sameer@netcom.com (Sameer Parekh)
install-script I can add this little feature. Which newsgroup? Should someone create an alt.remail? How exactly would it be implemented? I'm thinking that simply the user would do: [...] And the remailer would post to alt.remail:
There are two problems here. One is that the remailer exposes itself and defeats traffic analysis avoidance. The other is a standard transaction processing sort of problem; the posting to alt.remail might fail even though all else worked. Although I've dealt with transaction processing problems, it's a tricky area, and I don't have a good text on the subject. Any recommendations? b44729@achilles.ctd.anl.gov (Samuel Pigg) said:
By breaking a message into pieces and sending them via different paths to the same destination ("path forking"), this can only make traffic analysis easier, because all the pieces lead to the same destination, and you can follow any of them to get to the anonymous recipient.
Depends on how it's done. As stated this analysis implies that traffic analysis is *always* possible, since after all, the message must somehow make it to its destination. In other words, I disagree. Traffic analysers will have access to only some limited subset of information. If a certain kind of blind remailing with multiple pathways is practiced, then traffic analysis can be statistically defeated. The bad guys might sometimes know that X sent a message somewhere. Other times they might know Y received a message. Only improbably (under ideal implementation circumstances) would powerful bad guys own so many machines & networks that they would be able to deduce both sender and recipient, and even then, if traffic were heavy (as it will be in some years), it would be a statistical rather than certain deduction. (This of course raises the (no doubt old-hat) problem that no single remailer can be trusted, since it might be in the hands of the NSA or KGB or something. In fact, since the NSA is famous for doing their job well, this list must have NSA watchers, no question, even without paranoia, and if I were them I'd be experimenting with remailers even now, to keep up with trends. We'll never know how many remailers are trustworthy, so we'll have to use statistical schemes to make compromise unlikely.) This is all standard parallel remailing stuff. Add to this the possibility that the different remailing paths may contain message fragments rather than full messages, and it doesn't really change the security relative to full message parallel remailing...unless it's done badly. Badly would mean that some remailer is the one that finally recombines fragments prior to final delivery. Better is if the recipient's host does the recombination (and I worry about *that*, too). This needs to be done in conjunction with other standard cypherpunk fare, of course. The major design problem I've had is not with security, it's with fault tolerance. Statistical fault tolerance is available, but I prefer leaving that kind to the underlying base systems and networks, and trying to find a top level algorithm that is 100% guaranteed to either work or report failure, so long as the host systems/networks don't fail undetectably. A handshake ACK of receipt would help, except that it might not get back even if the original reached its destination. Which is why I'm starting to think I need to research transaction processing more thoroughly; some years back I'd heard that a centralized server was still state of the art for 100% fail-safe/soft operation. Is this still the case? If so, then we'll have to fall back on probabilistic fault-tolerance, to avoid issues of central authority compromise.
follow them all), as only one will arrive there and the rest would die after a number of remailer hops.
This is actually less safe than an approach which requires multiple pieces to arrive via multiple paths. Bad luck might leave your one path completely in the hands of bad guys (posing as cypherpunks, let's say).
I really think that non-deterministic "smart messages" are the way to go here.
This I agree with; but the way that is done is critical.
A simple command language for the remailers would allow the header construction software already being worked on by ebrandt@jarthur.Claremont.EDU (CRM) and others to use tricks like this to defend against attacks.
Cool. More info?
The defense complexity would be a function of the users' header construction software and needs. People who need "minimal" anonymity would have simpler anonymous address blocks, as compared to those who require "serious" anonymity, and the remailers themselves would have a lighter load (not having to implement very serious security for *all* messages-- just those that need it).
Strongly agree. BTW I consider this emphasis on batch mail to be short sighted. I'm designing for interactive cyberspace. I have a complete algorithm in mind, except I think it still needs some more OLTP wisdom added in. People have been telling me for a long while that I should hook up with cypherpunks; seeing traffic over the last week since I joined shows me why I heard that from so many sources. Tip of the hat to y'all; this is a much juicier forum than I had guessed. I only hope I can continue weathering the storm of heavy traffic, on top of other email lists. :-) Doug
On Fri, 3 Sep 1993 21:13:47 PDT, doug@netcom5.netcom.com (Doug Merritt) said:
Doug> sameer@netcom.com (Sameer Parekh)
install-script I can add this little feature. Which newsgroup? Should someone create an alt.remail? How exactly would it be implemented? I'm thinking that simply the user would do: [...] And the remailer would post to alt.remail:
Doug> There are two problems here. One is that the remailer Doug> exposes itself and defeats traffic analysis avoidance. Not necessarily. If the "post this message to alt.remailer" command for a smart message were executed via splitting off another message with its own encrypted header and path through the remailers to an anonymous posting service. (as suggested by miron@extropia.wimsey.com) Doug> The other is a standard transaction processing sort of Doug> problem; the posting to alt.remail might fail even Doug> though all else worked. I agree this could certainly be a problem (esp. executed as above.) [..] Doug> b44729@achilles.ctd.anl.gov (Samuel Pigg) said:
By breaking a message into pieces and sending them via different paths to the same destination ("path forking"), this can only make traffic analysis easier, because all the pieces lead to the same destination, and you can follow any of them to get to the anonymous recipient.
