Welcome to AnonOpsAnonOps (Anonymous Operations) IRC is an international communication platform frequented by Anonymous and other activists. You can join our network using your own IRC client or our webchat.
Have questions or need connection help? Try FAQ or Tutorials for more information.
Beginning on Wednesday January 11th 2017 we will be enforcing some stricter standards over TLS/SSL access to our network. You will only be able to negotiate TLS versions 1.2. This means that people who have been ignoring our warnings about using xchat to connect to our network will no longer be able to access our service, as it can only negotiate SSLv3. Anyone using a modern client should have no issues with these changes. Beyond enforcing a minimum TLS version we are also going to force the use of specific ciphersuites that are generally considered to be safe. No longer will we rely on the client's choice of ciphersuites, we will prefer server side settings.
You should check what cipher and TLS version you are connected with, most clients display this on connect. Also note that inspircd prints this information to you as well, for example: *** You are connected using SSL cipher "DHE-RSA-AES256-SHA".
Here's To Our Beloved owenNo doubt you were expecting an outpouring of grief before this message. Quite frankly, I wish I could but there are no words to express how much we're grieving and how much of a loss this is to the cause. For those that can still express themselves then please send messages of support and more importantly stories about how much owen touched your life. All we can do is keep up the good fight that he started and try to keep his dreams alive. http://www.forevermissed.com/dennis-owen-collins/ Yes, I'm afraid you do have to register to post but real details are optional. ;) Requiescat In Pace owen, forever you'll be in our hearts.
Removal of Plaintext IRC AccessBy the end of this week (Saturday, June 13th) we will have disabled access to our IRC network via plaintext. This means that if you want to connect to our network you must be using TLS on port 6697. The reason for this change is simple: TLS is something everybody should be using. Virtually every modern IRC client supports TLS, this includes mobile clients too. All clients (including authorized user bots) must be configured to use TLS or you won't be able to connect. To verify if you are using TLS check that you are connecting to port 6697 in your client, or if you are currently connected whois yourself and look for " is using a secure connection".
Cipher UpdatesWe have prioritized the cipher list accepted by our servers to ensure higher order ciphers are negotiated first if possible. We have disallowed RC4, MD5, etc. On connecting to the IRC, the server notice window will show you the cipher your client has negotiated with our server. An example would be: *** You are connected using SSL cipher "DHE-RSA-AES256-GCM-SHA384. In the end, its YOUR client that determines the cipher used so every user should verify they are using a strong one. More information can be found on our security page under the TLS section.
We have also disabled the CTCP function for all users due to abuse. The proper mode will be set on all users connecting to our network.
TLS Updates - IRCdsStarting at 2AM GMT on Thursday Feb 19th we will be upgrading the TLS libraries in our IRCds, we will also be generating new certificates and private keys. Once this upgrade is done all servers will have TLS 1.2 available and over time we will tweak the cipher priorities to stay up to date with the strongest options available. This upgrade is meant to offer users better privacy when using TLS assuming their client negotiates a strong cipher. We will be using only 4096 bit RSA keys, and certificates with SHA256 hashing after this upgrade. If you verify our certificate fingerprints note that these will change, we will tweet out the new certificate fingerprints after the upgrades are complete.
TLS Updates - Web ResourcesDue to recent revelations leaked from a three letter agency we have taken some steps to improve security of the TLS in use on our web resources. While all of our web resources are behind a CDN called Cloudflare we still want the origin/back end connections to be cryptographically strong. For this reason we have done the following: changed all keys to RSA 4096 bit, deprecated SHA1 and changed certificates to SHA256 and prioritized strong ciphers such as ECDH. Stay tuned for more information on TLS updates to our IRCd infrastructure.
IRCv3Recently we enabled limited IRCv3 support on our servers. IRCv3 is an attempt to modernize the IRC protocol and make it more efficient. We currently support the away-notify extension and we will look at enabling other extensions in the future. In order to take advantage of these extensions your client needs to support them. Check out ircv3.org for more info.
New Webchat and Other Helpful ThingsWebchat users are already aware but for the rest of you this is news. Last week we switched to a different webchat interface. This one is much nicer, more user friendly and has some new features unavailable in the old qweb interface. Check it out by clicking the webchat button in the nav menu. We have also been busy adding some new tutorials for the newblood site. We have added one for irssi, one for virtual machines and have made significant additions to the android page to accomodate the increasing number of droid users. We hope you like them. Translations of these new pages are in progress and should be available shortly. On the less visible technical side, we have upgraded some things in the backend and in the load balancing to improve connectivity and uptime. Upgrades to the radio are also underway. As we do not wish to take down the service entirely, expect a few bugs as this happens. Be patient. The end result is what matters, after all.
The Heartbleed Bug and Other Nasty StuffUnless you have been living under a rock or just recently emerged from the basement, you have heard about this bug. Make no mistake, it is very dangerous. Much is still unknown at this point but what info is available needs to be dealt with and fast. A lot of information has come out so start checking this info against your systems. Figure out what is vuln and fix it. For us, Cloudflare handled the public facing side of our web services. The backend had updated SSL installed immediately. Necessary changes were made to nginx, certs revoked and reissued. The IRCd servers use GnuTLS. They were not vulnerable but we updated them anyhow. We did our part. Now you do yours. You need updated OpenVPN clients, IRC clients, etc. Update your own servers. Any application that uses the affected OpenSSL libraries needs to be updated or disabled until updates become available.
Hypocrisy At It's FinestI don't think there is any way to describe this other than the few words in the title. For a while now we have watched our governments prosecute Anonymous individuals for conducting DDoS attacks, but it seems another group should be facing charges too. We are referring to the government. Full story here. We are appalled by this revelation that a government would prosecute their citizens for a crime but commit the same crime themselves only to go unpunished. Edward Snowden is a brave individual fighting for what he believes in and words cannot express how thankful we are for what he has done. We can only hope that this leak helps to aid those who have been so wrongly prosecuted in their legal battles.
Remembering AaronA year ago, the online community learned of a terrible tragedy. Aaron Swartz, hounded by the US goverment and threatened with decades behind bars, took his own life. Our sympathies go out to his family and friends during this emotional and difficult time. He contributed his time and intelligence to create a more open place, to connect more people together and further allow the free flow of information to those who seek to learn. Information should not be a commodity, packaged and sold only to those who can afford to do so by greedy corporations or hidden away from the people by governements who spend our money to spy on us. As the anniversary of his death passes, we ask that you join us in taking a stand.
February 11, 2014 is the day we fight back. We must all speak out against the obliteraton of our privacy by governments everywhere and to stop the persecution of activists by vindictive governments.
It is time we are heard.
Network RulesYou are free to discuss whatever you want on our network.
We do not control what our users discuss as long as they adhere to these simple network rules.