💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › K1INE › k-1ine_… captured on 2022-01-08 at 16:17:56.

View Raw

More Information

⬅️ Previous capture (2021-12-04)

-=-=-=-=-=-=-

  k-23-(11)-02

  OoO=o=oOO=o=O=OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
      OoO=o=oOO=o=O=OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
                               OoO=o=oOO=o=O=>
  :    -`-             -`-      OoO=o=oOO=o=O=>
  ;  _|_--oOO--(_)--OOo--_|_      OoO=oOO==OoO=o=oOO=o=O=>
     |   � K-1ine Zine !   |      OoO=o=oOO=o=O=>
      ! issue 23, volume 11�      OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
         ---------O^O----        OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
  ;.              |__|__|       oOYourO=oO=oOO=Telstra=oSucks=o=O=>
                    || ||       OoO=o=oOO=o=O=OoO<FIDO>OO=<Is>o=O=<Dying>o=o=O=>
              ooO Ooo          OoO=o=oOO=o=O=OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
                          OoO=o=oOO=o=O=OoO=o=oOO=o=O=O=o=ooO=o=>
  
     ;`-.> January 2002 <=o=O=o=O=o=O

   
      'Heaps and Heaps of DTMF Beeps'


     "People demand freedom of speech to make up
      for the freedom of thought which they avoid." 
          
         - Soren Aabye Kierkegaard (1813-1855)

 _____________________________________________________________________________

 � .- Words from the Editor -. �                                              |

 *: [-] Introduction .......................................... The Clone    :*
 *: (-) Contact Information ................................... The Clone    :*
 *: (-) Advertisment .......................................... HackerSalvage:*
 *: (-) Link of the Month ..................................... The Clone    :*
 *: (-) K-1ine Mirrors ........................................ The Clone    :*
 *: (-) New Album Recommendation: Aphex Twin 'Drukqs' ......... Nettwerked   :*
 ____________________________________________________________________________

 � .- Documents -. �                                                          |

 *: (x) 'Canadian Packet Switching Networks' .................. The Clone    :*
 *: (x) 'Bell Express View... The Rest of The Story' .......... Absinth      :*
 *: (x) 'The GSM Security Technical Whitepaper for 2002' ...... The Clone/RT :*
 *: (x) 'How to rip off your local bookstore monopoly' ........ Diabolik
 _____________________________________________________________________________

 � .- Conclusion -. �                                                         |

 *: [-] Credits ............................................... The Clone    :*
 *: [-] Shouts ................................................ The Clone    :*
 _____________________________________________________________________________ 



  Introduction -

  Welcome to the newest issue of K-1ine... issue #23, volume number 11.
  We have a bunch of "great" article compilations for your liking. Take the
  time to read through them, and don't forget to submit something (relevant)
  - you might just be in the next issue (unlikely).
  
  I hope you enjoy this issue (you better)... see you next month (unlikely).

 -->

 Contact Information;
 =-=-=-=-=-=-==-=-=-=

 Comments/Questions/Submissions: theclone@hackcanada.com

 On IRC: irc.2600.net - #hackcanada, #cpu (key)

 Check out my site: (Nettwerked) http://www.nettwerked.net

 -->

                             -- Advertisment --

          +++              WWW.HACKERSALVAGE.COM               +++

           HackerSalvage.com is a non-profit website dedicated to
            keeping old hardware in circulation. Many of us have
           piles of it sitting around but can't just toss it out.
             Here you can post computer items for sale or post a
           want ad for items you are looking for. A perfect place
           to get rid of perfectly good junk.... and get some new
                         stuff to rebuild the pile.
          +++                                                  +++ 

 --


 --=[ LINK OF THE MONTH ]=--

 Every month I post one really great "link of the month" on every issue
 of K-1ine magazine. The link can be anything in the technology industry,
 music scene, rave scene, punk scene, or even a good article you read on a
 news site. I'll be taking submissions via e-mail or IRC right away;
 so get your links in and maybe you'll see it in the next issue of K-1ine!

 For the month of January, the link of the month is:

	    http://www.prisonangels.com/main.html
	  This is a free service for all inmates and
         penpals wanting to correspond with each other.

