Yes, you read correctly.
It's been done.
grab the changed code from
http://mein-bowl.de/oss/mcpsxor directly from
http://mein-bowl.de/..._0.4.0-alpha.tar.bz2this is
by NO MEANS an official new mcps/xchat version!this code is
alpha, probably has bugs, might be insecure, blow up in your face.
it also depends on the OpenSSL library for doing the diffie-helman key agreement
i'm posting this here because i need your input and support.
if you're using mircryption with xchat and you feel confident enough to do so, please go ahead and test this code.
if you find any bugs or have suggestions, please contact me.
known bugs:
- doesn't use the name of the current query window if no parameter to /keyx is given (workaround: use /keyx NICKNAME)
known issues:
- there are some return values, mostly from the OpenSSL functions that aren't being checked yet. this has to be done.
- makefile for windows needs to be modified
- only tested on linux x86_64
- doesn't compile on intel macs (known issue with all versions of mircryption/xchat)
UPDATEi should note a few things that are different in the way i implemented DH1080
- there can only be one key exchange at the same time (to prevent mix ups of public keys)
- there is a 7 second timeout in which B has to answer to A's request to exchange keys
- there is a new command "DH1080_ABORT <reason>" to ignore requests with an optional reason
that's it, this doesn't break compatibility with either fish or mcps/mirc
UPDATE! 2009-01-10thanks to dev00 (
http://dev00.pytalhost.com/) there's now a windows build of the (latest) inofficial mircryption version.
this enables windows users to use the DH1080 keyexchange!
since I don't run windows, I haven't had a chance to test it yet myself.
There's a binary as well as source code with a working visual studio project available from
http://voobar.follvalsch.de/mcpsxThe binary version is dynamically linked against OpenSSL 0.8.9i from
http://www.slproweb....ts/Win32OpenSSL.html which you'd have to install.