*: (-) Affiliate Web-Links ................................... Nettwerked :*
*: (-) News: Nettwerked CD ................................... The Clone :*
*: (-) Advertisment .......................................... HackerSalvage:*
*: (-) Advertisment .......................................... FlipperSmack :*
*: (-) Link of the Month ..................................... The Clone :*
*: (-) Miscellaneous Links ................................... The Clone :*
*: (-) K-1ine Mirrors ........................................ The Clone :*
____________________________________________________________________________
» .- Documents -. « |
*: (x) 'WNN Exclusive' ....................................... WNN :*
*: (x) 'Tesla Coil Instructions' ............................. Nikola Tesla :*
*: (x) 'Stellar 310 - Guide and Specifications' .............. Nettwerked :*
*: (x) 'Nevada Probes Vegas Phone Hacks'...................... Cenobyte :*
*: (x) 'Poem By Wizbone' ..................................... Wizbone :*
*: (x) 'GUTSCI Protocol' ..................................... Fractal :*
_____________________________________________________________________________
» .- Conclusion -. « |
*: [-] Credits ............................................... The Clone :*
*: [-] Shouts ................................................ The Clone :*
_____________________________________________________________________________
Introduction --
Hello to all the avid K-1ine readers, and to all the newbies who happened
to stumble across my crazy collection of articles in the premier 21st century
Canadian hacking and phreaking electronic magazine.
If you have noticed, I am now including not only technical articles, but
interesting scientific news articles as well in an attempt to enlighten the
masses and open up the reader scope by many-a-soul.
So please enjoy the 15th issue, 7th volume, of K-1ine and go ahead -
learn something.
-->
Contact Information;
=-=-=-=-=-=-==-=-=-=
Comments/Questions/Submissions: theclone@hackcanada.com
On IRC: irc.h410g3n.com, #altphreakingfaq, #cpu (key required),
#hackcanada, #k-1ine
Shoot me an ICQ message: (UIN) 79198218
Check out my site: (Nettwerked) http://www.nettwerked.net
-->
Affiliate Web-Links:
=-=-=-=-=-=-==-=-=-=
B0G http://www.b0g.org
Damage Incorporated http://www.freeyellow.com/members6/damage-inc/index.html
Fuck Rogers AT&T http://www.fuckrogersatt.com *
Grass Hopper Unit http://www.ghu.ca
Hack Canada http://www.hackcanada.com
Phreak BC http://www.phreakbc.com
PyroFreak http://www.multimania.com/pyrozine/index.html
TRAPFONE http://www.trapfone.com *
* = featured sites of Nettwerked Incorporated
-->
News: Nettwerked CD
[Tue May 8 21:43]
I just wanted to fill you all in on what is happening with the
Nettwerked CDs (www.nettwerked.net/cd.html) that Cenobyte, DWR,
and I are working our butts off to finish for sale at Def Con 9.
As it stands, we will not be featuring any mainstream artists in
the cd without their express written permission (Cenobyte is working
on getting our stuff to 'Orbital' for permission to use 'Halcyon & On & On'
for our opening song). DWR and I however have finished off two down-tempo/
experimental tracks for the cd's; "The Sine Wave Experiment" and "Funk".
We plan on writing more songs in the future (using 'FruityLoops') ...
maybe some hard-trance stuff... and more experimental/downtempo (we love
that shit).
Now, if you make music on your computer (we prefer if it's electronic;
ie. trance, ambient, experimental, jungle, drum & bass, hardhouse, hardcore,
dub, etc) and would like to see your masterpiece(s) on the Nettwerked cd,
please contact either me (The Clone): theclone@ecn.ab.ca and/or Cenobyte:
jkodish@ecn.ab.ca.
[ Nettwerked Discussion Board 2.0 ]
[ http://disc.server.com/discussion.cgi?id=150061&article=299 ]
--
-- Advertisment --
+++ WWW.HACKERSALVAGE.COM +++
HackerSalvage.com is a non-profit website dedicated to
keeping old hardware in circulation. Many of us have
piles of it sitting around but can't just toss it out.
Here you can post computer items for sale or post a
want ad for items you are looking for. A perfect place
to get rid of perfectly good junk.... and get some new
stuff to rebuild the pile.
+++ +++
--
-
Flippersmack AD -
"Flippersmack is a culturemag for a penguin generation. What does this
mean? Articles and reviews from your favorite writers. The low-down on
what's fresh in tech, comics, movies, and music. Wrapped in a style all
its own."
"We will strive to release Flippersmack every week; a taste of insanity to
inspire, inform, and entertain. From the creators of System Failure and
Avalanche, there's a new zine out on the net: FLIPPERSMACK!"
You can read the first six issues at:
http://www.nettwerked.net/flippersmack001.txt
http://www.nettwerked.net/flippersmack002.txt
http://www.nettwerked.net/flippersmack003.txt
http://www.nettwerked.net/flippersmack004.txt
http://www.nettwerked.net/flippersmack005.txt
http://www.nettwerked.net/flippersmack006.txt
--
--=[ LINK OF THE MONTH ]=--
From now on, I will be posting one really great "link of the month" on
future issues of K-1ine magazine. The link can be anything in the technology
industry, music scene, rave scene, punk scene, or even a good article you
read on a news site. I'll be taking submissions via e-mail, ICQ, or IRC right
away; so get your links in and maybe you'll see it in the next issue of K-1ine!
For the month of May, the link of the month is:
The Secret guides to - Health
- Wealth
- Wisdom
http://www.waynegreen.com
[submitted by: The Clone]
--
K-1ine Mirrors:
http://the.wiretapped.net/security/info/textfiles/k1ine/
"Wiretapped.net is an Australian site offering an archive of open
source software, informational and advisory textfiles and radio/conference
broadcasts covering the areas of network security, network operations,
host integrity, cryptography and privacy. We aim to become the largest
archive of this nature in the Asia/Pacific region through steady growth
of our archives and regular updates to them (most updated nightly).
We are proudly telehoused on a 10Mbit/sec connection by Connect.com.au using
OneGuard hardware donated by eSec Limited. The archive, along with its
sister site on the same machine, The AusMac Archive, generates between 10
and 60 gigabytes of outbound traffic daily. Wiretapped.net is hosted in
Sydney, Australia."
-
<bu-joe> i want to be quoted in k-1ine then and only then will i be truly
happy.
-
WNN Exclusive
04/24/01
As always, WNN's dedicated effort to expose the truth has once again
turned up some secrets. This time is seems our friends The Clone, editor
in chief of k-line magazine and webmaster of security sites such as
nettwerked.net and trapfone.com has more secrets.
As it turns out, The Clone, aka Rebecca Fitzgerald, sleeps with a pink
teddy bear. Yes, it's true. He, a grown man, and seemingly level-headed
individual sleeps with a pink, stuffed teddy bear purchased from Zellers.
