(wow, this is the most interesting discussion on cypherpunks in months -- thanks Len!) My security philosophy is: 1) You need to make the set of people who can't provably not have sent messages larger than is worth investigating. Ideally, make the set that of all internet users. The set of people who use remailers today is not big enough; the set of people who use a web-based anonymizing gateway easily could be. The set of people who post binaries to usenet may be. You need to make it easy to join the set (use standard protocols, no client software, and ideally make it require no user knowledge of the deeper darker purpose behind it all), and make it worthwhile to join the set (ideally a non-security non-messaging benefit, like "cool porn" or whatever) 2) 2-way communication is inherently much harder to secure, but is socially beneficial. Without socially beneficial uses, it's going to be a long and unpleasant battle, as it will be very hard to attract users. Regulation is NOT the reason PR matters; perception by users is. 3) "Sending anonymous mail" is *not* a compelling end-user application on a wide scale; nowhere near "have all the music you want available for free", "have arbitrary prohibited pornography" or "pay people anonymously". Sending anonymous mail is a niche app but is also interesting as it is the same as "send protocol messages for other protocols, such as electronic cash, anonymously". Until there are real applications which can provide large user communities, communicating automatically, with a high desire for anonymity, the best chance is to create low-effort, not-necessarily-low-security remailer systems which increase the user community to the largest extent, spreading the collusion set even though the average user could be vulnerable. 4) Latency must be low. Anonymous (or at least private) online chat is more interesting to users than email. Feds own EFnet servers with regularity; people discuss plenty of interesting things on IRC, vs. most email. But, anonymous or even encrypted chat systems are a good deal more complex than mail. Also, low latency is good for messaging. Normal mail is "near realtime"; mixmaster is anything but. (most of the people who are likely to be users of anonymity are more comfortable with chat than email anyway. 5) User-Group is as interesting as User-User. If you require something which is opt-in, it will be difficult to communicate with mailing lists. Encrypted group chat is good. Use gale! (www.gale.org) (indeed, "develop e-cash to use as postage for remailers" is kind of putting the cart before the horse; "develop remailers to use to transport intermediate results of electronic cash operations" is the proper causality, I think) Being a wolf in sheep's clothing isn't very useful if you're not surrounded by sheep -- one "sheep" in a desert would look pretty suspicious. However, to successfully be a wolf hiding in a herd requires that you look like a sheep, at least to casual inspection. It does not require that the sheep themselves be equipped to go toe to toe with the shepherd's dog. (rambling level 1, skip if you're bored) I disagree that a remailer user is necessarily identifiable to "users of remailers" using current systems...but if you require a means of payment to send messages, you are increasing the difficulty in avoiding being in that set. (of course most remailer users today are observable in communicating with most remailers) If I were sending a "life or death" remailed message, I would focus on being unobservable and unlinkable -- inject the message into the remailer fabric using 802.11b access "borrowed", or a netcafe, or breaking into an office at night, or sending out a worm which transmits its encrypted payload at some point in the future, or whatever else. (it is important these activities do not draw attention themselves). I'm working on getting an nntp feed sorted out for HavenCo; once that's done, remailer.havenco.com will pick up and drop off messages encrypted in a newsgroup. I'd consider using a web frontend via a web anonymizer; more commercial focus seems to have gone into web anonymization. Assume all network feeds in and out of the top-20 remailers are monitored. (I'm not at all certain mine are, but in general) Being identified as a routine user of anonymous remailers would thus open you up to in-person visits from agents on fishing expeditions, black bag monitoring, etc. Exactly what you don't want if you're operating covertly. A one-off current remailer message isn't a big deal, but if you were to build an *application* on top of remailers, like mailing out kiddie porn to people on request, or software serial numbrs, or running an assassination politics server, the feds would be more likely to step up covert monitoring to try to catch people than to try to shut down the remailers themselves. (perhaps I'm overestimating the intelligence of the FBI, but In cases of defence 'tis best to weigh The enemy more mighty than he seems...) (if this were underway, I think you'd see the remailers they couldn't compromise dropping off due to unseen technical problems, difficulties with upstream ISPs, flooding, spam using the remailer as an exit, or perhaps other actions where the attackers involvement was deniable) But -- none of these attacks compromise remailers themselves. Even if you put the remailers in bank vaults, being identified as a member of the ~500-1000 regular users of remailers, where you need to have a continuing involvement. Thus, in *practice*, I don't see the remailer network of today as being substantially more secure against likely threats than a single very strong remailer which you trust. If I trusted me, I'd be more comfortable using a single-hop remailer accessed via a steganographic channel than in using some DC-net, infinitely-untraceable-internally fabric which only had 500 externally-visible users (of which I'd be one). I've had in testing a simple, secure SSL smtp/pop3/imap/webmail system, which should be ready to go into production shortly. I'm putting more resources into that than into remailers because I think the "market space" occupied by anon.penet.fi is far more socially beneficial than the "market space" occupied by mixmaster remailers. Specifically: (rambling verbosity 2, encouraged to skip) 0) Mixmaster is one-way. This is only good for abuse, and a VERY small number of socially beneficial uses. Even in the cases of "whistleblowing", a 2-way communications method is needed. A two-way system is much more socially beneficial; can more easily keep the service as a whole operating, even if individual accounts are shut off for abuse, by pointing at a large number of "redeeming" uses. It's ultimately a PR and a technical battle, not a legal one. 1) Mixmaster can't provide "AP-level" security, due to small user population and collusion set; mail.havenco.com can and can't -- you need to trust the operator somewhat more unless you encrypt all your traffic, and normal