Other details about the programs:
Keys are tied to connections by an ID/Password pair. This information is sent encrypted using the OTP for that ID/Password pair.
Random data is sent between the OTP programs to prevent network analysis on the packet timing/lengths between clients and servers.
Minimum installation guidelines (OTP Router):
At a minimum, the data connecting an ID and Password to a key file MUST be kept in volatile memory. Key files may be kept on non-volatile memory to allow for cheaper keys.
A small device will be outlined to allow usage of the OTP network on a non-trusted machine. The key, username, and password will remain secure -- but the endpoint data would not be.
Another device (and program) may be designed to transmit this information using a SDR.
The program is 98% complete. I've tested using IRC with great success.