He affectionately calls his child's plaything "Muffy" and has been said to
cry quite violently when it's removed from his bedroom.
WNN staff discovered this while investigating his living premises while he
was at work. As yet, WNN hasn't been able to find out just where The
Clone's place of employment is. A hidden camera was placed in Clone's
bedroom and the teddy removed. The following is an ascii conversion of
what the camera picked up when The Clone returned home to find his beloved
"Muffy" not on the silk pillow where he leaves it every morning.
____________
\ ####### \ /0\
\ pillow \ \|/
\ ####### \ | The Clone
\ \ /`\
\ bed \ _| \_
\___________\
As you can see from the shocked look on The Clone's face, he was quite
distraught by the whole situation. Moments later, the camera caught Clone
crying furiously and banging his fists on the wall. WNN officials parked
in a white van outside, watching the ordeal eventually felt sorry for The
Clone and left the bear on his doorstep, rang the doorbell, and gracefully
ran away.
Sensitive young man, or derranged teddy-loving psychopath? You decide.
-
<Tiffany> i think we're alone now... clonie clonie clonie i want your bone now
-
Tesla Coil Instructions
Note: These are instructions for building a Tesla Coil exactly like
the one shown on the photos page. It may be beneficial to change some
things.
Materials
1. Particle board
2. 4.5" PVC pipe
3. 4.5" PVC flange
4. 6.25" flexible duct
5. 22 AWG magnet wire
6. 1/4" copper tubing
7. 270VA Neon transformer: 9000V Secondary; 120V Primary
8. Glass wine bottles
9. Salt
10. RTV
11. Screwable pop bottle caps
12. Flat black spray paint
13. Drill
14. Saw
15. Polyurethane
16. Polyeurathane brush
17. 3/4" copper pipe
18. Plastic for mounting copper pipe
19. Pipe cutters
20. Wire cutters
21. Screws
22. Bolts
23. Nuts
24. Washers
25. Screwdriver
26. Wrench
27. Aluminum foil
28. Glass
29. Electrical tape
30. Blow torch
31. Solder
32. Flux
33. Fishing line
34. 14AWG High-voltage wire (15,000V)
35. Ring terminals
36. Multi-meter capable of measuring capacitance
39. Tape measure
Procedure
1. Fill the 8 wine bottles with saturated salt water up to where the
bottles start to curve. Fill the rest of the bottles up with motor
oil. Drill a hole in the center of each pop cap and put a bolt through
the hole upside down. Place a wire connector on the top of the caps.
Seal the caps with RTV. Wrap the bottles in aluminum foil so that no
salt water can be seen. Wrap electrical taped around the sides of the
bottles. The bottoms should have foil, but no electrical tape. Build a
box to put the eight bottles in and spray paint it flat black. The
bottles should fit snugly. Place a piece of glass on the bottom of the
box and put aluminum foil over it, and then put the bottles in the
box.
2. Build 6 supports for the primary coil using particle board. There
should be a 30 degree angle of elevation, an effective height of 3.5",
and an effective width of 6" on each one. Cut 15 grooves on the tops
of them. Wrap the copper tubing in a spiral using the grooves.
3. Wrap the 22 gauge magnet wire around the PVC pipe and put
polyurethane over the coil.
4. Make the spark gap by using RTV to put the copper pipe on the
plastic. There should be a .03" gap between each one.
5. Use the ducting to construct a toroid with a 29.2" outside
diameter.
6. Secure the primary coil, secondary coil, spark gap, capacitor box,
and transformer to a piece of particle board. Hang the toroid from the
piece of PVC pipe with two perpendicular pieces of fishing line.
7. Wire the two circuits as shown below.
[http://www.nettwerked.net/tesla.bmp]
"The mind of a genius lives forever"
Rest In Peace, Nikola Tesla
-
<CHadder> "hey mr ss man, is your phone running?" "ugh... yes...?" "then a
demostrater put lsd in your donut, haw haw"
-
Stellar 310 - Guide and Specifications
date. 05.15.01
INTRODUCTION
This phone has been specifically configured for Semi-Public
applications. Responsibility for the type of use of the phone, call
rates, and any federal, state, or local regulations are at the sole
discretion of the telephone owner. It is recommended that you contact
your state PUC (Public Utilities Commission) or state PSC (Public
Service Commission) regarding questions about product application.
Your Payphone's Programming
Your S-310 payphone has been pre-programmed to your request by G-TEL &
should be ready to work once it is properly installed.
Special Note to Payphone Owner
1. It is strongly recommended that all key numbers related to your
payphone(s) be recorded in case of loss or theft. G-TEL Enterprises,
Inc. is not responsible for keeping records of customer's key numbers.
Upper Housing Key Number(s):_____________________________________________
Lower Housing Key
Number(s):_____________________________________________
2. It is strongly recommended that you establish & use the Coin Box
Amount Security Code feature to prevent the coin box from
over-filling. The coin box amount should not exceed $150.00.
Over-filling of the coin box can lead to the malfunction of
several major components of the payphone.
Coin Box Amount Security Code: *#________________________
Technical Support
G-TEL Enterprises, Inc. offers technical support via telephone &
Internet only. Before trying to contact G-TEL Technical Support, we
strongly advise that you read the portion of the manual related to
your support needs so that a technician will be able to better assist
you.
G-TEL Technical Support via e-mail: support@payphone.com
G-TEL Technical Support via phone: 1-800-884-4835
MOUNTING INSTRUCTIONS
Mounting the Backboard or Enclosure
OUTDOOR INSTALLATION
If the payphone is to be installed outdoors, you must use an outdoor
pedestal / enclosure to mount the payphone and to prevent weather
deterioration. Outdoor pedestals can be mounted using concrete
anchors. Outdoor wall-peds can be mounted using toggle bolts. The
telephone cable should be routed to the pedestal using EMT conduit.
Once the pedestal & enclosure is mounted, follow the instructions
in this guide to mount the payphone to the pedestal & enclosure.
INDOOR INSTALLATION
It is recommended to use ¼" Toggle Bolts (with washers) to secure
the backboard or enclosure to the wall. The length of the toggle bolt
depends on the thickness of the wall. Anchor Screws may be used as an
alternative to Toggle Bolts.
1. Ensure that the wall that the backboard or enclosure is to install
to is flat & level.
2. The top height of the backboard or enclosure should be determined
by the following:
- Standard Height = 63" from floor
- Wheelchair Accessible = 54" from floor
3. Place the backboard or enclosure against the wall at the desired
height & mark the Line Wire Entrance Hole & Mounting Holes to be used,
(the backboard or enclosure offers 10 mounting holes, although not all
10 must be used.) Use the diagram below to ensure the backboard or
enclosure is not upside down or backwards.
