Log in

View Full Version : P2P securely


Silentnite
March 3rd, 2005, 01:46 AM
Ok, I have been doing a little reading, and hopefully you will find this as interesting as I did. Waste is a P2P program that makes it possible to have your own private P2P network along with encryption. I thought this would be a decent Idea for a Forum FTP of sorts. Even though we are currently working on GMAIL, and Mega has THE FTP, one more couldnt be that bad. Its called Fault tolerance right. :p


Fisty’s How to For WASTE!

What is WASTE?

WASTE is a P2P (file-sharing) Client that boasts increased SECURITY (privacy) and is best suited for small PRIVATE file-sharing networks.

**WASTE is built upon an underlying distributed network architecture that is similar to that of Gnutella. It consists of a distributed “peer to peer” network that allows communication between hosts based on the model of broadcast request routed reply, where a host sends out a broadcast message to the network, and zero or more hosts send routed replies that follow the path of the broadcast message back to the sender. WASTE uses 128 bit IDs for each new broadcast message, so that each node can track which broadcast messages it has seen, and so that it can route routed messages back to where the original broadcast message came from. Due to the logic of each node on the network, if there are multiple paths to a particular node from another node, the path that took the least time to broadcast is used for the routed reply.

Forum Thread: Nullsoft's Waste--A p2p proggie for small groups

Ok what that mumbo-jumbo really says is that WASTE is a decentralized P2P network. It was designed for small groups (up to 50 people) to have access to each others files in a secure network. When one computer connects to another computer and you start sharing files, the data that will be transfered will use the path of least resistance and thus arrive in the shortest amount of time.

Setting Up!

It’s a lot easier than you think!

This is meant to be for the TOTAL n00b, a step by step guide to hold your hand right up to the end. That’s why it is so long.

The hardest thing about WASTE is exchanging IP’s and Public registration keys. Think of the keys as a way to unlock the doors of houses that are filled with MP3 goodness. The only problem with these keys is the that you have to exchange your key for someone else’s that is already on a network Other than that is a piece of cake.

First, get the program :
http://slackerbitch.free.fr/waste/waste-setup.exe
http://waste.2mbit.com/waste-setup.exe

All the above links are from zeropaid's thread :
http://www.zeropaid.com/bbs/showthr...?threadid=10940


**Next follow all the instructions to install it.

1. Download the WASTE installer from where you can find it...

2. Run the installer. Select whatever directory you choose to install to.

3. When prompted to move the mouse around to generate randomness, move the mouse around until the progress bar is full.

4. The WASTE Profile Setup Wizard should appear. Enter a nickname which you want to be known as on the network.

5. Select your approximate internet connection speed, then hit Next.

6. Click 'Run key generator...' which will allow you to generate a key pair for use with WASTE.

7. Enter a password to encrypt your private key with. This will prevent someone who gains access to your computer from stealing your private key. The password should be good and hard to guess. Then hit Generate.

8. At this time you should move your mouse around in the WASTE Key Generator Window a ton in order to generate lots of randomness. You will know you have done enough when the window says "Generating key pair...". When the generation is complete, WASTE will give you a message box telling you how long it took to generate the key. Hit OK.

9. At this point you should copy your public key to the clipboard using the button labeled "Copy my public key to the clipboard" and then paste it into an email/IM/whatever to give it to the person(s) you wish to connect to.

10. You should also acquire the public key of the person(s) you wish to connect to via some means, and then click the "Import public keys..." button in order to import their keys. Once you import their keys, there should be a message in the setup wizard telling you how many keys are loaded total.

11. Hit Next.

12. (Optionally) select a path to save new files in, and path(s) to allow people access to.

13. Hit Run.

14. WASTE should open with two windows, a main "buddy-list" type window, and a "Network Status" window. Go to the text entry field at the top of the network status box, and type in the host name of the person you wish to connect to. If when you hit enter something appears for a quick flash in the host list, and then disappears, it probably means that you don't have each other’s public keys. To double-check what keys you have, hit Ctrl+P to go to the preferences, then go to Network/Public Keys tab.

15. To browse the network, hit Alt+B to open the browser, then click the upper left icon in the browser window to refresh. You can also type in search terms in to the browser address at the top to search.

Everything in Italic font was from this thread :
http://www.pctechtalk.com/forums/sh...15&pagenumber=3
Which originated from this page :
http://www.dhorrocks2003.pwp.blueyonder.co.uk/

Setting up the keys and connecting to the network

Now you need to get your private key.
Make sure waste is installed and running.
Go to the small box and…

FILE> PREFERNCES>highlight PRIVATE KEY (under NETWORK)>click COPY MY PUBLIC KEY TO THE CLIPBOARD.

