From jamesd at netcom.com Wed Feb 1 00:11:56 1995 From: jamesd at netcom.com (James A. Donald) Date: Wed, 1 Feb 95 00:11:56 PST Subject: The security characteristics of crypto modules with secrets In-Reply-To: <199502010607.WAA04942@largo.remailer.net> Message-ID: From: Matt Blaze On Tue, 31 Jan 1995, Eric Hughes wrote: > Let's take as our model general purpose computers which can't store > secrets connected directly to crypto modules which can. Furthermore, > let us assume that these general purpose computer are subject to > intrusion. In other words, it's today's servers with attached crypto. > > Now, the crypto module can't authenticate the machine it's plugged > into, because, by definition, that machine can't keep a secret. The model does not work, because that is not what we want to do. True: Matt's proposal cannot authenticate a machine. But one does not really want to authenticate a machine. One wants to authenticate data, that one might choose to transmit from that machine. For this purpose a tamper resistant crypto module that can be connected to a machine, but which is under user control, not under the control of the machine, is the only totally bullet proof solution. Of course expensive tamper proof crypto modules already exist: A Dos computer in a room with a key, running virtually no network software and possessing almost no utilities, though doubtless what Matt had in mind was a PCI card that one could keep in ones wallet. > The prevalent use of modules further reduces the likelihood of initial > attacks based on spoofing. Since active IP attacks require the > subversion of routers, and since router software is much more > difficult to subvert than general purpose servers, adding crypto > modules to routers would be a big win. This does not make sense: The advantage of a tamper resistant module is that if somebody physically gets to the system, he still cannot get the key. But if he physically gets to the router, he can make it do his will, even if he does not get the key. So one might as well have the key in software in the router. If the router is hard to subvert, and the attacker cannot physically get to it, then there is little need for a separate tamper resistant module. Software will do fine. If the router can be got at, you are stuffed regardless, tamper resistant module or not. --------------------------------------------------------------------- | We have the right to defend ourselves | http://www.catalog.com/jamesd/ and our property, because of the kind | of animals that we are. True law | James A. Donald derives from this right, not from the | arbitrary power of the omnipotent state. | jamesd at netcom.com From skaplin at mirage.skypoint.com Wed Feb 1 00:45:08 1995 From: skaplin at mirage.skypoint.com (Samuel Kaplin) Date: Wed, 1 Feb 95 00:45:08 PST Subject: Minnesota Cypherpunks Get Together and Bull Session Message-ID: Well folks, I've been on the list over a year and haven't seen a get together for those of us in MN. So being the masochist that I am, I'm going to try to put one together. Granted it won't be nearly as elaborate as those in the Bay area, but it'll be a start. Tentatively: Date: Saturday March 4, 1995 Place: Applebees - Calhoun Village Shopping Center, Minneapolis Time: 5:00pm 'til they throw us out. This may change, depending on how many (or how few) respond. Let me know if you are interested or have suggestions. This also will be a good opportunity for some key signing too. Sam -- ============================================================================== skaplin at skypoint.com | Finger skaplin at infinity.c2.org for | a listing of crypto related files PGP encrypted mail is accepted and | available on my auto-responder. preferred. | (Yes...the faqs are there!) | Finger skaplin at mirage.skypoint.com for | "...vidi vici veni" - Overheard PGP public key. | outside a Roman brothel. | Fax Number +1 (612) 928-9771 | An UZI beats five aces every time... ============================================================================== Architecture is the art of how to waste space. From danisch at ira.uka.de Wed Feb 1 01:18:54 1995 From: danisch at ira.uka.de (Hadmut Danisch) Date: Wed, 1 Feb 95 01:18:54 PST Subject: CD-ROM [brief addition] Message-ID: <9502010918.AA00196@elysion.iaks.ira.uka.de> > I forgot to mention that the CD-ROM in development will be > export restricted. It isn't going to be sold outside the united states > and canada. :-( From hkhenson at cup.portal.com Wed Feb 1 01:27:27 1995 From: hkhenson at cup.portal.com (hkhenson at cup.portal.com) Date: Wed, 1 Feb 95 01:27:27 PST Subject: Surety (authentication) Message-ID: <9502010126.2.19816@cup.portal.com> Thanks to all of you who replied to my request. I have what I needed. Keith From homer at math.cornell.edu Wed Feb 1 04:23:52 1995 From: homer at math.cornell.edu (Homer Wilson Smith) Date: Wed, 1 Feb 95 04:23:52 PST Subject: A proposal.... In-Reply-To: <199502011144.AA03317@xs1.xs4all.nl> Message-ID: On Wed, 1 Feb 1995, Remailer Operator wrote: > I'll not block addresses based on information supplied here. You forget > that there is no -formal- system, just a loose collection of operators. > There is no single policy, that operators use. Certainly, each operator is responsible for his own site and must act or not act as he sees fit, accepting the full consequences of those decisions. That is as it should be. No one is DEMANDING that anyone block an address, except the complainer's of course. :) However there is no harm in global reporting of spams or abuse, as each operator can choose to act or not act on the data as he will. > > Perhaps there could be a blocking mailing list, and all remailers > > could advertise that list in their headers, and anyone who wants to > > be blocked can send mail to that list and we would all get it. > > Perhaps. But I think it is a matter between the operator of a specific > site and the to be blocked address, not something for the world to know. Well in general I would guess that complainers WANT all reops to know about the complaint, they only complain to the one they got the abuse from, but they figure the abuser will just go to the next remailer and start there. They would prefer a way to contact all reops immediately to stop this sort of thing from happening. Complainer's are often so mad at the abuse that they not only write the remailer operator but also his sysadmin. Rahul for example has gotten at least two things 'on his desk' in the last two days, because of stuff going through my remailer, and that's two two many for me. That doesn't include all the ones he's gotten that he didn't forward to me because it was already handled. Further various and sundry turkeys are going to be complaining both to ME and possibly to Rahul for the next month about the Valentine's spam, as late readers come up to it in their news. I am STILL getting complaints and the guy was hung out to dry 10 hours ago. The complainer almost always wants ALL remail to that address stopped, and he certainly doesn't want to have to send repeated messages to various remailers as the abuser keeps jumping around. That would infuriate me no end if I were a postmaster. I would suggest that those of us who are interested, provide such a common list for complainers, it would make them feel one hell of a lot better about remailers, and keep the borderline cases on the side of free speech. A lot of people would like to see remailers shut down, but for many of them its mainly because remailers make them feel hysterical when things go out of control. THEY DON'T KNOW WHERE TO GO TO BRING THINGS BACK INTO CONTROL, AND THEY ARE NOT SURE THEY WILL BE PAID ATTENTION TOO. This leads to cc's to sysadmins and things, which I for one find INTOLERABLE. If we can bring a sense of immediate (even if partial) response and control to the remailer network, then this hysteria may subside a bit. I would distinguish between two kinds of abuse. Individual abuse, and spams. On the individual abuse I would agree that personal data should probably be kept confidential. Certainly one does not give away the complainee to the complainer so of course one does not post the complainee's name here or elsewhere. I have taken to posting the letters that I write them however, to show newbies possible ways of dealing with these things. However I see nothing wrong with posting the complainer's name. Some complainer's might object, but I think they understand the need to widely distribute, at least to the reop's, their address so that we can all effectively block them IF WE CHOOSE. In any case, such individual abuse is usually from one person to another, and its easy to block the TO: line without revealing the From: line, so there is no need to post the complainee's name. In the case of spams, its different. Spammers usually spam from one address (forged or not), but post to many sites. Blocking the To: line is impossible, but the From: line is easy. In this case I am for posting the From: line, not only here but as far and wide as possible. If I am wrong, I am sure you will let me know. I propose a mailing list, public or not, which those of you who wish to can subscribe, and which we advertise in the headers of all outgoing mail, saying that complaints should be sent to the mailing list. That way we all get to see spammers and complainers at once, making for much more effective action. This reduces the wear and tear on the postmasters, who surely do not deserve the brunt of the abuse. Like the Credit Card reporting agencies, one call is all it takes to report all your cards gone, one mail is all it takes to inform all operators of a spam or abuse. I am not suggesting that all reops join this list, or act on the data posted to it if they do, or advertise the list in their headers. I propose that THOSE OF US WHO WANT TO DO THIS, do it. Sort of a loose coalition or alliance amongst reops to show solidarity and personal responsibility towards the net. I KNOW people would appreciate it. How say any of you? Homer P.S. groupname at bull.com went down after the Valentine spam. Not very nice. I have already gotten warm mail commending US on how fast we nuked the guy. I say have no mercy for spammers. Homer From usura at replay.com Wed Feb 1 05:18:47 1995 From: usura at replay.com (Alex de Joode) Date: Wed, 1 Feb 95 05:18:47 PST Subject: CD-ROM [brief addition] Message-ID: <199502011233.AA16433@xs1.xs4all.nl> In article <199502010224.SAA24809 at infinity.c2.org> sameer stated: : I forgot to mention that the CD-ROM in development will be : export restricted. It isn't going to be sold outside the united states : and canada. Why not produce it outside the US and import it ? Regards, -- Alex de Joode usura at replay.com Hate mail appreciated, http://www.xs4all.nl/~usura weekly contest for best death threat. From danisch at ira.uka.de Wed Feb 1 05:56:14 1995 From: danisch at ira.uka.de (Hadmut Danisch) Date: Wed, 1 Feb 95 05:56:14 PST Subject: PGP Question Message-ID: <9502011343.AA00578@elysion.iaks.ira.uka.de> Is there any simple way to glue a binary file and its detached pgp signature together into a single pgp file (as produced by non-detached signing) ? thanks Hadmut From danisch at ira.uka.de Wed Feb 1 05:56:47 1995 From: danisch at ira.uka.de (Hadmut Danisch) Date: Wed, 1 Feb 95 05:56:47 PST Subject: CD-ROM [brief addition] Message-ID: <9502011353.AA00592@elysion.iaks.ira.uka.de> > Why not produce it outside the US and import it ? :-) From perry at imsi.com Wed Feb 1 06:18:28 1995 From: perry at imsi.com (Perry E. Metzger) Date: Wed, 1 Feb 95 06:18:28 PST Subject: VoicePGP cracked in 10 minutes?... In-Reply-To: <199502010348.VAA00506@einstein.ssz.com> Message-ID: <9502011418.AA26570@snark.imsi.com> root says: > I heard a rumor hear in Ctl. Tx. that the VoicePGP project was cracked in the > last couple of days in approx. 10 minutes. Anyone have any info on this other > than one of those wild rumors that occur? Considering that VoicePGP hasn't even been released, this is fascinating news. Perhaps the same team could work next on cracking things that haven't even been invented yet. .pm From perry at imsi.com Wed Feb 1 06:35:42 1995 From: perry at imsi.com (Perry E. Metzger) Date: Wed, 1 Feb 95 06:35:42 PST Subject: How the cypherpunks nearly got me fired (long) In-Reply-To: Message-ID: <9502011435.AA26645@snark.imsi.com> Michael Sattler says: > At 22:10 1/31/95, David Mandl wrote: > > [really horrid story about true life at a corporate dinosaur deleted] > > >I just thought > >you might enjoy this little story, and would want to keep it in mind if > >you're ever considering employment at Bear-Stearns. > > Part of my job-interviewing procedure has become grilling a would-be > employer (or whoever is asking for a contractor) about their net > connections. I'm a consultant. However, I won't take on clients with sufficiently distasteful business practices. This is something I consider to be sufficiently distasteful. Perry From mab at crypto.com Wed Feb 1 07:27:03 1995 From: mab at crypto.com (Matt Blaze) Date: Wed, 1 Feb 95 07:27:03 PST Subject: The security characteristics of crypto modules with secrets In-Reply-To: Message-ID: <199502011528.KAA23229@crypto.com> >> The prevalent use of modules further reduces the likelihood of initial >> attacks based on spoofing. Since active IP attacks require the >> subversion of routers, and since router software is much more >> difficult to subvert than general purpose servers, adding crypto >> modules to routers would be a big win. > >This does not make sense: The advantage of a tamper resistant module >is that if somebody physically gets to the system, he still cannot >get the key. But if he physically gets to the router, he can >make it do his will, even if he does not get the key. So one >might as well have the key in software in the router. > >If the router is hard to subvert, and the attacker cannot >physically get to it, then there is little need for a separate >tamper resistant module. Software will do fine. > >If the router can be got at, you are stuffed regardless, tamper >resistant module or not. The advantage of a secure crypto module on an insecure server (or router or whatever) is in limiting the scope of successful attack. As Eric pointed out, if you can subvert a general purpose machine that does all its crypto through a secure module that you can't subvert, you can still add a covert "service" to the machine that lets a future spoofer use the module remotely. The main important difference between this attack and just learning the server's secret is that it only remains useful as long as the attack is undiscovered. In the case of software keys, it is sufficient for the attacker to subvert the machine that knows the secret ONCE. He or she can put things back to normal on the original machine and still know the secret forever, with little chance of future detection. With a secure module, the attacker has to either steal (physically) the hardware (which will be discovered when the real server stops working) or set up the kind of future access that Eric mentioned (which, once discovered, will likely be turned off or investigated). If you have secure crypto hardware, you only have to worry about and detect whether the server is being compromised continuously. Otherwise, without special hardware, you have to worry about and detect whether the server was ever compromised since it was last rekeyed. Personally, the former seems like a realistic thing to try to do while the latter doesn't, at least in the environments in which I live. If the server hardware or software is insecure, cryptographic techniques can't provide any absolute guarantees, period. In the real world, though, you're not interested in absolute guarantees, you just want to reduce risks. How effective the mechanisms to do this are depends on how accurately they reflect the real world threats. -matt From ssteele at eff.org Wed Feb 1 07:38:08 1995 From: ssteele at eff.org (Shari Steele) Date: Wed, 1 Feb 95 07:38:08 PST Subject: your membership renewal letter Message-ID: <199502011537.KAA27134@eff.org> February 1, 1995 Dear David, We received your response to our membership renewal reminder and would like to thank you for taking the time to actually write a letter explaining why you have chosen not to renew. We are sorry that you are unhappy with the role EFF played in the Digital Telephony negotiations. We were not totally comfortable our role, but we do believe we did the right thing and that there would be a much more intrusive bill if EFF had done nothing. However, I'm sure that you've heard the arguments by now, and I'm not writing to change your mind about our role in Digital Telephony but, instead, to let you know about a lawsuit we're about to file against the State Department and others claiming the ITAR listing of encryption as a munition is unconstitutional. Our plaintiff wanted to post an encryption algorithm he developed to sci.crypt. The State Department informed him that he would need an export license before he could post the algorithm on the Net and then told him that he would be denied the license because the algorithm was too strong. We see this as a critical First Amendment challenge to a regulation that undermines secure communications on the networks. The suit should be filed before the end of the month. We don't expect to please all of the people all of the time, and it is clear that we didn't please you with Digital Telephony. But we really are trying to make Cyberspace a better place to be, and we hope you'll reconsider your decision regarding your renewal. You can earmark your contribution to be applied only to litigation or some other particular function, if that would make you feel more comfortable. Take care. Sincerely, Shari ---------------------------------------------------------------------------- Shari Steele, Director of Legal Services ssteele at eff.org Electronic Frontier Foundation 202/861-7700 (voice) 1667 K Street, N.W., Suite 801 202/861-1258 (fax) Washington, DC 20006-1605 202/861-1224 (BBS) From hughes at CSUA.Berkeley.EDU Wed Feb 1 08:36:15 1995 From: hughes at CSUA.Berkeley.EDU (Eric Hughes) Date: Wed, 1 Feb 95 08:36:15 PST Subject: Mystery files in the incoming/ directory Message-ID: <199502011636.IAA15941@soda.CSUA.Berkeley.EDU> I'm doing some archive maintenance at long last. Be warned, you can't upload right now because of some mystery configuration error that I can't fix myself. What I'm asking about are some files that were not uploaded with descriptions. I'll delete them in a week or so if I haven't got mail indicating what they are. This list is at the bottom of this message. (Yes, some of them are quite old.) Note that the archive maintainers have their own address now (see header). Please use it for all archive maintenance mail. And please read README.UPLOAD if you're going to upload in the future. Eric ----------------------------------------------------------------------------- -rw-rw-r-- 1 hughes remailer 119940 May 16 1994 contrib.zip -rw-rw-r-- 1 hughes remailer 16360 Jun 23 1994 cpremailer.tar.gz -rw-rw-r-- 1 hughes remailer 68968 Dec 16 09:07 dc-irc.alpha.tar.gz -rw-rw-r-- 1 hughes remailer 14946 Dec 1 15:29 mkpgp.txt.uu.gz -rw-rw-r-- 1 hughes remailer 75424 May 16 1994 pgp10.zip -rw-rw-r-- 1 hughes remailer 233854 Jul 16 1994 pgpw26.zip -rw-rw-r-- 1 hughes remailer 58033 May 7 1994 pwf11.zip -rw-rw-r-- 1 hughes remailer 2913 Dec 1 15:27 signtools.tgz From eric at remailer.net Wed Feb 1 08:54:28 1995 From: eric at remailer.net (Eric Hughes) Date: Wed, 1 Feb 95 08:54:28 PST Subject: The security characteristics of crypto modules with secrets In-Reply-To: <199502011528.KAA23229@crypto.com> Message-ID: <199502011653.IAA05730@largo.remailer.net> The advantage of a secure crypto module on an insecure server (or router or whatever) is in limiting the scope of successful attack. Just to expand on this, the scope is limited in _time_, not space. That's, when you pull out the module (literally or figuratively), the attack is known to be over -- and don't plug it back into a machine of unknown state. The main important difference between this attack and just learning the server's secret is that it only remains useful as long as the attack is undiscovered. Yes. Typically, once the attack is discovered, the method used in the attack is also discovered. The particular hole is then patched. The system can now be put back online without fear of immediate re-compromise. Eric From eric at remailer.net Wed Feb 1 08:58:07 1995 From: eric at remailer.net (Eric Hughes) Date: Wed, 1 Feb 95 08:58:07 PST Subject: ESP Unix encrypted session protocol software In-Reply-To: Message-ID: <199502011656.IAA05742@largo.remailer.net> From: Thomas Grant Edwards I am thinking of the use of a trusted adjudicator who could receive information from both the original participants and check to see if the two keys matched. How do you authenticate the adjudicator? You'll have to communicate with the adjudicator and verify one of their signatures. You can just as easily exchange signed DH parameters directly with the other party and verify the signature of your correspondent. This is another one of those problems where potential solutions often just lead to infinite regress. Eric From alt at iquest.net Wed Feb 1 09:43:00 1995 From: alt at iquest.net (Al Thompson) Date: Wed, 1 Feb 95 09:43:00 PST Subject: "bad" government Message-ID: >> If strong government resulted in liberty and freedom, then the >> most intrusive, all-encompassing governments would result in >> its citizens having the most liberty. Is this the case? I would >> look at the (former) Soviet Union, Iran, Cuba, East Germany, etc., >> for your answer. >Unrestricted individual freedom leads to unrestricted freedom of >`private' corporations. Private corporations uncurbed by society's law are >autarkies: internally totalitarian, externally predatory, as amoral as >amoebas. > >Is this the shape of the future you seek? 'Tis better to err on the side of liberty. To suggest otherwise would indicate that the origin and true meaning of "rights" or "liberty" is not understood. You can NOT restrict someone's rights simply because they MIGHT harm another (prior restraint). If they do cause actual harm to someone, they should be brought to justice. To place restrictions on someone based on the possibility that may may cause harm introduces restrictions based solely on the authorities' opinions (political philosophy, religion, race, etc). That that the shape of the future YOU seek? ************************************************************ * Just your basic signature block * * * * Al Thompson * * Fidonet 1:231/110 * * alt at iquest.net * ************************************************************ From rrothenb at ic.sunysb.edu Wed Feb 1 09:53:27 1995 From: rrothenb at ic.sunysb.edu (Robert Rothenburg Walking-Owl) Date: Wed, 1 Feb 95 09:53:27 PST Subject: VoicePGP cracked in 10 minutes?... In-Reply-To: <199502010348.VAA00506@einstein.ssz.com> Message-ID: <199502011753.MAA21825@libws2.ic.sunysb.edu> > > Hi all, > > I heard a rumor hear in Ctl. Tx. that the VoicePGP project was cracked in the > last couple of days in approx. 10 minutes. Anyone have any info on this other > than one of those wild rumors that occur? > > Thanks and take care. > Nope. That was "Call Security" which used something called Quick Public Key (QPK?) that was apparently homemade. From rrothenb at ic.sunysb.edu Wed Feb 1 09:58:08 1995 From: rrothenb at ic.sunysb.edu (Robert Rothenburg Walking-Owl) Date: Wed, 1 Feb 95 09:58:08 PST Subject: What's with anon.penet.fi?? Message-ID: <199502011757.MAA21864@libws2.ic.sunysb.edu> Subject says it. Every message I post to the list gets a reply saying that I am abusing the remailer by posting chain letters etc. All replies to admin at anon.penet.fi are also getting bounced back too. From ortenzi at interactive.net Wed Feb 1 10:54:36 1995 From: ortenzi at interactive.net (Anthony Ortenzi) Date: Wed, 1 Feb 95 10:54:36 PST Subject: Fundamental Question? Message-ID: Although I understand the need for remailers for anonymity, is it not true that the whole idea of encryption (good encryption, that is) is that no matter who gets the encrypted text, it really doesn't matter? Does this not mean that something like USENET is *perfect* for this? -Anthony From A5113643667 at attpls.net Wed Feb 1 10:59:25 1995 From: A5113643667 at attpls.net (Tom Jones) Date: Wed, 1 Feb 95 10:59:25 PST Subject: The security characteristics of crypto modules withsecrets In-Reply-To: <199502011528.KAA23229@crypto.com> Message-ID: <3573AD49> Matt and Cypherpunks, etal. I have been designing secure crypto modules for many years. The primary difficulty has been getting anyone to shell out the money to buy them. Perhaps things will be different with PC Cards. Peace. Tom From adam at bwh.harvard.edu Wed Feb 1 11:12:48 1995 From: adam at bwh.harvard.edu (Adam Shostack) Date: Wed, 1 Feb 95 11:12:48 PST Subject: Fundamental Question? In-Reply-To: Message-ID: <199502011911.OAA09754@bwnmr5.bwh.harvard.edu> | Although I understand the need for remailers for anonymity, is it not | true that the whole idea of encryption (good encryption, that is) is that | no matter who gets the encrypted text, it really doesn't matter? Does | this not mean that something like USENET is *perfect* for this? Its awfully expensive to send messages all over creation so one person can read them. Much better to send it to the person who wants to read it. Besides, USENET propagation can be slower than remailers; the far ends of the chain can often take around a week. Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From andrew_loewenstern at il.us.swissbank.com Wed Feb 1 11:28:22 1995 From: andrew_loewenstern at il.us.swissbank.com (Andrew Lowenstern) Date: Wed, 1 Feb 95 11:28:22 PST Subject: Fundamental Question? Message-ID: <9502011924.AA02931@ch1d157nwk> > Although I understand the need for remailers for anonymity, is it > not true that the whole idea of encryption (good encryption, that > is) is that no matter who gets the encrypted text, it really doesn't > matter? Does this not mean that something like USENET is *perfect* > for this? Usenet may be provide good untracability for the recipient, but the if the sender desires untracability she needs to use a remailer or some other service to get the message into Usenet. Also, the recipient needs to know if and where to look for the message. If the recipient isn't anticipating the receipt of a message untracably, or doesn't care if 'they' know she is receiving the message, then Usenet isn't necessary. andrew From jltocher at CCGATE.HAC.COM Wed Feb 1 11:31:47 1995 From: jltocher at CCGATE.HAC.COM (jltocher at CCGATE.HAC.COM) Date: Wed, 1 Feb 95 11:31:47 PST Subject: Clipper Revived? Message-ID: <9501017916.AA791667001@CCGATE.HAC.COM> From Edupage: REPLACEMENT FOR CLIPPER AT&T and VLSI Technology Inc. will collaborate to develop microchips that use a triple-strength version of DES (data encryption standard), which previously had been rejected by the National Security Agency. VLSI is the designated contractor to make the government-favored Clipper chips, but this latest announcement reveals their doubts over whether there's a market for the Clipper. "These companies have basically made the determination that Clipper is dead and there's going to be the proliferation of encryption anyway, so they might as well take advantage of it," says one observer, who predicts the market for such technology "could reach hundreds of millions" of dollars in annual sales by the end of the decade. (Wall Street Journal 1/31/95 A3) John L. Tocher THE CITY-a bounded infinity. A labyrinth where JLTocher at Earthlink.net you are never lost. Your private map where every PGP: CE 72 1A 11 07 47 35 block bears exactly the same number. Even if you 35 9A C1 DE EA 64 21 BC 94 lose your way, you cannot go wrong. --Kobo Abe From cactus at seabsd.hks.net Wed Feb 1 12:11:00 1995 From: cactus at seabsd.hks.net (Todd Masco) Date: Wed, 1 Feb 95 12:11:00 PST Subject: Fundamental Question? Message-ID: <199502012007.PAA13259@bb.hks.net> -----BEGIN PGP SIGNED MESSAGE----- - -----BEGIN PGP SIGNED MESSAGE----- In article <199502011911.OAA09754 at bwnmr5.bwh.harvard.edu>, Adam Shostack wrote: > Its awfully expensive to send messages all over creation so >one person can read them. Much better to send it to the person who >wants to read it. Besides, USENET propagation can be slower than >remailers; the far ends of the chain can often take around a week. 1. Let's have some perspective here. Remailer traffic can't really be expected to exceed the traffic in, for example, alt.binaries.pictures.erotica. Additionally, with USENET it's trivial to control when are whether you receive particular groups. Don't want to carry alt.anonymous.remailer.channel? No problem. Don't. 2. USENET propogation is not that slow; Between well connected sites (IE, just about any Internet host that isn't swamped for other reasons like Netcom frequently is) I haven't seen a larger lag than a few hours. The biggest reason to use remailers is not to avoid interception of traffic: that's a trivial problem with PGP. The biggest threat is that of traffic analysis: Alice doesn't want her boss Charlie to know she's having an ongoing discussion with Bob about a new "career opportunity." As I've said, I think USENET is perfect for this. Add some reordering to the processing and a hidden way to define the intended recipients and no way that passive traffic analysis is going to succeed. - - -- Todd Masco | "Schooling serves to reduce the risk of being eaten." cactus at hks.net | - Scientific American, June, 1982 Cactus' Homepage - -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLy+w1xNhgovrPB7dAQFjcgQAqc6eu22NAB8wE5iAyyGMTFbwlXLbiHF0 FUmJlWXQ4J8EkPXEa+ZUKGlcbCETjQ2rXxzHh3cOiVxjRVnKKh5Q/VmU4JOALPXE lBIfH+W8ty0LxaXBue9KkXh4cFvoehW7UXhq9oitNgSqiTmf/EoCbjJc5A7w7YHd Aqu7sgyyPFQ= =4UNd - -----END PGP SIGNATURE----- - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBLy/p3CoZzwIn1bdtAQGkNgGAtR+F+nkckmLHgvrlurrHsGng24kdBu4R 20AwntDjdEcZjNHAqrc/aCf8TKVhUUJV =o09G -----END PGP SIGNATURE----- From norm at netcom.com Wed Feb 1 13:03:39 1995 From: norm at netcom.com (Norman Hardy) Date: Wed, 1 Feb 95 13:03:39 PST Subject: ESP Unix encrypted session protocol software Message-ID: At 11:49 PM 1/31/95, Thomas Grant Edwards wrote: >On Tue, 31 Jan 1995, Eric Hughes wrote: > >> Just because plain old Diffie Hellman is subject to active attack >> doesn't mean it's useless. Some protection is better than no >> protection at all. It's still worthwhile implementing some security >> to make an opponent's task harder than to implement no security. > >I'm curious though if there is some way to reduce the risk or at least >increase the detectability of active DH spoofing. I am thinking of the >use of a trusted adjudicator who could receive information from both the >original participants and check to see if the two keys matched. > >Does anyone see a good solution to this problem? .... I trust that that the attack refered to is the "man-in-the-middle". I find it very curious that there is a simple fix to the attack for the enctrypted voice channel. Each unit displays to its human a few bits of g^(xy). One human quotes them vocally to the other. If there is a man in the middle the bits are unlikely to match. What I find curious is that there seems to be no automated analog to this precaution. It has to do with the difficulty of substituting the vocal signals that code these bits. This is too hard for either computer or man (in the middle). I write to stimulate a solution. I have none. From mab at crypto.com Wed Feb 1 13:37:44 1995 From: mab at crypto.com (Matt Blaze) Date: Wed, 1 Feb 95 13:37:44 PST Subject: ESP Unix encrypted session protocol software In-Reply-To: Message-ID: <199502012138.QAA26261@crypto.com> >I trust that that the attack refered to is the "man-in-the-middle". I find >it very curious that there is a simple fix to the attack for the enctrypted >voice channel. Each unit displays to its human a few bits of g^(xy). One >human quotes them vocally to the other. If there is a man in the middle the >bits are unlikely to match. What I find curious is that there seems to be >no automated analog to this precaution. It has to do with the difficulty of >substituting the vocal signals that code these bits. This is too hard for >either computer or man (in the middle). I write to stimulate a solution. I >have none. > > The reason there's no "computer" analog to the "anti-spoofing vector" for human-human voice communication lies in the definition of authentication. In a formal sense authentication here means binding a secret that only you know to the encrypted channel. In the case of voice communication over an encrypted link, that "secret" consists of the ability to hold a convincing exchange that sounds like your voice. You bind the secret to the channel by speaking a hash of the key. Computers, not pre-equipped with biological mechanisms for establishing who they are, need to use another secret (like knowledge of the secret part of a public key signature pair) to which only the computer you want to authenticate has access. The encrypted human voice authentication scheme is only as strong as it is hard to spoof voices. Digital signature authentication is only as strong as it is hard to break the signature scheme or compromise the signing key. -matt From cactus at hks.net Wed Feb 1 13:47:13 1995 From: cactus at hks.net (Todd Masco) Date: Wed, 1 Feb 95 13:47:13 PST Subject: FMP Message-ID: <199502012143.QAA14255@bb.hks.net> -----BEGIN PGP SIGNED MESSAGE----- Can anybody tell me where I might be able to find the FMP library ( Riordon's PD GMP-a-like)? Archie turns up empty. Thanks, - -- Todd Masco | "Schooling serves to reduce the risk of being eaten." cactus at hks.net | - Scientific American, June, 1982 Cactus' Homepage - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBLzAAXyoZzwIn1bdtAQHjuwF+JHUY0HeNtzptxC2hTuVRrNV/s9/k1DeZ F0XE3PUFvSTBCyo9iv++O31td0xt1YWj =3iAP -----END PGP SIGNATURE----- From kevin at elvis.wicat.com Wed Feb 1 15:23:59 1995 From: kevin at elvis.wicat.com (kevin at elvis.wicat.com) Date: Wed, 1 Feb 95 15:23:59 PST Subject: Fundamental Question? Message-ID: <9502012323.AA00271@toad.com> >2. USENET propogation is not that slow; Between well connected sites >(IE, just about any Internet host that isn't swamped for other reasons >like Netcom frequently is) I haven't seen a larger lag than a few hours. Consider the incoming directory on my local news host: -- jlc:/usr/spool/news/in.coming$ ls -l total 401 -rw-r--r-- 1 news news 172237 Feb 1 16:08 21705-000000.t drwxr-xr-x 2 news news 1024 Jan 31 13:43 bad/ -rw-r--r-- 1 news news 79792 Jan 27 12:35 nntp.a00606 -rw-r--r-- 1 news news 130025 Feb 1 16:09 nntp.a21731 drwxr-xr-x 2 news news 21504 Jan 21 12:57 save/ -rwxr-xr-x 1 news news 194 Nov 30 14:22 unz* jlc:/usr/spool/news/in.coming$ grep Date 21705-000000.t | more Date: Mon, 30 Jan 1995 18:28:21 GMT Date: Mon, 30 Jan 1995 18:34:30 GMT Date: 30 Jan 1995 11:03:14 -0800 Date: 30 Jan 95 13:25:19 +0200 Date: 30 Jan 1995 13:35:59 -0500 Date: 30 Jan 95 17:59:27 GMT Date: 30 Jan 1995 13:25:40 -0500 Date: 27 Jan 1995 14:11:51 -0600 Date: 27 Jan 1995 14:50:32 -0500 -- The majority of incoming messages are two days old (this was on Feb 1 at 16:10, GMT -7); the worst instance in this particular batch was six days old (posted from a backwater site in Sweden). Before you object that this is obviously a poorly-connected site, we're on a leased 56K line two hops from the backbone (we're fed by BYU, who is in turn fed by the University of Utah, one of the original four internet sites and as well fed as you get). Our server is keeping up with the incoming news. I suspect this is a pretty typical scenario. -- Kevin From kevin at elvis.wicat.com Wed Feb 1 15:48:30 1995 From: kevin at elvis.wicat.com (kevin at elvis.wicat.com) Date: Wed, 1 Feb 95 15:48:30 PST Subject: Frothing remailers - an immodest proposal Message-ID: <9502012348.AA00549@toad.com> >Without quoting the entire message, I think I better solution, in terms of >ease to implement as well as conserving bandwidth would be to have a >sophisticated remailer script-language. > >For instance, the script language could tell the remailer to check if a >site is on-line (perhaps within certain GMT hours or dates) and use the >next site if not available, or to randomly choose from a list of sites >the active ones, etc. Aye, there lies the rub. How exactly does one determine if a site is active or generate a current list of active sites? It is not enough to ping the site or even to successfulyl deliver mail to it: the fact that something is alive and running sendmail does not make it a remailer. Likewise, a remailer cannot select an alternate site on behalf of the user if the routing is chosen by the user, as each "envelope" is encrypted specifically for a given remailer. I suppose one could develop client software that built several redundant "envelopes" for alternate mailers, but that would get out of hand pretty quickly, both in terms of the effort of generating a secure message and in term of the size of a message. Scripting is useful (hell, the ::Request-Remailing lines are effectively a script) but not until there is data to operate on. >Maybe even have it work with a data haven? Mail the message to a data haven >and send another message to a remailer chain to pull the message from the >data haven and post the data (not flaws in this: don't want remailers getting >files from people's accounts and posting them to usenet etc.). Not a bad idea, actually. -- Kevin From kevin at elvis.wicat.com Wed Feb 1 16:17:20 1995 From: kevin at elvis.wicat.com (kevin at elvis.wicat.com) Date: Wed, 1 Feb 95 16:17:20 PST Subject: Frothing remailers - an immodest proposal Message-ID: <9502020017.AA00895@toad.com> >1. Broadcasting every couple of minutes isn't necessary and is undesirable >due to the real limitations of the Internet. A remailer could broadcast >its location with a time-out on the location without a constant stream >of availability announcements. In your position for example, you'd >broadcast a message at 5 pm with a 16 hour valid time. True, but this has two basic assumptions that I disagree with: first, that we can guarantee delivery of a broadcast message to all interested sites; and second, that remailers never go down for unexpected reasons. When the day comes that both networks and software are perfect, this method will be reliable. Of course, you are also right that broadcasting is undesirable; that is why I am pondering a way to minimize the impact. >2. This is actually unnecessary for your situation: All you need to do is >advertise your location as a "real" remailer and then have a cron job that >kill sendmail at 5pm on your remailer machine (assuming you have a spare >machine that doesn't need to run sendmail). The mail network is flexible >enough that things will Just Work. Mail won't go through instantly during >the day, of course, but that just helps to muddy up the mix. But, if my understanding of remailer operation is correct, this has two potential problems: first, I will still receive mail during the day, causing a bandwidth concern (I know, it's probably not a problem right now, particularly since users will probably choose to avoid a remailer with a possible 16 hour delay); and second, the machine delivering mail to me simply has to trust that a remailer will in fact pop up on this machine to process the stored mail. There is no way of determining that mail is not simply going into a black hole. And even if I try to be nice when the mailer goes down permanently and tell everyone not to route mail through it any more, that news still has to travel via word of mouth to all users of the web. > >3. Broadcasting over live IP isn't all that great a model. Ideally, >you'll use a mechanism that doesn't require instant communication among >hosts. I favor USENET for this: messages have a naturally long life- >time and the network is self-adjusting. If a direct route is temporarily >unavailable, an indirect one will often manifest itself. I also favor >using USENET store-and-forward for the messages themselves for the same >reasons: traffic analysis is impossible inside the web and direct routes >are not necessary. I am not happy with my proposed advertising methods, and was quietly hoping for some guidance from internet gurus in this point (the irc suggestion in particular is a pretty shaky straw man). However, see my earlier message (on some other thread) about Usenet propagation times. Propagation times in days do not seem to be rare (post to misc.test and see when the last reply comes back). While this is better than word-of-mouth propagation, it does not offer the very low latency I was looking for. >4. Using a PGP-style web-of-trust is important. In the ideal situation, >one human in an extended web can certify individual remailers and all other >remailers close enough on the same web of trust would pick up the message >immediately. It strikes me as critical; right now, a user has to choose to trust a set of remailers, given no assistance other than a list of "reliable" ones. Given an extended web of trust between remailers, the user can choose to trust one remailer (I have no idea how to make this process more palatable) and immediately gain the security of a large web of remailers (maybe you are right about that instant gratification thing...) Kevin From cactus at seabsd.hks.net Wed Feb 1 16:29:32 1995 From: cactus at seabsd.hks.net (Todd Masco) Date: Wed, 1 Feb 95 16:29:32 PST Subject: Fundamental Question? Message-ID: <199502020025.TAA15949@bb.hks.net> -----BEGIN PGP SIGNED MESSAGE----- In article <9502012323.AA00271 at toad.com>, wrote: >Consider the incoming directory on my local news host: ... Strictly speaking, you've really only demonstrated that there are a lot of poorly connected sites on the USENET. The primary characteristic that really needs to be considered is the time for news to reach one remailer site from another. My experience is that new propogation is fast enough that close to real-time conversations happen all the time. I take part in them on the newsgroups I still read and observe them all the time. I don't have a ready explanation for why my experience differs so much from yours. The worst-connected site I've ever read from was 9 mo.s ago with a batched feed from uunet. Even then the vast majority of posts I saw were from the day just ending. What are other people seeing as news delays? - -- Todd Masco | "life without caution/ the only worth living / love for a man/ cactus at hks.net | love for a woman/ love for the facts/ protectless" - A Rich Cactus' Homepage - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBLzAmeSoZzwIn1bdtAQHHiwGAxL13i5YYjZxREU1XwnAp81+XWgir7H92 enbDeqFQwjddTeEgHX+fKZWoZJBe4wy6 =pmE5 -----END PGP SIGNATURE----- From warlord at ATHENA.MIT.EDU Wed Feb 1 16:53:34 1995 From: warlord at ATHENA.MIT.EDU (Derek Atkins) Date: Wed, 1 Feb 95 16:53:34 PST Subject: PGP Question In-Reply-To: <9502011343.AA00578@elysion.iaks.ira.uka.de> Message-ID: <199502020053.TAA06783@charon.MIT.EDU> > Is there any simple way to glue a binary file and its detached pgp > signature together into a single pgp file (as produced by non-detached > signing) ? Uhh, this would sort of defeat the purpose of a detached signature; in which case why not use the regular signature?? Alternatively, you could use MIME multiparts to encode the binary file (in one part) and the signature (in another part) in a single message. Is this what you want??? -derek From nzook at bga.com Wed Feb 1 16:58:23 1995 From: nzook at bga.com (Nathan Zook) Date: Wed, 1 Feb 95 16:58:23 PST Subject: Lucky primes & omlets on my face... Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Considering the general temperature of this list, I'm amazed that I didn't get torched over my algorithm. sigh. The c-punks are all too busy debating operating systems to worry about effiency in their remailers. Unless, of course, Hal's "I don't understand" was from the Moore school? Let's try this again. Let 2*x be the target number of bits in the modulous. Let n be a large random number with x+2 digits. Let n1 be the next multiple of 0x10001. Let t2 be n1 mod 8, t3 be n1 mod 9, t5 be n1 mod 25, t7 be n1 mod 49. Loop: For i = 2 to 7 If n1 = 1 mod i and (n1-1)/i + 1 is not a multiple of {2,3,5,7} If (n1-1)/i + 1 is prime. { Let k = 0's in n1/0x10001. If k is in range, save and exit. } EndIf EndIf Next n1 += 0x10001; EndLoop Recall: x^p = x mod p therefore, x^(p-1) = 1 mod p. So what we need is: (x^e)^d = x^ed = x^(p-1)*i+1 = x mod p. ie: ed = (p-1)*i+1 or: (ed - 1) / i + 1 = p Now 0x10001 inverts easily, it is just n1/0x10001. By keeping track of various quantities, we can eliminate all multiprecision divisions except for the original one needed to get n1 and the t's, and doing increments instead. >Yes, I see that you are right about this. It would be easy to generate >e,d pairs and get a d which is significantly short on 1's by 10% or more. >I did not quite follow your algorithm to do this (was n the modulus or >was it phi, the sum of the modulus' divisors?). The one caveat is that >if "high-zero" decryption exponents are widely used, it could conceivably >reduce the search space somehow, although I don't see offhand how to >exploit this. > >Hal >> (you may wish to ensure that k is _above_ a certain threshhold...) I don't either, but if >80% of the digits were 0, I'ld probably start to get nervous. But I don't need a fast-key for my home system, I'm barely handing 10 signatures a day. I only advocate using high 0's when you are in a high usage environment. Nathan -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQEVAwUBLzA2NnmgMs8UcStNAQEyjQf/aOPBXcN6/M9cmh3aQHXeIr5uY3DEwvRw WHBtWv0dVE1jfSS/4i71apWi2+Gm7iRyLGc/G4Y03RkcqMhePGSHgN6NHEHC3QaR qoKMsa/h6z5nSMd/t8umTiSUJxFX2/1z8k29j7bM5gduUTqHPdFwcVnQnE8Rhy72 hwF+r3g9lFIhavsLFnT7KPeQ1ozVFJ+ItoTDWOOjjA8/MSGFi5JFkViw+saP2F/j 2JEbMhmMcjtTchu+s/yNVGJeL0C0DMjh2Ysh/wS/GwbcoXK1RFb602lXtCp2AUz5 Mzn9Xsdv4bUyyoumN5wT6YDdwu6QwvvU5Fh9sTZUwFHsY9RrMy53jQ== =lK0s -----END PGP SIGNATURE----- From nzook at bga.com Wed Feb 1 16:59:39 1995 From: nzook at bga.com (Nathan Zook) Date: Wed, 1 Feb 95 16:59:39 PST Subject: Why encrypt intra-remailernet. Message-ID: Hal >I still don't quite follow this. Clearly. ;) Okay. You are right that the first remailer derives no primary benefit, and engages in no primary risks from verifying signatures. Alice, however does, and Chaum is, after all, providing a service to Alice (and Frank). He does wish to provide all the benefits that he can to them. What benefit does Alice gain? 1) Plausible deniability. Remember, "reasonable doubt." Remember Abscam? The gov't is in a good position to fake source info. This squishes that. (It squishes even better if Chaum _requires_ signatures.) 2) If Chaum sends Alice a copy of the message that failed the signature check, Alice knows that someone is trying to spoof her. This information may be critical in determining how serious her opponents are. What risks does Alice take? If the final message to Bob is encrypted, and Chaum is not compromised, none. If Chaum _is_ compromised, Alice is chaining anyway, so it still doesn't matter. What might Chaum gain from checking or requiring signatures? Various net abuses often involve faking names. Requiring validated signatures would pressure these abuses away from the remailers. Reducing the net abuses going through the remailers is a PR goal. >PGP already includes a cryptographically protected length field in the >message. It will ignore any data past that, according to my experiments. >All that is needed is a simple patch to add junk data to the end. Soapbox mode: It seems to me that hacking PGP requires considerably more cooperation between remailers, and more work than just allowing recursive opening of PGP packets, automatic padding (or concatenating) of data, and automatic encryption of out-goin mail. Subways and MixMaster both appear to have far more working required to implement, far more cooperation between remailers, and far more room for failure than my idea. (Emphasis: appear. I've not seen Lance's paper, yet. He's getting it to me.) I also believe that hacking PGP is a bad thing (tm), because it means that every time an upgrade comes out, it will need to be re-hacked, and once you start hacking, when do you stop? Although, it would be nice to have a STD_LEN variable for such things. OTOH, you seem to be agreeing with me here. Who hacks PGP? Who is PGPing their outgoing stuff? Don't we have to have standard packet _inside_ the net? And you achieve this by using PGP? ????? >I still don't quite follow this. Exactly what attack would be possible >against Miron's remailer if it allowed encrypted reply blocks (as all >others do) which would fail if the messages were wrapped as you suggest? The most obvious one: Eve checks messages (in vs out) for matching tails. If the tails match, the messages match. The only way around this is for the entire message to be wrapped. Thus, the extropian requirement. When I say that the Mark I remailers are laughably easy to crack, I mean laughably easy. Is the message a clear set of ::Request-Remail-To:? Pull & log. Is the message clear, with encrypted headers? Match, pull, and log. Is the message encrypted separately from the headers? Match, pull, log. Is the whole message encrypted? Take the ones that are left, match the largest. Match the next largest. Match the next largest. Pull & log. Get stuck? Need a hint? Resend a message. Watch for the repeat on the out. Laugh. The only reason that our systems are actually able to do any good is that our threat model _is not_ an LEA--with government resources, and government patience. >Alice may not have a key whe wants the general public to use - she may >just be using one for her private correspondents. If she wants to be able to recieve untraceable mail, she is going to have to have a key that remailers can use when forwarding mail to her. See below. > Actually it seems to >me given the nature of remailing that it would be superior if it were >easy for people to "spoof" my use of the remailer. That would give me >more credence to claim innocence. The more useless return addresses are, >the less we even need remailers. I think you are arguing to ignorance here. The assumption so far on the list has been that if Alice is root, she is in the best possible postion to protect herself. I disagree. Alice has been hauled into court. The Feds claim that she is the one that actually sent messages M1,...Mx to Bob through Chaum, even though these messages have varied From: (and From) lines. As root, she cannot claim that this is not possible. OTOH, if Chaum requires a match, the Feds would have to claim that she compromised the secret keys of all of all the cooresponding From: addresses. Much tougher. >It's not my job to fix the damn Internet. So what if I get mail claiming >to be from abc when it's actually from def? I of all people care the >least, specifically because I throw away this data. Virtually everyone >else on the net cares where their mail comes from, but I don't. My whole >purpose is to discard the information about where it comes from. That is >why I am so confused about your emphasis on checking signatures. We care because we are good people. ;-) Seriously, if a sight is being shadowed, then it is insecure. It is to our advantage to know this. You are right that we "don't care" where a message comes from only if we assume that the message _didn't_ come from an LEA. (Or a big corporation. Some of them probably have the power to do this, too.) If it did, then the remailer net is under attack, and we most definitely _do_ care about that. >Although I agree with Wei Dai's mathematics, to my mind it points up the >importance of successful countermeasures rather than implying that the >remailer network is inherently insecure. For example, if you send one >identical message every batch, Wei's math shows clearly that you can't be >traced. Let's not get rumors started about how the remailers don't >work. I'm lost here. I thought that sending an identical message (producing identical output) every tick would be the equivalent to an attack. But what exactly constitutes "successful countermeasures"? How do you prevent an attacker from taking over a sight, thus compromising it, w/o the knowlege of the operator? How do you prevent long/short matching of the remailer net _as a whole_? How do you prevent tail matching? How do you prevent middle matching, for that matter? How do you prevent the repeated message attack? >Do you see your suggestion as protecting against Wei's in/out correlation >attack? Yes! Well, not by itself. My suggestions about "rational use of garbage" do that. If Bob recieves x messages each tick, 0 to x of which are real, Eve is hosed--if all messages are standard sized & encrypted!. Eve is even more hosed if the x messages are concatenated & superencrypted. If Alice sends y messages each tick, Eve is hosed. Even more so if the messages are concatenated & superencrypted. > I don't see it. If fixed-sized packets are used, with chained >encryption, I think you have as good a system as you do with all of your >inter-node encryption and signing. > The way you suggest to standardize packet sizes leaves the system vulnerable to matching the top of the body of the messages in a repeated- message attack. >Suppose one good encrypted message enters the net with 10 unencrypted >ones. Won't the full path of each of the 10 be visible to an outsider? >Even if the remailer helps out those 10 doltish users by encrypting them >from there on out, the outsider already saw their whole paths! They will >know how many unencrypted messages are going out to each destination, and >from that determine where the encrypted message is going. Not with rational use of garbage. With rational use of garbage, the system could protect a single encrypted message--if the recipient or sender is "in the box". BTW, it may be impractical for senders to be "in the box", as described, as they cannot know exactly when ticks occur. I believe it can be done, though. >Of course it was Chaum himself in his 1981 paper (which I think is available >from the CP FTP site) who described the duplicate-message attack. I don't >see that inter-remailing encryption helps much, because the attacker can >still notice that whenever they inject message A, _something_ goes to >Bob. The real solution, as Chaum pointed out, is that the remailer must >reject duplicate messages, even when separated by days. Doing this without >keeping a database of all messages ever sent is left as an exercise. > I disagree. If identical input to Chaum does not produce identical output to Bob, how does Eve coorelate them? Repeating, she can match the top of the body of messages, so random tails reveal the actual encrypted message, for whatever that is worth. And if Bob receivs x packets per tick, or a BIG packet every tick, how does Eve trace it? >Another aspect worth mentioning is that message splitting can make the >kinds of statistical correlations that Wei Dai was looking at more of >a danger. More than being the ONLY file in the net of your (approximate) size? > It's one thing if I send a message along with thousands of >other people, and Bob gets a message along with everyone else. But if I >send 10 messages and Bob gets 10 from that batch, that fact alone can >help to link us up. So splitting my big message into 10 standard ones >isn't that great if they're all sent at once. Ideally you'd want to >dribble them out at some standard rate, a rate at which you always send >a message whether you have something to send or not. But this may introduce >unacceptable latency. "Dribble them out at some standard rate". Yes. y packets per tick. Set y equal to your average number of real packets per tick, plus 3 standard deviations. Since you are chaining, the latency of you input will be less than the latency of the remailernet. Nathan "PGP?" "ITAR!" "Oh, RKBA!" |--------------------------------------------------+ ----------------- 14712B4D 1994/12/26 Nathan H. Zook ) |44B3D866 3D551E2E --------------------------------------------------- |F89222A6 338CDE24/ | ----------------- From nzook at bga.com Wed Feb 1 17:00:02 1995 From: nzook at bga.com (Nathan Zook) Date: Wed, 1 Feb 95 17:00:02 PST Subject: Ending the Crusade Message-ID: Here is an idea to tone down the dos crusade for those of you with procmail and a vindictive streak: Instead of routing all of those messages to /dev/null, forward them back to the authors, perhaps with a notice that the message appears to have been mistakenly routed to you? Nathan From nzook at bga.com Wed Feb 1 17:00:35 1995 From: nzook at bga.com (Nathan Zook) Date: Wed, 1 Feb 95 17:00:35 PST Subject: Thanks for not flaming !??!? Message-ID: Adam Shostack >YOu're right, I did miss the attack. I'll be responding in depth >tomorow, when I'm awake, but I wanted to say thanks for not flaming. >:) > >Adam Is it just me, or does this message have a rather disturbing social implication? Crimeny, no one's perfect around here. Well, maybe James or Perry. Nathan From kevin at elvis.wicat.com Wed Feb 1 17:00:38 1995 From: kevin at elvis.wicat.com (kevin at elvis.wicat.com) Date: Wed, 1 Feb 95 17:00:38 PST Subject: Frothing remailers - an immodest proposal Message-ID: <9502020100.AA01613@toad.com> >I have some concerns about Kevin's frothing remailers. Like so many of >the proposals we see to put more responsibility into the remailer net, >this opens vulnerability to a single bad remailer. If I trust the first >remailer in the net to choose my path for me, as I might be tempted to >do with a froth, then if that remailer is corrupt my anonyminity is lost. >With user-supplied chaining I am secure unless all of the remailers on >the chain are corrupt. Firstly, I certainly do not propose that we remove user-supplied chaining; it is obviously vital to true anonyminity. What I am suggesting is that we allow remailers to introduce more noise into the mix using information that users cannot easily obtain for themselves (e.g. which remailers are in operation at this moment). In the apparently common case of unencrypted messages crossing the net, this is at least no worse than the current situation. Of course, we would also have to allow users to specify that no munging of the route be allowed (some form of scripting). Trusting remailers to obey this request requires no more trust than we already place in them (which, I believe, is considerably more than most seem willing to admit). If you succumb to the temptation and trust remailer #1 totally, then you of course run the risk of sacrificing anonyminity. However, if you do not trust remailer #1 so completely and specify a chain of remailers, but allow remailer-generated routing between the points on that chain, you gain resistance to traffic analysis as well as making it possible for smaller transient remailers to play a useful role. >I also do not like the kind of close-knit, cozy cooperation among the >guild of remailer operators which seems to be envisioned in this and >similar proposals. Do you like the idea of messages on the remailer >operators list saying, I am getting objectionable messages from your >remailer, would you mind dropping in a log so we can see who is sending >these messages which violate the Politically Correct Speech Act? I don't see what would prevent this from happening now. The only