4. Drill through the marked holes on the wall using a drill bit similar
to the size of the toggles being used.
5. Route the telephone line cable through the Line Wire Entrance Hole.
6. Insert each toggle bolt & washer through the mounting holes being
used on the backboard or enclosure.
7. Secure the backboard or enclosure against the wall through the
pre-drilled holes & tighten each toggle bolt.
Separating the Upper & Lower Housing
1. Insert the upper housing key into the upper housing lock (located
on the right side of the phone) & turn it 1/8 turn counter clockwise.
2. Insert the T-wrench key into the T- wrench insert (located approx.
6 inches above the upper housing lock) & turn it 1/8 turn clockwise,
until you hear the phone `snap' open.
3. Slide the upper housing away from the lower housing (make sure the
upper housing cable is disconnected from the circuit board.)
Removing the Circuit Board Chassis
1. Disconnect the 4-wire Trigger Switch plug, (blue, red, white, &
green plug.)
2. Disconnect the 3-wire Relay plug (green, red, & white plug.)
3. Disconnect the modular RJ11 Telephone Line connector.
4. Disconnect the circuit board Ground wire.
5. Loosen the Captive nut at the bottom left of the circuit board
chassis.
6. Remove the circuit board chassis by carefully pulling down & away
from the inside of the lower housing.
Removing the Coin Acceptor
1. Remove the coin reject chute from the coin acceptor by loosening
the screw that attaches the top of the reject chute to the bottom of
the coin acceptor.
2. Loosen the slotted nut at the top rear of the coin acceptor.
3. Remove the coin acceptor by pulling it up & then outward, away from
the inside of the lower housing.
Removing the Vault Door & Coin Box
1. Insert the lower housing key into the lock on the left side of the
lower housing & turn it ¼ turn counter-clockwise.
2. Insert the T-wrench key into the vault door's vertical T-wrench key
insert (located at the center of the vault door) & turn it 1/8 turn
clockwise.
3. Remove the vault door & the coin box from the vault area.
Securing the Lower Housing to the Mounting Surface
1. Insert the telephone line cable through the line wire entrance hole.
2. Secure the lower housing to the backboard or enclosure mounting
surface using seven ¼ x 20 x ¾ mounting screws.
Reinstalling the Coin Box & Vault Door
1. Insert the coin box inside the vault area of the lower housing.
2. Make sure the lower housing key is in the unlock position.
3. Insert the T-wrench key into the vault door's vertical T-wrench key
insert (located at the center of the vault door) & turn it ¼ turn
clockwise.
4. Insert the vault door into the lower housing vault area & turn the
T-wrench key ¼ turn counter-clockwise to secure it.
5. Turn the lower housing key clockwise to the lock position & remove
the key.
Reinstalling the Coin Acceptor
*READ TO INSURE PROPER COIN ALIGNMENT*
1. Before re-installing the coin acceptor, ensure that the trigger
switch unit that the coin acceptor installs on top of is firmly
secured into the trigger switch sleeve in the back of the lower
housing, (the trigger switch should not be loose.)
2. Guide the tab at the bottom rear of the coin acceptor into the rear
of the trigger switch.
3. Position the top of the coin acceptor bracket onto the rear lip of
the coin acceptor slotted nut & then tighten the nut.
4. Reinstall the coin reject chute & secure the screw at the top of
the reject chute to the bottom threads of the coin acceptor.
Reinstalling the Circuit Board Chassis
1. Install the circuit board chassis by guiding the tab at the top,
left of the chassis into the slot at the top, left of the lower
housing. As you position tab, guide the captive nut onto the mounting
stud of the lower left side of the lower housing & then tighten it.
2. Connect the 4-wire Trigger Switch plug to the 4-prong Trigger Switch
connector.
3. Connect the 3-wire Relay plug to the 3-prong Relay connector.
4. Connect the RJ11 modular plug to the Telephone Line connector.
5. Connect the circuit board Ground wire to the middle right terminal
of the terminal block.
6. Connect the Battery plug (black & red wire plug) to the Battery
connector of the circuit board. (The battery is not usually connected
at the factory. To prevent the battery from draining, do not connect
the battery until the telephone line is ready to be connected.)
Connecting the Telephone Line
A minimum of 22ma (& 44 VDC) loop current must be provided to the
payphone from the Telephone Company's Central Office. In certain
situations, due to the distance between the Central Office and the
phone site, the loop current may not meet the required level of 22ma.
If the loop current is below 22ma, dial tone may not occur or the
phone may experience only momentary burst of dial tone. It is
recommended that the loop current level at the phone be tested at this
time to ensure that the required loop current level is present.
1. It is recommended that standard telephone / communication cable
(No. 22 gauge, 2 pair or greater) be used to connect the telephone
line with the payphone. Telephone / Communication cable usually
consists of 2 or more pairs of color-coded wire.
2. Connect one pair of communication cable wire to the two points of
the Telco interface box (D Marc location) that the telephone line
originates from.
3. Connect the opposite end of the same pair of wire to the top left &
bottom left terminal screws, (terminal block is located on the base of
the payphone's lower housing.)
4. Connect a proper earth ground wire to the left middle terminal to
ensure safety.
If using a line cord with a modular RJ11 plug instead of telephone /
communication cable, disregard the RJ11 pigtail cord that originates
from the terminal screws. Instead, plug in your incoming telephone
line-cord directly to the circuit board RJ11 connector.
Re-Connecting the Upper & Lower Housing
1. Connect the upper housing dial / hookswitch ribbon cable to the
circuit board upper housing connector.
2. Make sure the upper housing key is in the unlock position & the "T"
wrench key is in the open position, (all the way forward.)
3. Slide the bottom-lining of the upper housing along the lining of the
lower housing until the two housings meet.
4. Turn the T-wrench key 1/8 turn counter-clockwise until it `snaps'
close & then remove both keys.
PROGRAMMING INSTRUCTIONS
Your Payphone's Programming
Your S-310 payphone has been pre-programmed to your request by G-TEL &
should be ready to work once it is properly installed.
If you were unable to provide us with your programming request at
the time of your order, please test the payphone to see if it charging
acceptable amounts for local, toll, long distance, & other types of
calls. By simply dialing any number, the payphone will give voice
prompts of the required amount of money of the call if there is a
charge. Below is a list of typical programming the payphone will
usually contain if the customer was unable to provide us with
programming request at the time of their order.
If you are experiencing problems with the current programming
set-up or have questions on how to change the current programming,
please contact G-TEL Technical Support by phone at 1-800-884-4835 or
by e-mail at support@payphone.com.