        

 [submitted by: The Clone]

--

 K-1ine Mirrors:

        http://the.wiretapped.net/security/info/textfiles/k1ine/


 "Wiretapped.net is an Australian site offering an archive of open
 source software, informational and advisory textfiles and radio/conference
 broadcasts covering the areas of network security, network operations,
 host integrity, cryptography and privacy. We aim to become the largest
 archive of this nature in the Asia/Pacific region through steady growth
 of our archives and regular updates to them (most updated nightly).
 We are proudly telehoused on a 10Mbit/sec connection by Connect.com.au using
 OneGuard hardware donated by eSec Limited. The archive, along with its
 sister site on the same machine, The AusMac Archive, generates between 10
 and 60 gigabytes of outbound traffic daily. Wiretapped.net is hosted in
                            Sydney, Australia."

 --


		  New Album Recommendation: Aphex Twin 'Drukqs'


    If you like experimental music, you'll like this album.
    Stuffed with all the experimental/classical/breakbeats
    you could ever want in your lonely pathetic lives.

    Buy it NOW: http://www.warprecords.com/mart/music/release.php?cat=WARP92
 

  --

				  Canadian Packet Switching Networks

 
     Last Updated: 01/15/02
     Compiled By: The Clone

     theclone@hackcanada.com
     http://www.nettwerked.net

     The following is a list of the currently
     known Packet Switching Networks in Canada.


   NAME:                     DEFINED:                              DNIC:        PROTOCOL:

   AGNPAC                    Government of Alberta                              X.25

   AT&T CANADA               Long Distance Services FasPac         3026         X.121

   AT&T CANADA               Packet Switched Public Data Network   3028         X.121

   CNCP PACKET NET           Unitel/AT&T Network                   3028         X.25

   CNCP INFO SWITCH          Unitel/AT&T Network                   3029         X.25

   DATAPAC                   Links Computers                       3020         X.25

   DATAROUTE                 Large Users

   DATALINK                  Small Users

   DIALCOM                   Worldwide Messaging

   ENVOY100                  Messaging

   EXTEN                     Voice Messaging

   FACSROUTE                 Facsimile

   FASPAC                    Links Computers                       3026         X.25

   FAXCOM                    Facsimile

   GLOBEDAT                  *UNKNOWN*                             3025         X.25

   GLOBEDAT-P                *UNKNOWN*                             3025         X.25

   GLOBEFAX                  Overseas Facsimile

   INET 2000                 Databases

   INFOGRAM                  *UNKNOWN*                             3028

   INFOSWITCH                *UNKNOWN*

   NORTH AMERICAN GATEWAY    ATM/Frame Relay Network               3035

   POSTPAC                   Canada Post                           3038         X.25

   SPRINT CANADA             Frame Relay Service                   3036         X.121

   STENTOR                   Data Network Gateway                  3022         X.121

   STENTOR                   Stentor ISDN Identification           3023         X.121

   TELECOM CANADA            Datapak Network                       3020         X.121

   TELECOM CANADA            PSTN Access                           3021         X.121

   TELEGLOBE CANADA          Globedat-C Circuit Switched Network   3024         X.121

   TELEGLOBE CANADA          Globedat-P Packed Switched            3025

   TELEPOST                  Messages At The Post Office

   TELESAT CANADA            Anikom 200                            3039         X.121

   TELETEX                   Text                                  2861

   TMI Communications        Mobile Data Service (MDS)             3037         X.25

   TRADEROUTE                Electronic Data Interchange

   TYMNET CANADA             WorldCom                              3106         X.25

   WPMAIL                    E-mail

  -

  .end

 -

 <Flopik> Why I have stupid quote on all klined.. sniff

 -


  Bell Express View... The Rest of The Story

  Hey just in case you wanted to know for the BEV hack on your page
  (http://www.hackcanada.com/canadian/scams/bell_xpress_vu.txt)
  most of it is right but, some people might get surprises...
  Small corrections/updates to apply :

 * Disclamer: I pass this to you for informational purposes only as it was
              passed to me.  Whatever you do with is your own responsibility *

 * Password is required only if system has been locked by user
   default password is 1234, if you don't know, err remember, password
   you're fucked, almost ( see later)

 * The phone line test is required everytime you want to order a pay per view
   whether it be a movie or an event like boxing or whatever.