degree of cooperation I require from remailer operators is that they agree on some software standards and that, if they choose, they create extended webs of trust via signing one another's keys. There is no requirement that all remailers or remailer operators trust all other remailer operators; in fact, I think this would be undesirable, even if the trust were justified. Again, remember that control lies with the user. If you choose, you can allow a remailer to bounce your mail through its web of trust before forwarding it to the next point on your chain. I do not believe that this increases the risk of losing anonyminity. I do also propose that this be the default behavior in order to provide naive users with some degree of security, as well as using their traffic to obscure that of more sophisticated users. >I do like Kevin's ideas about a dynamic remailer net, but I think >another approach would put more smarts into the client program used by >the originator. Granted, his information will be somewhat more out of >date as the message makes its way through the network. But depending >on thie time scale at which the froth, um, froths, this should still >allow a lot more dynamism among the set of remailers. Using either IRC >or, as Todd suggested, Usenet to maintain an active remailer list might >work. We could also have a distributed set of sites which provide the >information by finger like the pinging sites we have now. True, all true (I seem to be saying this a lot today). My transient remailer problem can be solved by publishing the times of availability (assuming, of course, that my remailer will always be up when scheduled). My only serious objection to this is that there will always be more clients with more operating systems and platforms than there will be servers. I don't expect that it will be easy to create new standards for remailers and get significant numbers of operators to implement or use them, but I do believe that that task is easier than making smart clients available on all possible platforms. [ Safe-TCL comments deleted] >What you need then is some way for various messages to interact with each >other, so that, for examle, a message could wait until there were a >certain number of other messages inside the machine before it sent itself >out. You would also want a way for a message to suspend itself until >some future event, such as having a certain amount of time passing, or >waiting until some message with desired properties arrived. This is a fine suggestion; as I mentioned in an earlier message, scripting is not useful without data to operate on. You have suggested a number of data that a remailer could usefully provide to a message, making scripting more useful. Of course, you have to trust that the remailer is not lying to your script. [ More Safe-TCL comments and a plea for smarter clients rather than smarter servers, to which I reply with the earlier argument, deleted.] -- Kevin From cactus at seabsd.hks.net Wed Feb 1 17:03:28 1995 From: cactus at seabsd.hks.net (Todd Masco) Date: Wed, 1 Feb 95 17:03:28 PST Subject: Frothing remailers - an immodest proposal Message-ID: <199502020059.TAA16283@bb.hks.net> -----BEGIN PGP SIGNED MESSAGE----- - -----BEGIN PGP SIGNED MESSAGE----- In article <9502020017.AA00895 at toad.com>, wrote: >>1. Broadcasting every couple of minutes isn't necessary and is undesirable >True, but this has two basic assumptions that I disagree with: first, >that we can guarantee delivery of a broadcast message to all interested >sites; I had the USENET model of propogation in mind when I wrote this. Delivery is considerably better assured with such a store-and-forward over >and second, that remailers never go down for unexpected reasons. True, if you append "for extended periods of time." The key detail is the boundary condition: IE, how long does it take a "downed" remailer to come off the web. Since each site has the best idea of their own stability, they are in the best position to set the time-out period. A very flaky site might set a time-out to 6 hours. I'd suggest that a site flakier than that shouldn't be running a remailer. >>2. This is actually unnecessary for your situation: All you need to do is >>advertise your location as a "real" remailer and then have a cron job that >>kill sendmail at 5pm on your remailer machine >But, if my understanding of remailer operation is correct, this has two >potential problems: first, I will still receive mail during the day, >causing a bandwidth concern (I know, it's probably not a problem right >now, particularly since users will probably choose to avoid a remailer >with a possible 16 hour delay); No, not at all. The attempted connections to your sendmail with fail and the mail will attempt redilvery for some period of time (usually 3 days) at a certain interval (usually 30min. - 1 hour). >And even if I try to be nice >when the mailer goes down permanently and tell everyone not to route >mail through it any more, that news still has to travel via word of >mouth to all users of the web. Sure. It's important to note that you've got two seperable problems to address here: 1) a recurring limited window of up-time, and 2) handling permanent down-times. My suggestion only covers the first. The USENET model I'm pushing is designed to cover the second. >[PGP web-of-trust] strikes me as critical;... >Given an extended web of trust between remailers, the user can >choose to trust one remailer (I have no idea how to make this process >more palatable) and immediately gain the security of a large web of >remailers. Absolutely, that's what I was trying to express. Best regards, - - -- Todd Masco | "Let me get this straight. You're making a crypto toolkit, cactus at hks.net | and you're worried about it being _obscure_?" - Eric Hughes Cactus' Homepage - -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLy/1gRNhgovrPB7dAQGZCQQA47ADvvuXRvlq5Qw3MSZaUJqqk2KJbUKk nV1mnTVIbvBbCt5PczoSFKkO/O6wMfS/4zzkoTqpvpIvwYvZ6ds75yBwhIyxvTvx gygKFi5ZwysYGz/49vs0BdJSHMqUA+/HVHE2zfcYP+yvbnbTdryQJXLrOdlGhH3a R0LvGJVgCSw= =k+vP - -----END PGP SIGNATURE----- - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBLzAuayoZzwIn1bdtAQFa4gF8Cl9yuHttaTqmcy9Be+9EWa4qp3zHCP5n pgWiNvOt7reobq42ZluxFgTlWrFG0SKa =oFTV -----END PGP SIGNATURE----- From kevin at elvis.wicat.com Wed Feb 1 17:18:11 1995 From: kevin at elvis.wicat.com (kevin at elvis.wicat.com) Date: Wed, 1 Feb 95 17:18:11 PST Subject: Frothing remailers - an immodest proposal Message-ID: <9502020118.AA01956@toad.com> [deletia] >Now, dynamic rerouting is good for better delivery, but is bad for the >trust in silence. Trust in externally unverifiable properties is >_not_ transferrable. Just because I believe that my regular remailer >is OK does not mean you do. The creation of these links of trust is >not something that can be automated solely by the remailer operators. >The end users of the remailers are the endpoints of this trust >relationship. The end users must be involved, either directly or >through some (legal) agent, in the manipulation of these relationships. First, I must admit to being somewhat out of my depth here; this seems to be becoming a philosophical problem. With that shameful admission out of the way, let me bull ahead regardless. It seems to me that I can choose to trust in the fact that *your* trust in other remailers is well founded. This then becomes a third category of trust for a given remailer: trust that it will deliver (verifiable); trust that it will be silent (unverifiable); and trust that its operator has good judgement in choosing who to trust (unverifiable). These latter two are, and should be, the end users responsibility. Now, as I have mentioned in an earlier message (I'm being far too verbose today) I am proposing that dynamic routing be optional, though the default behavior, for reasons mentioned there. Thus, if I, as user, choose to allow dynamic routing (through omission - I must admit, I am becoming less fond of the notion of this as default behavior - it begins to smack of the heresy of "implied consent") I am expressing the third flavor of trust, just as by using the remailer at all, I am expressing the second variety. Of course, I still have to trust that a remailer will honor my routing requests. However, I believe this falls fair and square into the second category (trust in silence) >Any solution which tries to do this independent of the end user is >broken, by definition. -- Kevin ( I have no joke here, I just like saying "I trust a remailer if it is trusted by an entity I trust to trust remailers".) From mjwohler at netcom.com Wed Feb 1 17:57:46 1995 From: mjwohler at netcom.com (Marc Wohler) Date: Wed, 1 Feb 95 17:57:46 PST Subject: NYC area C'Punks meet 2/11/95 Message-ID: <199502020150.RAA29578@netcom14.netcom.com> -----BEGIN PGP SIGNED MESSAGE----- Attn.: New York City area Cypherpunks NYC C'punks meeting: Sat Feb 11, 3:00 P.M., at the home of Linn & Barbara Stanton 315 West 106 Street Apt 2A (Between West End Ave & Riverside Drive) 212-316-1958. Once again the gracious Stanton's invite local area Cpunks to their lovely home which is smoke free and feline friendly. The agenda is still open and suggestions can be made to mjwohler at netcom.com or phone Marc Wohler @ 212-362-0690. Let me know if you plan to attend. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLy+PL2eikzgqLB7pAQGHigP9HW1Py30O2fcZH/f1SAOToOBZYVZMiB9c buGQrujaicGVJlvGb1Le/OjJ872JB69BQD1MMsemABSYi4swL15w9qj1rhoTAHIg yTRDFJD16g1lqqLvEJZ0RijOh1dXLaUg8HNue0JoSAbARkQed8I3+mklP4C4saYn qW2Fa/kDuZY= =Rl9C -----END PGP SIGNATURE----- From hfinney at shell.portal.com Wed Feb 1 18:13:38 1995 From: hfinney at shell.portal.com (Hal) Date: Wed, 1 Feb 95 18:13:38 PST Subject: Lucky primes & omlets on my face... Message-ID: <199502020213.SAA17094@jobe.shell.portal.com> -----BEGIN PGP SIGNED MESSAGE----- From: Nathan Zook > Recall: x^p = x mod p therefore, x^(p-1) = 1 mod p. So what we need is: > (x^e)^d = x^ed = x^(p-1)*i+1 = x mod p. This would only be true for prime p, but with RSA we are dealing with composite moduli. What we want is ed=1 mod phi(n), where phi(n)=(p-1)(q-1). (Actually you want to use (p-1)(q-1)/gcd((p-1),(q-1)). I forget what that is called.) Conceptually, I gather you are setting e = 0x10001, then finding its multiplicative inverse d mod phi(n) (or mod p-1 in your example). Then you are looking for other possible values for d. I am a little unclear on what the interval would be between suitable values of d. I think it would be phi(n)/gcd as above, or p-1 in your example, but I am not sure. > Let's try this again. > > Let 2*x be the target number of bits in the modulous. > > Let n be a large random number with x+2 digits. > Let n1 be the next multiple of 0x10001. > Let t2 be n1 mod 8, t3 be n1 mod 9, t5 be n1 mod 25, t7 be n1 mod 49. > > Loop: > For i = 2 to 7 > If n1 = 1 mod i and (n1-1)/i + 1 is not a multiple of {2,3,5,7} > If (n1-1)/i + 1 is prime. > { > Let k = 0's in n1/0x10001. > If k is in range, save and exit. > } > EndIf > EndIf > Next > n1 += 0x10001; > EndLoop > > Recall: x^p = x mod p therefore, x^(p-1) = 1 mod p. So what we need is: > (x^e)^d = x^ed = x^(p-1)*i+1 = x mod p. > > ie: ed = (p-1)*i+1 > or: (ed - 1) / i + 1 = p > > Now 0x10001 inverts easily, it is just n1/0x10001. By keeping track of > various quantities, we can eliminate all multiprecision divisions except > for the original one needed to get n1 and the t's, and doing increments > instead. I still don't follow this. Is k claimed to be d? Where do we verify that ed=1 mod (p-1)? ed would be n1, right? When you said "If (n1-1)/i + 1 is prime" did you mean "is p"? I really don't think this whole thing works. Let me tell you what I tried. I inverted e to get a correct d. Then I looked at different d's to find one with lots of 0's. This turned out to be useless! The reasons is that PGP does not use d. It uses the Chinese Remainder Theorem to do its exponentiation. The two exponentiations it does use exponents d mod (p-1) and d mod (q-1). Adding multiples of phi to d does not change these values (since it is a multiple of both p-1 and q-1). Now one thing you could do is to use in place of d mod (p-1), (d mod (p-1)) + k*(p-1) where we choose k to minimize the sum of the number of bits and the number of 1 bits in this expression. Unfortunately the PGP data structures do not store d mod (p-1), it is constructed on the fly when you do a decryption. So there is no where to save a pre-computed optimal value for the two exponents used in the CRT exponentiations. So, this was a good idea, but the implementation does not fit into the current structure very well. Hal -----BEGIN PGP SIGNATURE----- Version: 2.6 iQBVAwUBLzA/mhnMLJtOy9MBAQEjmAIAzQbwkia3F7+4F7tNUewKnZVYsBEhgoBk h5jem/qjUxFeGhYNUL/pSLKJPR+PlzleZmBQJyOlk3q7KL0ety851g== =EHVe -----END PGP SIGNATURE----- From jrochkin at cs.oberlin.edu Wed Feb 1 18:19:09 1995 From: jrochkin at cs.oberlin.edu (Jonathan Rochkind) Date: Wed, 1 Feb 95 18:19:09 PST Subject: Frothing remailers, the advertising and pinging problems Message-ID: At 5:50 PM 02/01/95, kevin at elvis.wicat.com wrote: >I am not happy with my proposed advertising methods, and was quietly >hoping for some guidance from internet gurus in this point (the irc >suggestion in particular is a pretty shaky straw man). However, see my >earlier message (on some other thread) about Usenet propagation times. >Propagation times in days do not seem to be rare (post to misc.test and >see when the last reply comes back). While this is better than >word-of-mouth propagation, it does not offer the very low latency I was >looking for. I tried to discuss this very issue a few months ago, with little interest. But I'm glad there's someone to discuss it with now. (read, someone who will listen when I spout volumes to the list :) ) Here follows my treatise. :) We already have a solution, actually. Raph's remailer list. If you know your remailer is going down, tell Raph about it, and he'll remove you from the list. [Better would be an automatic way of removing remailers from the list upon receiving a PGP-signed message from the op, without Raph's intervention]. Presumably, if your remailer never returns his ping, it will move to the bottom of his list. So applications like his "premail", which use this list, won't send to those remailers. This is really an excellent solution, and what it doesn't do, could easily be added to it. The problem is that it's too centralized. We like decentralized things hereabouts, and Raph's list requires you to trust Raph not to lie to you, or withhold information to you. And of course a centralized solution is more subject to attack too; if someone mangaged to subvert Raph's list (either by subverting his data collection methods, or the report he generates), then an increasingly large portion of the remailer-using-public is up shit creek. Single point of failure. A partial solution is for lots of people to run remailer pinging and reporting services like Raph's. Then you could use which ever one you want, or even write a script to get info from them all and average em together (throwing out extremely oddball scores, using some sort of statistical method). A better solution to the centralization problem would be for _everyone_ to run their own remailer pinging service. This solves the centralization problem, but now when a remailer op knows his remailer is going down, he can't simply tell Raph, he's got to tell _everyone_, which is the same problem he had originally. Also, this is somewhat realistic. People have been saying for ages that the remailer net is much more secure when every user runs their own remailer, but it still hasn't happened. For obvious reasons. So we've still got the problem of how users are to tell when remailers go down. That's what I see as the basic problem here. It really divides into two problems: the "advertising" problem, and the "pinging" problem. Which actually aren't at all completely seperate. *THE ADVERTISING PROBLEM* The advertising problem consists of how remailers are to get info out to the Remailer-Net-At-Large. I run a remailer, and I know my remailer is going out of business soon (temporarily, or permanently), and I want to tell people. Or, my remailer has returned (or just started started business for the first time), and I want to tell people. ++Usenet. Non-IP, but slow. ++ Usenet is an obvious solution, but the latency is too low. But usenet does work really nicely, aside from the latency problem. Remailers post messages to alt.remailer.auto-announce, giving one of a number of standardized machine-readable messages. For instance FriendlyRemailer might post that it's going down, and expects to be down for about 24 hours. Clients, which could be other remailers, or chaining applications like premail, would periodically check this newsgroup and keep track of info. My client software might decide to stop routing through FriendlyRemailer, and completely ignore the "for 24 hours" thing, and start sending through there again when it gets an "I'm back" message over the usenet. Or it might decide to record the "for 24 hours" thing somewhere for human reading. If a new remailer appears and broadcasts "I'm here", it might add it to the list of useable remailers, or it might ignore it, or it might ask for human approval of adding it to the list. Whatever the user wants it to do. ++Direct TCP. IP-required, complicated, but fast.++ But there's still a latency problem. The only way I can think of to solve that is with direct TCP connections of some kind. IRC would be one way. Remailers could broadcast "I'm here" every 20 seconds on an IRC channel, and clients could keep an eye on this IRC channel to see what's up. Of course, then a client would need to wait up to 20 seconds before sending a piece of mail, which is kind of a pain. So, instead, you might have a background program running always, and tabulating data, so it's got data stored and doesn't need to wait at all. (If the remailer said "I'm here" a minute ago, that's good enough, dont' need to wait another minute for the next "I'm here"). And then remailers wouldn't need to broadcast as often as 20 seconds; something like 5 minutes would probably do. So bandwith is more reasonable. If a remailer goes down, and you send a message to it within 5 minutes, you are shit out of luck, unfortuantely. The problem with this solution is that everyone using it needs to be on the internet. People haven't wanted to exclude UUCP connections and such from participating in the remailernet (as remailer or client) in the past, and I think they're probably right. And IRC might not be that reliable, I don't know. And it requires a lot of proccessing power; remailers have got to be constantly sending out "I'm here", client programs have to be constantly running and scanning for this info. Might not be that scalable either, when you have 100 remailers broadcasting, and 20,000 users listening. Or more. *THE PINGING PROBLEM* The pinging problem consists of how clients (which could be other remailers) can querry remailers about whether they are up or not. (and what features the particular remailers support, which is also something that might be advertised above, incidentally.) The user is taking the initiative, as opposed to the remailer. Because maybe someone subverted your usenet or IRC or other broadcasting medium, so you don't want to place too much trust on it, and you want to check it yourself. And maybe the "advertising" medium is slow usenet, so you the last "I'm here" you got from a remailer was a dated day ago. Is it still there? You'd like a quick way of pinging it to see. Again, we have two solutions: Slower simpler, being-on-the-net unneccesary, pinging with mail; and Faster, More Complicated, need-to-be-on-the-net TCP. ++Mail ping. Non-IP, simple, slow. ++ A mail ping simply consists of sending a message to a remailer with a Request-Resending-To: yourself. When you get it back, you know the remailer is alive. This has the advantage that it's hard for the remailer to trick you, even if it is an evil NSA remailer that wants you to believe it is alive, even though it really throws messages in the trash. It can't differentuate between your "ping" (to be returned), and a normal message (to be thrown in the trash). And you can do it with a UUCP connection, or some other kind of store-and-forward non-IP connection. The problem is that it's slow. Especially with the latency that secure remailers have to put into the mix. This could be solved if you could tell the remailer somehow that this is a ping message which should be sent relatively quickly and not re-ordered and latency-added like a normal message. Of course, then you lose the advantage that the remailer can't tell the difference between a ping and a normal message. The way to deal with the high latency, would again be to have each client have a background process running and pinging periodically, and storing data. Again, if it's gone down since your last ping, you are out of luck. And this is kind of complicated, and high-bandwith. ++TCP transaction ping. IP required, complicated, but fast.++ Again, the other alternative is a direct TCP connection. Connect to a certain port, say "are you there", get an answer. I believe mixmaster will soon support direct TCP traffic transactions, it would probably be trivial to add a "pinging" feature too. Although really unneccesary. If you contact the host directly, and it answers, you know it's there, you don't need to ping. The disadvantage is again that IP is required. **CONCLUSION** Advertising and pinging methods are needed. There should be a way for a new remailer to announce itself to the net (might not be trusted or used by software, but it's up to the user), and a way for existing remailers to announce that they are going down (and announce when they come back up). There also needs to be a way for a user to "querry" a remailer individually, instead of relying on advertising, _especially_ if the advertising method is high-latency. Both the slower store-and-forward (mail, news) techniques, and the faster direct-socket-connection techniques both have advantages and disadvantages. Ideally, _all_ of them would be exist. Some remailers might only support or deal with some of them (out of choice or lack of IP connectivity or bandwith), but client software could gather info from all or some of the pinging and advertising mediums, and make choices about whether to use remailers, based on how much info it has, and what the info says. And the issue not even discussed here, is that of having a succesful way to bounce messages. If all of your advertisment-gathering and pinging fail anyhow, you should be notified that your message didn't make it through. It actually seems possible that a succesful bounce method would remove the need for advertising and/or pinging completely. But a succesful bounce method seems even more remote then succesful pinging/advertising methods. From rfb at lehman.com Wed Feb 1 18:21:10 1995 From: rfb at lehman.com (Rick Busdiecker) Date: Wed, 1 Feb 95 18:21:10 PST Subject: Ending the Crusade In-Reply-To: Message-ID: <9502020220.AA18342@cfdevx1.lehman.com> Date: Wed, 1 Feb 1995 18:59:54 -0600 (CST) From: Nathan Zook Instead of routing all of those messages to /dev/null, forward them back to the authors, perhaps with a notice that the message appears to have been mistakenly routed to you? And then all LD has to do to have lots-o-fun is to send you a whole bunch of "your OS sucks" messages with the From: line set to alt.religion.scientology at some.mail2news.site . . . . Rick From remail at desert.xs4all.nl Wed Feb 1 19:08:30 1995 From: remail at desert.xs4all.nl (remail at desert.xs4all.nl) Date: Wed, 1 Feb 95 19:08:30 PST Subject: No Subject Message-ID: <199502020308.AA13869@xs1.xs4all.nl> ## Subject: Re: Frothing remailers - an immodest proposal In-reply-to: <199502010520.VAA04884 at largo.remailer.net> (eric at remailer.net) > Date: Tue, 31 Jan 1995 21:20:28 -0800 > From: eric at remailer.net (Eric Hughes) > > In article <9501312152.AA10208 at toad.com>, wrote: > >It seems to me that the current remailer web suffers a fundamental flaw. > >It is simply too static. > > Now, dynamic rerouting is good for better delivery, but is bad for the > trust in silence. [...] The end users must be involved, either directly or > through some (legal) agent, in the manipulation of these relationships. > > Any solution which tries to do this independent of the end user is > broken, by definition. > > Eric Well, pgp support multiple recipients of messages. Supose that the remailers would choose at random only one of the addresses the user (or their client program) requested in a header line like: Request-ND-Remailing-To: RM1 at a.b.c, RM2 at c.d.e, RM3 at e.f.g and try to deliver. If the mail fails right away, then it tries another address. Etc. The very paranoid user would avoid this feature, and stick with the old fashioned system. The paranoid would list two remailers, and encrypt the folowing message to both of them, and probably add a few more levels to the chain, just to be sure. The compleatly trusting would only have two levels of remailing, but which listed every remailer as a posible recipient of the message they send to the first in the chain. In this way we get better reliability, but still have user control over selecting the remailers. In fact, the user can select arbitrary message reliability, and remailer trust parameters, and should be able to come up with a set of nd-hops to meet the parameters. Hey Wei, Hal: What is the cost of this in terms of likelyhood that the whole path of remailers actually selected is compromised? Is this about right? If 50% of the remailers are run by the enemy, then with only one remailer listed in each hop, the odds of the path being compromised is (.5)^h (where h is number of hops). The odds of successfull delivery are .90^h (asuming every remailer is 90% up). If at each step there were two remailers, and the evil remailers always selected other co-operating evil remailers, then the odds of the path being compromized is larger at ((1-.5^2)==.75)^(h). But the odds of sucessfull delivery are much better, (1-((1-.90)^2)==.99)^(h). To keep the same chance of the path being compromised, the user would need to have 'x' times more hops where x is such that (.75)^x == .5, or about 2.4 times as many. Hmmm... Noyb From rrothenb at ic.sunysb.edu Wed Feb 1 20:00:37 1995 From: rrothenb at ic.sunysb.edu (Robert Rothenburg Walking-Owl) Date: Wed, 1 Feb 95 20:00:37 PST Subject: Fundamental Question? In-Reply-To: Message-ID: <199502020400.XAA03916@libws2.ic.sunysb.edu> Anthony Ortenzi wrote: > > Although I understand the need for remailers for anonymity, is it not > true that the whole idea of encryption (good encryption, that is) is that > no matter who gets the encrypted text, it really doesn't matter? Does > this not mean that something like USENET is *perfect* for this? Well, it's happened in the past. Doesn't mean Usenet is perfect for it, since nobody wants to sift through several thousand messages a day for messages encrypted to him/her. Also, imagine all the traffic sent to a remailer duplicated on overy site that carries that Usenet group... Rob From rrothenb at ic.sunysb.edu Wed Feb 1 20:35:08 1995 From: rrothenb at ic.sunysb.edu (Robert Rothenburg Walking-Owl) Date: Wed, 1 Feb 95 20:35:08 PST Subject: Clipper Revived? In-Reply-To: <9501017916.AA791667001@CCGATE.HAC.COM> Message-ID: <199502020434.XAA04359@libws2.ic.sunysb.edu> > > From Edupage: > > REPLACEMENT FOR CLIPPER > AT&T and VLSI Technology Inc. will collaborate to develop microchips > that use a triple-strength version of DES (data encryption standard), > which previously had been rejected by the National Security Agency. > VLSI is the designated contractor to make the government-favored > Clipper chips, but this latest announcement reveals their doubts over > whether there's a market for the Clipper. "These companies have > basically made the determination that Clipper is dead and there's > going to be the proliferation of encryption anyway, so they might as > well take advantage of it," says one observer, who predicts the market > for such technology "could reach hundreds of millions" of dollars in > annual sales by the end of the decade. (Wall Street Journal 1/31/95 > A3) So, the question is, are these chips escrowed like Clipper (ie, are they abandoning the standard because the phones are awful)? Or are they abandon- ing the escrowed encryption altogether? From rfb at lehman.com Wed Feb 1 20:48:07 1995 From: rfb at lehman.com (Rick Busdiecker) Date: Wed, 1 Feb 95 20:48:07 PST Subject: Fundamental Question? In-Reply-To: <199502020400.XAA03916@libws2.ic.sunysb.edu> Message-ID: <9502020446.AA06471@cfdevx1.lehman.com> Date: Wed, 1 Feb 95 23:00:18 EST From: Robert Rothenburg Walking-Owl Well, it's happened in the past. Doesn't mean Usenet is perfect for it, since nobody wants to sift through several thousand messages a day for messages encrypted to him/her. It's easy to automate and you are incorrect in saying that nobody does it. alt.anonymous.messages was created as an implementation of an anonymous message pool. I wouldn't go so far as to say that it's perfect, but it's simple and it works. If you post a message encrypted for my public key and include my name and/or my key id in the subject, I'll get it. And, no, I'm not the only one who uses it. Rick From hfinney at shell.portal.com Wed Feb 1 23:14:37 1995 From: hfinney at shell.portal.com (Hal) Date: Wed, 1 Feb 95 23:14:37 PST Subject: Why encrypt intra-remailernet. Message-ID: <199502020714.XAA15798@jobe.shell.portal.com> -----BEGIN PGP SIGNED MESSAGE----- From: Nathan Zook [ Re: remailers checking signatures on incoming messages ] > What benefit does Alice gain? > 