Typical Pre-Sets for S-310 Payphones Not Pre-programmed to Customers
Request
7-Digit Calls; $.35 every 15 minutes
10-Digit Home Area Code Calls; $1.00 every 2 minutes
Long Distance Calls in U.S; $1.00 every 2 minutes
Information Calls; $.75
1-800 Type Calls; Free
Incoming Calls; Free
If you are a customer using Protel ExpressNet Payphone Management
software, please refer to your Protel Pocket Reference Guide & your
ExpressNet Manual for instructions on Initializing & Programming the
Payphone.
Entering the Program Mode
This procedure, among others, is necessary if you are editing the
current programming set-up. All program entries are done in the
program mode, using the keypad of the payphone. When programming, one
`beep' represents a completed entry. Three `beeps' represents an
error. To start an entry over, press the # key & wait for three
`beeps' & then re-try the entry. If you make a mistake on one entry,
you do not have to re-do all other entries.
1. Open the upper housing of the payphone, (see Separating the Upper &
Lower Housing on pg. 4.)
2. Ensure that the telephone line, dial / hookswitch ribbon cable, &
circuit board battery have all been properly connected, (see Circuit
Board Diagram below).
3. Push & hold the black program button on the circuit board, (see
Circuit Board Diagram below.)
4. Take the handset off-hook, (while program button is held down.)
5. Listen for a single `beep'
6. Release the program button (after the single `beep' is heard.)
Programming the Rate, Time Limit, & Keypad Allowance
The rate, time limit, and keypad allowance features are edited in the same
program entry for each type of call. Therefore, you must program for each
feature even if only trying to change one of these features. Before you
begin programming, you must first locate the Rate Band (4-digit code) that
represents the type of call you are programming for, (see the Call Type
Description Table above.)
1. Make sure the phone is in the program mode.
2. Enter the following information in this order
for the call being programmed:
4-digit Rate Band, (see Call Type Description Table for list of Rate Bands)
4-digit Initial Charge, (if the call is free, enter 0000)
4-digit Additional Charge, (if the call is free or unlimited, enter 0000)
3-digit Initial Time Limit, (if the call is free or unlimited, enter 255)
2-digit Additional Time Limit, (if the call is free or unlimited, enter 01)
4-digit Keypad Allowance, (if the keypad is allowed during the call,
enter 0008; if the keypad is not allowed during the call, enter 0001)
Press the * (star) key to complete the entry; listen for one confirmation
`beep'
Changing the Receiver Volume Level
1. Make sure the phone is in the program mode.
2. Enter 27
3. Enter the receiver volume level. (1=Lowest 2=Medium 3=Highest)
4. Press the * (star) key to complete the entry; listen for one
confirmation `beep'.
To Disable Certain Types of Calls
1. Make sure the phone is in the program mode.
2. Enter the 4-digit rate band of the type of call being disabled (see
Call Type Description Table on page 11 for help)
3. Press the * (star) key to complete the entry; listen for one
confirmation `beep'.
To Program Certain Types of Calls to be Free
1. Make sure the phone is in the program mode.
2. Enter the 4-digit rate band of the type of call being made free
(see Call Type Description Table on page 11 for help)
3. Enter 0000 0000 255 01 0008 *
4. Press the * (star) key to complete the entry; listen for one
confirmation `beep'.
Programming an Access Code for PBX Phone Systems
The following procedure shows the steps necessary to allow the S-310
to work on a PBX phone system when an access code must be dialed to
access an outside line. The S-310 will automatically dial the PBX
access code before the users destination number.
1. Make sure the phone is in the program mode.
2. Enter 24
3. Enter the PBX access code.
4. Press the * (star) key to complete the entry; listen for one
confirmation `beep'.
Programming a Free Number
1. Make sure the phone is in the program mode.
2. Enter 23
3. Enter the free number exactly as it would normally be dialed from
the payphone.
4. Press the * (star) key to complete the entry; listen for one
confirmation `beep'.
To delete a free number that has been programmed, enter 23 *
*NOTE Only one free number may be programmed into the phone.
COIN BOX AMOUNT SECURITY CODE
Overfilling of the coin box can cause several major components of the
payphone to malfunction. To prevent the coin box from overfilling,
the owner should use the coin box amount security code to check the
status of the coin box. The coin box amount should not exceed 150.00.
Programming the Coin Box Amount Security Code
1. Make sure the phone is in the program mode.
2. Enter 293
3. Enter any 4-digit code except 0000
4. Press the * (star) key to complete the entry; listen for one
confirmation `beep'.
Exit the program mode & reset the coin box amount to 0 zero, (see
Re-Setting the Coin Box Amount to Zero below)
Re-Setting the Coin Box Amount to Zero
1. Lift the handset off-hook & listen for dial tone.
2. Dial * (star) # (pound) 5 (five) + your 4-digit coin box amount
security code.
Verify that the voice prompt in the handset repeats "0".
Determining the Coin Box Amount
1. Lift the handset off-hook & listen for dial tone.
2. Dial * (star) # (pound) 4 (four) + your 4-digit coin box amount
security code.
The voice prompt in the handset should then prompt the current coin
box amount.
S-310 DIAGNOSTIC PROCEDURES
Use the following procedures to verify proper operation of hardware
components. If any of the diagnostic tests fail, check the Trouble-
shooting Guide for help.
Entering the Diagnostic Mode
1. Enter the program mode.
2. Dial 9 (nine) 0 (zero) 2 (two)
Performing Keypad Test
1. Make sure phone is in diagnostic mode.
2. Press each key on the keypad (except the * star key) and verify
that the voice prompt in the handset repeats each number you press.
Performing Coin Validation Test
1. Make sure phone is in diagnostic mode.
2. Deposit a quarter & verify that the voice prompt in the handset
repeats "25 cents".
3. Deposit a dime & verify that the voice prompt in the handset
repeats "10 cents".
4. Deposit a nickel & verify that the voice prompt in the handset
repeats "5 cents".
Performing Relay Refund & Collect Test
1. Make sure phone is in diagnostic mode.
2. Deposit a coin.
3. Dial * (star) 1 (one) & verify that the coin is refunded into the
coin return bucket.
4. Deposit another coin.
5. Dial * (star) 2 (two) & verify that the coin is collected into the
coin box.
Performing Battery Voltage Test
1. Exit diagnostic mode.
2. Lift receiver & listen for dial tone.
3. Dial * (star) # (pound) 67 (six, seven)
One `beep' = good battery; Two `beeps' = marginal battery; Three
`beeps' = low battery
Performing Manual Battery Charge
1. Lift receiver & listen for dial tone.
2. Dial * (star) # (pound) 68 (six, eight)
3. Listen for "Please Wait" voice prompt & then hang up. The procedure
should last approx. 2 minutes & cannot be interrupted once it has been
started.
