
Fabrice Planchon <fabrice@math.Princeton.EDU> writes:
Comme disait Adam Back (aba@dcs.ex.ac.uk):
Been looking at the RC5 crack project.
http://rc5.distributed.net/ has loads of flashy graphics, stats, etc. but no instructions!
seems they are in the final process of rewriting clients entirely, with a new protocol, etc... so they don't bother explaining how the old clients work. Still, I agree it sucks.
here is the best that I found on that subject in the rc5 list archive..
rc5.exe -l -a outland.hway.net -a2 rc5proxy.distributed.net -s -k 20 jonass@lysator.liu.se
-l is logging (writes to a file) -a primary server to use -a2 secondary server -s shows status -k number of blocks to buffer local. The larger number the less you have to be online
The client I have which I downloaded yesterday complains most of those arguments are illegal. I think the DOS version and the unix versions have different usage. Ben Byer <root@bushing.plastic.crosslink.net> wrote:
You want to download the "personal proxy", perproxy. It should be available on the same ftp site as the client. The proxy will buffer the keys and the answers for you... you just run the proxy on your machine, point it at rc5proxy.distributed.net, and you point your client at localhost.
This method works, in case any others are reading and trying this under unix. It's still chewing keys this morning. Adam -- Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`