1) Plausible deniability. Remember, "reasonable doubt." Remember Abscam? > The gov't is in a good position to fake source info. This squishes > that. (It squishes even better if Chaum _requires_ signatures.) She doesn't get that. A signature lets her prove that she sent a message. It doesn't let her prove she didn't send a message. > 2) If Chaum sends Alice a copy of the message that failed the signature > check, Alice knows that someone is trying to spoof her. This > information may be critical in determining how serious her opponents > are. I don't really understand this threat that Alice may be "spoofed". Why, of all places, would her opponents try to spoof her through an anonymous remailer? Isn't this kind of like sending mail with no return address, and pretending it comes from someone else? This seems terribly subtle. > What might Chaum gain from checking or requiring signatures? > Various net abuses often involve faking names. Requiring validated > signatures would pressure these abuses away from the remailers. Reducing > the net abuses going through the remailers is a PR goal. This would be a good thing, agreed. And requiring signatures probably would weed out a lot of the flakes, largely by raising the threshold of cluefulness needed to use the network. > It seems to me that hacking PGP requires considerably more cooperation > between remailers, and more work than just allowing recursive opening of > PGP packets, automatic padding (or concatenating) of data, and automatic > encryption of out-goin mail. Subways and MixMaster both appear to have far > more working required to implement, far more cooperation between remailers, > and far more room for failure than my idea. (Emphasis: appear. I've not > seen Lance's paper, yet. He's getting it to me.) This is not clear to me. My hope would be to persuade the PGP developers (many of whom read this list) to incorporate a pad feature in future versions so that messages can be easily rounded up to a standard size. Alternatively the mixmaster client may include this capability. > OTOH, you seem to be agreeing with me here. Who hacks PGP? Who is PGPing > their outgoing stuff? Don't we have to have standard packet _inside_ the > net? And you achieve this by using PGP? ????? I can see the problem with standard packets in a chaining context, that they would shrink slightly in size as each successive remailer stripped off its envelope. Re-encrypting would solve this by providing more padding. OTOH you can actually stick padding into a PGP packet if you know what you're doing. I have a perl script around somewhere which will do this. > >I still don't quite follow this. Exactly what attack would be possible > >against Miron's remailer if it allowed encrypted reply blocks (as all > >others do) which would fail if the messages were wrapped as you suggest? > > The most obvious one: Eve checks messages (in vs out) for matching tails. > If the tails match, the messages match. The only way around this is for > the entire message to be wrapped. Thus, the extropian requirement. It is true that encrypting messages intra-remailer would prevent this attack as far as that one remailer in the chain is concerned. But it seems to me that the message still suffers from this attack against the remailer network as a whole. This points up the fundamental problem with this form of encrypted reply block. They are really not secure unless the body itself gets transformed at each step as in Chaum's model. > When I say that the Mark I remailers are laughably easy to crack, I mean > laughably easy. None of this is news. We have been discussing these attacks for years. Even with intra-remailer encryption I think these attacks work against the remailer net. > Is the message a clear set of ::Request-Remail-To:? Pull & log. This will work when the message is heading to the net in the clear, even if it is encrypted between nodes. > Is the message clear, with encrypted headers? Match, pull, and log. You can still match the message entering and leaving the net, even if it is encrypted within. > Is the message encrypted separately from the headers? Match, pull, log. As above. > Is the whole message encrypted? Take the ones that are left, match the > largest. Match the next largest. Match the next largest. Pull & log. Encryption with padding between nodes would protect against size matching, I agree. But it is the padding which is important, not the encryption. > Get stuck? Need a hint? Resend a message. Watch for the repeat on the > out. That's why Chaum identified one of the main features of a remailer being that it would reject duplicates. Mixmaster does some version of this, although that needs improvement to really meet this attack. > Alice has been hauled into court. The Feds claim that she is the one that > actually sent messages M1,...Mx to Bob through Chaum, even though these > messages have varied From: (and From) lines. As root, she cannot claim > that this is not possible. OTOH, if Chaum requires a match, the Feds would > have to claim that she compromised the secret keys of all of all the > cooresponding From: addresses. Much tougher. OTOH, if Alice actually has signed those messages, her jig is up pretty good, wouldn't you say? Do we really want to force people to use the nets in a mode in which they can be incriminated like this by a hostile government? > Seriously, if a sight is being shadowed, then it is insecure. It is to our > advantage to know this. You are right that we "don't care" where a message > comes from only if we assume that the message _didn't_ come from an LEA. > (Or a big corporation. Some of them probably have the power to do this, > too.) Hell, Detweiler has the power to do this! He's spoofed messages plenty of times. How do we know? Because of remailer logging. That's the real threat, IMO (the logging). > If it did, then the remailer net is under attack, and we most > definitely _do_ care about that. Even if a message comes from a fake address that is hardly evidence of an attack by a powerful opponent. It could just be an extra-paranoid legitimate remailer user who doesn't want to extend any more trust than necessary. > >Although I agree with Wei Dai's mathematics, to my mind it points up the > >importance of successful countermeasures rather than implying that the > >remailer network is inherently insecure. For example, if you send one > >identical message every batch, Wei's math shows clearly that you can't be > >traced. Let's not get rumors started about how the remailers don't > >work. > > I'm lost here. I thought that sending an identical message (producing > identical output) every tick would be the equivalent to an attack. I meant to refer to encrypted messages identical in size and otherwise opaque, so that your apparent rate of output is constant. > But what exactly constitutes "successful countermeasures"? How do you > prevent an attacker from taking over a sight, thus compromising it, w/o > the knowlege of the operator? How do you prevent long/short matching of > the remailer net _as a whole_? How do you prevent tail matching? How do > you prevent middle matching, for that matter? How do you prevent the > repeated message attack? I was referring specifically to the correlation attack described by Wei. The other attacks you describe need to be met by the kinds of countermeasures we have been discussing: standard-sized messages, remailer chains, not using encrypted reply blocks which leave message bodies alone, rejecting matching messages. All of these were discussed in Chaum's 1981 paper. > >Do you see your suggestion as protecting against Wei's in/out correlation > >attack? > > Yes! Well, not by itself. My suggestions about "rational use of garbage" > do that. If Bob recieves x messages each tick, 0 to x of which are real, > Eve is hosed--if all messages are standard sized & encrypted!. Eve is even > more hosed if the x messages are concatenated & superencrypted. If Alice > sends y messages each tick, Eve is hosed. Even more so if the messages are > concatenated & superencrypted. How can Bob arrange to receive a constant number of messages each tick? Do all his messages come from one remailer? Or do all of the remailers which might send to him check among themselves before sending to him so they can mutually know how many fake messages to send? IMO the real solution to the correlation attack is to have a constant message generation rate. That is sufficient. Solutions to the other attacks mentioned in Chaum are described in Chaum. (This attack was not described in Chaum's paper.) > >Of course it was Chaum himself in his 1981 paper (which I think is available > >from the CP FTP site) who described the duplicate-message attack. I don't > >see that inter-remailing encryption helps much, because the attacker can > >still notice that whenever they inject message A, _something_ goes to > >Bob. The real solution, as Chaum pointed out, is that the remailer must > >reject duplicate messages, even when separated by days. Doing this without > >keeping a database of all messages ever sent is left as an exercise. > > > > I disagree. If identical input to Chaum does not produce identical output > to Bob, how does Eve coorelate them? Repeating, she can match the top of > the body of messages, so random tails reveal the actual encrypted message, > for whatever that is worth. I'm not sure what you mean by "matching the top of the body of messages". Are you referring to an encrypted reply block, which might be the same for two different messages to the same user? Or are you suggesting that messages would have some headers or some other structures at their top which would be preserved through a remailer? > And if Bob receivs x packets per tick, or a BIG packet every tick, how does > Eve trace it? If the input to Bob really can be made constant across the whole remailer net then this does seem to largely protect against duplicate-message insertion, in conjunction with the intra-remailer encryption. However it would apparently also be necessary for every remailer to send a constant number of packets to every other remailer. Otherwise a bolus of duplicates into one remailer would all leave to go to the next remailer at once and would show up. This means that the net as a whole has to carry a constant traffic load on all inter-node links, which could mean a large cost in bandwidth load. I still think that rejecting matching messages is a better solution. > >Another aspect worth mentioning is that message splitting can make the > >kinds of statistical correlations that Wei Dai was looking at more of > >a danger. > > More than being the ONLY file in the net of your (approximate) size? No, of course message size standardization is a necessary step. This has been recognized for 15 years. > > It's one thing if I send a message along with thousands of > >other people, and Bob gets a message along with everyone else. But if I > >send 10 messages and Bob gets 10 from that batch, that fact alone can > >help to link us up. So splitting my big message into 10 standard ones > >isn't that great if they're all sent at once. Ideally you'd want to > >dribble them out at some standard rate, a rate at which you always send > >a message whether you have something to send or not. But this may introduce > >unacceptable latency. > > "Dribble them out at some standard rate". Yes. y packets per tick. Set y > equal to your average number of real packets per tick, plus 3 standard > deviations. Since you are chaining, the latency of you input will be less > than the latency of the remailernet. OK, but chances are your average number of real packets per tick is < 1, e.g. if a tick is a few hours and you only send one or two messages a day. So when you do need to send that 500KB GIF it's going to take a lot of ticks. I would sum up by agreeing with several points: the need for standard message sizes, and for a standard rate of message output. I am neutral on whether a remailer may want to super-encrypt a message to the next link in the chain (whether a remailer or an end user) if it happens to have a key handy. I don't see any harm in this and the remailer software will already handle this transparently on the receiving end. I disagree with the idea of remailers checking signatures. I don't agree that inter-node remailer encryption provides significantly more protection than padding. I think that encrypted reply blocks are unsafe even with inter-node remailer encryption. See Chaum's paper for ways that encrypted reply blocks can be used safely. We have also had some suggestions here for modifications to Chaum's method. And I don't see how you can arrange to receive a constant load from the net without a highly centralized system, which would have its own dangers. Hal -----BEGIN PGP SIGNATURE----- Version: 2.6 iQBVAwUBLzCGHRnMLJtOy9MBAQEzlwH/XUYi0mhSUl0Dd4hMp/dE9KFEDQd3jNQs Zby7ZIDl3qQn1EK1f81pLSHUYdQgGflMrMaDS9QTrRXSR/mYqx3HeQ== =ZyWU -----END PGP SIGNATURE----- From an158409 at anon.penet.fi Thu Feb 2 05:46:08 1995 From: an158409 at anon.penet.fi (beacher) Date: Thu, 2 Feb 95 05:46:08 PST Subject: computer underground digest stuff Message-ID: <9502021305.AA25319@anon.penet.fi> Date: Fri, 20 Jan 1995 00:13:29 -0600 (CST) From: David Smith Subject: File 1--ACM Computers Seized by IIT (fwd) ---------- Forwarded message ---------- ACM Computers Seized By Illinois Institute of Technology "And let it be known throughout the world what was done this day..." Dateline January 17, 1995 Today sometime before noon today, the Illinois Institute of Technology seized the computer systems of the Association for Computing Machinery student chapter at IIT. 700 Student and Faculty users are not happy. And are now without their Email and other private files. The locations of the ACM systems is currently unknown, and the security of the system and the accounts on it is highly questionable, as it was quite literally riped out of the wall. ( a piece of the modem was found lying on the table ). The reasons given by IIT where that members of ACM are suspected of hacking into the computer of another IIT student group, and pulling several pranks. The memo sent to the Dean of Students details the hacking attempt, but no evidence points to ACM's systems or to any of their users, but the memo does make several unbacked accusations. And at this time, we can see no reason ACM would even be tied to the events. However because ACM members are suspect, the systems where unlawfully seized by IIT. IIT has no legal right to seize ACM's systems, nor anyone else, as they contain private accounts, files, and Email. Such rights are protected under the Electronic Communications Privacy Act (ECPA), which extended most of the protections of the federal Wiretap Act ("Title III") to electronic mail. Precidence established in the case Secret Service vs. Steve Jackson Games decided March 12, 1993 Needless to say, ACM members are not too happy about all of this. And the other 700 people don't seem happy either. --------------------------------------------- Dateline January 18, 1995 o Members realize that along with Troll, which is physicaly considered IIT's property even tho it was purchased with student funds, property of ACM members was also seized includind a network card, SIMM modules, and the modem that was broken by IIT during the seizure. o ACM recieves writen copy of allegations and supposed proof that ACM systems where used in the attempt. However the evidence clearly shows that other IIT owned systems where used and NOT ACM's systems. o Electronic Frontier Foundation is called and informed of the situation, and begins investigating the situation. o ACM HEARS THAT THE COMPUTER SYSTEM IS IN THE PROCESS OF BEING SEARCHED BY IIT STAFF, AND ACM MEMBERS NOW CONSIDER THE SYSTEM COMPROMISED. STILL NO EVIDENCE SHOWING ACM INVOLVEMENT. o Word continues to spread amung the IIT community, many more students and faculty are outraged about the seizure of their accounts and files. o Continued stress to students due to the lack of access to their Email, addressbooks, and other files. Email is now being lost in mass due to the o ACM systems removal, much of which is considered critical by many people. ACM members miss the Chicago ACM meeting due to the fact that all the info concerning time/location was stored on the seized systems. o ACM members miss the Chicago ACM meeting due to the fact that all the info concerning time/location was stored on the seized systems. ------------------------------------------------------------------------- To find out more about the anon service, send mail to help at anon.penet.fi. Due to the double-blind, any mail replies to this message will be anonymized, and an anonymous id will be allocated automatically. You have been warned. Please report any problems, inappropriate use etc. to admin at anon.penet.fi. From greg at ideath.goldenbear.com Thu Feb 2 06:09:53 1995 From: greg at ideath.goldenbear.com (Greg Broiles) Date: Thu, 2 Feb 95 06:09:53 PST Subject: Frothing remailers and trust Message-ID: <199502020934.AA25847@ideath.goldenbear.com> -----BEGIN PGP SIGNED MESSAGE----- kevin at elvis.wicat.com writes: > It strikes me as critical; right now, a user has to choose to trust a > set of remailers, given no assistance other than a list of "reliable" > ones. Given an extended web of trust between remailers, the user can > choose to trust one remailer (I have no idea how to make this process > more palatable) and immediately gain the security of a large web of > remailers (maybe you are right about that instant gratification > thing...) For what it's worth, I'm a remailer operator and I don't know any of the other operators well enough to say that I'm sure that they're trustable with respect to preserving privacy. (no offense intended.) I do, for the most part, trust them to forward almost all messages but my conclusion is based in large part on Raph's list. Absent that list, I don't think I'd have enough information on delivery reliability to comment about that either. This "web of trust" thing sounds nice but I can't participate because I don't know the other people involved. I think other remailer operators may be in a similar situation. Your scheme seems to conflate two tasks/roles I think are separable - remailing messages and specifying a trustable path for messages to take. The latter requires more information than I have - but it is information someone could gather. I think it'd be possible for someone to perform "remailer audits", and then report their findings. Some part of that report might be in the form of a "Anon-To:" chain, or probabilites for creating your own chain of messages; or maybe the auditor would serve as a first-hop-but-never-the-last remailer, passing the message along to remailers it believes to be reliable and trustworthy. Premail seems to be a step in this direction, but it chooses hops on the basis of reliability, not reliability + privacy. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLzCm8X3YhjZY3fMNAQEjnwP/T//KwPuvnzlRYgV8MgltJIaisM78zMjU J+Q+ARuvBudBS9ah8Z2p/MtxClj6nBYXEMFWtqwQbICBzDwxfpQAwahz5Vlay3qi QouRKx0ZJonvdi1LpIYYS8ElH8SdWEERMItfDyFDe2HDjFTXjL6fUbrIyLBvdzdl PCSmID/WYq0= =ukpf -----END PGP SIGNATURE----- From eric at remailer.net Thu Feb 2 06:45:22 1995 From: eric at remailer.net (Eric Hughes) Date: Thu, 2 Feb 95 06:45:22 PST Subject: Remailer encryption module In-Reply-To: Message-ID: <199502021444.GAA07493@largo.remailer.net> From: Nathan Zook I also believe that hacking PGP is a bad thing (tm), because it means that every time an upgrade comes out, it will need to be re-hacked, and once you start hacking, when do you stop? I agree. PGP just does not have the support for the encryption required for mixing remailers. These deficiencies have been known for about two years at this point and still nothing has happened. I expect this not to change anytime soon. That means that we have to replace PGP as the encryption module for remailers. The first thing to do is to design a data format which supports what the remailers need now, and nothing speculative. Since this data format has a single purpose, we can make new revisions more easily than for a general purpose package. Once we get a data format, implementations will follow. Eric From perry at imsi.com Thu Feb 2 06:53:24 1995 From: perry at imsi.com (Perry E. Metzger) Date: Thu, 2 Feb 95 06:53:24 PST Subject: Remailer encryption module In-Reply-To: <199502021444.GAA07493@largo.remailer.net> Message-ID: <9502021453.AA28522@snark.imsi.com> Eric Hughes says: > > Once we get a data format, implementations will follow. > The obvious data format is MIME's "Security Multiparts". Perry From Nobody at eniac.ac.siue.edu Thu Feb 2 07:04:00 1995 From: Nobody at eniac.ac.siue.edu (Anonymous) Date: Thu, 2 Feb 95 07:04:00 PST Subject: How much entropy in a key press? Message-ID: <199502021456.IAA01951@eniac.ac.siue.edu> Can anyone tell me how many bits of entropy there are per 7-bit ASCII character. More specifically, a program wishes to generate a session key by prompting the user to type N random key presses. The characters entered are hashed down to 128 bits by MD5 for subsequent use as a key. What should the value of N be, such that the entropy of the user's string does not unnecessarily exceed the entropy of the hash? From allan at elvis.tamu.edu Thu Feb 2 07:08:49 1995 From: allan at elvis.tamu.edu (Allan Bailey) Date: Thu, 2 Feb 95 07:08:49 PST Subject: Remailer encryption module In-Reply-To: <199502021444.GAA07493@largo.remailer.net> Message-ID: <9502021508.AA28912@elvis.tamu.edu> -----BEGIN PGP SIGNED MESSAGE----- > From: Nathan Zook > I also believe that hacking PGP is a bad thing (tm), because it means that > every time an upgrade comes out, it will need to be re-hacked, and once you > start hacking, when do you stop? Sounds like the UNIX philosophy to me. :) > I agree. PGP just does not have the support for the encryption [...] > That means that we have to replace PGP as the encryption module for > remailers. The first thing to do is to design a data format which > supports what the remailers need now, and nothing speculative. Since > this data format has a single purpose, we can make new revisions more > easily than for a general purpose package. > > Once we get a data format, implementations will follow. Isn't this what the forthcoming PGP RFC is about? Also, what about the PEM "standard"? If remailers agree to follow one or more of those standard data format specifications, then someone could just ripup PGP and implement modules to produce those data formats. Consider what CP did with his(her?) PGPTools kit. As long as we have an agreeable dataformat "standard", the implementation becomes irrelevant. Maybe I'm just confused and not following the thread closely enough.... - -- Allan Bailey, allan at elvis.tamu.edu | "Freedom is not free." _O_ Senlima Diverseco je Senlimaj Kombinajxoj.| allan.bailey at tamu.edu | KC5KSF |nefud-the-delirious at tamu.edu GCS w+ v-/+ C++++ U@$ P+++ L++ E++ N++ po--- Y++ b++ -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLzD1ghDxfDCMTq7JAQH9SgQA1K0i/PndcdaZFHkRwP2IrWbMihXvCTRc 0G0xf3GUH4KLlR5HC/qUBurvreoRCF2PjM6cDpx1Ao2pRbB/jeiRINC/5OuhZtrJ A1KpWN51XR2c4BXRTxXvNGCUMzzH7B8uLjR01n3EWabHljoKX8HHwWKKXTe5S/1Q AQlh00/0iA0= =+b0t -----END PGP SIGNATURE----- From paul at poboy.b17c.ingr.com Thu Feb 2 08:18:34 1995 From: paul at poboy.b17c.ingr.com (Paul Robichaux) Date: Thu, 2 Feb 95 08:18:34 PST Subject: Video encryption & QTC Message-ID: <199502021617.AA27746@poboy.b17c.ingr.com> -----BEGIN PGP SIGNED MESSAGE----- [ for cypherpunks: Apple's now beta testing a video conferencing product called QuickTime Conferencing, or QTC. The Mac crypto interface list (mcip at feeley.cc.utexas.edu) started a discussion on video encryption, hence this crosspost. Feel free to chime in. ] Here are a couple of additional things to consider. This is a pretty classic application for stream ciphers. Since QTC is transport-independent (and I'd bet it's using OpenTransport calls, too), I'm assuming that QTC is using streams for video data, and that any packetization happens at the transport layer. Just before you call UDPSend(), ATPSend(), or whatever, just whack that outgoing block through the crypto function and off you go. As mentioned, RC4 might be a good choice. It's fast, plus Apple's already licensed it. It probably provides adequate tactical security, but as Adam pointed out, it has not been well analyzed in the open literature. However, there are many other stream ciphers out there: Diamond, Blowfish, RC5, etc. My gut feel is that RC4 is probably adequately secure with a 128-bit key; then Apple can dumb down to 40 bits for export approval. After all, they're not likely to build a product which they can't export. What about using a PCMCIA card like the National Semi Persona 100? It includes RSA signatures & verification, Diffie-Hellman key exchange (I think) and single DES; future versions will include 3DES and IDEA. Hardware encryption is fast, fast, fast. Don't forget AT&T's recent announcement of a similar product which does 3DES. One MCIP reader proposed just using PGP: RSA the session key and send it along. IMHO Diffie-Hellman is a better way to do this. Rather than using the PGP metaphor, where RSAing the session key allows you to send the session key as part of the message, DH allows you to establish the session key over an insecure channel, then start sending messages. - -Paul - -- Paul Robichaux, KD4JZG | Good software engineering doesn't reduce the perobich at ingr.com | amount of work you put into a product; it just Not speaking for Intergraph. | redistributes it differently. ### http://www.intergraph.com ### -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLzEFkKfb4pLe9tolAQEtEAP/bxEHw+fwPaJJPyHaRRtuZqlxmzvEyD+w 5cmB9c75gzkY9SpSSLkbtawwUjCCiKynMAX76uSRaDRkVeTILelJ3gvdguRMS3Id MYQI162mPvCN+lTvsMoXVJAdZzC14WE9JE0t9FC+ovYE8M+/yZ16EGEnvtWbnNYQ pO8GkvNpR+g= =n3fX -----END PGP SIGNATURE----- From eric at remailer.net Thu Feb 2 08:36:40 1995 From: eric at remailer.net (Eric Hughes) Date: Thu, 2 Feb 95 08:36:40 PST Subject: Why encrypt intra-remailernet. In-Reply-To: Message-ID: <199502021635.IAA07634@largo.remailer.net> From: Nathan Zook When I say that the Mark I remailers are laughably easy to crack, I mean laughably easy. By whom? I am hearing a general denunciation of the current remailer system. These blanket denials are false on their face, because they are not true in every circumstance. The only reason that our systems are actually able to do any good is that our threat model _is not_ an LEA--with government resources, and government patience. _Our_ threat model? There is not one threat model. Each person has their own threat model and their own desired level of security. An individual also desires more security for some messages than others. The current remailer network is good for some purposes and bad for others. Every evaluation of security _must_ include the nature of the security desired, because there is no single concept called "security" which is the same in every situation. Eric From adam at bwh.harvard.edu Thu Feb 2 08:37:22 1995 From: adam at bwh.harvard.edu (Adam Shostack) Date: Thu, 2 Feb 95 08:37:22 PST Subject: How much entropy in a key press? In-Reply-To: <199502021456.IAA01951@eniac.ac.siue.edu> Message-ID: <199502021639.LAA15114@hermes.bwh.harvard.edu> Shannon estimates roughly 1 bit per character of English. RFC 1750 D. Eastlake, S. Crocker, J. Schiller, "Randomness Recommendations for Security" is probably useful. Adam | Can anyone tell me how many bits of entropy there are per 7-bit ASCII | character. More specifically, a program wishes to generate a session | key by prompting the user to type N random key presses. The characters | entered are hashed down to 128 bits by MD5 for subsequent use as a key. | | What should the value of N be, such that the entropy of the user's | string does not unnecessarily exceed the entropy of the hash? | | -- "It is seldom that liberty of any kind is lost all at once." -Hume From eric at remailer.net Thu Feb 2 08:48:23 1995 From: eric at remailer.net (Eric Hughes) Date: Thu, 2 Feb 95 08:48:23 PST Subject: Remailer encryption module In-Reply-To: <9502021453.AA28522@snark.imsi.com> Message-ID: <199502021647.IAA07663@largo.remailer.net> From: "Perry E. Metzger" > Once we get a data format, implementations will follow. The obvious data format is MIME's "Security Multiparts". That's not a complete answer. That's kind of the obvious package, but it addresses nothing of the interior. Eric From hfinney at shell.portal.com Thu Feb 2 08:49:39 1995 From: hfinney at shell.portal.com (Hal) Date: Thu, 2 Feb 95 08:49:39 PST Subject: Adding padding to PGP files Message-ID: <199502021648.IAA05417@jobe.shell.portal.com> Here are a couple of perl scripts I wrote last year to add padding to PGP encrypted files. The usage would be: perl pgppadt.pl filename bytestoadd The output file is filename.pad. It only works on binary ".pgp" public-key encrypted files (not ascii armored files). So there would be some work needed to make it a really useful tool. It would also be better to use a strong source of random numbers. I think Carl Ellison recently posted some tools that could help with this. The two files are pgppad.pl, which does the work, and pgppadt.pl, a very simple test driver to show how to use it. They are in a shar archive. Hal ---------------cut here---------------- #!