Doug> Depends on how it's done. As stated this analysis Doug> implies that traffic analysis is *always* possible, Doug> since after all, the message must somehow make it to its Doug> destination. In other words, I disagree. No I'm not implying that. But there really isn't any way doing that could make such an analysis *harder*, as by splitting pieces of the message off, you have multiple parts all going to the same destination. This gives the attacker redundant paths to follow, and if the attacker can trace *any* message, he can discover the identity of the recipient. There would be no "dead-ends" for the attacker. (when I say "follow" I don't necessarily mean follow in a literal sense, but any traffic based statistical analysis.) Doug> This needs to be done in conjunction with other standard Doug> cypherpunk fare, of course. The major design problem Doug> I've had is not with security, it's with fault Doug> tolerance. Statistical fault tolerance is available, but Doug> I prefer leaving that kind to the underlying base Doug> systems and networks, and trying to find a top level Doug> algorithm that is 100% guaranteed to either work or Doug> report failure, so long as the host systems/networks Doug> don't fail undetectably. A handshake ACK of receipt Doug> would help, except that it might not get back even if Doug> the original reached its destination. I agree this is the major problem, with the current state of the remailers, but it may not be a problem with a stable remailer web and an "anonymous address server" (see my long laborious boring posts regarding this from about a week ago.)
follow them all), as only one will arrive there and the rest would die after a number of remailer hops.
Doug> This is actually less safe than an approach which Doug> requires multiple pieces to arrive via multiple paths. Doug> Bad luck might leave your one path completely in the Doug> hands of bad guys (posing as cypherpunks, let's say). I don't think so. This way there is only one (or a few) paths that actually would lead to the recipient, and many "blind alleys" for an attacker to follow. With the multiple-pieces-same-destination scheme *any* one path would be enough to determine the recipient.
I really think that non-deterministic "smart messages" are the way to go here.
Doug> This I agree with; but the way that is done is critical.
A simple command language for the remailers would allow the header construction software already being worked on by ebrandt@jarthur.Claremont.EDU (CRM) and others to use tricks like this to defend against attacks.
Doug> Cool. More info? I'm not saying that CRM actually uses a command language (it can't-- nothing has been agreed upon/worked out yet!) but tools like CRM would be able to use a remailer command language to tailor the message's (or anonymous address block's) anonymity protection. See that same long, boring post I made about a few suggestions for what such a language could contain/be useful with.
The defense complexity would be a function of the users' header construction software and needs. People who need "minimal" anonymity would have simpler anonymous address blocks, as compared to those who require "serious" anonymity, and the remailers themselves would have a lighter load (not having to implement very serious security for *all* messages-- just those that need it).
Doug> Strongly agree. Doug> BTW I consider this emphasis on batch mail to be short Doug> sighted. I'm designing for interactive cyberspace. I Doug> have a complete algorithm in mind, except I think it Doug> still needs some more OLTP wisdom added in. A remailer command language could include instructions to specify how long to hold this message (possibly to be combined with some remailer batching functions.) [..] Sam Pigg dt1acaa@cfraix.cfr.usf.edu samp@renoir.cftnet.com <or> b44729@achilles.ctd.anl.gov PGP Key Fingerprint: ED A7 49 33 65 90 9A BD A4 E4 C5 92 5A 00 BC 6C
Oops!
A simple command language for the remailers would allow the header construction software already being worked on by ebrandt@jarthur.Claremont.EDU (CRM) and others to use tricks like this to defend against attacks.
ebrandt@jarthur.Claremont.EDU is the return address of the remailer that sent the message from astrashe@nyx.cs.du.edu (Alex Strasheim), who is the author of CRM. My mistake. (thankfully pointed out by Liam David Gray <lg2g+@andrew.cmu.edu>) Sam Pigg dt1acaa@cfraix.cfr.usf.edu samp@renoir.cftnet.com <or> b44729@achilles.ctd.anl.gov PGP Key Fingerprint: ED A7 49 33 65 90 9A BD A4 E4 C5 92 5A 00 BC 6C
I only hope I can continue weathering the storm of heavy traffic, on top of other email lists. :-) Doug Good luck..
Didn't someone mention a while back a scheme by which a message can be split up into a bunch of parts and only requires about 50% of them or so to be completely rebuilt? Something like that would be very useful I think to deal with remailer reliability problems. That would require a good deal more user work though. -- Sameer sameer@netcom.com
participants (3)
-
b44729@achilles.ctd.anl.gov
-
doug@netcom5.netcom.com
-
sameer@netcom.com