 * All the information about pay per view is included on the smartcard. This
   information is written only when movie is watched, if you don't watch it,
   you don't pay for it.  Be careful however cuz if you order something you
   don't want and go channel surfing, even if you have the channel only for 1
   second it is as if you watched the whole thing.

 * That also means that if you loose signal (rain/snow fade) before ppv, change
   the channel and don't go back on it, order it again when everything is back
   up ok, cuz they don't credit anything in that way, even if you're a very
   lucrative customer.

 * If all receivers in same account order same ppv on same day at same time, it
   will only be billed once.

 * Smartcard has a built-in pay per view limit, should be around 50$ or
   something like 10 movies.  When you plug your phone line, all this is dumped
   to your bill and smartcard counter is reset to zero so you can order again.
   Yes that means you can be billed for stuff ordered over a year ago.

 * To know what is currently stored on your smartcard use remote and go to
   "menu - system setup - purchase info" (menu-6-5<4 if receiver is 1000>)

  Ok that's all good stuff to know you'll say but what about passwords ?
  It would be pretty dumb to have to buy a whole new receiver just cuz you or
  your friend lost a password and can't order pr0n anymore !!  Well you'll be
  happy to know that techies over there don't do it for nothing.  They ask you
  a bunch of questions like PIN (yeah they have that now on some accounts), full
  address, last bill ammount, programming, etc.  That's a lot of info and you
  probably don't remember it... but if you do they'll fix you up, set up a new
  pass and write it down in your file over there... But it's so much trouble.
  Now, they're not gods and can't control your receiver or your tv set over the
  phone so how do they reset they password ?  They don't !  They show you how
  and 98% of the time you'll forget how to do it again so it's not a big deal.
  Technically speaking, you don't reset the password, you "corrupt non volatile
  memory" which basically crashes the system and asks you to reboot it,
  restoring factory defaults. That means system is unlocked, password is 1!
  234, favorites lists and timers have been lost and the remote adress is back
  to 01 (now if you changed that before and you can't control the receiver
  anymore, remove the smartcard and press "record" on the remote (in sat mode
  of course) while on the "important system info" screen. putting the smartcard
  back in will just have the receiver reboot again). Now since most of this info
  is stored on the smartcard, I don't know if it clears the ppv list as well
  (feedback anyone ?). Yeah that's all good but "HOW" can you do this ????

 * Go in "menu - system setup - diagnostics" (menu-5 if 1000, menu 6-3 for all
   other receivers).  Now look at your remote, locate "info" "browse" "themes",
   see them ? no ?  info is under the "big circle" browse is to the right of
   select "small circle", theme is to the left. Now that you know where they
   are, press them in this order : info browse theme, withing 5 seconds. This
   should bring you to "memory dump & device status" window.  Check the 3rd box
   from the left in the top row, they call it "watchdog" and it is the number
   of times your system crashed or had a glitch.  If it is over 6 or has
   letters in it, you might considering replacing the receiver.  Now causing
   that memory crash causes some permanent damage to your receiver/card so do
   it at your own risk.  Ok so while you're on that same screen, press
   "tv/video", it will give you a message asking you to reboot.  Power off the
   receiver from the front pannel, it will turn back on by itself.  If you're
   stuck with a 1000, pull the plug, wait 30 secs and plug it back.  Voila !

   Hope this helps you all with your Bell Express View
 
   _Absinth_

   p.s. Did you know that they have over a million customers ? WOW ...

   12/20/2001

 -


			The GSM Security Technical Whitepaper for 2002


 Thursday January 10, 2002

 Researched, Written,
 and Compiled by:

       The Clone - theclone@hackcanada.com
              RT - r_t@mac.com

     Web-site: www.nettwerked.net


 A Brief Introduction to GSM

 The purpose of GSM Security

 GSM Encryption Algorithms

 GSM's Security Limitations

 A5 - Encryption Implementation

 GSM Security News Articles

 GSM Security Technical Papers

 Conclusion


   A Brief Introduction to GSM:

 Global System for Mobile communication (GSM) is a globally accepted standard for
 digital cellular communication. GSM is the name of a standardization group that was
 established in 1982 in an effort to create a common European mobile telephone standard
 that would formulate specifications for a pan-European mobile cellular radio system
 operating at 900 MHz. Today over 400 million people worldwide use GSM mobile phones
 to communicate with each other, via voice and short-message-service (SMS) text.