Paste this key into Notepad. Notepad works well and I have also used Word.

Give this key file to someone else with waste.

Now get the above mentioned persons key file. Have them dcc it to you in a text file or a simple cut and paste in an email works well.

Importing the key

FILE> PREFERNCES>highlight PUBLIC KEY (under Network)> click ADD> paste their FULL key in the box at the bottom, (even the thing that says WASTE_PUBLIC_KEY_END ). Click the ‘load key text’ button that’s underneath the box where you cut and pasted.

Or

If you have their file saved on your computer somewhere:
FILE> PREFERENCES > ADD> browse for key.txt file > click open > pop up msg window verifies "key added"

Now that they have your key and you have their key…

Setup the name of the network you wish to connect too

FILE> PREFERENCES>NETWORK>and in the box under network name/ID, put in the group user name. If you are on a private network you have to get this correct. I am pretty sure that this is also case sensitive. I noticed that some people who attempted to connect to a network and didn’t have the case set correctly had some trouble, which after some finagling they managed to connect after the reset their ID

To connect to the group or network

VIEW>click NETWORK STATUS> IP of the person you PREFERENCEShavPREFERENCESe edid notxchanged keys with, either that or place their user name, I have yet to successfully connect with user names, so far its been IP’s…


Trouble connecting?

On your virgin connect the window says, “network down”. Just shove the IP of someone who is currently on and has your key and IP.

Exchange IP’s and keys with someone who (is new to you and) is on the network and has an open connection space, if you can’t connect with the first person you switched keys with.

Common n00b probs: (after you have connected)

Lets say the same person keeps connecting to you, and it wont stop, in “NETWORK STATUS” check to make sure that that box is BLANK once you have connected to the network. Make sure that the idiot connecting to you has also taken your IP out of that box and has left it blank.

If you drop that message box menu (network status window), you'll find all user IP’s that you have entered there is STILL there. The excess IP's can be manually removed from default.prO (waste folder)...as multi IP’s in that list has the proggie attempting multiple connections (even cloning)-Ldylaffs

MAC users, there is supposedly a compilable file out for this program. BUT our resident MAC user and boy genius says that it won’t compile for him PLUS he says that he will have to build a GUI for it. Whenever he gets the time to do this he says he may, we will (on his permission) make this available to you....


This is meant to get you started. Once you are up and running, play around with different settings that suit your needs. You guessed it, they are in FILE> PREFERENCES

Advice

Keep a text file of all the keys of your network in a safe place, and keep your old key as well in case you need to reinstall your program.

Play around with your settings. In PREFERENCES, there is a place where you can disable browsing of your files. It doesn't mean you'll be leeching, it just means that people can't wander through your directories. They will still be able to search and d/l the old fashion way.

Remember to keep your network secure. It is only as safe as you keep it, be careful who you let in. This is one way you can flip the finger to the powers that be...

Final word

Maybe later another tutorial will follow on more advanced functions, the consequences of some options, and how to best effect security.

If this is going to be cut and pasted to other sites, please 1) Pimp the site and post a link that was nice enough to share this, www.pctechtalk.com and 2) leave the authors name in it. 3) Leave the links to other sites, where Fister ripped stuff off of. We are all in this fight together, so lets help each other out.

Shouts out to Raztro for helping out on the virgin net, ldylaffs for the editing, and all the Techtalkers for their input and support and for joining up!

Fister

EDIT: Links fixed.

Thoughts anyone?

Chris The Great
March 6th, 2005, 03:26 AM
Hmm, would it scale up easily to have a few thousand members? After all I'm sure alot of members would use this, much more then the number who use the ftp. However the problem I see with it is that each person would have to get the information of EVERYONE else on the network. Perhaps a list could be made for this, and anyone who wishes to join the network merely has to copy the list into the program, and put their key onto the list. But then it's not very secret at all now is it :(

I find the fact that is decentralized to be very interesting, after all a single computer failing or being taken out of service will not affect the network at all. This also means that unlike bittorrent it won't be useless if the tracker isn't working.

malzraa
March 6th, 2005, 12:21 PM
There is also this- http://tor.eff.org/ it is better than regular proxying because it automatically chains, and it always has working clients. And there also is this http://freenet.sourceforge.net/ which is also totally anonymous. Tor will work for any p2p client, but freenet is a standalone protocol.