/bin/sh # to extract, remove the header and type "sh filename" if `test ! -s ./pgppad.pl` then echo "writing ./pgppad.pl" cat > ./pgppad.pl << '\End\Of\Shar\' # Perl module to allow padding and some other manipulation of PGP # files. # # Include this with the statement: # require 'pgppad.pl' # # 10/16/93 # Hal Finney # Read a PGP Cipher Type Byte and the following length. # One argument: file to read from # Returns several things, in this order: # CTB, with the length information removed, as a number. # Length of following packet. # Name of this kind of packet, made up, see list below. # Packed CTB/length packet, suitable for writing out. # Returns an empty string on error. sub read_ctb { local($file) = @_; local($ctb, $length, $name, $rctb, $rlength, $lengthlength); if (read ($file, $rctb, 1) != 1) { # Raw ctb return ""; } $ctb = unpack ("C", $rctb); if ($ctb < 128) { return ""; # Must have high bit set } $lengthlength = $ctb % 4; $ctb -= $lengthlength; if ($lengthlength == 0) { $lengthlength = 1; } elsif ($lengthlength == 1) { $lengthlength = 2; } elsif ($lengthlength == 2) { $lengthlength = 4; } else { $lengthlength = 0; $length = -1; # Unknown length } if (read ($file, $rlength, $lengthlength) != $lengthlength) { return ""; } if ($lengthlength==1) { $length = unpack("C", $rlength); } elsif ($lengthlength==2) { $length = unpack("n", $rlength); } elsif ($lengthlength==4) { $length = unpack("N", $rlength); } $rctb = pack ("C a".$lengthlength, $rctb, $rlength); # Packed data if ($ctb==0x84) { $name = "pubkey header"; } elsif ($ctb==0x88) { $name = "signature"; } elsif ($ctb==0x8c) { $name = "message digest"; } elsif ($ctb==0x94) { $name = "secret key"; } elsif ($ctb==0x98) { $name = "public key"; } elsif ($ctb==0xa0) { $name = "compressed"; } elsif ($ctb==0xa4) { $name = "conventional encrypted"; } elsif ($ctb==0xa8) { $name = "plaintext"; } elsif ($ctb==0xb0) { $name = "trust"; } elsif ($ctb==0xb4) { $name = "user id"; } elsif ($ctb==0xb8) { $name = "comment"; } else { return ""; } return ($ctb, $length, $name, $rctb); } # Write a CTB and length field out. # 3 arguments: file handle, ctb value, and length in bytes. # No return value. # Length gets output as 1, 2, or 4 bytes, the smallest in which it # will fit. # If length is negative we output no length field, but an "indefinite # length" code is added to ctb. sub write_ctb { local($file, $ctb, $length) = @_; local($rctb); $ctb = $ctb - ($ctb % 4); # Be sure 2 low bits are clear if ($length < 0) { $rctb = pack ("C", $ctb+3); # Packed data } elsif ($length > 65535) { $rctb = pack ("C N", $ctb+2, $length); # Packed data } elsif ($length > 255) { $rctb = pack ("C n", $ctb+1, $length); # Packed data } else { $rctb = pack ("C C", $ctb+0, $length); # Packed data } print $file $rctb; } # This entry point always outputs a 4-byte count. Length must be > 0. # Otherwise like write_ctb. sub write_ctb_4 { local($file, $ctb, $length) = @_; local($rctb); $ctb = $ctb - ($ctb % 4); # Be sure 2 low bits are clear if ($length < 0) { die ("write_ctb_4 called with negative length\n"); } $rctb = pack ("C N", $ctb+2, $length); # Packed data print $file $rctb; } # Pad a PGP public-key-encrypted file to the specified length. # Arguments: input file handle; output file handle; new size. # Returns negative value on error. See the code for what the # different values mean. # Returns 0 on success. sub pgppad { local($infile, $outfile, $size) = @_; local($ctb, $length, $name, $rctb, $insize, $buf); # Read ctb & length of pubkey header ($ctb, $len, $name, $rctb) = &read_ctb($infile); if ($ctb == 0) { return -1; # Error } if ($name ne "pubkey header") { return -2; # Error } if ($len < 0) { return -3; # Error } $insize = length($rctb) + $len; # Read packet of pubkey header if (read ($infile, $data, $len) != $len) { return -3; } # Write out pubkey header, unchanged &write_ctb($outfile, $ctb, $len); print $outfile $data; # Read ctb and length of conventional packet ($ctb, $len, $name, $rctb) = &read_ctb($infile); if ($ctb == 0) { return -4; # Error } if ($name ne "conventional encrypted") { return -5; # Error } # Calculate size of outgoing conventional packet. # Assume rctb won't change size; it may grow by 1 or 2 in some # rather rare cases, in which case we'll be a byte or two too big. $size -= $insize + length($rctb); if ($size < $len) { return -6; # Error } # Output CTB with new length &write_ctb_4($outfile, $ctb, $size); # Copy remainder of input file while (read ($infile, $buf, 32768)) { print $outfile $buf; } # Note that this random number generator is probably not # cryptographically strong. srand (time|$$); while ($len < $size) { print $outfile pack ("C", int(rand(256))); ++$len; } return 0; # Success } 1; # Non-zero return for 'require' \End\Of\Shar\ else echo "will not over write ./pgppad.pl" fi if `test ! -s ./pgppadt.pl` then echo "writing ./pgppadt.pl" cat > ./pgppadt.pl << '\End\Of\Shar\' # Test program for pgppad.pl, showing how to use it. require 'pgppad.pl'; open (IN, $ARGV[0]) || die ("Couldn't open $ARGV[0]\n"); open (OUT, ">$ARGV[0].pad") || die ("Couldn't create $ARGV[0].pad\n"); $padding = $ARGV[1]; @stat = stat(IN); $size = $stat[7]; print "Input file $ARGV[0] has size $size bytes\n"; print "Output file $ARGV[0].pad will have size ".$size+$padding." bytes\n"; if (($code = &pgppad (IN, OUT, $size+$padding)) < 0) { die ("pgppad returns code $code\n"); } close (IN); close (OUT); print ("Done\n"); \End\Of\Shar\ else echo "will not over write ./pgppadt.pl" fi echo "Finished archive 1 of 1" exit From perry at imsi.com Thu Feb 2 08:53:15 1995 From: perry at imsi.com (Perry E. Metzger) Date: Thu, 2 Feb 95 08:53:15 PST Subject: Remailer encryption module In-Reply-To: <199502021647.IAA07663@largo.remailer.net> Message-ID: <9502021652.AA28840@snark.imsi.com> Eric Hughes says: > From: "Perry E. Metzger" > > > Once we get a data format, implementations will follow. > > The obvious data format is MIME's "Security Multiparts". > > That's not a complete answer. That's kind of the obvious package, but > it addresses nothing of the interior. It does specify the interior. .pm From xpat%vm1.spcs.uma.thurman.edu at vm1.spcs.umn.edu Thu Feb 2 09:23:33 1995 From: xpat%vm1.spcs.uma.thurman.edu at vm1.spcs.umn.edu (xpat%vm1.spcs.uma.thurman.edu at vm1.spcs.umn.edu) Date: Thu, 2 Feb 95 09:23:33 PST Subject: Frothing remailers, the advertising and pinging problems Message-ID: <9502021723.AA10432@toad.com> jrochkin at cs.oberlin.edu (Jonathan Rochkind) wrote: > ++Mail ping. Non-IP, simple, slow. ++ > A mail ping simply consists of sending a message to a remailer with a > Request-Resending-To: yourself. When you get it back, you know the > remailer is alive. > This has the advantage that it's hard for the remailer > to trick you, even if it is an evil NSA remailer that wants you > to believe it is alive, even though it really throws messages in > in the trash. It can't differentuate between your "ping" > (to be returned) and a normal message (to be thrown in the trash). Sure it can. if (message_origin==request-resending-to) forward_message; To get around this you would have to chain, thereby relying on an additional remailer. Of course your origin and resend addresses could become are different through net.sorcery, but to rely on existing (and most likely transient) security loopholes are unsound foundations to construct a persistent reliable remailer net. Of course, clever Evil Remailer (tm) operatives might have their machines work *most* of the time, and have more than one, so that the entire network of remailers *seems* unreliable, or subtlely mangle encrypted messages so that the ball drops somewhere else. ---------------------------------------------------------------------- P M Dierking | "Emptiness is consistent with everything" --Nagarjuna From hfinney at shell.portal.com Thu Feb 2 09:46:29 1995 From: hfinney at shell.portal.com (Hal) Date: Thu, 2 Feb 95 09:46:29 PST Subject: Remailer encryption module Message-ID: <199502021745.JAA10726@jobe.shell.portal.com> From: "Perry E. Metzger" > Eric Hughes says: > > > > Once we get a data format, implementations will follow. > > > > The obvious data format is MIME's "Security Multiparts". > > Perry For those wishing to follow this debate, here is a URL for this document: I had trouble finding it since the filename does not contain "mime" or "security". Hal From ortenzi at interactive.net Thu Feb 2 10:18:38 1995 From: ortenzi at interactive.net (Anthony Ortenzi) Date: Thu, 2 Feb 95 10:18:38 PST Subject: Fundamental Question? In-Reply-To: <199502020400.XAA03916@libws2.ic.sunysb.edu> Message-ID: I guess that I don't have any real idea about how much traffic goes through remailers, myself having only used anon.penet.fi, and even that only to reply to others who were anonymized... anyone have any approximate statistics about traffic through other remailers? And although I know it might be a pain, could there be simple encryption (read: fast) that could be implemented so messages could be doubly encrypted, the plaintext by pgp, and the pgp text by something else and have the identity of the recipient inside the second encryption, where each message coming in could be checked to see if it should be pgp decrypted? Maybe using a simple hash of the recipient's name or other identifying mark? -Anthony On Wed, 1 Feb 1995, Robert Rothenburg Walking-Owl wrote: > Anthony Ortenzi wrote: > > > > Although I understand the need for remailers for anonymity, is it not > > true that the whole idea of encryption (good encryption, that is) is that > > no matter who gets the encrypted text, it really doesn't matter? Does > > this not mean that something like USENET is *perfect* for this? > > Well, it's happened in the past. Doesn't mean Usenet is perfect for it, > since nobody wants to sift through several thousand messages a day for > messages encrypted to him/her. Also, imagine all the traffic sent to a > remailer duplicated on overy site that carries that Usenet group... > > Rob > > > From lperez at oswego.Oswego.EDU Thu Feb 2 13:27:56 1995 From: lperez at oswego.Oswego.EDU (Luis Agustin Perez) Date: Thu, 2 Feb 95 13:27:56 PST Subject: info Message-ID: I recently read an atricle in HT magazine called cyberbucks. I was wondering if you could send me some information on the topic of the article. thanx From perry at jpunix.com Thu Feb 2 13:29:14 1995 From: perry at jpunix.com (John A. Perry) Date: Thu, 2 Feb 95 13:29:14 PST Subject: MX'ing and jpunix.com Message-ID: <199502022127.PAA14199@jpunix.com> -----BEGIN PGP SIGNED MESSAGE----- JPUNIX.COM (soon to be alias.net) offers a MX service for individuals that want to run an anonymous remailer but don't want the domain they are operating from to be immediately apparent. By making application to perry at jpunix.com, a remailer operator will be granted a DNS MX record pointing to the domain address of the requestor's choice and will appear to reside in the jpunix.com (alias.net) domain. Additional masking can be provided by having the MX record point to myriad.pc.cc.cmu.edu. What good does this do? I have an agreement with myriad.pc.cc.cmu.edu (Matt Ghio) where myriad will take the MX-pointed record and additionally alias it through the smail daemon on myriad. This function adds the unique benefit where determining the actual location of the remailer in question will be foiled when using nslookup. Since an additional alias is performed the result of an nslookup will always point to myriad. The actual location of the remailer remains hidden inside the alias on myriad. Lastly, Matt has the EXPN function of his sendmail daemon disabled so the identity of the remailer can't be determined by alias expansion. Future modifications to this scheme include adding an addition step whereby the MX-alias process will cause a version of Raph Levien's premail to post-process the message to add one or more random remailer paths the the overall path that the message travels. This step in still in the planning stages and has not been implemented yet. If you have and questions, or want to set up an MX record, send email to: perry at jpunix.com or ghio at myriad.pc.cc.cmu.edu John Perry < perry at jpunix.com> -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLzFN6lOTpEThrthvAQHfAAQAkzoGHz7iaJKHMzB5GEQr8OvEwhDY0F9s lCZUJhTw3KV2hVWDoUtZNPwiSf4vcsDhGx0CDQrDUon2vXC0mOHj4zBbDhhuUD5l /NCPOmtWKFSnWiny2JbD0esNIuxIaWfa/tVTkDoDq/zPtsG0awmHTpGMSeIkkxvy II1mDwnZ9n0= =2jQD -----END PGP SIGNATURE----- From mg5n+ at andrew.cmu.edu Thu Feb 2 14:11:13 1995 From: mg5n+ at andrew.cmu.edu (Matthew J Ghio) Date: Thu, 2 Feb 95 14:11:13 PST Subject: null In-Reply-To: <199501311018.EAA01333@rebma.rebma.mn.org> Message-ID: nobody at rebma.rebma.mn.org wrote: > The current status of this is that I get the remailed receipt, but the > message never shows in the group. Is mail2news at demon.co.uk down? Yes. Try using mail2news at news.demon.co.uk or mail2news at myriad.pc.cc.cmu.edu From nobody at myriad.pc.cc.cmu.edu Thu Feb 2 14:56:26 1995 From: nobody at myriad.pc.cc.cmu.edu (Anonymous) Date: Thu, 2 Feb 95 14:56:26 PST Subject: Remailer Unreliability Message-ID: What if it was possible to specify an alternate remailer? In the case that a remailer went down, you could specify an alternate. For example: :: Anon-To: remailer at foo.com Alternate-To: remailer at bar.com :: Encrypted: PGP ---pgp msg--- If foo.com was down, the message would be delivered to bar.com instead. The PGP message would have to be readable to both of them, so it would decrease security, but reliability would be better, especially for reply blocks. Comments? From eric at remailer.net Thu Feb 2 15:44:26 1995 From: eric at remailer.net (Eric Hughes) Date: Thu, 2 Feb 95 15:44:26 PST Subject: Remailer encryption module In-Reply-To: <9502021508.AA28912@elvis.tamu.edu> Message-ID: <199502021935.LAA07891@largo.remailer.net> From: Allan Bailey [re: not using PGP for remailers] Isn't this what the forthcoming PGP RFC is about? Not to my knowledge. As I understand it, they're just trying to standardize a PGP format by documenting what the code can actually handle and what was already planned into it. Also, what about the PEM "standard"? PEM carries too much identification on the outside of the encryption wrapper to be of good practical use against traffic analysis for regular mail, much less remailer mail. Consider what CP did with his(her?) PGPTools kit. As long as we have an agreeable dataformat "standard", the implementation becomes irrelevant. I expect someone to have library come out that does the format. The format need not be very complicated. Getting rid of all the key distribution features makes a format much easier indeed. Eric From CCGARY at MIZZOU1.missouri.edu Thu Feb 2 16:01:21 1995 From: CCGARY at MIZZOU1.missouri.edu (Gary Jeffers) Date: Thu, 2 Feb 95 16:01:21 PST Subject: The FIREWALL CHIP. U're phone always offhook? Message-ID: <199502022357.SAA28764@bb.hks.net> -----BEGIN PGP SIGNED MESSAGE----- THE FIREWALL CHIP! U'RE PHONE ALWAYS OFFHOOK? We have potential bugging devices in all our houses - The telephone! Of course, when it is onhook, the microphone does not transmit... or does it? Would the phone have to be rewired to render it always "offhook" or would it be an operation at the central phone company? If the present models would have to be rewired, then how about future models? Much function is done thru chips & so could many of the models on the current market be remote programmable? See the latest issue of Mondo 2000. This problem demands a hardware solution. How about an adapter module between microphone & the rest of phone? THE FIREWALL CHIP The Clipper chip architecture was secret! Cypherpunks demand source code with their security software! How about a demand for the "visable" chip. That is - a chip with a known architecture - that can be tested for integrity & is a general computer chip for doing software operations & for doing i/o with electronic devices? With our property being loaded up with sophisticated "trust me" electronics, it may be necessary to have a general electronic "FIREWALL CHIP". The FIREWALL CHIP could have its applications software supplied by various companies which would specialize in fields for detecting electronic intrusion. Some specializing in phone audio, others in vision telephones, cell phone tracking, & many others to be considered. The FIREWALL CHIP will be a future necessity. It & its software suppliers will probably constitute an outlaw industry. PUSH EM BACK! PUSH EM BACK! WWWAAAYYY BBBAAACCCK! BBBEEEAAATTTT STATE! Gary Jeffers - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBLzFxYCoZzwIn1bdtAQG0ewF/RUMJZU1qXc+31XVQLfetSZst4j+S55/i tq6j/JN5t3rjXa873mY5lT4cHCFBukfv =NSeZ -----END PGP SIGNATURE----- From hfinney at shell.portal.com Thu Feb 2 16:15:01 1995 From: hfinney at shell.portal.com (Hal) Date: Thu, 2 Feb 95 16:15:01 PST Subject: Remailing in safe-tcl Message-ID: <199502030014.QAA22049@jobe.shell.portal.com> Suppose someone runs safe-tcl to process incoming mail, and supports the "delivery-time" mode, where incoming mail programs are executed as soon as they arrive. (Support for this mode doesn't really exist yet, but I am putting together a simple script to enable it.) Here then is an example of how a self-remailing message might look: [Other headers] Content-Type: multipart/enabled-mail; boundary="----- =_791623442" Content-ID: <2269.791623082.4 at cryo> ------- =_791623442 Content-Type: application/Safe-Tcl; version="7.3"; evaluation-time=delivery Content-ID: <2269.791623082.2 at cryo> # Get the other sub-part of this message and send it to the desired address SafeTcl_sendmessage -to hfinney at shell.portal.com \ -subject {Remailed message} -body [SafeTcl_getbodyprop 1.2 all] ------- =_791623442 Content-Type: text/plain Content-ID: <2269.791623082.3 at cryo> This is the body of the message, which will get remailed. It could be a PGP message if the server supported automatic decryption of incoming PGP mail. Then it could have nested remailing instructions in it. ------- =_791623442-- This is a MIME format message with two sub-parts. The first is the script which gets run on delivery, and the second is the "payload", the message to be remailed. The script is a simple one-liner which sends the second subpart to my email address. Safe-Tcl does allow (rather vaguely) for automatic decryption of incoming mail, as well as authentication (so you might allow messages signed by certain people to get access to some special functions). There is a rudimentary mechanism for communication between scripts and server, and (I think) among scripts themselves, with SafeTcl_getconfigdata and SafeTcl_setconfigdata. These let you put in {key, value} pairs that other scripts can read. I don't see any straightforward way for a script to suspend itself and re-activate on some future event (such as the arrival of another message). Maybe it could put its whole self into the config database as a {key, value} pair and rely on future messages to pull it out and execute it. But that doesn't seem too great. There is a lot of interest in this notion of mail messages as scripted agents which go zipping about the network gathering data which they send home. I am optimistic that we will be able to get remailing capabilities out of this infrastructure largely for free. Hal From unicorn at access.digex.net Thu Feb 2 17:00:14 1995 From: unicorn at access.digex.net (Black Unicorn) Date: Thu, 2 Feb 95 17:00:14 PST Subject: "bad" government In-Reply-To: Message-ID: On Wed, 1 Feb 1995, Al Thompson wrote: > Date: Wed, 01 Feb 1995 12:31:20 -0600 > From: Al Thompson > To: Charles Bell > Cc: cypherpunks at toad.com > Subject: Re: "bad" government > > > >> If strong government resulted in liberty and freedom, then the > >> most intrusive, all-encompassing governments would result in > >> its citizens having the most liberty. Is this the case? I would > >> look at the (former) Soviet Union, Iran, Cuba, East Germany, etc., > >> for your answer. > > >Unrestricted individual freedom leads to unrestricted freedom of > >`private' corporations. Private corporations uncurbed by society's law are > >autarkies: internally totalitarian, externally predatory, as amoral as > >amoebas. > > > >Is this the shape of the future you seek? Yes, orginization by choice, not by design. > You can NOT restrict someone's rights simply because they MIGHT harm another > (prior restraint). If they do cause actual harm to someone, they should be > brought to justice. To place restrictions on someone based on the > possibility that may may cause harm introduces restrictions based solely on > the authorities' opinions (political philosophy, religion, race, etc). Precisely. > > That that the shape of the future YOU seek? > ************************************************************ > * Just your basic signature block * > * * > * Al Thompson * > * Fidonet 1:231/110 * > * alt at iquest.net * > ************************************************************ > > 073BB885A786F666 nemo repente fuit turpissimus - potestas scientiae in usu est 6E6D4506F6EDBC17 quaere verum ad infinitum, loquitur sub rosa - wichtig! From warlord at MIT.EDU Thu Feb 2 17:23:58 1995 From: warlord at MIT.EDU (Derek Atkins) Date: Thu, 2 Feb 95 17:23:58 PST Subject: Remailer encryption module In-Reply-To: <199502021444.GAA07493@largo.remailer.net> Message-ID: <9502030123.AA02022@josquin.media.mit.edu> > I agree. PGP just does not have the support for the encryption > required for mixing remailers. These deficiencies have been known for > about two years at this point and still nothing has happened. I > expect this not to change anytime soon. Hmm -- I clearly haven't been reading this thread close enough! How is PGP deficient? What do you need PGP to do in order to get it to work right with remailers? I've never seen a bug-report/ feature request of this sort sent to pgp-bugs at mit.edu, so clearly no one considered this for the MIT PGP release. So, what does PGP need to be able to do? -derek From nzook at bga.com Thu Feb 2 18:01:19 1995 From: nzook at bga.com (Nathan Zook) Date: Thu, 2 Feb 95 18:01:19 PST Subject: Why encrypt intra-remailernet. Message-ID: >We had some concerns here a while back that someone was trying to exploit >such a feature to create an exponentially-growing message that would >totally overload the remailers. A message of the form: > >:: >Request-Remailing-To: > >:: >Request-Remailing-To: > > > >was sent. If all remailers had observed and honored the multiple >requests, there would have been uncounted trillions of messages flying >about. So I would caution anyone considering implementing this feature. > >Hal Was this Detweiller's "exponentially growing message"? Note that requiring pgp wrappers kills this... Nathan From nzook at bga.com Thu Feb 2 18:03:03 1995 From: nzook at bga.com (Nathan Zook) Date: Thu, 2 Feb 95 18:03:03 PST Subject: Frothing remailers - an immodest proposal Message-ID: kevin at elvis.wicat.com: >Be gentle, though - it's my first time. Here? You jest. ;) >It seems to me that the current remailer web suffers a fundamental flaw. >It is simply too static. When a remailer disappears, service is >disrupted and messages are lost. Humans have to statically route their >messages through the web either by hand or using relatively primitive >tools such as the chain script (not to belittle the useful work that has >been done, but it is by no means idiot proof yet). Basically, the >current web of mailers shows nothing of the dynamic nature that has kept >the internet alive and has offered us a decent chance at truly anonymous >communications, nor is it easy to use to its full potential. > >Consider a more dynamic web of remailers. I envision remailers that >actively advertise their presence on the web so that all active >remailers are aware of all other active remailers. This advertising is >to have very low latency so that a new mailer can be known to the web >within minutes (I will address the implementation of this later). Thus, >remailers can constantly be appearing and disappearing without impact on >the web as a whole (I refer to this dynamic web of remailers as a >"froth"). Imagine also that remailers are allowed to dynamically perform >the routing functions that are currently done statically offline (for >reasons I will discuss shortly). > Some version of this discussion came up a few months ago, and I passed on it then, but I think I've heard enough to comment now: The remailers are based on an inherently different model than the InterNet. Some of these differences, in fact, are crucial. 1) The InterNet is based on mutual cooperation/mutual trust. Cypherpunks trust no one that they don't have to. This is not just a result of our twisted psyche. If we could trust everyone, we wouldn't _need_ remailers. Since we don't even know who is whom out there, we avoid extending trust. 2) The InterNet is concerned first about reliability, and not at all about privacy. The remailers are concerned first about privacy, and can leave reliability to the users, if need be. There is nothing to prevent Alice and Bob agreeing to send each other ACK statements, and retransmitting messages if they don't get the ACK. There has been some mention of remailers doing the same with each other, in an attempt to improve net-wide reliability. BTW, with T1, sending ACKs is not unreasonable between remailers. 3) From 1) and 2). The remailers are heading towards mandatory PGP, possibly nested. All InterNet messages are world-readable--although this may be changing as the model breaks down. Again, this has to do with the intrinsic diffences. >The use of such transient routers implies allowing dynamic routing. If >any given remailer may go down or move at any point, it is impractical >to expect users to keep track of which are up at the moment and create >static routes in the current manner. The only reasonable solution I have >come up with is to allow the remailers themselves to choose routing, >given that they have full knowledge of the current state of the froth. Here we have the real head of the problem, as Hal so asutely points out: in your model, if the first remailer is bad, the message is compromised. If user encrypt to all remailers, they might as well encrypt directly to mole at snakeoil.nsa.gov. If they don't, they severly limit who can pick out their messages. In particular, they bypass transient remailers. But that isn't all. If the remailers pick the route, they are in a no better state than the users. Since the flushing attack requires remailers to operate on ticks, with carryover, an hour delay per remailer is almost minimal, untill traffic really picks up. So if some message routes through four remailers, a minimum of four hour delay results. In your case, this could easily move between in/out of service modes. > Think about the proposed extension to MixMaster to >allow separate parts of a multi-part message to be routed separately, >and consider whether you really want to have to do this by hand. I >strongly suspect that most messages are currently routed via boilerplate >scripts, which has to make the job of traffic analysis much easier for >our good friend Eve. Stupid is as stupid does. >By the way, a brief rant on a related topic; people speak of not >trusting remailers any further than necessary, while I am clearly >suggesting granting more authority and trust to the remailers. This >notion of not assigning trust is simply nonsense. When you send a piece >of mail to a remailer, encrypted or not, you are assigning complete >trust in that remailer to keep you anonymous and not to forward your >mail to the NSA immediately. NOT TRUE. With proper use of encryption, you are trusting your first remailer only to not reveal that you sent a message, and not to correlate that message to the one it sends out. With rational use of garbage running two deep, you can even suffer this loss without significant harm. >This does lead to a related problem, however; if we allow remailers to >pop up at random and join in the froth, how do we know that Deitweiller >won't set up a number of black hole remailers that take your mail and >throw it away, disrupting the froth, or forward it to nphard at nsa.gov? How indeed? The reason we chain is because we _don't_ really trust our first remailer--or any other. >Fortunately, we already have the PGP web of trust model in place and can >use it to good effect in this case. Remailers should simply not route >mail through any remailer whose public key is not trusted unless >explicitly ordered otherwise. This ring remailers to the user--with an exception list for those not "live". Nathan From sinclai at ecf.toronto.edu Thu Feb 2 18:04:17 1995 From: sinclai at ecf.toronto.edu (SINCLAIR DOUGLAS N) Date: Thu, 2 Feb 95 18:04:17 PST Subject: The FIREWALL CHIP. U're phone always offhook? In-Reply-To: <199502022357.SAA28764@bb.hks.net> Message-ID: <95Feb2.210355edt.6007@cannon.ecf.toronto.edu> > We have potential bugging devices in all our houses - The telephone! > Of course, when it is onhook, the microphone does not transmit... or > does it? Would the phone have to be rewired to render it always > "offhook" or would it be an operation at the central phone company? > If the present models would have to be rewired, then how about future > models? Much function is done thru chips & so could many of the models > on the current market be remote programmable? See the latest issue of > Mondo 2000. The Mondo article ("Total Surveillance" by Charles Ostman) was a joke. Among other things, he claims the Teledesic project is a massive satellite surveilance scheme. Those birds are going to be in geo-synchronous orbit! What's more, even a LEO spy-sat weighs many tons. Nobody could launch 840 satellites of that weight without being noticed. >From the innacuracies in what I do know about, I assume all of the phone-paranoia is also unjustified. From rrothenb at ic.sunysb.edu Thu Feb 2 18:12:33 1995 From: rrothenb at ic.sunysb.edu (Robert Rothenburg Walking-Owl) Date: Thu, 2 Feb 95 18:12:33 PST Subject: The FNORDWALL CHIP. Message-ID: <199502030212.VAA22129@libws2.ic.sunysb.edu> > ----- Transcript of session follows ----- > ... while talking to toad.com.: > >>> RCPT To: > <<< 550 ... User unknown > 550 ... User unknown Talk about lame. I accidentally CC'd this to "cyberpunks". *sigh* [ More header snipped! ] > > > > > THE FIREWALL CHIP! U'RE PHONE ALWAYS OFFHOOK? > > Fnorjd! > > > > > We have potential bugging devices in all our houses - The telephone! > > Of course, when it is onhook, the microphone does not transmit... or > > does it? Would the phone have to be rewired to render it always > > "offhook" or would it be an operation at the central phone company? > > I believe there is a way to get regular analog phones to go "off hook" > by sending the right kind of signal down the wire. Apparently not that > reliable if you've got multiple extentions. I think some newer phone > systems and/or newer phones don't work that well for the method, though > I never tried it myself. > > > > This problem demands a hardware solution. How about an adapter module > > between microphone & the rest of phone? > > How about disconnecting the phone when uneeded? Or, filter the calls through > an answering machine (which may also defeat such a method described above). > > [ Snip! ] > > > > The FIREWALL CHIP could have its applications software supplied by > > various companies which would specialize in fields for > > detecting electronic intrusion. Some specializing in phone audio, others > > in vision telephones, cell phone tracking, & many others to be > > considered. > > > > The FIREWALL CHIP will be a future necessity. It & its software > > suppliers will probably constitute an outlaw industry. > > I don't think it will be a necessity. I can think of several alternatives > that don't require trusting an "outlaw industry". > > Rob > > > --VAA00527.791777197/abel.ic.sunysb.edu-- > > From hfinney at shell.portal.com Thu Feb 2 18:26:30 1995 From: hfinney at shell.portal.com (Hal) Date: Thu, 2 Feb 95 18:26:30 PST Subject: Frothing remailers - an immodest proposal Message-ID: <199502030225.SAA06856@jobe.shell.portal.com> One point re remailer reliability: Even though in my discussions with Nathan I did not really agree with his suggestion to have remailers check signatures on incoming messages, actually Chaum did propose something similar in his 1981 paper. He would have each remailer sign the batch of messages it outputs each cycle. (Chaum's remailers used a straight batching approach.) The idea, as I recall, was to allow a remailer to prove that it had not engaged in a denial-of-service attack by purposely dropping some message into the bit bucket. If some customer put his message in here and it didn't ever come out over there, I guess the remailer could prove that it didn't lose the message by showing its signed batch. I'm not clear on the details though. Anyway, here is an area where message signing and reliability have some intersection. Hal From rrothenb at ic.sunysb.edu Thu Feb 2 18:26:52 1995 From: rrothenb at ic.sunysb.edu (Robert Rothenburg Walking-Owl) Date: Thu, 2 Feb 95 18:26:52 PST Subject: How much entropy in a key press? In-Reply-To: <199502021456.IAA01951@eniac.ac.siue.edu> Message-ID: <199502030226.VAA22341@libws2.ic.sunysb.edu> > > Can anyone tell me how many bits of entropy there are per 7-bit ASCII > character. More specifically, a program wishes to generate a session > key by prompting the user to type N random key presses. The characters > entered are hashed down to 128 bits by MD5 for subsequent use as a key. Depends. You could use a fast timer and sample between keystrokes, then use the least significant byte of the difference like PGP does (for DOS, anyway). You could change that so it samples bits instead of bytes, but it's conceivable that you'll have less randomness that way. I've experimented with speeding up the timer IRQs on my PC for that but found it was superficially less random (in a pool of 256 bytes there were more duplicates). > What should the value of N be, such that the entropy of the user's > string does not unnecessarily exceed the entropy of the hash? With a decent timerr that samples bytes, I'd say 16 keystrokes. Use a cypher overtha random data to garbe it a bit. Rob > From rrothenb at ic.sunysb.edu Thu Feb 2 18:36:54 1995 From: rrothenb at ic.sunysb.edu (Robert Rothenburg Walking-Owl) Date: Thu, 2 Feb 95 18:36:54 PST Subject: Remailer Unreliability In-Reply-To: Message-ID: <199502030236.VAA22498@libws2.ic.sunysb.edu> > > What if it was possible to specify an alternate remailer? In the case that > a remailer went down, you could specify an alternate. For example: > [ Snip! ] > > If foo.com was down, the message would be delivered to bar.com instead. > The PGP message would have to be readable to both of them, so it would > decrease security, but reliability would be better, especially for > reply blocks. Comments? > Hmmm. Not as secure, but how about this... (a kind of script) begin A if active(mailer at foo.com) mail(mailer at foo.com,B,C) elseif active(mailer at bar.com) mail(mailer at bar.com,B,C) end begin B { next block of scripts for chain... remailer would encrypt B and C blocks for appropriate mailer } end begin C { this block would be cargo... could even contain multiple messages? } end That's a pseudoscript, but you get the idea... (no pun intended ;) From anonymous-remailer at shell.portal.com Thu Feb 2 19:01:25 1995 From: anonymous-remailer at shell.portal.com (anonymous-remailer at shell.portal.com) Date: Thu, 2 Feb 95 19:01:25 PST Subject: Remailer Unreliability In-Reply-To: Message-ID: <199502030300.TAA10357@jobe.shell.portal.com> > Date: Thu, 2 Feb 95 18:00 EST > From: nobody at myriad.pc.cc.cmu.edu (Anonymous) > > What if it was possible to specify an alternate remailer? In the case that > a remailer went down, you could specify an alternate. For example: Well, *I* think it is a good idea. But how does remailer1 know that remailer2 is both a remailer and down? Noyb From ortenzi at interactive.net Thu Feb 2 20:16:54 1995 From: ortenzi at interactive.net (Anthony Ortenzi) Date: Thu, 2 Feb 95 20:16:54 PST Subject: 1995-02-02 President Names Members to Intelligence Commission (fwd) Message-ID: [Thought Intelligence would be something of interest to the list... ] [Note the sneaking in of Zoe Baird (umm... can you say favor?) ] [...................................................................] ---------- Forwarded message ---------- Date: Thu, 2 Feb 1995 18:53-0500 From: The White House To: Public-Distribution at CLINTON.AI.MIT.EDU Subject: 1995-02-02 President Names Members to Intelligence Commission THE WHITE HOUSE Office of the Press Secretary ________________________________________________________________________ For Immediate Release February 2, 1995 STATEMENT BY THE PRESIDENT NAMING MEMBERS OF THE COMMISSION ON THE ROLES AND CAPABILITIES OF THE U.S. INTELLIGENCE COMMUNITY I am announcing today appointments to the Congressionally- mandated Commission on the Roles and Capabilities of the United States Intelligence Community. The Commission will be chaired by the current chairman of my Foreign Intelligence Advisory Board, Les Aspin. Former Senator Warren Rudman will serve as the vice chairman and I have asked General Lew Allen, Jr., Zoe Baird, Ann Caracristi, Stephen Friedman, Anthony S. Harrington, Robert J. Hermann, and Ambassador Paul Wolfowitz to serve as well. These distinguished Americans will join the eight members appointed by the leadership of the 103rd Congress. They are Tony Coelho, David Dewhurst, Representative Norm Dicks, Senator James Exon, former Senator Wyche Fowler, Representative Porter Goss, General Robert Pursley and Senator John Warner. Intelligence remains a critical element of our national power and influence. For over 40 years bipartisan support for the work performed by U.S. intelligence has been essential to the creation of an intelligence capability that is second to none. While the world has changed in dramatic ways, our need to retain the advantage that U.S. intelligence provides our country remains constant. With the end of the Cold War we must renew and reinvigorate this bipartisan support. The foundation for this support must begin with a thorough assessment of the kind of intelligence community we will need to address the security challenges of the future. Our objective is to strengthen U.S. intelligence, to ensure it has the management, skills and resources needed to successfully pursue our national security interests through the next decade and beyond. It is an effort to which I attach the highest personal priority. I am confident that Les Aspin, Warren Rudman and the other outstanding members of this Commission will work cooperatively with the leadership of the intelligence community and the Congress to ensure continued bipartisan support for this critical mission. And I know that their effort will ensure the continued trust of the American people in the outstanding and often unheralded work performed by the men and women of U.S. intelligence. # # # Attachment: Biographic Information THE COMMISSION ON THE ROLES AND CAPABILITIES OF THE UNITED STATES INTELLIGENCE COMMUNITY Members Appointed by the President Honorable Les Aspin, Chairman. Mr. Aspin, of Milwaukee, Wisconsin, is a Distinguished Professor of International Policy at Marquette University and a Counsel at the Center for Strategic and International Studies. He served as Secretary of Defense from 1993 to 1994. As the US Representative from Wisconsin's 1st District, his congressional career spanned twenty two years. He was Chairman of the House Armed Services Committee from 1985 to 1993. Prior to his election to the US Congress in 1970, Mr. Aspin was a staff assistant to the chairman of President Kennedy's Council of Economic Advisors. He also serves as Chairman of the President's Foreign Intelligence Advisory Board (PFIAB). Warren B. Rudman, Vice Chairman. Senator Rudman, of Washington, DC and Manchester, New Hampshire, is a partner in the Washington law firm of Paul, Weiss, Rifkind, Wharton & Garrison. He served as a U.S. Senator from 1980 to 1992, where he was a member of the Select Committee on Intelligence. He previously was Attorney General of the State of New Hampshire. He also serves as Vice Chairman of the PFIAB. General Lew Allen, Jr., USAF (Ret.). General Allen, of Pasadena, California, served as Chief of Staff of the Air Force and Director of the National Security Agency. He retired in 1991 as a Vice President of the California Institute of Technology and Director of the Jet Propulsion Laboratory. He was a member of President Bush's PFIAB and is a current PFIAB member. Zoe Baird. Ms. Baird, of Hartford, Connecticut, is Senior Vice President and General Counsel of the Aetna Life & Casualty company. She is a former counselor and senior staff executive of the General Electric Corporation, a former partner in the Washington, DC law firm of O'Melveny & Myers, and a former Associate Counsel to President Carter. Ann Caracristi. Miss Caracristi, of Washington, DC, is a former Deputy Director of the National Security Agency, where she served in a variety of senior management positions over a 40 year career. She recently chaired a DCI Task Force on intelligence training and is a member of the DCI/Secretary of Defense Joint Security Commission. She is a current PFIAB member. Stephen Friedman. Mr. Friedman, of New York City, is Senior Chairman and Limited Partner of Goldman, Sachs & Co., which he originally joined in 1966. He served as Chairman and Senior Partner from December 1992 to November 1994 when he retired from active management of the firm. Anthony S. Harrington. Mr. Harrington, of Washington, DC, is a partner in the law firm of Hogan & Hartson. He is a former General Counsel to the Democratic National Committee, the former General Counsel to the Clinton/Gore Campaign, a founding Director of the Center for Democracy, and a former Assistant Dean of the Duke Law School. He is a current PFIAB member. Robert J. Hermann. Dr. Hermann, of Hartford, Connecticut, is the Senior Vice President for Science and Technology of the United Technologies Corporation. He is a former Director of the Defense Department's National Reconnaissance Office and a former senior official at the National Security Agency. He is a current PFIAB member. Paul D. Wolfowitz. Dr. Wolfowitz, of Chevy Chase, Maryland, is the dean of the Paul H. Nitze School of Advanced International Studies at The Johns Hopkins University. He served as Under Secretary of Defense for Policy from 1989 to 1993 and has held a variety of positions in government beginning in 1966. Members Appointed By Congress Honorable Tony Coelho. Mr. Coelho is President and CEO of Wertheim Schroder Investment Services, Incorporated, and a Managing Director of Wertheim Schroder & Co, Inc. He a former US Representative from California and a former Majority Whip of the US House of Representatives. David H. Dewhurst. Mr. Dewhurst is Founder, Chairman, and CEO of Falcon Seaboard Resources, Inc., a Houston- based, integrated energy company. He served as a Case Officer with the Central Intelligence Agency in the early 1970s, and was recently elected to the National Board of Directors of the Jewish Institute for National Security Affairs. Mr. Dewhurst served as Chairman of the Texas Product Development Advisory Board. Representative Norman D. Dicks. Mr. Dicks, of Washington, was first elected to the House in 1976. He has served on the Appropriations Committee since his freshman term, and currently sits on three subcommittees -- Defense, Interior and Military Construction. He currently is the ranking minority member of the Select Committee on Intelligence. Mr. Dicks also was an Administrative Assistant to Senator Warren Magnuson from 1973 to 1976. Senator J. James Exon. Senator Exon, of Nebraska, was elected to his first term in 1978. He currently is a member of the Armed Services Committee (where he chairs the Subcommittee on Nuclear Deterrence, Arms Control & Defense Intelligence), the Committee on Commerce, Science & Technology and the Budget Committee. He is a former two-term Governor of Nebraska, and a World War Two veteran of the US Army Signal Corps. Honorable Wyche Fowler. Mr. Fowler is a partner in the law firm of Powell, Goldstein, Frazer & Murphy. He served 16 years in the US Congress. Elected to the Senate in 1986, he was Assistant Floor Leader and was a member of the Appropriations, Budget, Energy and Agricultural Committees. During his nine years in the House, he served on the Select Committee on Intelligence and the Foreign Relations and Ways and Means Committees. Representative Porter J. Goss. Mr. Goss, of Florida, was first elected to the House in 1988. He currently is a member of the Select Committee on Intelligence, the Ethics Committee and the Rules Committee, where he chairs the Subcommittee on the Legislative Process. He is a former Clandestine Service Officer with the Central Intelligence Agency, where he served for ten years. Mr. Goss is a former Councilman of Sanibel, Florida, where he also was elected the city's first mayor. Lt. Gen. Robert E. Pursley, USAF (Ret.) General Pursley is President of the Logistics Management Institute, and a former Vice Chairman of USAA, a private financial service company, and a former Executive Vice President of Insilco Corporation. In twenty five years of military service, he served as Military Assistant to Secretaries of Defense Laird, Clifford and McNamara, and was Commander of US Forces Japan and the Fifth Air Force. Senator John Warner. Senator Warner, of Virginia, was elected to his seat in 1978. He is the second most senior member of the Senate Armed Services Committee and the Environment and Public Works Committee. He served as Vice Chairman of the Senate Select Committee on Intelligence from 1992 to 1994. He also is a former Secretary and Undersecretary of the Navy. Senator Warner sponsored the legislation creating this commission. # # # From daleh at ix.netcom.com Thu Feb 2 20:44:04 1995 From: daleh at ix.netcom.com (Dale Harrison AEGIS) Date: Thu, 2 Feb 95 20:44:04 PST Subject: The FIREWALL CHIP. U're phone always offhook? Message-ID: <199502030441.UAA17143@ix2.ix.netcom.com> You wrote: >> We have potential bugging devices in all our houses - The telephone! >> Of course, when it is onhook, the microphone does not transmit... or >> does it? > >The Mondo article ("Total Surveillance" by Charles Ostman) was a joke. > >From the innacuracies in what I do know about, I assume all of the >phone-paranoia is also unjustified. Actually, there is a germ of truth in this. On older phones (don't know if this works on newer electronic phones) when the handset is 'on-hook' a switch opens and breaks the voice circuit. This of course only works for DC circuits. If you drive that same circuit with an AC signal (from further up the line) then that 'open' switch becomes a capacitor and acts as a band-pass filter. Signals from the mic will then modulate that AC current and can be extracted and reconstructed. Supposedly the Dutch police have perfected this and use it in investigations to circumvent legal restrictions on physically bugging suspects homes; or so was alleged a couple of years ago during a narcotics trial in Amsterdam. Dale H. From Nobody at eniac.ac.siue.edu Thu Feb 2 20:47:02 1995 From: Nobody at eniac.ac.siue.edu (Anonymous) Date: Thu, 2 Feb 95 20:47:02 PST Subject: Adding padding to PGP files In-Reply-To: <199502021648.IAA05417@jobe.shell.portal.com> Message-ID: <199502030438.WAA09561@eniac.ac.siue.edu> > Date: Thu, 2 Feb 1995 08:48:49 -0800 > From: Hal > > It only works on binary ".pgp" public-key encrypted files (not ascii armored > files). So there would be some work needed to make it a really useful tool. > > Hal I just tried adding random characters at the end of a pgp ascii armoured message. I had to cut out the checksum, but pgp was able to decrypt the message just fine. So a very simple program (ideally with a strong source of random numbers) should be able to pad ascii armoured files. Noyb From jordyn at alinc.com Thu Feb 2 21:11:34 1995 From: jordyn at alinc.com (Jordyn A Buchanan) Date: Thu, 2 Feb 95 21:11:34 PST Subject: Remailer Unreliability Message-ID: >> Date: Thu, 2 Feb 95 18:00 EST >> From: nobody at myriad.pc.cc.cmu.edu (Anonymous) >> >> What if it was possible to specify an alternate remailer? In the case that >> a remailer went down, you could specify an alternate. For example: > > Well, *I* think it is a good idea. But how does remailer1 know that >remailer2 is both a remailer and down? The issue of whether or not the alternate address is a remailer seems to be largely irrelevant. It doesn't really hurt anyone to be able to specify an alternate address, and the feature would even seem to have some practical value as you could specify alternate addresses for an end-recipient if you suspect an address might be unreliable. As long as the alternate address is only invoked if the first mail delivery fails, the problem of the exponentially-growing message is avoided as well. Jordyn ------------------------------------------------------------------------- Jordyn A. Buchanan Environmental Studies (B.U.S.) jordyn at alinc.com University of Utah -- '95 (hope) PGP Public Key: 0xADEEC1 ED 3D 36 5A 98 CE 9D B4 4B 37 0B 9B B5 D6 F3 4B From hfinney at shell.portal.com Thu Feb 2 21:15:55 1995 From: hfinney at shell.portal.com (Hal) Date: Thu, 2 Feb 95 21:15:55 PST Subject: Adding padding to PGP files Message-ID: <199502030514.VAA24599@jobe.shell.portal.com> From: Nobody at eniac.ac.siue.edu (Anonymous) > > Date: Thu, 2 Feb 1995 08:48:49 -0800 > > From: Hal > > > > It only works on binary ".pgp" public-key encrypted files (not ascii armored > > files). So there would be some work needed to make it a really useful tool. > > > > Hal > > I just tried adding random characters at the end of a pgp ascii > armoured message. I had to cut out the checksum, but pgp was able to > decrypt the message just fine. So a very simple program (ideally with > a strong source of random numbers) should be able to pad ascii > armoured files. Unfortunately, this approach is easy but doesn't really succeed in adding undetectable padding. The PGP message, once the ascii armor is stripped away, has a byte count in it. Anyone can de-armor the message and see that this byte count does not match the size of the file. So you also need to bump this byte count to match the added bytes. That's all my perl script does that I posted. Hal From jordyn at alinc.com Thu Feb 2 21:16:56 1995 From: jordyn at alinc.com (Jordyn A Buchanan) Date: Thu, 2 Feb 95 21:16:56 PST Subject: Remailer Unreliability Message-ID: >> Date: Thu, 2 Feb 95 18:00 EST >> From: nobody at myriad.pc.cc.cmu.edu (Anonymous) >> >> What if it was possible to specify an alternate remailer? In the case that >> a remailer went down, you could specify an alternate. For example: > > Well, *I* think it is a good idea. But how does remailer1 know that >remailer2 is both a remailer and down? The issue of whether or not the alternate address is a remailer seems to be largely irrelevant. It doesn't really hurt anyone to be able to specify an alternate address, and the feature would even seem to have some practical value as you could specify alternate addresses for an end-recipient if you suspect an address might be unreliable. As long as the alternate address is only invoked if the first mail delivery fails, the problem of the exponentially-growing message is avoided as well. Jordyn ------------------------------------------------------------------------- Jordyn A. Buchanan Environmental Studies (B.U.S.) jordyn at alinc.com University of Utah -- '95 (hope) PGP Public Key: 0xADEEC1 ED 3D 36 5A 98 CE 9D B4 4B 37 0B 9B B5 D6 F3 4B From jlasser at rwd.goucher.edu Thu Feb 2 22:31:34 1995 From: jlasser at rwd.goucher.edu (Jon Lasser) Date: Thu, 2 Feb 95 22:31:34 PST Subject: A simple idea Message-ID: Maybe this has been discussed before, but if so I wasn't around for it and would like to know: What if: (assuming trusted remailers, but still worried about traffic analysis of those remailers): One mailed a message to one remailer. This remailer held onto all messages until some predestined hour or kilobyte size or whatever, and then forwarded ALL its messages to this other remailer, in one packet (.TARred and PGPed separately, say), but NOT IN THE ORDER RECIEVED? While this wouldn't solve all the problems (to some extent, the sizes of files might be correlated, but this could probably be foiled by other means), wouldn't it at least foil the easy to/from traffic analysis that is (I believe) the greatest threat? Jon ============================================================================== Jon Lasser This is an advanced .signature virus -- please attach to your .signature and add your last initial to the list: l ------------------------------------------------------------------------------ From samman at CS.YALE.EDU Thu Feb 2 23:01:25 1995 From: samman at CS.YALE.EDU (Ben) Date: Thu, 2 Feb 95 23:01:25 PST Subject: The FIREWALL CHIP. U're phone always offhook? In-Reply-To: <199502022357.SAA28764@bb.hks.net> Message-ID: On Thu, 2 Feb 1995, Gary Jeffers wrote: > -----BEGIN PGP SIGNED MESSAGE----- > > THE FIREWALL CHIP! U'RE PHONE ALWAYS OFFHOOK? > > We have potential bugging devices in all our houses - The telephone! > Of course, when it is onhook, the microphone does not transmit... or > does it? Would the phone have to be rewired to render it always > "offhook" or would it be an operation at the central phone company? > If the present models would have to be rewired, then how about future > models? Much function is done thru chips & so could many of the models > on the current market be remote programmable? See the latest issue of > Mondo 2000. Use an encrypted cordless phone. When its not in use, take the battery out of the phone. As long as the model you own doens't have a speaker phone you're cool. If you start thinking that all phones that you buy have other hidden mikes in them, then I start wondering about paranoia. Ben. From rrothenb at ic.sunysb.edu Fri Feb 3 00:20:26 1995 From: rrothenb at ic.sunysb.edu (Robert Rothenburg Walking-Owl) Date: Fri, 3 Feb 95 00:20:26 PST Subject: Adding padding to PGP files In-Reply-To: <199502030438.WAA09561@eniac.ac.siue.edu> Message-ID: <199502030820.DAA07843@libws4.ic.sunysb.edu> > > > Date: Thu, 2 Feb 1995 08:48:49 -0800 > > From: Hal > > > > It only works on binary ".pgp" public-key encrypted files (not ascii armored > > files). So there would be some work needed to make it a really useful tool. > > > > Hal > > I just tried adding random characters at the end of a pgp ascii > armoured message. I had to cut out the checksum, but pgp was able to > decrypt the message just fine. So a very simple program (ideally with > a strong source of random numbers) should be able to pad ascii > armoured files. Probably can calculate a new checksum too... or binary PGP, add junk and mime/uu/xx-encode....? Rob From nobody at tower.techwood.org Fri Feb 3 07:16:12 1995 From: nobody at tower.techwood.org (Anonymous) Date: Fri, 3 Feb 95 07:16:12 PST Subject: Why encrypt intra-remailernet. In-Reply-To: Message-ID: <199502031504.HAA15462@tower.techwood.org> Nathan Zook wrote: > Was this Detweiller's "exponentially growing message"? Yes. > Note that requiring pgp wrappers kills this... No, just encrypt to multiple recipients. From nsb at nsb.fv.com Fri Feb 3 07:26:27 1995 From: nsb at nsb.fv.com (Nathaniel Borenstein) Date: Fri, 3 Feb 95 07:26:27 PST Subject: Remailing in safe-tcl In-Reply-To: <5122.791772273.1@nsb.fv.com> Message-ID: Excerpts from mail: 2-Feb-95 Remailing in safe-tcl Hal at shell.portal.com (2397) > I don't see any straightforward way for a script to suspend itself and > re-activate on some future event (such as the arrival of another > message). Maybe it could put its whole self into the config database as > a {key, value} pair and rely on future messages to pull it out and > execute it. But that doesn't seem too great. The problem is that this is a very hard -- perhaps impossible -- thing to build in at the level of a safe-tcl interpreter, because the safe-tcl interpreter is supposed to be a relatively stand-alone thing. To activate something based on a future event requires some hooks into external event management -- e.g. a cron job, or the message receipt facilities of a specific mail tool, etc. The challenge, I think, is to figure out how to make sure safe-tcl has the right hooks for such an external environment without REQUIRING one particular such environment in order to run safe-tcl. In other words, I think the best to be hoped for is for safe-tcl to have the facilities that are needed by such an environment. I'm not entirely sure what those facilities are, but I'm optimistic that this could be layered on using the "declareharmless" mechanism of safe-tcl. Thus, you could write (in full tcl) a procedure that essentially queues an event for future processing, and make that procedure available to the safe-tcl environment. Is this plausible in your application context? > There is a lot of interest in this notion of mail messages as scripted > agents which go zipping about the network gathering data which they send > home. I am optimistic that we will be able to get remailing capabilities > out of this infrastructure largely for free. I think there's a good chance of that, yes. Part of the safe-tcl experiment, actually, is the attempt to figure out, cooperatively, what all is needed in the way of infrastructure. So what I'm most interested in knowing is whether there are features you can imagine adding to safe-tcl that would make this easier to do on your end... -- Nathaniel From nobody at myriad.pc.cc.cmu.edu Fri Feb 3 08:50:25 1995 From: nobody at myriad.pc.cc.cmu.edu (Anonymous) Date: Fri, 3 Feb 95 08:50:25 PST Subject: Remailer Unreliability Message-ID: >From: anonymous-remailer at shell.portal.com > Well, *I* think it is a good idea. But how does remailer1 know that >remailer2 is both a remailer and down? By attempting a connection to the SMTP port and using the alternate if it fails? From jltocher at CCGATE.HAC.COM Fri Feb 3 09:12:52 1995 From: jltocher at CCGATE.HAC.COM (jltocher at CCGATE.HAC.COM) Date: Fri, 3 Feb 95 09:12:52 PST Subject: No Subject Message-ID: <9501037918.AA791831560@CCGATE.HAC.COM> From Edupage: THE NEW ETHOS OF THE NET A professor at St. Cloud University in Minnesota calls for overhauling business school curricula to stress ethical concerns in the electronic age the same way they stress finance or economic theory. The end result? "Information systems will be protected because most people will no longer be willing to purposefully contaminate a program or network; they will protect others' confidentiality, privacy, and copyright as they protect their own; they will refuse to plagiarize, fabricate, and perpetrate other types of fraud; and they will not tolerate such activities in others." The alternative is bleak: "...We will degenerate into secretive, encrypted, overly protective information hoarders, unwilling to share and disseminate knowledge -- except for profit." (Information Week 2/6/95 p.64) But, how do you really feel... John John L. Tocher THE CITY-a bounded infinity. A labyrinth where JLTocher at earthlink.net you are never lost. Your private map where every PGP: CE 72 1A 11 07 47 35 block bears exactly the same number. Even if you 35 9A C1 DE EA 64 21 BC 94 lose your way, you cannot go wrong. --Kobo Abe From anonymous-remailer at shell.portal.com Fri Feb 3 09:15:23 1995 From: anonymous-remailer at shell.portal.com (anonymous-remailer at shell.portal.com) Date: Fri, 3 Feb 95 09:15:23 PST Subject: to hfinney Message-ID: <199502031714.JAA01901@jobe.shell.portal.com> mr finney , do you know if that perl prog of yours to add stuff to .pgp files can be ported to messy dos ? many thanx From peb at netcom.com Fri Feb 3 09:28:27 1995 From: peb