TESTING THE LOOP CURRENT LEVEL
A minimum of 22ma (mili-amps) (or 44VDC) loop current must be provided
to the CTR-201 from the Telephone Company's Central Office. In certain
situations, due to the distance between the Central Office and the
phone site, the loop current may not meet the required level of 22ma.
If the loop current is below 22ma, dial tone may not occur or the
phone may experience only momentary burst of dial tone. If the loop
current level is below 22ma, you should contact your Local Telephone
Co.
1. Locate a test meter (multi-meter) for this task.
2. Set the meter to Amps DC.
3. Make sure the incoming Telco tip wire is connected to the terminal
block (located at the base of the lower housing.)
4. Make sure the incoming Telco ring wire is disconnected from the
terminal block.
5. Connect one lead of the meter to the disconnected Telco ring wire.
6. Disconnect the pigtail cable ring wire (red wire) from the
terminal block.
7. Connect the other lead of the meter to the disconnected pigtail
cable ring wire.
8. Lift the handset off-hook and record the loop current level shown
on the meter. Verify that the reading is greater than 22ma (mili-amps).
FCC & EQUIPMENT SPECIFICATION
FCC Registration
FCC Registration Number: F2LUSA-24605-CX-E
Ringer Equivalency Number: 0.0B
This device complies with Part 15 of the FCC Rules.
This equipment complies with Part 68 of the FCC rules.
On the Chass is bracket of this equipment is a label that contains,
among other information, the FCC Registration Number and Ringer
Equivalence Number (REN) for this equipment. If requested,
this information must be provided to the telephone company.
The REN is used to determine the quantity of the devices that may be
connected to the telephone line. Excessive REN's on the telephone line
may result in the devices not ringing in response to an incoming call.
In most but not all areas, the sum of the REN's should not exceed five
(5.0). To be certain of the number of devices that may be connected to
the line, as determined by the total REN's, contact the telephone
company to determine the maximum REN for the calling area.
For compliance with state tariffs, the telephone company must be
notified prior to connection of the equipment (S-310) to the telephone
line. In some states, approval for equipment connection must be
obtained from the Public Utility Commission, Public Service
Commission, or Corporate Commission prior to connection.
If the terminal equipment (S-310) causes harm to the telephone
network, the telephone co. will notify you in advance that temporary
discontinuance of service may be required. If advance notice is not
practical, the telephone company will notify the customer as soon as
possible. You will also be advised of your right to file a complaint
with the FCC if you believe it is necessary.
The telephone company may make changes in it's facilities, equipment,
operations, or procedures that could affect the operation of the
equipment, (S-310). In this case, the telephone company will provide
advance notification in order for you to make the necessary
modifications to maintain uninterrupted service.
This equipment is hearing aid compatible.
ETL Listing
This equipment (S-310) is in compliance with the requirements of the
Standard for Telephone Equipment (UL-1459, Second Edition). This
equipment is listed by the ETL Testing Laboratories in compliance with
the above standard.
Electrical
Input Power-------------------------------------- Line Powered, loop start
Loop Limit--------------------------------------- 22ma to 90ma
Dialing-------------------------------------------- Pulse or Touch Tone
DTMF P21:53 15/05/01ower Level (LOW Group)----------- -10.5 dBm (min) into 600 ohms
DTMF Power Level (HIGH Group)---------- -8.5 dBm (min) into 600 ohms
DTMF Power Level (per pair)----------------- +1.0 dBm (max) into 600 ohms
DTMF Frequency Tolerance------------------- + 0.5% per frequency
DTMF Twist-------------------------------------- < 3 dB
Hardware
Housing Type------------------------------------ GTE / Quadrum Style Housing)
Environmental
Temperature-------------------------------------- - 40° to +150° F (-40° to +65° C)
Humidity------------------------------------------ - 0 to 95% relative, non-condensing
W W W . N E T T W E R K E D . N E T
-
<phlux> least your girlfriend isnt saying she wants to marry you cuz shes
pregnant and needs a father to help raise her son
-
Nevada probes Vegas phone hacks
Do hackers control sin city? Adult entertainment operators, private eyes, a
bail bondsman and his bounty hunter all say they've felt the pinch from a
shady cyberpunk syndicate. Now the state has launched an investigation, and
there could be millions on the line.
By Kevin Poulsen
May 14, 2001 1:12 AM PT
Eddie Munoz knows a secret about Las Vegas.
As the operator of one of the city's oldest in-room adult entertainment
services, Munoz knows Vegas is a town fuelled by the unceasing buzz of money
and vice. When he was at the top of his game his phones rang 100 times a
day, and he dispatched private nude "dancers" (prostitution is illegal in
Las Vegas) to the hotels along the Strip fifteen to twenty times a night,
raking in, he says, $240,000 a year in referral fees.
That's not the secret.
The secret, Munoz says, lies in the hundreds of miles of modern glass fiber
and aging copper wire buried beneath the town's sun-baked streets, and in
the dozens of digital switches that speed data and voice from one end of the
Strip to the other. Munoz believes that for a decade a shadowy cabal of
criminals, corrupt insiders and professional hackers has had an illicit
stranglehold on Vegas cyberspace, and all but muscled him out of the adult
entertainment industry by selectively blocking, tapping and rerouting the
telephone lines crucial to the outcall biz.
"In this business, you receive your calls from 5:00 in the afternoon until
5:00 in the morning, and that's when they hit us," says Munoz. "It's like
you're the Maytag man. The phone will not ring."
These days Munoz is lucky if he gets one or two customers a night, and his
once great empire of vice is a threadbare operation run from an office in
his home, far from Vegas' neon core. He's hanging on primarily through his
hard-won ownership of nearly half of the five hundred licensed news racks on
the Strip, which he crams with stacks of his own paper, "The Las Vegas
Informer" -- twelve gritty pages of advertisements for "Red Hot Red Heads"
and "Hot Hot Hot Tall Sexy Blondes." Until recently, every phone number
advertised in the paper went to Munoz's switchboard, yet his phones still
didn't ring. The economics of the situation eventually forced him to sell
advertising space to a competitor to pay the rent.
Munoz believes Soranno is one of the masterminds of a plot to destroy his
business; Soranno says that's exactly the kind of talk that nearly got him
whacked.
Munoz's phone problems are legion; his log of trouble-reports stretches
longer than a junkie's rap sheet. Callers from outside Vegas, or from
payphones and cell phones, get through, he says, but hotel callers get false
busy signals, or reach silence, driving them into the arms of competing
services. Sometimes calls are rerouted directly to a competitor, he claims.
And when a would-be customer does get through, and Munoz dispatches a dancer
to the tourist's hotel room, she's likely to find another entertainer
already there. "Sometimes they beat us to the calls, like they're
listening," says Munoz.