 This papers purpose was written to teach the masses currently known GSM Security
 Vulnerabilities, and to address concerns over some recently talked about (theoretical)
 GSM security vulnerabilities. We feel we need to address all security concerns in good faith,
 therefore this white paper was written to enlighten wireless carriers and end users. Please
 feel free to send all updates, questions, and concerns to The Clone and RT at their e-mail
 addresses (located on the top of the page).


   The purpose of GSM Security:

 Since all cases of GSM fraud against a specific wireless carrier will result in a
 substantial loss to the operator. This substantial loss may include the following:

 � No direct financial loss, where the result is lost customers and
   increase in use of the system with no revenue.

 � Direct financial loss, where money is paid out to others, such as
   other networks, carriers and operators of 'Value Added Networks'
   such as Premium Rate service lines.

 � Potential embarrassment, where customers may move to another
   service because of the lack of security.

 � Failure to meet legal and regulatory requirements, such as
   License conditions, Companies Acts or Data Protection Legislation.

    GSM Encryption Algorithms:

     A3 - The GSM authentication algorithm "placeholders" used in the GSM system.

     A5 - GSM stream cipher algorithm (GSM) / There are a series of implementations
          named A5/1, A5/2, ... The A5/1 is known as the strong over-the-air voice-
          privacy algorithm. A5/x (A5/2 ...) are weaker implementations targeted at
          foreign markets out side of Europe. There is also an A5/0 algorithm, which
          encloses no encryption at all. The A5 algorithm used for encrypting the
          over-the-air transmission channel is vulnerable against known-plain-text
          and divide-and-conquer attacks and the intentionally reduced key space is
          small enough to make a brute-force attack feasible as well.

COMP128 - one-way function that is currently used in most GSM networks for A3 and A8.
          Unfortunately the COMP128 algorithm is broken so that it gives away information
          about its arguments when queried appropriately. The COMP128 algorithm used in
          most GSM networks as the A3/A8 algorithm has been proved faulty so that the
          secret key Ki can be reverse-engineered at the SIM level (2^19 queries),
          and over-the-air in approximately eight hours.


COMP128-2 COMP128-2 algorithm out (revised A3/A8 reference algorithm)

  
    GSM's Security Limitations:

 Existing cellular systems have a number of potential weaknesses
 that were considered in the security requirements for GSM. 

 The security for GSM has to be appropriate for the system operator and customer:

 � The operators of the system wish to ensure that they could issue bills to the right
   people, and that the services cannot be compromised.

 � The customer requires some privacy against traffic being overheard.


  The countermeasures are designed to:

 � make the radio path as secure as the fixed network, which implies anonymity and
   confidentiality to protect against eavesdropping;

 � have strong authentication, to protect the operator against billing fraud;

 � prevent operators from compromising each others' security, whether inadvertently
   or because of competitive pressures.


  The security processes must not:


 � significantly add to the delay of the initial call set up or subsequent communication;

 � increase the bandwidth of the channel,

 � allow for increased error rates, or error propagation;

 � add excessive complexity to the rest of the system,

 � must be cost effective.

  The designs of an operator's GSM system should take into account,
  the environment and have secure procedures such as: 

 
 � the generation and distribution of keys, 

 � exchange of information between operators, 

 � the confidentiality of the algorithms. 

 
   Descriptions of the functions of the services:

  The security services provided by GSM are:

 � Anonymity So that it is not easy to identify the user of the system.

 � Authentication So the operator knows who is using the system for billing purposes.

 � Signaling Protection So that sensitive information on the signaling channel,
   such as telephone numbers, is protected over the radio path.

 � User Data Protection So that user data passing over the radio path is protected.


   Anonymity

 Anonymity is provided by using temporary identifiers. When a user first switches on
 his/her radio set, the real identity is used, and a temporary identifier is then issued.
 From then on the temporary identifier is used. Only by tracking the user is it possible
 to determine the temporary identity being used.

   Authentication

 Authentication is used to identify the user (or holder of a Smart Card) to the network
 operator. It uses a technique that can be described as a "Challenge and Response", based
 on encryption. Authentication is performed by a challenge and response mechanism. A random
 challenge is issued to the mobile, the mobile encrypts the challenge using the authentication
 algorithm (A3) and the key assigned to the mobile, and sends a response back. The operator
 can check that, given the key of the mobile, the response to the challenge is correct. 

