Re: Reordering, not Latency (Was: Re: Remailer)
Adam Shostack says:
It may be that the FBI has a couple of Suns handling the whole remailer network right now.
Perry Metzger replies:
If they are doing that, they are violating the ECPA. They are allowed to monitor only those things they have a warrant to monitor (with, of course, all those lovely National Security exceptions). This is not to say that it isn't being done, but it can't be used in court.
Is this even technically possible? That is, wholesale monitoring of disparate portions of the net from a single access point. Given the distributed and dynamic properties of the Net this would seem impossible. To monitor the entire remailer network an attacker would have to setup packet sniffers upstream from each and every portion of the Net that contained a remailer, wouldn't they? I suppose an extremely resourceful attacker could monitor traffic at crucial points (i.e. transcontinental feeds, points on the NFSnet, CIX, etc...), but there are so many private connections linking networks that it would be very difficult indeed to sniff out every bit of remailer traffic. Is having every bit of remailer traffic necessary for traffic analysis? Or would having a good percentage of it be sufficient? andrew
Andrew Lowenstern says:
Is this even technically possible? That is, wholesale monitoring of disparate portions of the net from a single access point.
Sure -- you need to have packet forwarders installed all over the place, but thats easy to do -- there are commercial network monitoring products that will do the job for you. In that sense, you can't do it from a single access point.
To monitor the entire remailer network an attacker would have to setup packet sniffers upstream from each and every portion of the Net that contained a remailer, wouldn't they?
Largely, although they could be smart about how they did it. Perry
From: Andrew Lowenstern <andrew_loewenstern@il.us.swissbank.com> Is this even technically possible? That is, wholesale monitoring of disparate portions of the net from a single access point. If I were doing global Internet monitoring, I wouldn't be doing it in-band. Too much cooperation by the vendors required; too much discovery. Rather, I'd gain access to the trunks directly and do my own demodulation and decoding. Eric
participants (3)
-
Andrew Lowenstern -
eric@remailer.net -
Perry E. Metzger