At least three other adult entertainment outfits, a private investigator and
a bail bondsman have reported similar patterns. "I'd get half a ring, and
pick up the phone, and there would be no one there," says Hilda Brauer, the
former owner of the now-defunct "Sexy Girls" outcall service. In 1998,
Brauer filed suit against the local phone company, a competitor she blamed
for the problem, and the publisher of the Donnelly Directory, in which Sexy
Girls had seven full page ads. She later dropped the suit, closed her
business, and now makes her living telling fortunes for a psychic hotline.
"I lost my home, I had to sell my furniture to get money to move into an
apartment," says Brauer.
Peter Vilencia, a former bail bondsman, had phone problems as well. Vilencia
purchased Bail Bonds Inc. in 1996, and, after a week of brisk business
springing drunken tourists and small time crooks from the Clark County
Detention Center, he suddenly suffered a sharp drop in call volume. "At 4:00
in the afternoon Friday, my phone would stop ringing," says Vilencia, who
sold the company last year. "Almost every weekend for nearly four years, you
could set your watch by it."
Sabotage defies testing
"We would lose our phones from Friday night, through the weekend, and that's
the most common time people get arrested," recalls Mike Kapfer, Vilencia's
former bounty hunter. Sometimes the phones would half-ring, as though call
forwarding was in effect; more commonly, inmates would seem to be switched
to a competing bond writer in mid call. Only calls from the jail were at
risk. "If I tried calling the number from my cell phone, it would go
through," says Kapfer.
Both men agree with Munoz and Brauer that someone is pulling strings from
deep within the network. "I had guys watching the building in the back where
the phone lines come in, and the junction boxes down the street," says
Vilencia. "It had to be internal, nobody else had access."
But even after Brauer's lawsuit, years of formal complaints from Munoz, a
written complaint from a private investigator who claimed to be losing
calls, and two stories about the call diversion allegations in The New York
Times, the local phone company is adamant that nothing is wrong.
"We've run our tests, we've spent time and resources on this, and we haven't
seen any indication of call diversion," says Scott Collins, of Sprint
subsidiary Central Telephone's department of regulatory affairs. Last
November, at the direction of the Nevada Public Utilities Commission (PUC),
the phone company ran three days of test calls from five different Las Vegas
hotels: the Sahara, Travel Lodge, Vagabond, Motel 6, and Four Queens. Of 205
calls, all but 23 went through, and none were diverted to competitors.
(Further investigation of the 23 incomplete calls turned up innocent
explanations.) Testing by AT&T in 1997 produced similar results.
Munoz blames leaks -- he says everyone knew the tests were taking place, and
the culprits deliberately let the calls slip through. But in December, a
reporter's call from a Vegas hotel also went through without incident.
Could the Vegas cyber jacking be a myth, woven from the detritus of failed
businesses and blurry technological anecdotes? If so, it's a myth that's
attained the status of 'common knowledge' on Vegas' nocturnal fringe, and in
one bizarre case, it almost made an adult entertainment operator the victim
of brutal mob reprisal.
Vinnie "Aspirins" and his power drill
It happened in 1998: An FBI investigation into police corruption in Vegas
turned up a six-man organized crime plot to muscle in on a handful of
successful Las Vegas outcall services, which had been trouncing a mob-backed
venture headed by one of the men, Christiano DeCarlo.
According to court documents, the conspirators, allegedly affiliated with
the Gambino crime family, were particularly interesting in moving in on
Richard Soranno, the owner of one of the town's largest services, Vegas
Girls. They believed Soranno had been diverting phone calls from
competitors, including DeCarlo, with the help of a mysterious computer
expert named Charles Coveney.
"Coveney has contacts in the Sprint Telephone Company and is able to have
telephone calls diverted from one number to another," the gangsters
believed, according to an FBI affidavit. The men expected to "persuade"
Coveney to leave Seranno "and assist DeCarlo in his out call business by
diverting telephone calls to DeCarlo." Among the persuasive tools at the
gang's disposal, an enforcer named Vinnie "Aspirins" Congiusti, flown in
from Tampa, who reputedly earned his nickname by once using a cordless power
tool to drill holes in someone's head.
When the mobsters began scouring Las Vegas for Coveney, the FBI was forced
to swoop in, prematurely pulling the plug on a massive undercover operation.
All six men later plead guilty to conspiracy. Vinnie "Aspirins" died in jail
from apparent heart failure last year.
Today, there's no love lost between Munoz and Soranno; Munoz believes, but
admits he cannot prove, that Soranno is one of the masterminds of a plot to
destroy his business, while Soranno says that's exactly the kind of talk
that nearly got him whacked. "It all got started because Munoz picked up on
a rumor and made it into a thing," says Soranno. "He put my life in danger."
The sex mogul says he doesn't know anyone named Charles Coveney, and has
triumphed in the adult entertainment trade purely through marketing skill
and general business acumen. "Munoz is the worst businessman in the world,"
Soranno says. "If you were the worst businessman in the world, would you get
calls?"
Telco: Vegas is hack proof
But even Soranno sees corruption in the ebb and flow of Vegas' telephonic
tide -- though not in Sprint's network. At some hotels, he believes, corrupt
insiders monitor the PBX logs for calls to adult entertainment services.
When they spot one, they leapfrog the service by sending their own
entertainer to the guest's room. "Once they know there's an interested
party, they can send someone up," says Soranno. If true, the tactic would
explain the duplicate-dancer scenario Munoz reports. "If a girl goes to a
call, and another girl is already there, the first thing they think is
someone's tapping the phone," says Soranno.
Sprint's Collins says that, as far as Sprint Central Telephone knows, the
company has never had a problem with corrupt employees or hackers of any
kind. "No one that we're aware of," says Collins. "We haven't had any
indication that any of that has happened."
The company came to the same conclusion in September 1995, in response to a
complaint filed with the Nevada PUC (then called the Public Service
Commission) by Hilda Brauer. According to documents in the case, the
commission's staff concluded that the volume of complaints suggested
something was indeed rotten in Vegas cyberspace, but there was no "probable
cause" to believe Sprint Central Telephone was culpable. The commission
noted that the telephone company had "followed established rules and
regulations and had turned up no evidence of an illegal intrusion into its
network."
For decades, regional and long distance telephone companies from coast to
coast have seen hackers gain control of critical systems. Most recently, in
1999 federal officials won guilty pleas from three members of a nationwide
hacker group they dubbed "The Phone Masters." Until the FBI raided them in
1995, The Phone Master had access to Sprint Long Distance, Southwestern Bell
and GTE computers, and in some areas of the country were able to obtain
unlisted phone numbers, monitor phone lines, and leverage their access to
crack unrelated systems, including the FBI's National Crime Information
Center (NCIC).
If Sprint Central Telephone has never been hacked, the company is a rarity
among telecommunications carriers. But SecurityFocus has learned that the
company's Las Vegas network may not be immune to hackers after all.