 Eavesdropping the radio channel reveals no useful information, as the next time a new random
 challenge will be used. Authentication can be provided using this process. A random number is
 generated by the network and sent to the mobile. The mobile use the Random number R as the
 input (Plaintext) to the encryption, and, using a secret key unique to the mobile Ki, transforms
 this into a response Signed RESponse (SRES) (Ciphertext) which is sent back to the network.

 The network can check that the mobile really has the secret key by performing the same SRES
 process and comparing the responses with what it receives from the mobile.

  Implementation and Roaming

 The authentication algorithm A3 is an operator option, and is implemented within the smart card
 (known as the Subscriber Interface Module or SIM). So that the operators may inter-work without
 revealing the authentication algorithms and mobile keys (Ki) to each other, GSM allows triplets
 of challenges (R), responses (SRES) and communication keys (Kc) to be sent between operators over
 the connecting networks. The A5 series algorithms are contained within the mobile equipment, as
 they have to be sufficiently fast and are therefore hardware. There are two defined algorithms
 used in GSM known as A5/1 and A5/2. The enhanced Phase 1 specifications developed by ETSI allows
 for inter-working between mobiles containing A5/1, A5/2 and unencrypted networks. These algorithms
 can all be built using a few thousand transistors, and usually takes a small area of a chip within
 the mobile.

  World-wide use of the algorithms

 There are now three different possibilities for GSM, unencrypted, and use of the A5/1 algorithm or
 the A5/2 algorithm to secure the data. This arose because the GSM standard was designed for Western
 Europe, and export regulations did not allow the use of the original technology outside Europe.
 The uses of the algorithms in the network operator's infrastructure are controlled by the GSM
 Memorandum of Understanding Group (MoU) according to the formula below:

 � The present A5/1 algorithm can be used by countries which are members of CEPT.

 � The algorithm A5/2 is intended for any operators in countries that do not fall into the above category.

 Export controls on mobiles are minimal, and the next generation of mobiles will support A5/1, A5/2
 and no encryption. The protocols to support the various forms of A5 (up to seven) are available in GSM.

  Loss areas

 There are a number of areas that can be exploited, the most likely intention
 of all the techniques is the ability to make money at the lowest cost possible.

  Technical fraud

 Technical fraud is where a weakness of the system is exploited to make free calls.
 For example, Call Forwarding or Conference Call facilities may be used to give reduced
 price services to customers from a stolen mobile. These are often known as 'Call Sales Offices'.
 Hackers and phreakers are often able to gain access and exploit a weakness in the switching or
 billing system and gain the ability to make calls or financial advantage. In some cases hackers
 and phreakers can take over the entire billing system and routing system; thus causing convenience
 for customers and carriers.

  Procedural fraud

 Procedural fraud results from the exploitation of business processes, where a flaw or weakness can
 be used to gain money. It may be possible for example to get free calls from a stolen mobile, and
 sell the calls on for a lower cost than any legitimate network operator. This can be minimized by
 designing processes so that losses can be stopped by the use of correct and up to date policies,
 and by taking the opportunity to create a fraud away from the attacker or employee.

 Comparison with other frauds

 Many of the techniques that can be used to commit fraud on telecommunications networks can also
 be used for a mobile network. Analogue mobile phone systems (AMPS) were subject to being eaves-
 dropped (with conventional RF-Scanners available at electronics shops and Radio Shack), and the
 phones could be cloned (ESN snarfing over thin-air) so that bills were paid by the owner of the
 original mobile phone. Existing cellular systems have a number of potential weaknesses that were
 considered in the security requirements for GSM. Networks such as GSM, with international roaming
 and interactions with other operators (carriers), offer other opportunities for exploitation. GSM
 has been designed to offer various technical solutions to prevent misuse, such as strong authenti-
 cation, together with anonymity and encryption of the signaling and data over the radio. However,
 all systems are dependent on secure management deployment and special procedures; lapses in these
 areas have severe impact on the resilience of the business process to fraud. For example; many
 carriers still make use of the COMP128 encryption algorithm for both A3 (the authentication algorithm
 to prevent phone cloning) and A8 (the voice-privacy key-generation algorithm), which is fine for
 securing against simple over-the-air attacks. However we have determined, that the COMP128's voice-
 encryption algorithms only encrypt voice between the GSM wireless phone and the base station.
 It does not encrypt voice within the phone network, nor does it encrypt end to end. It only encrypts
 the over-the-air portion of the transmission. The attack on COMP128 takes just 2^19 queries to the GSM
 smart-card chip, which takes approximately 8 hours over the air. This attack can be tested on as many
 simultaneous phones in radio range as your rogue base station has channels.

