Rocksolid Light

Welcome to Rocksolid Light

mail  files  register  nodelist  faq  login

"Don't think; let the machine do it for you!" -- E. C. Berkeley


rocksolid / Hacking / Re: X-Ufhash NNTP header query

SubjectAuthor
* X-Ufhash NNTP header queryh4ck4fr33d0m
+- Re: X-Ufhash NNTP header queryAnonUser
`- Re: X-Ufhash NNTP header queryNeodome Admin

1
Subject: X-Ufhash NNTP header query
From: h4ck4fr33d0m
Newsgroups: rocksolid.shared.hacking
Organization: Rocksolid Light
Date: Fri, 27 Dec 2019 14:33 UTC
Path: i2pn2.org!.POSTED!not-for-mail
From: h4ck4fr33d0m@rslight.i2p (h4ck4fr33d0m)
Newsgroups: rocksolid.shared.hacking
Subject: X-Ufhash NNTP header query
Date: Fri, 27 Dec 2019 14:33:11 -0000 (UTC)
Organization: Rocksolid Light
Message-ID: <de2486ec2b0a9ca2639e0f767f020c41$1@bchz4vggexx63qvy.onion>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 27 Dec 2019 14:33:11 -0000 (UTC)
Injection-Info: i2pn2-novalink.localdomain; posting-account="retrobbs1";
logging-data="29831"; mail-complaints-to="usenet@i2pn2-novalink.localdomain"
User-Agent: Rocksolid Light (news.novabbs.com/getrslight)
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on novabbs.com
X-Spam-Level: **
X-Rslight-Site: $2y$10$r/62dfael6Z05RkNPq3HdOu.Yi/fOU98QnjHTittpwMnmauzF3HuW
View all headers

Hi, all
I'v been posting on newsgroups/usenet and trying to figure out how to query the X-Ufhash NNTP header that returns a long encrypted string to get meaningfull info
X-Ufhash : ZaQJEMf5JdvcWEOleKoXo4ljK0hv5rauvinj9qfPFH9gkEPA9vOw7Jqtkzj1SWuX6Q8ZeGvPfoGqFZipnXALeUtU8QLJQ513NMFAEVrNG2z3xZ48ksSy%2BKsEFCn6UJps8tZrNOrMiMKF%2FNofAzkyepiHCjV5CTN9PZ%2BV54b86ugEh9hPoGwPMgxFJJ8naz5uHr%2BHog6zUm4qfvxfrhgiuz17g%2BMO07eqsGuJ

is there some kind of way to decode ?
any ideas ?

thank's in advance

--
Posted on Rocksolid Light


Subject: Re: X-Ufhash NNTP header query
From: AnonUser
Newsgroups: rocksolid.shared.hacking
Organization: Rocksolid Light
Date: Sat, 28 Dec 2019 10:34 UTC
References: 1
Path: i2pn2.org!.POSTED!not-for-mail
From: AnonUser@rslight.i2p (AnonUser)
Newsgroups: rocksolid.shared.hacking
Subject: Re: X-Ufhash NNTP header query
Date: Sat, 28 Dec 2019 10:34:55 -0000 (UTC)
Organization: Rocksolid Light
Message-ID: <f07c1a4ff20be9150cc48daea8121e2f$1@news.novabbs.com>
References: <de2486ec2b0a9ca2639e0f767f020c41$1@bchz4vggexx63qvy.onion>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 28 Dec 2019 10:34:55 -0000 (UTC)
Injection-Info: i2pn2-novalink.localdomain; posting-account="retrobbs1";
logging-data="16184"; mail-complaints-to="usenet@i2pn2-novalink.localdomain"
User-Agent: Rocksolid Light (news.novabbs.com/getrslight)
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on novabbs.com
X-Rslight-Site: $2y$10$0DrDaS0O8SXeUZQN0P0xhOuVDk0H9UINWu/HsQRanOed3DRt.OKoe
View all headers
h4ck4fr33d0m wrote:


Hi, all
I'v been posting on newsgroups/usenet and trying to figure out how to query the X-Ufhash NNTP header that returns a long encrypted string to get meaningfull info

I don't have an answer for you but are you looking into header related changes when using tor? I've noticed some questions around the net about this and would be curious if something is modifying headers other than the standard news server doing so.



--
Posted on Rocksolid Light


Subject: Re: X-Ufhash NNTP header query
From: Neodome Admin
Newsgroups: rocksolid.shared.hacking
Organization: Neodome
Date: Mon, 30 Dec 2019 09:31 UTC
References: 1
Path: i2pn2.org!i2pn.org!news.neodome.net!.POSTED!not-for-mail
From: admin@neodome.net (Neodome Admin)
Newsgroups: rocksolid.shared.hacking
Subject: Re: X-Ufhash NNTP header query
Date: Mon, 30 Dec 2019 09:31:37 -0000 (UTC)
Organization: Neodome
Message-ID: <qucg5o$1lmj$1@neodome.net>
References: <de2486ec2b0a9ca2639e0f767f020c41$1@bchz4vggexx63qvy.onion>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 30 Dec 2019 09:31:37 -0000 (UTC)
Injection-Info: neodome.net; mail-complaints-to="abuse@neodome.net"
User-Agent: NewsTap/5.3.5 (iPhone/iPod Touch)
Cancel-Lock: sha1:QaIHIiW0ufCUfXDSOzbGJnJl8Y0=
View all headers
h4ck4fr33d0m <h4ck4fr33d0m@rslight.i2p> wrote:

Hi, all
I'v been posting on newsgroups/usenet and trying to figure out how to
query the X-Ufhash NNTP header that returns a long encrypted string to get meaningfull info
X-Ufhash :
ZaQJEMf5JdvcWEOleKoXo4ljK0hv5rauvinj9qfPFH9gkEPA9vOw7Jqtkzj1SWuX6Q8ZeGvPfoGqFZipnXALeUtU8QLJQ513NMFAEVrNG2z3xZ48ksSy%2BKsEFCn6UJps8tZrNOrMiMKF%2FNofAzkyepiHCjV5CTN9PZ%2BV54b86ugEh9hPoGwPMgxFJJ8naz5uHr%2BHog6zUm4qfvxfrhgiuz17g%2BMO07eqsGuJ

is there some kind of way to decode ?
any ideas ?

thank's in advance

I doubt you’ll be able to get any meaningful information out of it. If I
understand correctly, it’s similar to X-Trace header - just a way to tell
that posts were sent by the same person. It’s there in case if you will
flood some group with a million of messages and someone will need to
automatically delete all those posts.

It’s the same with HTTP in I2P. HTTP server always gets your Base64-encoded
hash from you, otherwise it would not be able to support any kind of
sessions. Once you reboot I2P, that hash will be different. It also changes
automatically once a day or so.

--
Neodome


1
rocksolid light 0.7.2
clearneti2ptor