"Vegas was easy"
Until he went on the lam in the early nineties, Las Vegas was a
home-away-from-home for the world's most famous hacker, Kevin Mitnick, who
had family in town. And from approximately 1992 until his February 1995
arrest, Mitnick says he enjoyed substantial illicit access to the Vegas
network. What's more, he recalls once being approached with an offer to
redirect calls from an adult entertainment service for a single weekend, for
$3,000. "They wanted me to somehow take control of the line and forward it,"
Mitnick recalls."
"It would have taken, had I wanted to do it, all of three minutes."
Currently under court supervision after five years in prison, Mitnick is not
known to have ever cashed in on his hacking, and he says he never
participated in a call diversion scheme. But he points to two specific holes
in the Las Vegas network that would make such a scheme possible for a
knowledgeable insider, or a sophisticated hacker.
For starters, Mitnick says he had direct access to the control consoles on
Vegas' switching systems through dial-up modems. Each Nortel DMS switch had
a secret phone number, and a default username and password. The dial-ups
were normally inaccessible, and Mitnick had to call a Sprint employee and
pose as a technician to get the lines turned on, he says. Once that was
done, "I had the same access to the switch that the techs did," he recalls:
total control over how calls are routed.
With access to the switches, Mitnick found it useful to launder his calls
through sin city as an anti-tracing tactic, even when he was hiding out in
Seattle and Raleigh, North Carolina, "Vegas was easy," Mitnick says.
The second hole is a testing system pronounced "Callers" -- Mitnick says he
never saw its name in print, so he doesn't know how it was spelled or
capitalized. As he describes it, the system was designed to allow phone
company workers to run tests on customer lines, "loops" in the parlance of
telephony, from a central location. The system consisted of a handful of
client computers, and remote servers attached to each of Sprint Central
Telephone's DMS-100 switches.
Vegas' remote servers were poorly protected, Mitnick says. They were
accessible through low-speed dial-up modems, guarded by a technique only
slightly more secure than simple password protection: the server required
the client -- normally a computer program -- to give the proper response to
any of 100 randomly chosen challenges. "It would prompt you with a query,
and you would have to answer promptly," Mitnick says. "It was a number, like
54, and it had a certain hex response, like 3FAE."
Mitnick says he was able to learn the Las Vegas dial-up numbers by conning
Sprint workers, and he snagged the "seed list" of challenges and responses
from the company that made the system, Ontario-based Northern Telecom,
renamed in 1999 to Nortel Networks. "I had to call Nortel and have one of
the engineer's talk me though it," says Mitnick. "I told them I was writing
software that had to interface with it."
The system allowed users to silently monitor phone lines, or originate and
answer phone calls on other people's lines, Mitnick says. "All you needed
was a laptop and a phone." The implications go well beyond mere
call-napping. "Somebody with real criminal intent, in a city like Las
Vegas-- think of the possibilities."
Nortel spokesman David Chamberlin dismissed Mitnick's account as "wild
speculation" and "rumor." But a list on the company web site offers a
feature called "CALRS", "Centralized Automated Loop Reporting System," as an
option on the company's DMS line of switches. Elsewhere on the site, Nortel
literature describes CALRS as an "external test access system."
A Sprint spokesperson, and an attorney representing the company, both
declined to comment on CALRS, and would neither confirm nor deny the
existence of a poorly protected testing system that might be an open door
into the inner sanctum of Vegas' telecommunications infrastructure.
Public hearings set
The company may not be able to stay mum forever. After fielding years of
complaints, the State of Nevada is now taking Munoz's allegations seriously.
In February, over Sprint's objections, the PUC found "probable cause" for a
full investigation, and has scheduled public hearings for September.
Meanwhile, the commission is demanding answers. Last month it formally
served Sprint with a "data request" asking, among other things, whether the
company has ever been hacked. The company responded Thursday, once again
claiming that there was no evidence that it had ever suffered from corrupt
employees or outside intruders.
Sprint's Collins is no longer talking to reporters, referring calls to the
company's outside counsel, Patrick Reilly, a lawyer with the Nevada law firm
Hale Lane Peek Dennison Howard and Anderson. "To our knowledge, there's been
no evidence of a breach of the network," says Reilly.
"Now I have subpoena power," says Munoz. "Look out."
"Eddie's been knocking on people's doors, various governmental entities, for
years, and as far as I know this is the first genuine forum that he's
gotten," says Nevada PUC consumer complaint manager Rick Hackman. "Although
he hasn't convinced us that Sprint is at fault, we believe that he deserves
the forum to make his case in front of the full commission."
The PUC decision to hold hearings is an enormous victory for Munoz, and it
raises the stakes for Sprint Central Telephone. If Munoz prevails, the
commission could impose monetary fines and sanctions. Further, Munoz says
he'll sue the company for $20 million.
That's the price, he says, for ten years of lost business, in a period
that's seen mind boggling growth in the city. Construction of super hotels
like the Bellagio, the Venetian, Paris, and Aladdin have pushed Las Vegas'
guest capacity to over 120,000 hotel rooms, and the city now hosts some four
thousand conventions each year. And that's a lot of people who could have
been trying to call one of Munoz's Hot Hot Hot Tall Sexy Blondes.
--
p1asm1c/#hackcanada think he has discovered a condition in hackers and
phreakers once they reach the age of 19. This erratic behaviour
has been displayed by the clone and wizbone
<p1asm1c> i call it haxorpause.
-
+++++++++++++++++
+Poem by wizbone+
+++++++++++++++++
This is a poem
I wrote it myself
I can't write poems
So shut the fuck up
The only reason
I wrote this poem
was so I could published
In k-line #15
So please oh please
publish me clone
because if you don't
I'll cry like a girl
-
<cyb> jesus christ.. don't you know them alabama porch monkies HATE being
called kneegrows!?
-
GUTSCI Protocol
---------------
Hello, all. This is my first contribution to this zine, and I'm
sad to say it will be, for the most part a cut-and-dry and not to interesting
article that will propose some standards for the GUTSCI protocol.
GUTSCI, or Global Underground Technology Secure Communications Infrastructure
(pronounced gut-see) was first proposed by Agent Smith in a brief
article outlining the purpose and rational behind the protocol,
without going into much (any) specifics of how the technical aspects
should work.
You should be able to find Smith's original article at nettwerked.net,
unless the link is dead.
Basically, GUTSCI is a secure chatting, instant messaging, and file
transfer protocol. It's major focus is to develop a cryptographically
secure, anonymous peer-to-peer system. That means that we can't
rely on any central server whatsoever, all communication must use
open cryptographic standards, authentication must take place peer
to peer (this should prove to be exceedingly difficult...).
Anyways, I'm sure it's obvious by now that this model poses many
obstacles, not the least of which that peer-to-peer communication
is almost unheard of because of it's difficulty in designing a reliable
secure system around it, but I wholy believe it's possible.