  A5 - Encryption Implementation

 The documentation we have, which arrived anonymously in two brown envelopes,
 is incomplete; we do not know the feedback taps of registers 2 and 3, but we
 do know from the chip's gate count that they have at most 6 feedback taps
 between them. The following implementation of A5 is due to Mike Roe, and all
 comments and queries should be sent to him.


/*
 * In writing this program, I've had to guess a few pices of information:
 *
 * 1. Which bits of the key are loaded into which bits of the shift register
 * 2. Which order the frame sequence number is shifted into the SR (MSB
 *    first or LSB first)
 * 3. The position of the feedback taps on R2 and R3 (R1 is known).
 * 4. The position of the clock control taps. These are on the `middle' one, 
 *    I've assumed to be 9 on R1, 11 on R2, 11 on R3.
 */

/*
 * Look at the `middle' stage of each of the 3 shift registers.
 * Either 0, 1, 2 or 3 of these 3 taps will be set high.
 * If 0 or 1 or one of them are high, return true. This will cause each of
 * the middle taps to be inverted before being used as a clock control. In
 * all cases either 2 or 3 of the clock enable lines will be active. Thus,
 * at least two shift registers change on every clock-tick and the system
 * never becomes stuck.
 */

static int threshold(r1, r2, r3)
unsigned int r1;
unsigned int r2;
unsigned int r3;
{
int total;

  total = (((r1 >>  9) & 0x1) == 1) +
          (((r2 >> 11) & 0x1) == 1) +
          (((r3 >> 11) & 0x1) == 1);

  if (total > 1)
    return (0);
  else
    return (1);
}

unsigned long clock_r1(ctl, r1)
int ctl;
unsigned long r1;
{
unsigned long feedback;

 /*
  * Primitive polynomial x**19 + x**5 + x**2 + x + 1
  */

  ctl ^= ((r1 >> 9) & 0x1);
  if (ctl)
  {
    feedback = (r1 >> 18) ^ (r1 >> 17) ^ (r1 >> 16) ^ (r1 >> 13);
    r1 = (r1 << 1) & 0x7ffff;
    if (feedback & 0x01)
      r1 ^= 0x01;
  }
  return (r1);
}

unsigned long clock_r2(ctl, r2)
int ctl;
unsigned long r2;
{
unsigned long feedback;

  
 /*
  * Primitive polynomial x**22 + x**9 + x**5 + x + 1
  */   

  ctl ^= ((r2 >> 11) & 0x1);
  if (ctl)
  {
    feedback = (r2 >> 21) ^ (r2 >> 20) ^ (r2 >> 16) ^ (r2 >> 12);
    r2 = (r2 << 1) & 0x3fffff;
    if (feedback & 0x01)
      r2 ^= 0x01;
  }
  return (r2);
}

unsigned long clock_r3(ctl, r3)
int ctl;
unsigned long r3;
{
unsigned long feedback;

 /*
  * Primitive polynomial x**23 + x**5 + x**4 + x + 1
  */

  ctl ^= ((r3 >> 11) & 0x1);
  if (ctl)
  {
    feedback = (r3 >> 22) ^ (r3 >> 21) ^ (r3 >> 18) ^ (r3 >> 17);
    r3 = (r3 << 1) & 0x7fffff;
    if (feedback & 0x01)
      r3 ^= 0x01;
  }
  return (r3);
}

int keystream(key, frame, alice, bob)
unsigned char *key;   /* 64 bit session key              */
unsigned long frame;  /* 22 bit frame sequence number    */
unsigned char *alice; /* 114 bit Alice to Bob key stream */
unsigned char *bob;   /* 114 bit Bob to Alice key stream */
{
unsigned long r1;   /* 19 bit shift register */
unsigned long r2;   /* 22 bit shift register */
unsigned long r3;   /* 23 bit shift register */
int i;              /* counter for loops     */
int clock_ctl;      /* xored with clock enable on each shift register */
unsigned char *ptr; /* current position in keystream */
unsigned char byte; /* byte of keystream being assembled */
unsigned int bits;  /* number of bits of keystream in byte */
unsigned int bit;   /* bit output from keystream generator */

