Cryptographic IRC? 15
cylent asks: "I have a close-knit group of acquaintances that like to communicate with each other often. Public IRC servers are fine for chit-chat, although for more in-depth discussions a more secure form of communication is preferred. I'm wondering what GPL'd software exists to provide for a secure form of realtime multi-party communication. Are there any IRC servers/clients that support any form of public key cryptography? Blowfish? 3DES? Are there any other proprietary "chat" programs available with a forte in cryptography?"
Gale (Score:1)
Still beta, but it works quite well
loopback (Score:2)
Have you considered Pig Latin? (Score:1)
S-talk (Score:2)
NOW NOW NOW NOW NOW NOW NOW NOW NOW (Score:1)
I'll accept that response... (Score:1)
(sinister laugh)
Other possibilities (Score:2)
Other possibilities: The easiest and fastest implementation I can think of, though a bit klunky, and requiring either a nice web admin or you to be the web admin, would be a HTML script (cgi) chat program and connect via SSL (you can generate your own cert, your interactants will have to trust it. big whoop. Problem is that it's not end-to-end, the chat will be in cleartext on the web server.
real-time manual encryption. IIRC, Syncrypt has a java interface that can encrypt what you highlight on screen, program independent, in Win32, via use of the clipboard. This could perhaps be automated via mIRC in windows environments?
You might investigate using Elliptic Curve crypto of some sort. It's soooo incredibly much faster, and if'n you go full-blown with sending PKI-style public-key crypto, separate messages to each recipient, speed will rapidly become an issue. Moreover, ECC 108 proved something like 50x harder to crack than RSA 512, and 163bit, which would still be lightning fast, would be much, much more secure.
AOL IM (Score:1)
--
Re:SSH (Score:1)
Re:AOL IM (Score:1)
You'd also loose all the advantages IRC have over such systems as AIM or ICQ.
SSH (Score:3)
For example:
1. Set up SSH config file with:
local port: 6667
remote host: [change to host with IRC server]
remote port: 6667)
2. Start SSH and log into the server with it. You should see a shell prompt.
3. Have BitchX, X-Chat or some other IRC client connect to 127.0.0.1 port 6667.
Tada! Instant security.
The old standby: talk (Score:1)
Another method would be to setup a small IRC server on one of your machines. Then have everyone connect to your machine with port forwarding on. You almost certainly don't want to trust the public IRC servers.
A somewhat higher-latency solution would be to set up a mailing list and some simple scripts, lets say called mailit and readit. mailit [filename] will encrypt the file with GPG then mail it to the list. readit listens for mail from that address (probably with help from procmail), and automagically decrypts the message and displays it on the screen (you type the passphrase when you first run it). This is just a random thought, there are probably problems with it that I'm not thinking of.
Someone was doing work on a talk/IRC type client which encrypted using Diffie-Hellman and Blowfish, but I can't think of the name right now.
Re:FYI: public key != {blowfish, (3)des} (Score:1)
Encrypted text (Score:1)
um... not quite (Score:2)
Connections from the ssh client to the ssh server are encrypted. Likewise, forwarded ports are encrypted via the same channel. One a connection gets bounced past the ssh server, it is no longer encrypted, since the ssh server has already decrypted that connection.
For example, in your example, the irc connection would be made to localhost, which the ssh client intercepts and encrypts and sends along to the ssh server. The ssh server then decrypts it and sends it on its merry way to the irc server. Anything listening between the ssh server and the irc server will be able to see a non-encrypted stream of data.
I think the point of the question was how to ensure a secure data path between each client end to end, which ssh port forwarding does not accomplish.