means of access have inbuilt "pooling" in that they're spooled on the server automatically. If you access via covert means, either a general web anonymizer, or encrypted dead-drop, or whatever else, maybe it's a bit better. Of course you can use both for the best of both. 2) Mixmaster is fucking hard to use for 1-way messaging (and all this new stuff about "use electronic stamps, spam filtering, etc." will go even *farther* in the "hard to use" side). mail.havenco.com is easier to use than your isp, because we won't rename accounts when people buy providers out, we support SSL cert based relaying so it works on the road, etc. The rules of getting apps actually deployed: * Provide a tool which supports a compelling application; providing a tool which is useless for the application of "being a first-class but anonymous participant in online foruns", or which is a *great* buggywhip or camel condom, is not the same thing. * Use existing infrastructure and standards to make it easier to develop, configure, and maintain -- don't re-invent TCP every time, don't make users install massive amounts of custom software to do something as simple as send and receive electronic mail with their client, etc. * Incremental improvement and get something out the door quickly, incorporate feedback I think doing interesting new transports inter-remailer is...interesting, especially from an intellectual and academic standpoint. Requiring that users participate as first-class nodes in p2p systems, dc-nets, etc. is going to raise the bar to being a remailer user quite a bit, and lower traffic. Users who can do that kind of investment can already send unobservable, unlinkable, untraceable email with little effort. 3) Mixmaster messaging is unreliable. A professionally maintained mailbox server is highly reliable; even if transports are unreliable, it can retransmit transparently. Abusive apps don't care about reliability; most socially compelling ones do. (latency is an issue too, and without more volume than mixmaster has now, you can't really get away with low latency) 4) Mixmaster is fairly immune to "editorial" action on the part of remops; there are too many of them, it's too difficult to do anything to do them. A centralized system allows various forms of censorship, from accounts being shut off due to AUP violations (spamvertised mailboxes), pressure being placed on the operator, etc. My AUP is simple: - No spam and no use as spamvertised dropbox - No child pornography (due to sealand local regulations) - No files > x KB (where x will initially be something small and increase) (technically enforced) - No attachments or binaries (for now) (technically enforced) - Resource limits (per-day message limits, check limits) (technically) - No mail bombing or other malicious activity (rate-limiting) - dest.blk maintained by server operator on a per-user and systemwide basis - AUP violations result on forfeit of funds on deposit and deletion of account, but no information turned over (initially you must take this on faith/apathy, but later, the management UI will just have a "delete account" button and no way to subvert access control and read mail without breaking hardware tamper-resistance) 5) For a professional ISP, mixmaster is a bitch to maintain, vs. cyrus/postfix/etc. which are designed to scale to lots of users, are easily maintained, etc. 6) Mixmaster has no clear revenue model. A system which is "sticky", with people getting mailboxes, and persistent communications with expectation of support from the server operator, easily allows charging on a bulk basis. "micropayments" are crap. We've already determined people won't pay large amounts for mixmaster remailers because it doesn't support high-value applications and doesn't support any compelling general applications, and collecting small payments is a hassle. There are plenty of ways to expand on a professional offshore secure mail service as well -- think "critical path done well". 7) Having an organization with press/legal/etc. resources supporting a remailer is more likely to get positive PR spin than a loose collection of amateur remailer operators. Also, of course, more risk. 8) Mixmaster as operated now has no love from the network operator community. People are abusing "no servers" accounts, for the most part, to run high-hassle servers on subnets. If *I* were running a $20/month dialup ISP, I'd shut people off for running remailers. It breaks terms of service, which breaks revenue models for network operators. 9) Vanity domains, group messaging, etc. are not possible with mixmaster or reply blocks. 10) Mixmaster has been tried for a while, and seems to "work", but doesn't really do the kind of things which anon.penet.fi did. I'd rather give a different approach a try -- deploy something technically inferior in some ways to mixmaster, but better from a user perspective, and then armor-plate it later. (rambling level 3, even more skipable) I was actually holding off for a while to provide this service commercially because someone else claimed to be working on a public-access mail system which would have also been suitable. However, that system is unlikely to be deployed beyond their insiders, and is a complex scripted thing which doesn't do the specific task I want, so I see no reason to delay. My main concern is minimal support overhead. If I give away free accounts, I fear people will use them for spam dropboxes, and we'll be spending all our time deleting those accounts. Thus, I really need something which has a substantial up-front investment to open an account -- install fee, prepayment, or anti-spam bond; proof-of-human-work; reputation; etc. My initial thought is that I'll give accounts to some well-known people if they want access, and sell accounts for a high but not insane rate -- USD 200/year for an offshore mailbox with SSL web/smtp/pop3/imap access seems reasonable. I will adjust pricing based on demand, resources, etc. I don't actually need to make any money off of this; our colo sales are sufficient, and I can consider it an advertising expense and entertainment for me, but dealing with spam is not entertainment. People who care can use this system in a highly privacy protecting way...encrypt everything with PGP locally, interact entirely via deaddrop, pay for service anonymously, use a domain maintained by havenco vs. one they sign over in a registrar, send messages via remailers as well. People who just want a "secure" offshore mail solution can send cleartext mail over SSL interactions with the server. The second set, I believe, is far larger, and is doing more socially beneficial things with their access, and provides cover traffic for the first set as well. -- Ryan Lackey [RL7618 RL5931-RIPE] ryan@havenco.com CTO and Co-founder, HavenCo Ltd. +44 7970 633 277 the free world just milliseconds away http://www.havenco.com/ OpenPGP 4096: B8B8 3D95 F940 9760 C64B DE90 07AD BE07 D2E0 301F
participants (1)
-
Ryan Lackey