  /* Initialise shift registers from session key */

  r1 = (key[0] | (key[1] << 8) | (key[2] << 16) ) & 0x7ffff;
  r2 = ((key[2] >> 3) | (key[3] << 5) | (key[4] << 13) | (key[5] << 21)) & 0x3fffff;
  r3 = ((key[5] >> 1) | (key[6] << 7) | (key[7] << 15) ) & 0x7fffff;


  /* Merge frame sequence number into shift register state, by xor'ing it
   * into the feedback path
   */

  for (i=0;i> 1;
  }

  /* Run shift registers for 100 clock ticks to allow frame number to
   * be diffused into all the bits of the shift registers
   */

  for (i=0;iBob key stream */

  ptr = alice;
  bits = 0;
  byte = 0;
  for (i=0;i> 18) ^ (r2 >> 21) ^ (r3 >> 22)) & 0x01;
    byte = (byte << 1) | bit;
    bits++;
    if (bits == 8)
    {
      *ptr = byte;
      ptr++;
      bits = 0;
      byte = 0;
    }
  }
  if (bits)
    *ptr = byte;

  /* Run shift registers for another 100 bits to hide relationship between
   * Alice->Bob key stream and Bob->Alice key stream.
   */

  for (i=0;iAlice key stream */

  ptr = bob;
  bits = 0;
  byte = 0;
  for (i=0;i> 18) ^ (r2 >> 21) ^ (r3 >> 22)) & 0x01;
    byte = (byte << 1) | bit;
    bits++;
    if (bits == 8)
    {
      *ptr = byte;
      ptr++;
      bits = 0;
      byte = 0;
    }
  }
  if (bits)
    *ptr = byte;
 
  return (0);

}



 GSM Security News Articles:

 'Cracking GSM's Security Code (date unknown)' (Mobile Computing Online)
  http://www.mobilecomputing.com/showarchives.cgi?3:2

 'ZDNet News: Cell phone flaw opens security hole' (Sept 18, 2000)
  http://www.zdnet.com/zdnn/stories/news/0,4586,2628754,00.html


 GSM Security Technical Papers:

  Miscellaneous:

  Berkeley Website: GSM Cloning
  http://www.isaac.cs.berkeley.edu/isaac/gsm-faq.html

  Department of Computer Science and Engineering: GSM Interception
  http://www.dia.unisa.it/ads.dir/corso-security/www/CORSO-9900/a5/Netsec/netsec.html

 SIM Card Technology:

  SIM Cards: At the Heart of Digital Wireless Security (.pdf / 1,842 KB)
  http://www.uwcc.org/pdfs/smart_cards.pdf


  Conclusion:

 We have contacted several people from the GSM Association
 (www.gsm.org) and asked about receiving spec and source
 for the updated COMP128-2 encryption algorithm. We are
 now awaiting approval, and will post all relevant info about
 COMP128-2 in later releases of this GSM security paper.

 Also, we're doing extensive research involving security
 vulnerabilities with EIR databases the contain all known
 IMEIs (International Mobile Equipment Identity) numbers,
 as well as physical vulnerabilities that allow software
 and hardware IMEI cloning. This information will be made
 available on the next release of this GSM paper as well.

   This document is Copyright (c) 2002 by Nettwerked.
      And by the other respective owners.

 -

 <emmanuel> it's a fucking irc server and you're on fucking irc so fucking fuck the fuck off

 -

 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
 How to rip off your local bookstore monopoly
 =-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
                                    2001 diabolik
                                    -=-=-=-=-=-=-


 disclaimer : I wrote this to bring to light a rather glaring hole.  I wrote it in
 a howto-ish sort of form to display how the system could possibly be abused, not with
 the intent that the actions below would ever be enacted.  Do not do this.  It is
 most likely fraud, and more importantly, morally wrong.  Upon acting out these steps,
 you take full responsibility for your actions and release me, diabolik, from any
 responsibility.  Yeah.

