Rocksolid Light

Welcome to Rocksolid Light

mail  files  register  newsreader  groups  login

Message-ID:  

It's hard to tune heavily tuned code. :-) -- Larry Wall in <199801141725.JAA07555@wall.org>


computers / Hacking / X-Ufhash NNTP header query

SubjectAuthor
* X-Ufhash NNTP header queryh4ck4fr33d0m
+- Re: X-Ufhash NNTP header queryAnonUser
`- Re: X-Ufhash NNTP header queryNeodome Admin

1
X-Ufhash NNTP header query

<de2486ec2b0a9ca2639e0f767f020c41$1@bchz4vggexx63qvy.onion>

 copy mid

https://news.novabbs.org/computers/article-flat.php?id=117&group=rocksolid.shared.hacking#117

 copy link   Newsgroups: rocksolid.shared.hacking
Path: i2pn2.org!.POSTED!not-for-mail
From: h4ck4fr33d0m@rslight.i2p (h4ck4fr33d0m)
Newsgroups: rocksolid.shared.hacking
Subject: X-Ufhash NNTP header query
Date: Fri, 27 Dec 2019 14:33:11 -0000 (UTC)
Organization: Rocksolid Light
Message-ID: <de2486ec2b0a9ca2639e0f767f020c41$1@bchz4vggexx63qvy.onion>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 27 Dec 2019 14:33:11 -0000 (UTC)
Injection-Info: i2pn2-novalink.localdomain; posting-account="retrobbs1";
logging-data="29831"; mail-complaints-to="usenet@i2pn2-novalink.localdomain"
User-Agent: Rocksolid Light (news.novabbs.com/getrslight)
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on novabbs.com
X-Spam-Level: **
X-Rslight-Site: $2y$10$r/62dfael6Z05RkNPq3HdOu.Yi/fOU98QnjHTittpwMnmauzF3HuW
 by: h4ck4fr33d0m - Fri, 27 Dec 2019 14:33 UTC

Hi, all
I'v been posting on newsgroups/usenet and trying to figure out how to query the X-Ufhash NNTP header that returns a long encrypted string to get meaningfull info
X-Ufhash : ZaQJEMf5JdvcWEOleKoXo4ljK0hv5rauvinj9qfPFH9gkEPA9vOw7Jqtkzj1SWuX6Q8ZeGvPfoGqFZipnXALeUtU8QLJQ513NMFAEVrNG2z3xZ48ksSy%2BKsEFCn6UJps8tZrNOrMiMKF%2FNofAzkyepiHCjV5CTN9PZ%2BV54b86ugEh9hPoGwPMgxFJJ8naz5uHr%2BHog6zUm4qfvxfrhgiuz17g%2BMO07eqsGuJ

is there some kind of way to decode ?
any ideas ?

thank's in advance

--
Posted on Rocksolid Light

Re: X-Ufhash NNTP header query

<f07c1a4ff20be9150cc48daea8121e2f$1@news.novabbs.com>

 copy mid

https://news.novabbs.org/computers/article-flat.php?id=118&group=rocksolid.shared.hacking#118

 copy link   Newsgroups: rocksolid.shared.hacking
Path: i2pn2.org!.POSTED!not-for-mail
From: AnonUser@rslight.i2p (AnonUser)
Newsgroups: rocksolid.shared.hacking
Subject: Re: X-Ufhash NNTP header query
Date: Sat, 28 Dec 2019 10:34:55 -0000 (UTC)
Organization: Rocksolid Light
Message-ID: <f07c1a4ff20be9150cc48daea8121e2f$1@news.novabbs.com>
References: <de2486ec2b0a9ca2639e0f767f020c41$1@bchz4vggexx63qvy.onion>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 28 Dec 2019 10:34:55 -0000 (UTC)
Injection-Info: i2pn2-novalink.localdomain; posting-account="retrobbs1";
logging-data="16184"; mail-complaints-to="usenet@i2pn2-novalink.localdomain"
User-Agent: Rocksolid Light (news.novabbs.com/getrslight)
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on novabbs.com
X-Rslight-Site: $2y$10$0DrDaS0O8SXeUZQN0P0xhOuVDk0H9UINWu/HsQRanOed3DRt.OKoe
 by: AnonUser - Sat, 28 Dec 2019 10:34 UTC

h4ck4fr33d0m wrote:

> Hi, all
> I'v been posting on newsgroups/usenet and trying to figure out how to query the X-Ufhash NNTP header that returns a long encrypted string to get meaningfull info

I don't have an answer for you but are you looking into header related changes when using tor? I've noticed some questions around the net about this and would be curious if something is modifying headers other than the standard news server doing so.

--
Posted on Rocksolid Light

Re: X-Ufhash NNTP header query

<qucg5o$1lmj$1@neodome.net>

 copy mid

https://news.novabbs.org/computers/article-flat.php?id=119&group=rocksolid.shared.hacking#119

 copy link   Newsgroups: rocksolid.shared.hacking
Path: i2pn2.org!i2pn.org!news.neodome.net!.POSTED!not-for-mail
From: admin@neodome.net (Neodome Admin)
Newsgroups: rocksolid.shared.hacking
Subject: Re: X-Ufhash NNTP header query
Date: Mon, 30 Dec 2019 09:31:37 -0000 (UTC)
Organization: Neodome
Message-ID: <qucg5o$1lmj$1@neodome.net>
References: <de2486ec2b0a9ca2639e0f767f020c41$1@bchz4vggexx63qvy.onion>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 30 Dec 2019 09:31:37 -0000 (UTC)
Injection-Info: neodome.net; mail-complaints-to="abuse@neodome.net"
User-Agent: NewsTap/5.3.5 (iPhone/iPod Touch)
Cancel-Lock: sha1:QaIHIiW0ufCUfXDSOzbGJnJl8Y0=
 by: Neodome Admin - Mon, 30 Dec 2019 09:31 UTC

h4ck4fr33d0m <h4ck4fr33d0m@rslight.i2p> wrote:
>
> Hi, all
> I'v been posting on newsgroups/usenet and trying to figure out how to
> query the X-Ufhash NNTP header that returns a long encrypted string to get meaningfull info
> X-Ufhash :
> ZaQJEMf5JdvcWEOleKoXo4ljK0hv5rauvinj9qfPFH9gkEPA9vOw7Jqtkzj1SWuX6Q8ZeGvPfoGqFZipnXALeUtU8QLJQ513NMFAEVrNG2z3xZ48ksSy%2BKsEFCn6UJps8tZrNOrMiMKF%2FNofAzkyepiHCjV5CTN9PZ%2BV54b86ugEh9hPoGwPMgxFJJ8naz5uHr%2BHog6zUm4qfvxfrhgiuz17g%2BMO07eqsGuJ
>
> is there some kind of way to decode ?
> any ideas ?
>
> thank's in advance

I doubt you’ll be able to get any meaningful information out of it. If I
understand correctly, it’s similar to X-Trace header - just a way to tell
that posts were sent by the same person. It’s there in case if you will
flood some group with a million of messages and someone will need to
automatically delete all those posts.

It’s the same with HTTP in I2P. HTTP server always gets your Base64-encoded
hash from you, otherwise it would not be able to support any kind of
sessions. Once you reboot I2P, that hash will be different. It also changes
automatically once a day or so.

--
Neodome

1
server_pubkey.txt

rocksolid light 0.9.7
clearnet tor