0% found this document useful (0 votes)
290 views

Nothing

The document lists various IRC networks and their policies regarding access from Tor users. It categorizes the networks based on whether they block Tor, want to provide access to Tor but are currently unavailable, try to provide access to Tor while respecting user privacy, or block Tor without respect for user privacy. Some networks that try to provide access include ECnet, Hackint, Darkscience, and KernelPanic, which offer onion addresses or policies to support anonymous users. Networks that block Tor include Mozilla, SwiftIRC, RASnet, and Undernet.

Uploaded by

HảiTrungLê
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
290 views

Nothing

The document lists various IRC networks and their policies regarding access from Tor users. It categorizes the networks based on whether they block Tor, want to provide access to Tor but are currently unavailable, try to provide access to Tor while respecting user privacy, or block Tor without respect for user privacy. Some networks that try to provide access include ECnet, Hackint, Darkscience, and KernelPanic, which offer onion addresses or policies to support anonymous users. Networks that block Tor include Mozilla, SwiftIRC, RASnet, and Undernet.

Uploaded by

HảiTrungLê
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

= List of IRC/chat networks that block or support Tor =

Some IRC networks, by policy, don't allow access from anonymous users. Mostly,
they do this because some (but not all, or even most) anonymous users are jerks,
and most IRC software doesn't provide a way to block jerks more sophisticated than
blocking them by IP address.(or the ability to provide new ip addresses on the fly
as one can generate new .onion transports on the fly)

Becoming unblockable by target services is '''not''' a goal of the Tor project; see
the FAQ entry on why this is both difficult and undesirable.

Sorting of IRC Networks suggestion: Put IRC networks supporting .onion v3 closest
to the top, then .onion v2 services next and lastly normal domain names. Put those
IRC networks supporting SSL closer to the top, but still keep the above sorting of
v3(transport), v2(transport), normal domains consistent. ie. even an .onion v2
transport with ssl doesn't go above an .onion v3 transport without ssl, as a domain
with ssl does not go higher than an .onion v2 without ssl. Also use common sense,
if for example you can't find any available IRC Networks when visiting a link maybe
remove it or put it at the end of the list.

== Networks that block Tor ==


* **irc.mozilla.org**
* [http://www.swiftirc.net SwiftIRC]
* [http://www.rmachine.net RASnet]
* [http://www.irc-hispano.org IRC-Hispano]
* [http://www.irchighway.net IRCHighWay]
* [http://www.undernet.org Undernet]
* [irc://SantaAna.CA.US.Undernet.org] (blocks all relays, not just exits)
* [http://dal.net DALnet]
* [http://www.slashnet.org SlashNet]
* [http://thundercity.net ThunderCity]
* [http://www.efnet.org EFnet] (most of the servers)
* [irc://irc.homelien.no]
* [irc://irc.dkom.at]
* [irc://efnet.xs4all.nl]
* [irc://efnet.demon.co.uk]
* [irc://irc.efnet.pl]
* [irc://irc.efnet.nl]
* [irc://irc.daxnet.no]
* [irc://irc.nac.net]
* [irc://irc.blackened.com]
* [irc://irc.prison.net]
* [irc://irc.lightning.net]
* [irc://irc.mindspring.com]
* [irc://irc.servercentral.net]
* [irc://irc.shoutcast.com]
* IRCNet (Netherlands, per country policies)
* [http://zirc.org ZiRC]
* [http://www.psionics.net Psionics-Anlarye]
* [http://esper.net EsperNet]
* GRNET (Greek IRC network)
http://www-eng.irc.gr (En web site)
http://www.irc.gr (Gr web site)
* [http://gamesurge.net GameSurge]
* [http://www.ircnet.org IrcQnet] (based on DroneBL)
* [http://irondust.net]
* [http://www.rizon.net Rizon]
* [http://www.noodleninja.com NNIRC]
* [http://www.euirc.net EuIRC]
* [http://www.d-t-net.de D-T-Net] (german)
* [http://www.sorcery.net SorceryNet]
* [http://www.purplesurge.com PurpleSurge] - when connecting "Closing Link:
[::ffff:185.220.101.45] Z:Lined (Tor exit server detected. See
www.sectoor.de/tor.php?ip=185.220.101.45. To inquire about this ban, please go to
http://abuse.purplesurge.com and click Open New Ticket.)"