 So.  Indigo owns Chapters.  Chapters owns Coles.  Until later 2002 when Barnes&Noble
 cross the border, nearly every major bookstore in Canada is owned by the same company.
 Not cool.

 Wait, it really is actually.  Once Indigo bought Chapters, Heather Reisman decided to 
 amalgamate a bunch of things.  Firstly, the annoying discount card program is now the
 same at chapters, coles, indigo, etc.. irewards program.

 So what.  Save 10% off of regular priced books.  Yeah.

 Now, Chapters and Coles, and presumably Indigo, have a very jolly Canadian return policy.
 Bring back an undamaged book without a receipt and exchange the book or get gift 
 certificates back.  You can probably see where this is going.  Make a $100 purchase with
 a iRewards card (pay $90) at Coles.  Bring the books back to Chapters and get $100 in 
 gift certificates.  Make a $111 purchase ($100/0.9) at chapters (or coles), paying $100,
 and bring the books back to either place and receive the full $111, which buys you $123 
 worth of books.

 You don't need both a Coles and a Chapters, but it helps - the more entities you can
 return the books, the less times you have to frequent either.  And you can be funny
 about it - buy all the copies of a certain book from Chapters and return them all to
 Coles (they'll catch on to this, the SIMS computer system at Coles will show a return
 of larger quantity than ever ordered, however that won't be noticed until days later.

 I'm not sure if Chapters' tills would notice the erroneous return sooner - however, just
 buy common books so that you're not the only sales of the title and therefore won't cause
 panic in the bookgeeks.  Be warned - Coles usually only employs around 10 people in their
 mall stores, and these people do have the mental capacity to remember people.  It would
 be suggested to do this ploy with multiple people, so that its less obvious.  Use New
 Release hardcover titles - about $50 apeice and are popular enough.  I'd suggest use
 audio cassetes but you wouldn't save 10% so it'd be useless.

 NOTE - register your iRewards card with fake info - they keep that in a main database and
 if they somehow correlated these returns without receipts with your purchases you would
 be in trouble.

 So, You've done this 7 times and doubled your money.  You still have only gift
 certificates, not real dough.  You can get the money out of this by -

 - buying books for people who were otherwise going to pay for them anyways.  You don't
 have to tell them your plan, you could just tell them granny gave you gift certificates
 and you wanna get rid of them.  However, this still forces you to involve more people.

 - when you order a book from Chapters, you have to often prepay for the book if its
 a rare title.  If this book cannot be ordered, you can go back and receive money for 
 the title because the computer doesn't keep track of if the book was prepaid with
 gift certificates or not.

 fuck corporations, eh?

 diabolik
 http://th.oughtpolice.net

 greetz - clox, hackcanada, nettwerked, heather herself, roy fans.

 flames - tron - stop killing me in LORD you bitch

 01/03/2002

-->

 -- Credits

    Without the following contributions this zine issue would be fairly
      delayed or not released, so thank you to the following people:

	    		 Absinth, Diabolik, RT, The Clone

  -- Shouts:

    Hack Canada (#HackCanada), Canadian Phreakers Union (#cpu), The Grasshopper Unit,
      Flippersmack, Pyrofreak, soapie, Fran�oise, `enjoy, Kybo_ren, Flopik, Pinguino,
       and lastly to everyone and anyone who contributes to the Canadian H/P scene.


                             ;.  .;..  ; ;. ;..
                           ;..   .;..; .;.; .;; ;..
                      .;..;. .;..;  .;.;...; ;..;..
                         .;.         A         .;. .;.
                       ;..   N E T T W E R K E D  ;..
                        ;..;.. P R O D U C T   ;..;..
                          .;..;               ;..;..
                     ;  .;..;.;..   .; .  .;. ..;..
                    .;..   . .;  ..;..;..;.. .;
                ;..;.   .;.. . .;.. .;.;.
              ..;. ..;.. .;.   ;.;..;;..;.;
                ;.;;..;..      ;.;.; .; .
                   ;.;..;. .;. ;.;:.;.
                     ,;....;.
               .;.;. .;.;
              .;.;.;
            .;.;
            ;..;.
           .;.;;.; .;. ..; ;. > > > > > > ... carpet beetles taste like chicken