One last thing before I jump into the technicalities of the program,
this project will only be able to grow and develop if we get lots
of feedback, suggestions, criticism, etc.
The Protocol
------------
The entire protocol will take place over a TCP/IP network. There will
be a standard (though adjustable) port. The port has yet to be
determined. All connections will use simple BSD sockets, connect() and
whatnot. This is so we can port it to the maximum number of operating
systems possible.
People can be running 3 different services on their machine at once,
although only 1 is required, all of them having their own standard
port number.
1 --- Server
2 --- Client
3 --- Messaging
Now what's all this about server/client? I thought it was supposed to
be peer-to-peer? Is this guy on crack? Well, that's none of your
damn business. Actually, since anyone can set up any of these services
and link them together effortlessly, it will still be a peer-to-peer
system. Keep reading.
Once the server is launched (probably as a daemon, and *NOT AS ROOT*)
it will just sit there listening for open connections. It will respond
differently to each request, of course. One notable case is that it
will be able to accept connections from other servers as well as clients,
enabling a network of GUTSCI severs to build up. More later.
The client connects to the server, and can issue it various commands,
but will inevitably either have the connection terminated, or be
joined to a chat room. More later.
The messanger will maintain a connection with the server, much like
the client, but will not be joined to a chat room, it will just sit
and listen for messages off the GUTSCI network. More later.
Connection Requests
-------------------
CHAT AS <name>
-Rather simple really. A client connects to a server, and the server
connects the client to a chat room with all the other parties that
have connected to that server then sends 'Ok.'. One last note:
everything sent to the server from a client is concatenated with the
name that the client submitted on the chatting request, so here might
be a typical connection:
Client connects to server.
Client sends -> CHAT AS JimmyJazz
Client recieves <- Ok.
Client sends -> Hey guys.
Server sends out to all clients -> <JimmyJazz> Hey guys.
etc.
Note: The actual messages will be encrypted, and this will be standardized
in the client, *not* the server.
RELAY <random string of text>
-Sends another relay to all of the server's it has LATCHed onto (more later),
except the one it got the RELAY request from. The RELAY that it sends will
have the exact same string of random text as the original RELAY.
LATCH <server> [port]
-Tells the server to make an attempt to latch onto <server>. The server
would go through a couple of steps first.
The server makes a connection to <server> on the optional port [port],
And does a RELAY. It then listens for 5 seconds to see if that random
string of text gets back to it. If it doesn't, then it adds <server>
to the BOTTOM of it's list of servers to connect to. Note, the LATCH
connection will still be open, and the server will send back either:
"Ok." or "Relay loop.". If it recieves "Relay loop." it will drop the
connection. If it recieves "Ok." then it also will add the server to
the BOTTOM of it's list of servers to connect to. Note, some error
checking must be in place to prevent a server from being listed more
than once in the list. Once this latch connection is open, messages
will be sent both ways in the connection. This is how the instant
messaging feature will work.
MESSAGING AS <name>
-The server forwards all messages destined to <name> to this person, as well
as relaying them to the next server. It will also take any messages from
this connection and then send it to all of it's LATCHed connections.
As you can see, the server offers little security whatsoever. All of the
encryption will be standardized in the client. Sure, you'll be able to use
somebody elses nick, and you'll be able to recieve all of his/her messages, but
you won't have their private key so you will be unable to read it.
Also, the client will encrypt all messages in a channel, so if you don't
have the particular key that people are using on that server, you won't
be able to read what they're saying.
NC Hack: Ok, I've already released some unpolished crappy code. The worst
part is, it doesn't follow this protocol at all. Yeah, that's funny.
It doesn't support messaging, you can't specify a name, basically all that
you do is connect to the server, it sends you a port number, you connect
to that port, and anything you send will be sent to anyone else on that
server. Check out the README included with that release for more info.
I intend to write a server that fully follows this protocol eventually.
The main body of code is in the gutsec program. Basically, this program
is a piece of tubing you can put in a pipe (in unix, of course), and
if you specify the -e <key> option, it will 3DES encrypt everything
from stdin and send it to stdout. Likewise with the -d option, but it
decrypts. I also went to great lengths to make sure that only human
readable ASCII characters were transmitted through the pipe. Oh, and don't
use it for a reliable data transfer yet. It garbles about .5% of the text
you send through. Not bad, but I hope to fix this soon. Once I get all
the bugs worked out, I'm considering making a seperate program called
spipe or something.
Anyways, to be perfectly honest I'm beginning to reconsider the design
issues around GUTSCI, and I'm thinking maybe it should be either
an instant messaging protocol or a chatting protocol. Let me know what
you think.
I'm even thinking of maybe dropping this project, and working on a secure
client for IRC since IRC is already an established interface, and has
proved to be extremely popular, and difficult to shut down. Maybe even
a trusted bot that has a key from everyone, and when it gets a message,
it decrypts it, encrypts it with the destinations key and sends it to him.
Of course this raises question's like "Can I trust the bot owner?" and "Is he
logging my messages?". Maybe the bot could be a public key server. Anyways,
I'm itching to do something. Let me know what you think.
Fractal
doug@bearcountry.cjb.net (I should see if I could get @hackcanada.com...)
Fractal irc.h410g3n.com #hackcanada or #cpu (I should be running a server soon)
-
<Flopik> i can have sexual friendship with another english phreaker, i
have enought teddy bear .. sniff
-
-- Credits
Without the following contributions this zine issue would
be fairly delayed or not released, so thank you to the following people:
Cenobyte, Fractal, Kevin Poulsen, Nikola Tesla,
Nettwerked, The Clone, Wizbone, WNN
-- Shouts:
Hack Canada (#HackCanada), #CPU, #k-1ine, #altphreakingfaq
k-rad-bob @ b0g, Blackened @ Damage Inc., The Grasshopper Unit,
Flippersmack, Pyrofreak, _plappy, soap, and lastly to everyone
and anyone who contributes to the Canadian H/P scene.
;. .;.. ; ;. ;..
;.. .;..; .;.; .;; ;..
.;..;. .;..; .;.;...; ;..;..
.;. A .;. .;.
;.. N E T T W E R K E D ;..
;..;.. P R O D U C T ;..;..
.;..; ;..;..
; .;..;.;.. .; . .;. ..;..
.;.. . .; ..;..;..;.. .;
;..;. .;.. . .;.. .;.;.
..;. ..;.. .;. ;.;..;;..;.;
;.;;..;.. ;.;.; .; .
;.;..;. .;. ;.;:.;.
,;....;.
.;.;. .;.;
.;.;.;
.;.;
;..;.
.;.;;.; .;. ..; ;. > > > WE DON'T FUCK AROUND!