Yes, you read correctly.
It's been done.
grab the changed code from http://mein-bowl.de/oss/mcpsx
or directly from http://mein-bowl.de/oss/f...xchat_0.4.0-alpha.tar.bz2
this is by NO MEANS an official new mcps/xchat version!
this code is alpha, probably has bugs, might be insecure, blow up in your face.
it also depends on the OpenSSL library for doing the diffie-helman key agreement
i'm posting this here because i need your input and support.
if you're using mircryption with xchat and you feel confident enough to do so, please go ahead and test this code.
if you find any bugs or have suggestions, please contact me.
- doesn't use the name of the current query window if no parameter to /keyx is given (workaround: use /keyx NICKNAME)
- there are some return values, mostly from the OpenSSL functions that aren't being checked yet. this has to be done.
- makefile for windows needs to be modified
- only tested on linux x86_64
- doesn't compile on intel macs (known issue with all versions of mircryption/xchat)
i should note a few things that are different in the way i implemented DH1080
- there can only be one key exchange at the same time (to prevent mix ups of public keys)
- there is a 7 second timeout in which B has to answer to A's request to exchange keys
- there is a new command "DH1080_ABORT <reason>" to ignore requests with an optional reason
that's it, this doesn't break compatibility with either fish or mcps/mirc
thanks to dev00 (http://dev00.pytalhost.com/) there's now a windows build of the (latest) inofficial mircryption version.
this enables windows users to use the DH1080 keyexchange!
since I don't run windows, I haven't had a chance to test it yet myself.
There's a binary as well as source code with a working visual studio project available from http://voobar.follvalsch.de/mcpsx
The binary version is dynamically linked against OpenSSL 0.8.9i from http://www.slproweb.com/products/Win32OpenSSL.html which you'd have to install.