== Networks that want to provide normal access to Tor or .onion transports but are
currently unavailable ==
* [http://www.quakenet.org QuakeNet] ([https://www.quakenet.org/news/226-tor-
users-on-quakenet announcement regarding Tor])
([http://archivecaslytosk.onion/Y349i archived version]) - When attempting a
connect an intention to setup their own .onion is revealed: "Closing Link: namestor
by underworld2.no.quakenet.org (G-lined (Due to mass abuse Tor is temporarily
banned -- we will be setting up an onion server.))"
* To quickly test if they block Tor just visit(through Tor)
https://webchat.quakenet.org/ and as your nickname type 'test' and as your channel
type '#test' then press the button "Join chat". You will quickly know if they block
Tor after this process.

== Networks that try to provide normal access to Tor or .onion and remove K-lines
where respect for users privacy is unknown ==
This category is for IRC networks that have an intention or have managed to provide
normal access to Tor though where the intentions of IRC network owners are
unknown(we don't know of their intentions to preserve user privacy at any cost).
Some of the items in this category haven't been researched yet, please look them up
and contribute status updates whether they stay in this category or are moved to a
more relevant one.

* [http://freenode.net/ freenode] ([http://freenode.net/policy.shtml#tor freenode


tor policy]) - Direct access via Tor is [http://freenode.net/irc_servers.shtml K-
LINED], but access via a freenode onion is provided with an already existing
account (using SASL -> no anonymity).
[https://trac.torproject.org/projects/tor/ticket/14349 About an (admittedly
somewhat naive) attempt] to enhance this situation.
* [https://nixbits.net Nixbits] - use ircs://uuwlyffs4yepwt62.onion:6697 instead
of ircs://irc.nixbits.net (client certFP advised)
* [https://scuttled.net 2600.net] - use ircs://awwqg2ishrohngue.onion instead of
ircs://irc.2600.net (client certFP advised)
* [https://wirelesspt.net WirelessPT] - use ircs://l6xsibhkdrsdwm53.onion:6697
instead of ircs://irc.wirelesspt.net (client certFP advised)
* [http://www.chatjunkies.org ChatJunkies]
* [http://webchat-ecnet.cf ECnet WEBCHAT (allowing Tor)] -
[irc://ecnetworld.com:6661 clear/plain] - [ircs://ecnetworld.com:9999 clear/SSL]
look also for Tor Hidden Service Below (ECnet IRC Tor)
* [http://silcnet.org SILCnet] (not IRC)

== Networks that try to provide normal access to Tor or .onion and remove K-lines
and show respect for users privacy ==
These IRC networks try to make it easier for Tor users to connect, they try to
provide backup plans in case of abuse coming from Tor and they try to respect their
users privacy without requiring any form of de-anonymization for registering or
connecting to official channels.
* [irc://ecnetjlf2alxy2ob.onion:6661 ECnet IRC Tor/plain] -
[ircs://ecnetjlf2alxy2ob.onion:9999 ECnet IRC Tor/SSL] -- ECnet IRC server with
Services
* [http://ecnetjlf2alxy2ob.onion/index.php?controller=page&action=view&id_page=4
Info about ECnet IRC Server+Webchat] -- [http://ecnetjlf2alxy2ob.onion
ecnetjlf2alxy2ob.onion] <--The Tor Blog about ECnet
* [irc://ncwkrwxpq2ikcngxq3dy2xctuheniggtqeibvgofixpzvrwpa77tozqd.onion:6667
HackInt(no SASL)] - ([https://www.hackint.org/transport/tor hackint tor policy]) -
use irc://dtlbunzs5b7s5sl775quwezleyeplxzicdoh3cnhm7feolxmkfd42nqd.onion:6667
(sasl) (or use their v2 .onion with sasl) instead of irc://irc.hackint.eu (client
certFP advised)
* [http://www.darkscience.ws Darkscience] ([https://darkscience.net/faq faq and
tor policy]) [ircs://darksci3bfoka7tw.onion:6697 suggested .onion address]
* [http://www.kernelpanic.com.ar KernelPanic] - ircs://kpanicfz4v7lrsrv.onion:6697
KernelPanic
* [http://www.oftc.net OFTC]

You might also like