About this document
Files included with Kiwi
Example of using Kiwi
This is a quick start guide, geared towards experienced users of the Unix operating system. More detailed instructions are in the file Start.html.
This is a basic description of some of the files in the kiwi package, and how to use them.
.kiwirc
. This file tells the Kiwi software
whether you have a sendmail or qmail system, the location
of your mail spool and/or the address you want to forward "good" mail to,
the log file to use, the encryption key, and the password so friends can
email you without needing to know an encrypted cookie. You also need to
decide on whether to forward "good" mail on, or append it to a mailbox you
specify.
tools
, secpass is used to generate a
random key for the encryption, to be placed in the kiwi_key field in .kiwirc
(using cut and paste). This program will only run on an operating system
with /dev/random
support, and with a copy of the perl
interpreter in /usr/bin/perl
. Any modern Linux distribution
will have /dev/random support and perl located at /usr/bin/perl.
When run with no arguments, you are given three cookies: One which times out (by default) in three days, one which times out in two weeks (this one is usually used for Usenet postings), and one which times out after 90 days.
Example: clicrypt
You can change the timeout values by varying kiwi_days_short, kiwi_days_mid,
and kiwi_days_long in your .kiwirc
file.
If you send out an email with the return address name+cookie@domain.com (or name-cookie@domain.com on Qmail systems), the email address will time out.
To encrypt an IP subblock, either set up the 'REMOTE_ADDR' environmental variable (or run it as a SSI on most web servers) or give it an IP on the command line. Details on using ipcrypt on an SSI-enabled web browser are in the file Webmailto.html.
Example: clicrypt 127.0.0.1
This program can also be used to encrypt a five-letter message, typically used for subscribing to announce mailing lists, or to give to people of marginal trust.
Example: clicrypt abcde
.forward
(or
.qmail
and .qmail-default
on qmail systems) that
determines if a message was sent to a valid cookie (or has the correct
password in the email address), and if so, either appends your mailbox
with the message in question, or forwards it to another email address you
have. If the cookie was rejected, then it discards the message and makes
a note in your maillog file.
A cookie will be rejected if the cookie does not decrypt to valid data (a randomly generated cookie has a 1 in 113 chance of being considered valid data), or if the time stamp in the decrypted cookie has expired.
If kiwi_password is defined in .kiwirc
, and someone sends
mail with the password in place of the encrypted cookie in the address,
the message will be accepted. This is useful for giving personal friends
an easy to remember email address. Care must be taken that the email
address with the password does not fall in to spammers' hands.
.pinerc
file:
sendmail-path=/usr/local/bin/wrapper -t
Example of using Kiwi:
$ cd ../src
[Paste the password generated by secpass (Not the above
example password), and put it in the kiwi_key field when you edit .kiwirc]
$ cp exmaple_kiwirc ~/.kiwirc
$ ../tools/secpass
If it pauses here, please type some random text to replenish the random seed
Random password with 96 bits of entropy: jzsmGA.Mtep7-tDD
[edit the .kiwirc file]
$ pico -w ~/.kiwirc
[you will get a number of compiling messages]
$ make
[The exact text will be different on your system]
$ ./clicrypt
fmx2v6v
[The exact text will be different on your system]
$ ./clicrypt 127.0.0.1
eqjq2b4
[Use the text you got from clicrypt above]
$ ./decode
fmx2v6v
[Your date will be different]
Data type: Long timeout
Message: 905972880, or Wed Sep 16 12:08:00 1998
[Use the text you got from clicrypt above]
$ ./decode
eqjq2b4
Data type: Truncated IP
Message: 127.0.0.0-16