at netcom.com (Paul E. Baclace) Date: Fri, 3 Feb 95 09:28:27 PST Subject: THROUGH THE LOOKING GLASS Message-ID: <199502031709.JAA20821@netcom20.netcom.com> Recently a relative of mine was battered/assulted in a park. The perp, after a personal item broke, called a friend at the police on his cel phone and an officer charged my relative for assault! The perp is also trying to sue for damages. The relative is nearly at retirement age and the perp had 3 large attack dogs at the time. This is a bad cop with a vindictive mentality and the court so far believes the cop. (My relative should be suing for psychological damages after weeks of nightmares about being attacked and then betrayed by the police and fear of retribution for pursuing justice. This is a very expensive process in money, time and emotions.) A personal recording of what happened would make a lot of difference. Paul E. Baclace peb at netcom.com From rishab at dxm.ernet.in Fri Feb 3 09:54:26 1995 From: rishab at dxm.ernet.in (rishab at dxm.ernet.in) Date: Fri, 3 Feb 95 09:54:26 PST Subject: Tribes, cyberspace and the communication society Message-ID: The Internet develops its own order... Electric Dreams Weekly column for The Asian Age by Rishab Aiyer Ghosh #46, 30/January/1995: Tribes, cyberspace and the communication society Industrialization brought with it many social changes. Concentrating power in cities, it expanded the value of property rights and built a complex formal legal system to enforce them. It gave birth to the powerful police force as the means for keeping law and order in the urban population of gathered strangers, and, while spreading democracy, distanced people from the process of legislation that affected them. All this is going to change as the information revolution engulfs the planet. Perhaps surprisingly, the social changes to come will more closely reflect humans as they interacted millennia ago, rather than as they did in the more recent past. Before industrialization, cities were much less important. The village (in an idealized history) was the key social unit, as the tribe was in pre-agricultural communities. Economic power, being geographically distributed, resulted in considerable control by people over the informal rules that governed them and their immediate environment, despite the absence of democracy as we now know it. Property rights were lax, especially in tribal society; villages placed great importance on common land. There was correspondingly little emphasis on a police force or formal law. Order was maintained primarily through systems of social punishment - reputation and taboo. As cities formed, the value of owned property increased, as there was little sense of community or common benefit among strangers. Crime increased, property rights became important to enforce, and taboo was no longer an effective preserver of order primarily because unlike villages, the city is not what I call a communication society. People don't depend on each other in cities as much as in villages, nor does the threat of ostracization work, as social interaction is a far greater component of rural than urban life. Urban society needed, and developed, modern forms of centralized law enforcement. As mainstream media and the general public discover the relative anarchy of the Internet, they take fright at its apparent disorder and suggest the need for government if cyberspace is to have a future - people fear freedom. At least until they experience it - after all, the Net has been around long before it became front-page news, and has evolved its own, distributed, law. Based on principles of total freedom of expression and a strong dislike of irrelevant content outside clearly defined zones, infractions are met sometimes by the guerrilla action of spontaneous protest, sometimes by ostracization. This works because cyberspace is also a communication society. While McLuhan's Global Village has become extremely cliched, in this aspect cyberspace does resemble a village. People on the Net may not be dependent on each other for food and clothing, but they are for almost anything else concerned with a cyber life. Cyberspace is full of vibrant communities that do little else but talk, and with social interaction at a higher level than at any time in history, it is well suited to a system of social punishment such as taboo; indeed, this may become the only practical form of wired justice, and could be very effective - in cyberspace, if nobody talks to you, you're dead. The similarity to pre-industrial communities does not end with modes of governance, but extends to basic issues of economics. Property rights in the infosphere are contentious; they keep getting more impractical to enforce, and will play a diminished role in a post- industrial world as technology and people work around attempts at formal legislation. Without realizing it, the denizens of the Net have already created a vast 'cooking- pot' market in software, news and information, based on the very tribal notion of shared property and benefit. That government and industry will work with such disorganized economies is extremely unlikely, but they are so inherent to the communication society that cyberspace is, that they will survive, though perhaps occasionally going underground. Technology and society go hand in hand, but sometimes history repeats itself, if not without variation. Though the realm of information forms but part of our lives, that part will increase, and affect the rest. If we are a communication society while in the ocean of information, what might we be outside? Rishab Aiyer Ghosh is a freelance technology consultant and writer. You can reach him through voice mail (+91 11 3760335) or e-mail (rishab at dxm.ernet.in). --====(C) Copyright 1994 Rishab Aiyer Ghosh. ALL RIGHTS RESERVED====-- This article may be redistributed in electronic form only, PROVIDED THAT THE ARTICLE AND THIS NOTICE REMAIN INTACT. This article MAY NOT UNDER ANY CIRCUMSTANCES be redistributed in any non-electronic form, or redistributed in any form for compensation of any kind, WITHOUT PRIOR WRITTEN PERMISSION from Rishab Aiyer Ghosh (rishab at dxm.ernet.in) --==================================================================-- ----------------------------------------------------------------------------- For Electric Dreams subscriptions and back issues, send a mail to rishab at arbornet.org with 'get help' as the message Subject. Rishab Aiyer Ghosh rishab at dxm.ernet.in rishab at arbornet.org Vox +91 11 6853410 Voxmail 3760335 H 34C Saket, New Delhi 110017, INDIA From rishab at dxm.ernet.in Fri Feb 3 09:56:58 1995 From: rishab at dxm.ernet.in (rishab at dxm.ernet.in) Date: Fri, 3 Feb 95 09:56:58 PST Subject: Compromising the first remailer Message-ID: Nathan Zook wrote: > >notion of not assigning trust is simply nonsense. When you send a piece > >of mail to a remailer, encrypted or not, you are assigning complete > >trust in that remailer to keep you anonymous and not to forward your > >mail to the NSA immediately. > > NOT TRUE. With proper use of encryption, you are trusting your first > remailer only to not reveal that you sent a message, and not to correlate > that message to the one it sends out. With rational use of garbage running > two deep, you can even suffer this loss without significant harm. Actually any remailer, with NSA-modified operating software, can correlate the message it receives to the one it sends out, by keeping track of the message past any decryption until it's posted out. With rational use of garbage and chaining, all you do is stop the NSA from knowing your final destination from the first remailer, but they _would_ know the identity of the second remailer (assuming the first is compromised) and could try to attack the second, ad nauseum. Of course this was always known to be the problem, to which chaining and traffic analysis evasion are partial solutions. ----------------------------------------------------------------------------- For Electric Dreams subscriptions and back issues, send a mail to rishab at arbornet.org with 'get help' as the message Subject. Rishab Aiyer Ghosh rishab at dxm.ernet.in rishab at arbornet.org Vox +91 11 6853410 Voxmail 3760335 H 34C Saket, New Delhi 110017, INDIA From turcotte at io.com Fri Feb 3 10:02:45 1995 From: turcotte at io.com (Brett Turcotte) Date: Fri, 3 Feb 95 10:02:45 PST Subject: 1995-02-02 President Names Members to Intelligence Commissi Message-ID: <199502031802.MAA20515@pentagon.io.com> > > Attachment: > Biographic Information > > > > > > THE COMMISSION ON THE ROLES AND CAPABILITIES > OF THE UNITED STATES INTELLIGENCE COMMUNITY > Anyone else notice all of the inside the beltway plus NYC area types on this list....anyone want to bet on how much "newly required" intelligence capabilities will come out of this commission... Brett Turcotte turcotte at io.com From bdolan at use.usit.net Fri Feb 3 10:24:21 1995 From: bdolan at use.usit.net (Brad Dolan) Date: Fri, 3 Feb 95 10:24:21 PST Subject: THROUGH THE LOOKING GLASS In-Reply-To: <199502031709.JAA20821@netcom20.netcom.com> Message-ID: There really is a CP thread here. After you've had one of these experiences, you will not trust authority any more. I can't wait for the "good faith" exeception to the 4th amendment to hit the streets. bd On Fri, 3 Feb 1995, Paul E. Baclace wrote: > Recently a relative of mine was battered/assulted in a park. The > perp, after a personal item broke, called a friend at the police on > his cel phone and an officer charged my relative for assault! The > perp is also trying to sue for damages. The relative is nearly at > retirement age and the perp had 3 large attack dogs at the time. > This is a bad cop with a vindictive mentality and the court so far > believes the cop. (My relative should be suing for psychological damages > after weeks of nightmares about being attacked and then betrayed > by the police and fear of retribution for pursuing justice. This > is a very expensive process in money, time and emotions.) > > A personal recording of what happened would make a lot of difference. > > Paul E. Baclace > peb at netcom.com > From hfinney at shell.portal.com Fri Feb 3 10:33:32 1995 From: hfinney at shell.portal.com (Hal) Date: Fri, 3 Feb 95 10:33:32 PST Subject: to hfinney Message-ID: <199502031832.KAA10617@jobe.shell.portal.com> From: anonymous-remailer at shell.portal.com > mr finney , do you know if that perl prog of yours to add stuff to .pgp > files can be ported to messy dos ? > many thanx Perl does exist for ms-dos, and I think those scripts would probably work OK there. They don't do anything exotic, just some byte reads and writes. Maybe the random-number generation would need to be looked at; as I said, that is the one weak part. But probably they would work OK. Hal From sandfort at crl.com Fri Feb 3 10:46:48 1995 From: sandfort at crl.com (Sandy Sandfort) Date: Fri, 3 Feb 95 10:46:48 PST Subject: The FIREWALL CHIP. U're phone always offhook? In-Reply-To: <199502030441.UAA17143@ix2.ix.netcom.com> Message-ID: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SANDY SANDFORT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C'punks, On Thu, 2 Feb 1995, Dale Harrison wrote: > . . . > Actually, there is a germ of truth in this. On older phones (don't know if > this works on newer electronic phones) when the handset is 'on-hook' a > switch opens and breaks the voice circuit. This of course only works for > DC circuits. If you drive that same circuit with an AC signal . . . There's another angle I may have mentioned before. Many electronic phones come with a ``feature'' that allows you to call home, produce an electronic tone and eavesdrop on your own house. When the tone is sounded, the ringing stops (or never starts) and the phone goes into ``off hook'' mode (i.e., the microphone in the mouthpiece is turned on). Even if you did not buy this feature when you bought your phone, it is still there, just waiting for that electronic tone. You can't produce it, because you didn't buy the doohickey, but anyone with such a doohickey can call your house and listen in. . . S a n d y ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From tedwards at wam.umd.edu Fri Feb 3 11:17:35 1995 From: tedwards at wam.umd.edu (Technoshaman Tom) Date: Fri, 3 Feb 95 11:17:35 PST Subject: Mugshot Identification Database announcement Message-ID: Heard elsewhere... National Institute of Standards and Technology announces the release of NIST Special Database 18 Mugshot Identification Database (MID) NIST Special Database 18 is being distributed for use in development and testing of automated mugshot identification systems. The database consists of three CD-ROMs, containing a total of 3248 images of variable size, compressed with lossless compression. Each CD-ROM requires approximately 530 megabytes of storage compressed and 1.2 gigabytes uncompressed (2.2 : 1 average compression ratio). There are images of 1573 individuals (cases), 1495 male and 78 female. The database contains both front and side (profile) views when available. Separating front views and profiles, there are 131 cases with two or more front views and 1418 with only one front view. Profiles have 89 cases with two or more profiles and 1268 with only one profile. Cases with both fronts and profiles have 89 cases with two or more of both fronts and profiles, 27 with two or more fronts and one profile, and 1217 with only one front and one profile. Decompression software, which was written in C on a SUN workstation [1], is included with the database. NIST Special Database 18 has the following features: + 3248 segmented 8-bit gray scale mugshot images (varying sizes) of 1573 individuals + 1333 cases with both front and profile views (see statistics above) + 131 cases with two or more front views and 89 cases with two or more profiles + images scanned at 19.7 pixels per mm + image format documentation and example software is included Suitable for automated mugshot identification research, the database can be used for: + algorithm development + system training and testing The system requirements are a CD-ROM drive with software to read ISO-9660 format and the ability to compile the C source code written on a SUN workstation [1]. Cost of the database: $750.00. For ordering information contact: Standard Reference Data National Institute of Standards and Technology Building 221, Room A323 Gaithersburg, MD 20899 Voice: (301) 975-2208 FAX: (301) 926-0416 email: srdata at enh.nist.gov All other questions contact: Craig Watson craig at magi.ncsl.nist.gov (301)975-4402 [1] The SUN workstation is identified in order to adequately specify or describe the subject matter of this announcement. In no case does such identification imply recommendation or endorsement by the National Institute of Standards and Technology, nor does it imply that the equipment is necessarily the best available for the purpose. From anonymous-remailer at shell.portal.com Fri Feb 3 11:42:27 1995 From: anonymous-remailer at shell.portal.com (anonymous-remailer at shell.portal.com) Date: Fri, 3 Feb 95 11:42:27 PST Subject: re to hfinney Message-ID: <199502031941.LAA18023@jobe.shell.portal.com> hal sez: : Perl does exist for ms-dos, and I think those scripts would probably work : OK there. They don't do anything exotic, just some byte reads and : writes. Maybe the random-number generation would need to be looked at; : as I said, that is the one weak part. But probably they would work OK. kool . could you please repost the scripts , i seem to have misplaced them. also , where can i get perl for dos , any idea ? tia . From jrochkin at cs.oberlin.edu Fri Feb 3 11:42:44 1995 From: jrochkin at cs.oberlin.edu (Jonathan Rochkind) Date: Fri, 3 Feb 95 11:42:44 PST Subject: Compromising the first remailer Message-ID: At 6:11 PM 02/03/95, rishab at dxm.ernet.in wrote: >Actually any remailer, with NSA-modified operating software, can correlate the >message it receives to the one it sends out, by keeping track of the message >past any decryption until it's posted out. With rational use of garbage and >chaining, all you do is stop the NSA from knowing your final destination from >the first remailer, but they _would_ know the identity of the second remailer >(assuming the first is compromised) and could try to attack the second, ad >nauseum. Of course this was always known to be the problem, to which chaining >and traffic analysis evasion are partial solutions. Yes, but as long as _one_ remailer in your chain is not compromised by the NSA, and if that one remailer has high enough traffic going through it and does the proper things with reordering and latency and such (a big "if", currently), you're still safe. That turns out to be the whole purpose of chaining, since it has been shown that it doesn't neccesarily make traffic analysis any harder. The purpose is to hope that at least one link on your chain is both honest and properly working. Yeah, if all the links on your chain are NSA-sponsored, your in trouble. Nothing that can be done about that. From eric at remailer.net Fri Feb 3 11:52:36 1995 From: eric at remailer.net (Eric Hughes) Date: Fri, 3 Feb 95 11:52:36 PST Subject: Remailer encryption module In-Reply-To: <9502030123.AA02022@josquin.media.mit.edu> Message-ID: <199502031942.LAA15031@largo.remailer.net> From: Derek Atkins > I agree. PGP just does not have the support for the encryption > required for mixing remailers. How is PGP deficient? What do you need PGP to do in order to get it to work right with remailers? Note that I said mixing remailers, not just regular remailers. -- No support for random padding to a fixed length. Yes, this can be patched by script. Hell, you could rewrite PGP with a script, so the existence of a workaround is no defense. -- Message size blowup for encrypted armor-within-armor. Yes, I know it compresses, but it would be a better thing to get PGP to unpack a PGP encrypted message (the message to the next hop) to multipart form, part regular text, part armored. -- Inability to restrict PGP from accepting a non-encrypted message. PGP run on an armored plaintext file will work just as if it were encrypted. This precludes being able to require encryption as a site policy. (Again this can probably be worked around; again, not an excuse.) In addition, there's a few really bad misfeatures for pseudonymity (which is what everyone seems to want to do with remailers): -- Identities for secret keys are in cleartext in the secret key ring. Upon seizure of a secret key ring, presence of a pseudonym name can be considered a presumption of possession of a corresponding secret key, simply because people don't fill up their secret key rings with bogus keys with other people's names. -- Key ID of the recipient is always in the clear. -- The RSA-encrypted session key does not have a flat representation over its multiword container. This yields a statistical traffic analysis hole. (This point is irrelevant without fixing 4.) Hal and I completely solved this problem last year. This is all I can think of off the top of my head. Not having analyzed the problem recently, I can't say that I've got everything. Eric From jya at pipeline.com Fri Feb 3 13:12:51 1995 From: jya at pipeline.com (John Young) Date: Fri, 3 Feb 95 13:12:51 PST Subject: NYT on Jihad Message-ID: <199502032112.QAA08358@pipe4.pipeline.com> The New York Times February 3, 1995, p. A19 [Column] On My Mind A. M. Rosenthal Jihad in America The Clinton Administration has come to two major conclusions about terrorism in America, and from America. The first is that the United States is becoming a national safe haven for terrorists from the Middle East: a combination bank, fund-raiser, militarist training ground, recruitment center, political academy and embarkation dock. Second conclusion: Do something. So one recent night, instructions from Washington went out to banks nationwide to freeze the funds of the various Hamas Hezbollah and Islamic Jihad units, and their clones, operating from the East Coast to Texas and California. Mr. Clinton did that by Presidential order. Now the Administration is asking Congress to pass new anti-terrorist legislation. It would enable the Government to trace funds to and from the terrorist-supporting groups, tighten the definition of terrorism, enlarge the powers of Federal attorneys to deal with it and make it illegal to plan or train for terrorism abroad as well as in the U.S. The draft legislation is called the Omnibus Counterterrorism Act of 1995. It was drawn up by the Department of Justice on Presidential order and will be introduced in Congress in a matter of days. For Americans who have been warning about terrorism operating in and out of America, the time to relax has hardly arrived. We will see how effective it is in ending the contribution to terrorism of American laws and American inattention. But the fact is that the Clinton Administration has begun to pay more attention to the growth of terrorist organizations here than its predecessors have. And in parts of the government intelligence machinery, the assessment of the danger of terrorism originating in America is strong enough to surprise even anti-terrorism alarm ringers like myself. In large part, the awakening can be credited to the terrorists themselves. Even for America, blowing up the World Trade Center was a little thick. But the next time you get all worked up about the dastardly press, do remember that in the matter of terrorism, as so many others, it was an American journalist whose skill, determination and risk-taking (physical and professional) helped shake government awake. On Nov. 21, 1994, PBS presented "Jihad in America." The documentary laid it all out on film -- the meetings in American cities where the cry of holy war went up against America, Christians, Jews and Muslims who would not surrender to fundamentalism; the training; the visits to American units by Middle Eastern leaders of Hamas and Islamic Jihad, and the fund-raising structure that supported terrorism. The executive producer was Steven Emerson, an investigator of terrorism who has turned out a strong body of work in film, books and print journalism. Among government officials I talked to, credit for Mr. Emerson was not only acknowledged but volunteered. Democracy often has a tough time defending itself because it has to operate step by step, inch by inch, under the law. Yes, of course, that is democracy's blessing and strength. But nothing says a democracy has to watch the bombers come racing in their trucks and pretend they are bicyclists out for a ride in the park. Laurie Mylroie, the U.S. expert on Iraq who wrote a fine best seller on Saddam Hussein with Judith Miller, has written another book, focusing on the question of an Iraqi role in the bombing. It deserves to be published wide and soon. The Emerson documentary brought protests from American Muslim groups. So will the new legislation. Immediately, non-Muslims nod sypathetically and think, well, it's understandable Muslims will be upset. I almost did myself. But why? Christians are not expected to complain about denunciation of Christian Fascists. Jews around the world led the protests of the massacre at the mosque in Hebron and Jews generally did not protest the President's freezing of funds of two extremist Jewish groups. The assumption that all Muslims must be angry at action against Muslim terrorists strengthens the killers. It demeans the intelligence of all Muslims. And, as for the hundreds of thousands of Muslim victims who died under Muslim state tyranny or Muslim state-supported terrorism, it spits on their graves. END From turner at telecheck.com Fri Feb 3 13:42:54 1995 From: turner at telecheck.com (Joe Turner) Date: Fri, 3 Feb 95 13:42:54 PST Subject: re to hfinney In-Reply-To: <199502031941.LAA18023@jobe.shell.portal.com> Message-ID: <9502032142.AA17527@TeleCheck.com> > > hal sez: > > : Perl does exist for ms-dos, and I think those scripts would probably work > : OK there. They don't do anything exotic, just some byte reads and > : writes. Maybe the random-number generation would need to be looked at; > : as I said, that is the one weak part. But probably they would work OK. > > kool . could you please repost the scripts , i seem to have misplaced them. > also , where can i get perl for dos , any idea ? tia . > > PERL can be obtained via anon FTP: ftp.uu.net 137.39.1.9 archive.cis.ohio-state.edu 128.146.8.52 jpl-devvax.jpl.nasa.gov 128.149.1.43 Get the source code and start compiling... :> -- Joe N. Turner Telecheck International turner at telecheck.com 5251 Westheimer, PO BOX 4659, Houston, TX 77210-4659 compu$erv: 73301,1654 (800) 888-4922 * (713) 439-6597 Finger for PGP KEY. MicroSoft SNA Server SUCKS.. buy it at your own risk. From chen at intuit.com Fri Feb 3 13:58:56 1995 From: chen at intuit.com (Mark Chen) Date: Fri, 3 Feb 95 13:58:56 PST Subject: Lucky primes & omlets on my face... In-Reply-To: <199502020213.SAA17094@jobe.shell.portal.com> Message-ID: <9502032157.AA04050@doom.intuit.com> > > Recall: x^p = x mod p therefore, x^(p-1) = 1 mod p. So what we need is: > > (x^e)^d = x^ed = x^(p-1)*i+1 = x mod p. > > This would only be true for prime p, but with RSA we are dealing with > composite moduli. What we want is ed=1 mod phi(n), where > phi(n)=(p-1)(q-1). (Actually you want to use (p-1)(q-1)/gcd((p-1),(q-1)). > I forget what that is called.) "Least common multiple," or LAMBDA(n). -- Mark Chen chen at intuit.com 415/329-6913 finger for PGP public key D4 99 54 2A 98 B1 48 0C CF 95 A5 B0 6E E0 1E 1D From rrothenb at ic.sunysb.edu Fri Feb 3 14:00:10 1995 From: rrothenb at ic.sunysb.edu (Robert Rothenburg Walking-Owl) Date: Fri, 3 Feb 95 14:00:10 PST Subject: The FIREWALL CHIP. U're phone always offhook? In-Reply-To: Message-ID: <199502032159.QAA12943@libws4.ic.sunysb.edu> >From a couple of folx.... > > Actually, there is a germ of truth in this. On older phones (don't know if > > this works on newer electronic phones) when the handset is 'on-hook' a > > switch opens and breaks the voice circuit. This of course only works for > > DC circuits. If you drive that same circuit with an AC signal . . . > > There's another angle I may have mentioned before. Many > electronic phones come with a ``feature'' that allows you to > call home, produce an electronic tone and eavesdrop on your own > house. When the tone is sounded, the ringing stops (or never > starts) and the phone goes into ``off hook'' mode (i.e., the > microphone in the mouthpiece is turned on). > [ Snip! ] A simpler solution is to keep the phone in another room used mainly for phonecalls, or even in a small office if you don't make an sounds there worth evesdropping on. (The really paranoid can soundproof/tempest-proof the room....) From greg at ideath.goldenbear.com Fri Feb 3 14:29:55 1995 From: greg at ideath.goldenbear.com (Greg Broiles) Date: Fri, 3 Feb 95 14:29:55 PST Subject: Remailer Unreliability Message-ID: <199502032132.AA09239@ideath.goldenbear.com> -----BEGIN PGP SIGNED MESSAGE----- >> Well, *I* think it is a good idea. But how does remailer1 know that >>remailer2 is both a remailer and down? > >By attempting a connection to the SMTP port and using the alternate if >it fails? This depends on a significant change in remailer features - existing remailers don't do message delivery, they pass remailed messages off to the local MTA (e.g, sendmail, Smail, whatever) and let it take care of delivery. Expecting remailers to handle queueing and delivery adds lots of code and complexity. (It also may piss off sysadmins who aren't remailer operators. Bogus or not, some institutions frown on attempting mail delivery manually or with non-standard programs.) Also, it's difficult to say when delivery has failed. Not every failure (where failure = not delivered in a reasonable time) results in a bounce message; if the sending remailer can't determine success or failure immediately, it will have to keep a database of the last few (hundred, probably) primary/alternate address pairs, and then extract the failed message from the bounce message, then reprocess with the alternate address. Yuck. I think the easiest way to do this would be for remailers to have a list of "unavailable remailers", and to process the primary/alternate choice immediately upon receipt/resending - but if we have a good way to provide the remailers with availability information, we've probably found a good way to provide it to users, too. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLzKgyH3YhjZY3fMNAQHlkwP7Bj5D5PbC1H+x3XXqP3gdUTTL6eLMjt2d 6cmj/kr0nv88XwXkIttj7r4wSDRXSe8K4mpU4utNQ1l+RlArDzZLkiY/qleuRhGX yRplXo6eoNwSv24oBCIVwdu7r+gnlhVs4sU3tzkWD+deOQxVXffdPL0opZ1Cn8v6 qRmKmuOYFB8= =i/8j -----END PGP SIGNATURE----- From eric at remailer.net Fri Feb 3 15:14:54 1995 From: eric at remailer.net (Eric Hughes) Date: Fri, 3 Feb 95 15:14:54 PST Subject: MX'ing and jpunix.com In-Reply-To: <199502022127.PAA14199@jpunix.com> Message-ID: <199502032312.PAA15531@largo.remailer.net> From: "John A. Perry" Additional masking can be provided by having the MX record point to myriad.pc.cc.cmu.edu. What good does this do? I have an agreement with myriad.pc.cc.cmu.edu (Matt Ghio) where myriad will take the MX-pointed record and additionally alias it through the smail daemon on myriad. This is the beginning of private name service. The machines behind this MX record are not particularly visible to the outside. Given the existence of such machine, it makes sense to consider giving them names which are also not too visible from the outside. A group of remailer operators who had access to the DNS setups on their machines could create their own personal top-level domain. For sake of discussion, let's call it ".cp". Now random Unix boxes on the Internet won't be able to gain access to .cp addresses, but the remailer club would. Outside parties would be able to be shown .cp addresses but would not be able to resolve where the machines actually were on the Internet, much less find them IRL. (Access control on who can pull .cp records will have to be added the the DNS software in order to do this.) Consider this in the light of Matt Ghio's MX service. Matt MX's for the alias.net addresses. Inside alias.net, the individual remailers could use .cp addresses to talk to each other. In fact, those who want zero contact with the outside world could advertise only .cp addresses and mail only to other .cp addresses. For sake of experimentation, I've set up a primary top-level nameserver here on my machine for ".cp". In order to access it, you'll need to act as a secondary name server for the domain. Hacking alternate roots into BIND comes later. Just add the following line to your named.boot file: secondary cp 204.94.187.1 db-secondary.cp If you do this, you'll be able to ask for a second-level domain. If you want a .cp domain, send mail to hostmaster at ndip.cp Tell the kind hostmaster what name you want, what you want it for, where you name servers are, etc. This is an experimental service and is not guaranteed to be reliable. It might also serve as a test bed for doing cryptographic name service trials. Eric From wcs at anchor.ho.att.com Fri Feb 3 15:16:13 1995 From: wcs at anchor.ho.att.com (wcs at anchor.ho.att.com) Date: Fri, 3 Feb 95 15:16:13 PST Subject: VoicePGP cracked in 10 minutes?... Message-ID: <9502032249.AA04577@anchor.ho.att.com> > > I heard a rumor hear in Ctl. Tx. that the VoicePGP project was cracked in the > > last couple of days in approx. 10 minutes. Anyone have any info on this other > > than one of those wild rumors that occur? > > Considering that VoicePGP hasn't even been released, this is > fascinating news. Perhaps the same team could work next on cracking > things that haven't even been invented yet. Cracking VoicePGP is easy, since it's still a bones version without the encryption installed yet - anybody who can figure out where to get the software should be able to do it. Might take more than 10 minutes to do that :-) However, the rumor mostly sounded like a pro-active version of the "NSA cracked PGP" version of the FBI Modem Tax on Religious Broadcasting put out by Madeline Murray O'Shergold. From wcs at anchor.ho.att.com Fri Feb 3 15:24:04 1995 From: wcs at anchor.ho.att.com (wcs at anchor.ho.att.com) Date: Fri, 3 Feb 95 15:24:04 PST Subject: Is the remailer crisis over? Message-ID: <9502032313.AA04793@anchor.ho.att.com> > Well folks as of 11:30 on 1-30-94 there are 14 remailers with uptimes > greater than 99%. What's the consensus...Is the remailer crisis over? The "remailers are broken" crisis may be over, but until there are a lot of remailers in service, and 14 isn't a lot, with a lot of traffic on them, remailers won't be a very effective security tool. If the Bad Guys wanted to watch all 14 remailers, it'd probably not be hard to figure out which messages came from which senders, just because there aren't enough for real tracking. If the Bad Guys decided to confiscate 14 remailers, they could do it. If your machine got busted or sued for sending an anonymous message somebody didn't like, and you contended that you're a remailer and there was no way to prove it originated on your machine, "they" could respond that you're not one of the 14 well-known remailers and if you were "they" would have been watching you because they watch every machine that talks to the well-known remailers, and you're not one of them. As the folks in the nuclear-war planning business say, fewer than 100 of anything isn't reliable. Bill From rchcnslt at epix.net Fri Feb 3 16:11:52 1995 From: rchcnslt at epix.net (rchcnslt at epix.net) Date: Fri, 3 Feb 95 16:11:52 PST Subject: AIR Mosaic Feedback Mail Message-ID: <199502040009.AA26622@relay.interserv.com> Mail sent from AIR Mosaic (16-bit) version 3.07.04.02 howdy.. Cyperpuk, life and all that.. Lemme in on the cool poop! Rick R. From hfinney at shell.portal.com Fri Feb 3 18:45:45 1995 From: hfinney at shell.portal.com (Hal) Date: Fri, 3 Feb 95 18:45:45 PST Subject: re to hfinney Message-ID: <199502040245.SAA05320@jobe.shell.portal.com> From: anonymous-remailer at shell.portal.com > kool . could you please repost the scripts , i seem to have misplaced them. > also , where can i get perl for dos , any idea ? tia . Rather than re-post them, I put a copy of my message up for ftp at the cypherpunks ftp site. From wcs at anchor.ho.att.com Fri Feb 3 19:58:31 1995 From: wcs at anchor.ho.att.com (wcs at anchor.ho.att.com) Date: Fri, 3 Feb 95 19:58:31 PST Subject: commercial authecation Message-ID: <9502032329.AA04966@anchor.ho.att.com> Keith Henson asked how to find the digital-time-stamp folks, Surety Technologies Inc., started by Stuart Haber and Scott Stornetta as a spinoff of Bellcore. They're now actively in business - there was an article in one of the trade rags that you can get their signature kit for PCs for something like $50 with tokens for 50 notarizations. Details on their web page. email: info at surety.com www: http://surety.com - with lots of little graphic icons :-( ftp: surety.com Bill From werewolf at io.org Fri Feb 3 21:09:35 1995 From: werewolf at io.org (Mark Terka) Date: Fri, 3 Feb 95 21:09:35 PST Subject: Wired Institutes PGP Usage For Subscriptions.... Message-ID: <8ajClOwscU-H077yn@io.org> Got this message in my mailbox a week after I posted the query of magazine subscriptions via encrypted cc #'s. I'll check it out tonight, as I want to order a subscription for a friend. =========================================================================== From weidai at eskimo.com Fri Feb 3 21:59:13 1995 From: weidai at eskimo.com (Wei Dai) Date: Fri, 3 Feb 95 21:59:13 PST Subject: commercial authecation Message-ID: <199502040558.AA15052@mail.eskimo.com> -----BEGIN PGP SIGNED MESSAGE----- > Keith Henson asked how to find the digital-time-stamp folks, > Surety Technologies Inc., started by Stuart Haber and Scott Stornetta > as a spinoff of Bellcore. > > They're now actively in business - there was an article in one of the > trade rags that you can get their signature kit for PCs for > something like $50 with tokens for 50 notarizations. > Details on their web page. This technology is very clever and bound to be extremely important. But does anyone else think that the price is a little high? I mean the marginal cost can't be more than a few seconds of CPU time for each time stamp... This price tag will temporarily put the time stamp technology out of ubiquitous use, where every piece of e-mail, homework paper, Usenet post, etc., is automaticly time stamped in a cryptographically secure way so that authorship can be asserted and proved. I think the need for proof of authorship is going to become increasingly important in an increasingly online world, where copying is so effortless, and reputations are based on digital identities. Wei Dai -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLzMXKDl0sXKgdnV5AQFA+gP/XcrjAncBMVqocpXYfAaBR7RJ2PDR4ZF/ TEgCPcPM7we4eoR5w++7V+jsBhtNRSng5OUCeKQWSCU8BDnkUXuQNpQ8+fNKciMS RQWn1PBx4carczVOJoNyR1U8Rxu9tIH0Drh/NIZJ4324azpMOd8ysVFkJ4QODCPu 07Bf7pZ36c0= =tAcu -----END PGP SIGNATURE----- E-mail: Wei Dai URL: "http://www.eskimo.com/~weidai" =================== Exponential Increase of Complexity =================== --> singularity --> atoms --> macromolecules --> biological evolution --> central nervous systems --> symbolic communication --> homo sapiens --> digital computers --> internetworking --> close-coupled automation --> broadband brain-to-net connections --> artificial intelligence --> distributed consciousness --> group minds --> ? ? ? From tjb at acpub.duke.edu Fri Feb 3 22:11:13 1995 From: tjb at acpub.duke.edu (Tom Bryce) Date: Fri, 3 Feb 95 22:11:13 PST Subject: IMPORTANT: BUG IN 68K IDEA ASSEMBLER DISTRIBUTED IN SECURE EDIT Message-ID: -----BEGIN PGP SIGNED MESSAGE----- IMPORTANT NOTE: If you are going to use the IDEA 68k assembler distributed with Secure Edit b0.5, please take note of the following bug: You have to change @Mulzero3: neg.w d7 <--- addq.w #1,d5 sub.w -2(a1),d5 bra.s @Muldone3 to: @Mulzero3: neg.w d5 <--- addq.w #1,d5 sub.w -2(a1),d5 bra.s @Muldone3 I have not yet received any reports of data being fouled up by this, and before tonight personally had encrypted and decrypted megabytes without error, but note that I HAVE FOUND EXAMPLES OF IT FOULING UP A BLOCK OF DATA. IT IS DANGEROUS TO USE THIS CODE IN ITS PRESENT FORM. Please make note of this if you are going to use this 68k code. Currently, I do not believe this code is being used anywhere except Secure Edit b0.5, although it was certainly about to be used. I will immediately upload a corrected version of Secure Edit and source. Sorry about the screw up. Tom -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLzMbp1uwJA7oL8O9AQGk0wP/YF8VQ2jDtW63Wb7fteImBvYCfMi7NnTf tXMBV6U5iIKf+iBoED34gnwJyLAdEplpMa6P1yJUIMjNXly1/I+SzQoMFGVXuuKV m0h+idXI1mXTVG+gnmdpGMw9/6/u72DcaYCZRHveL8tuMesO5UdgQEDjvy+zX7+c 0cAvyXQaArg= =ubXB -----END PGP SIGNATURE----- From tjb at acpub.duke.edu Sat Feb 4 00:01:00 1995 From: tjb at acpub.duke.edu (Tom Bryce) Date: Sat, 4 Feb 95 00:01:00 PST Subject: FIXED SEC. EDIT, SEC. EDIT SOURCE, UPGRADE PATCH Message-ID: -----BEGIN PGP SIGNED MESSAGE----- I have uploaded a fixed version of both secure edit and source code to ripem.msu.edu in the directory pub/crypt/mac. I have also uploaded a 35k patch that will update your b0.5 to b0.6. There are also some other minor bugfixes rolled into this b0.6 update. Again, sincere apologies for the bug (it was my fault), and I earnestly hope no data was compromised by it. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLzMx/1uwJA7oL8O9AQHHegP9FPCkO2fVO54Vm3kDTsJH+1SW5Iui3wTS F4BvZ0CSzJTw8K15oYOVnVbYcqofoOe5DvmR4ex1kK7zPObicfwLeIQbcvnRbBuI 0xpk+ymOMgOzjd9ySusXNuTCuwomQHXD4jTuyEsU+QrT6FEkmUJjA+TtctAZu7JX nbZGDtOD/18= =xKnR -----END PGP SIGNATURE----- From nowhere at bsu-cs.bsu.edu Sat Feb 4 02:22:46 1995 From: nowhere at bsu-cs.bsu.edu (Anonymous) Date: Sat, 4 Feb 95 02:22:46 PST Subject: Message-ID: <199502041019.FAA17058@bb.hks.net> -----BEGIN PGP SIGNED MESSAGE----- I wonder if 'Net-cash' is any good? Try sending e-mail to netbank-info at agents.com with the words netbank-intro on the first line of body. It says: The NetBank ...is based on "payment coupons" that may be traded via electronic mail ... NetCash is easily obtained by using the NetBank's "Check Cashing by FAX" service. Customers may purchase NetCash by writing a personal check and faxing it to the NetCash Distribution Center. Travelers on the Infobahn may carry NetCash and cash checks while online. and lots more. Does not look too anymous, however, and there is no mention of PGP in the documents I got. But do check it out. When you get the info, they give you 5 cents worth of NetCash, BTW. They also have other stuff: For information on related topics, please send e-mail to "netbank-info at agents.com" with the following keyword(s) in the message: Keyword Topic netbank-faq Answers to frequently asked questions buying-netcash How to buy NetCash from the NetBank netbank-merchant Opening a NetBank Merchant account shareware-info Using the NetBank to collect shareware fees boardwatch-story Reprint of NetCash story from Boardwatch Magazine story-update Enhancements since the Boardwatch story was published - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBLzNURyoZzwIn1bdtAQFwJwF+KeI9ErF2N04Y1+XwX4B6teBDlIudSuip uNhn0k80uoru/vIWb//WMiMCBFHT+Bww =39YD -----END PGP SIGNATURE----- From rrothenb at ic.sunysb.edu Sat Feb 4 03:01:39 1995 From: rrothenb at ic.sunysb.edu (Robert Rothenburg Walking-Owl) Date: Sat, 4 Feb 95 03:01:39 PST Subject: Wired Institutes PGP Usage For Subscriptions.... In-Reply-To: <8ajClOwscU-H077yn@io.org> Message-ID: <199502041101.GAA29832@libws4.ic.sunysb.edu> > > Got this message in my mailbox a week after I posted the query of magazine > subscriptions via encrypted cc #'s. I'll check it out tonight, as I want to > order a subscription for a friend. [ clip ] > In article , werewolf at io.org (Mark Terka) wrote: > > > .....if it is sooooooo hooked in the online culture have a PGP public key > > that 'net users could use to send in their credit card numbers for > > subscriptions? > > > Here it is. We're just implementing it. Send us a message (send to > talk2subs at wired.com) [ clip ] Neato. I'm tempted to send 'em a message saying "Where's the crime?!"... From habs at panix.com Sat Feb 4 05:59:04 1995 From: habs at panix.com (Harry S. Hawk) Date: Sat, 4 Feb 95 05:59:04 PST Subject: Forward: Teleco/Cabe REg. & Free speech Message-ID: <199502041358.AA09885@panix.com> TELECOM REFORM, REPUBLICAN-STYLE Sen. Larry Pressler (R-SD) has proposed a telecommunications reform plan that would drop all cable TV rate regulations; allow local phone and cable competition and cross-ownership in one year; ease foreign ownership restrictions; and allow local phone companies to compete in long distance in three years. A formal counter proposal is expected from the Democrats February 14, and it's expected that there will be objections to most of the provisions outlined in Pressler's bill. (Investor's Business Daily 2/2/95 A4) (((cut here))) For those that don't know I have my Master's in Interactive Telecommunications, and have long looked at cable and teleco from several angles including freemarket and cypherpunk viewpoints. While there is a lack of detail here, I strongly endorse anything that lets cable and phone companies compete. They have largely the same customer base (although telco's have a larger % of the base), but the cable companies are in a better opportunity to over PCS, higher-bandwidth networking, and video on demand. What we have to watch out for is FCC regulation. It is well excepted that the FCC can censor commercial speech (cig. ads), and individual speech (the 7 dirty words), in the "public" interest. Cable and Teleco are FCC regulated. If they provide the network of the future, as opposed to UUnet-Microsoft (for example), we might have to be careful.. The "model" of interactivity most "thinking" people endorse is one that is two way. The FCC does really monitor what you say on the phone (although who knows about the NSA ;)... If you can in the brave new Telco/Cable future send as well as receive.. and send in broadcast-like mode... are you subject to content approval from the FCC? We should strongly endorse this move by. Sen. Pressler as it will get us broadband to many homes in 5 to 7 years, but we have to remain concerned about our freedom to speak not matter if that is one on one, or to a large group! /hawk -- Harry S. Hawk habs at panix.com Product Marketing Manager PowerMail, Inc. Producers of MailWeir(tm) & PowerServ(tm) From mjwohler at netcom.com Sat Feb 4 06:26:35 1995 From: mjwohler at netcom.com (Marc Wohler) Date: Sat, 4 Feb 95 06:26:35 PST Subject: NYC CPUNKS MEET NEXT SAT Message-ID: <199502041425.GAA29475@netcom15.netcom.com> -----BEGIN PGP SIGNED MESSAGE----- Attn.: New York City area Cypherpunks NYC C'punks meeting: Sat Feb 11, 3:00 P.M., at the home of Linn & Barbara Stanton 315 West 106 Street Apt 2A (Between West End Ave & Riverside Drive) 212-316-1958. Once again the gracious Stanton's invite local area Cpunks to their lovely home which is smoke free and feline friendly. The agenda is still open and suggestions can be made to mjwohler at netcom.com or phone Marc Wohler @ 212-362-0690. Let me know if you plan to attend. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLy+PL2eikzgqLB7pAQGHigP9HW1Py30O2fcZH/f1SAOToOBZYVZMiB9c buGQrujaicGVJlvGb1Le/OjJ872JB69BQD1MMsemABSYi4swL15w9qj1rhoTAHIg yTRDFJD16g1lqqLvEJZ0RijOh1dXLaUg8HNue0JoSAbARkQed8I3+mklP4C4saYn qW2Fa/kDuZY= =Rl9C -----END PGP SIGNATURE----- From rah at shipwright.com Sat Feb 4 07:31:56 1995 From: rah at shipwright.com (Robert Hettinga) Date: Sat, 4 Feb 95 07:31:56 PST Subject: Message-ID: At 5:19 AM 2/4/95, Anonymous wrote: >I wonder if 'Net-cash' is any good? Probably the best discussion of the available transaction processing/settlement mechanisms is by Jason Solinsky. It's called "An Introduction to Electronic Commerce", and though he probably hasn't updated it since he wrote it a few months ago, he discusses NetCash there... http://nearnet.gnn.com/gnn/meta/finance/feat/sol.html Take a bow, Jason. Cheers, Bob Hettinga ----------------- Robert Hettinga (rah at shipwright.com) "There is no difference between someone Shipwright Development Corporation who eats too little and sees Heaven and 44 Farquhar Street someone who drinks too much and sees Boston, MA 02331 USA snakes." -- Bertrand Russell (617) 323-7923 From tjb at acpub.duke.edu Sat Feb 4 09:05:15 1995 From: tjb at acpub.duke.edu (Tom Bryce) Date: Sat, 4 Feb 95 09:05:15 PST Subject: signature validation on secure edit messages Message-ID: Jeez. I really don't know why the heck this always happens to me, my digsigs not validating. You can finger me at tjbryce at amherst.edu to retrieve a message with a valid signature. I always write the message in eudora, copy it, sign it in MacPGP as TEXT with attached signature, then go back and paste it over the old message. Then I go back to MacPGP and check the signature on the clipboard to be sure - no problems. But after getting mailed, it doesn't work. Damn. Tom From hfinney at shell.portal.com Sat Feb 4 10:11:09 1995 From: hfinney at shell.portal.com (Hal) Date: Sat, 4 Feb 95 10:11:09 PST Subject: There is another NetCash Message-ID: <199502041810.KAA20164@jobe.shell.portal.com> From: rah at shipwright.com (Robert Hettinga) > At 5:19 AM 2/4/95, Anonymous wrote: > >I wonder if 'Net-cash' is any good? > > Probably the best discussion of the available transaction > processing/settlement mechanisms is by Jason Solinsky. It's called "An > Introduction to Electronic Commerce", and though he probably hasn't updated > it since he wrote it a few months ago, he discusses NetCash there... People interested in NetCash should be aware of a potentially confusing name re-use. NetCash is also the name of a payment system designed by people associated with the Information Sciences Institute (affiliated, I think, with USC). A reference is: Despite the names, neither one is cash in the cryptographic sense: neither uses blinding. If you didn't want the bank to be able to create a database of every transaction you make, everything you spend and with whom, you would need to have some anonymous connection with the bank and exchange your netcash through that connection. This would be cumbersome IMO. Some payment system is probably better than none, but I hate to see the name "cash" expropriated by these non-cash systems. Hal From hfinney at shell.portal.com Sat Feb 4 10:17:03 1995 From: hfinney at shell.portal.com (Hal) Date: Sat, 4 Feb 95 10:17:03 PST Subject: PGP padding scripts (again) Message-ID: <199502041816.KAA20644@jobe.shell.portal.com> Sorry for the bandwidth waste, but my anonymous correspondent was not able to ftp these scripts. I also got another request for the scripts. So here again is my post with a pair of perl scripts which will insert padding pretty much undetectably into a .pgp file. The one limitation is the quality of Perl's random number generator. Here are a couple of perl scripts I wrote last year to add padding to PGP encrypted files. The usage would be: perl pgppadt.pl filename bytestoadd The output file is filename.pad. It only works on binary ".pgp" public-key encrypted files (not ascii armored files). So there would be some work needed to make it a really useful tool. It would also be better to use a strong source of random numbers. I think Carl Ellison recently posted some tools that could help with this. The two files are pgppad.pl, which does the work, and pgppadt.pl, a very simple test driver to show how to use it. They are in a shar archive. Hal ---------------cut here---------------- #!/bin/sh # to extract, remove the header and type "sh filename" if `test ! -s ./pgppad.pl` then echo "writing ./pgppad.pl" cat > ./pgppad.pl << '\End\Of\Shar\' # Perl module to allow padding and some other manipulation of PGP # files. # # Include this with the statement: # require 'pgppad.pl' # # 10/16/93 # Hal Finney # Read a PGP Cipher Type Byte and the following length. # One argument: file to read from # Returns several things, in this order: # CTB, with the length information removed, as a number. # Length of following packet. # Name of this kind of packet, made up, see list below. # Packed CTB/length packet, suitable for writing out. # Returns an empty string on error. sub read_ctb { local($file) = @_; local($ctb, $length, $name, $rctb, $rlength, $lengthlength); if (read ($file, $rctb, 1) != 1) { # Raw ctb return ""; } $ctb = unpack ("C", $rctb); if ($ctb < 128) { return ""; # Must have high bit set } $lengthlength = $ctb % 4; $ctb -= $lengthlength; if ($lengthlength == 0) { $lengthlength = 1; } elsif ($lengthlength == 1) { $lengthlength = 2; } elsif ($lengthlength == 2) { $lengthlength = 4; } else { $lengthlength = 0; $length = -1; # Unknown length } if (read ($file, $rlength, $lengthlength) != $lengthlength) { return ""; } if ($lengthlength==1) { $length = unpack("C", $rlength); } elsif ($lengthlength==2) { $length = unpack("n", $rlength); } elsif ($lengthlength==4) { $length = unpack("N", $rlength); } $rctb = pack ("C a".$lengthlength, $rctb, $rlength); # Packed data if ($ctb==0x84) { $name = "pubkey header"; } elsif ($ctb==0x88) { $name = "signature"; } elsif ($ctb==0x8c) { $name = "message digest"; } elsif ($ctb==0x94) { $name = "secret key"; } elsif ($ctb==0x98) { $name = "public key"; } elsif ($ctb==0xa0) { $name = "compressed"; } elsif ($ctb==0xa4) { $name = "conventional encrypted"; } elsif ($ctb==0xa8) { $name = "plaintext"; } elsif ($ctb==0xb0) { $name = "trust"; } elsif ($ctb==0xb4) { $name = "user id"; } elsif ($ctb==0xb8) { $name = "comment"; } else { return ""; } return ($ctb, $length, $name, $rctb); } # Write a CTB and length field out. # 3 arguments: file handle, ctb value, and length in bytes. # No return value. # Length gets output as 1, 2, or 4 bytes, the smallest in which it # will fit. # If length is negative we output no length field, but an "indefinite # length" code is added to ctb. sub write_ctb { local($file, $ctb, $length) = @_; local($rctb); $ctb = $ctb - ($ctb % 4); # Be sure 2 low bits are clear if ($length < 0) { $rctb = pack ("C", $ctb+3); # Packed data } elsif ($length > 65535) { $rctb = pack ("C N", $ctb+2, $length); # Packed data } elsif ($length > 255) { $rctb = pack ("C n", $ctb+1, $length); # Packed data } else { $rctb = pack ("C C", $ctb+0, $length); # Packed data } print $file $rctb; } # This entry point always outputs a 4-byte count. Length must be > 0. # Otherwise like write_ctb. sub write_ctb_4 { local($file, $ctb, $length) = @_; local($rctb); $ctb = $ctb - ($ctb % 4); # Be sure 2 low bits are clear if ($length < 0) { die ("write_ctb_4 called with negative length\n"); } $rctb = pack ("C N", $ctb+2, $length); # Packed data print $file $rctb; } # Pad a PGP public-key-encrypted file to the specified length. # Arguments: input file handle; output file handle; new size. # Returns negative value on error. See the code for what the # different values mean. # Returns 0 on success. sub pgppad { local($infile, $outfile, $size) = @_; local($ctb, $length, $name, $rctb, $insize, $buf); # Read ctb & length of pubkey header ($ctb, $len, $name, $rctb) = &read_ctb($infile); if ($ctb == 0) { return -1; # Error } if ($name ne "pubkey header") { return -2; # Error } if ($len < 0) { return -3; # Error } $insize = length($rctb) + $len; # Read packet of pubkey header if (read ($infile, $data, $len) != $len) { return -3; } # Write out pubkey header, unchanged &write_ctb($outfile, $ctb, $len); print $outfile $data; # Read ctb and length of conventional packet ($ctb, $len, $name, $rctb) = &read_ctb($infile); if ($ctb == 0) { return -4; # Error } if ($name ne "conventional encrypted") { return -5; # Error } # Calculate size of outgoing conventional packet. # Assume rctb won't change size; it may grow by 1 or 2 in some # rather rare cases, in which case we'll be a byte or two too big. $size -= $insize + length($rctb); if ($size < $len) { return -6; # Error } # Output CTB with new length &write_ctb_4($outfile, $ctb, $size); # Copy remainder of input file while (read ($infile, $buf, 32768)) { print $outfile $buf; } # Note that this random number generator is probably not # cryptographically strong. srand (time|$$); while ($len < $size) { print $outfile pack ("C", int(rand(256))); ++$len; } return 0; # Success } 1; # Non-zero return for 'require' \End\Of\Shar\ else echo "will not over write ./pgppad.pl" fi if `test ! -s ./pgppadt.pl` then echo "writing ./pgppadt.pl" cat > ./pgppadt.pl << '\End\Of\Shar\' # Test program for pgppad.pl, showing how to use it. require 'pgppad.pl'; open (IN, $ARGV[0]) || die ("Couldn't open $ARGV[0]\n"); open (OUT, ">$ARGV[0].pad") || die ("Couldn't create $ARGV[0].pad\n"); $padding = $ARGV[1]; @stat = stat(IN); $size = $stat[7]; print "Input file $ARGV[0] has size $size bytes\n"; print "Output file $ARGV[0].pad will have size ".$size+$padding." bytes\n"; if (($code = &pgppad (IN, OUT, $size+$padding)) < 0) { die ("pgppad returns code $code\n"); } close (IN); close (OUT); print ("Done\n"); \End\Of\Shar\ else echo "will not over write ./pgppadt.pl" fi echo "Finished archive 1 of 1" exit From skaplin at mirage.skypoint.com Sat Feb 4 11:06:20 1995 From: skaplin at mirage.skypoint.com (Samuel Kaplin) Date: Sat, 4 Feb 95 11:06:20 PST Subject: PGP padding scripts (again) In-Reply-To: <199502041816.KAA20644@jobe.shell.portal.com> Message-ID: On Sat, 4 Feb 1995, Hal wrote: > Sorry for the bandwidth waste, but my anonymous correspondent was not > able to ftp these scripts. I also got another request for the scripts. > So here again is my post with a pair of perl scripts which will insert > padding pretty much undetectably into a .pgp file. The one limitation is > the quality of Perl's random number generator. I've put em' up on my auto-responder. Send a message to: skaplin at c2.org With the subject: SEND FILE pad And you should get them within a couple of hours. Sam From roy at cybrspc.mn.org Sat Feb 4 11:19:53 1995 From: roy at cybrspc.mn.org (Roy M. Silvernail) Date: Sat, 4 Feb 95 11:19:53 PST Subject: re to hfinney In-Reply-To: <9502032142.AA17527@TeleCheck.com> Message-ID: <950204.123917.2m0.rusnews.w165w@cybrspc.mn.org> -----BEGIN PGP SIGNED MESSAGE----- In list.cypherpunks, turner at telecheck.com writes: >> also , where can i get perl for dos , any idea ? tia . > PERL can be obtained via anon FTP: > > ftp.uu.net 137.39.1.9 > archive.cis.ohio-state.edu 128.146.8.52 > jpl-devvax.jpl.nasa.gov 128.149.1.43 > > Get the source code and start compiling... :> Bring a lunch... you'll be at it a while. :) Perl is a non-trivial port to MS-DOS, but there are versions available. Look on your favorite SimTel mirror site: Directory SimTel/msdos/perl/ Filename Type Length Date Description ============================================== bperl3s1.zip B 505075 940412 32-bit Perl 4.0pl36 w/VM & Win supt. (src 1/3) bperl3s2.zip B 530821 940412 32-bit Perl 4.0pl36 w/VM & Win supt. (src 2/3) bperl3s3.zip B 522530 940412 32-bit Perl 4.0pl36 w/VM & Win supt. (src 3/3) bperl3x.zip B 482794 940412 32-bit Perl 4.0pl36 w/VM & Win 3.1 supt. (exe) perl4019.zip B 196446 920620 UNIX-based scripting lang. replaces sh/awk/sed perl419x.zip B 435591 920317 Len Reed's port of Unix Perl v4.19 ptch19.zip B 116444 920317 Len Reed's patch set to make perl 4.19 - -- Roy M. Silvernail [ ] roy at cybrspc.mn.org PGP public key available by mail echo /get /pub/pubkey.asc | mail file-request at cybrspc.mn.org These are, of course, my opinions (and my machines) -----BEGIN PGP SIGNATURE----- Version: 2.6.1 iQCVAwUBLzPKuhvikii9febJAQH0QQP+I+gjmjrx4AFmwq71cxneTvo9xCqmckCj nsZkNske/VQAmB3BJNgf/SgAahkHryq8xZ2aM0tWr8B0FLdObqxmUKYHfu801Jtm 6pCyhOSBKUffRfiI+dvFPbuhuCOGcl+poYH2lvdpxyL2ABs6+QNVXj+Q9AlrozzF kpJXL4BjIlk= =dM24 -----END PGP SIGNATURE----- From rah at shipwright.com Sat Feb 4 11:53:03 1995 From: rah at shipwright.com (Robert Hettinga) Date: Sat, 4 Feb 95 11:53:03 PST Subject: There is another NetCash Message-ID: At 10:09 AM 2/4/95, Hal wrote: >Some payment system is probably better than none, but I hate to see >the name "cash" expropriated by these non-cash systems. Indeed. That was the point of the URL to Mr. Solinsky's excellent introduction to the subject. It is easy to see that the original NetCash isn't a digital cash system, with its clearing of a single-use serial number transmitted unencrypted in the clear, and with its "bank" settling the transaction through the telco 900-number system. Not having looked yet, I bet the "other" NetCash is probably not Chaumian-equivalent digital cash either, or we'd have heard more about it. It would be a pretty major accomplishment, especially if it doesn't violate Chaum's patents. As Eric has said here recently, we have to remember the difference between transaction clearing (which First Virtual, for example, does well, at least as a prima facie system) and transaction settlement (which FV does on the back of the Visa/MC network), which is what a true cash-settlement system would do in one stroke. Someday, and not now, I would like to take up the cudgel and jumpstart the old offline/online cash debate. I like offline cash because it doesn't require a bank intervention at every transaction, double-spending cash and "inside-job" private key theft notwithstanding... Ah, well. Someday. Cheers, Bob Hettinga ----------------- Robert Hettinga (rah at shipwright.com) "There is no difference between someone Shipwright Development Corporation who eats too little and sees Heaven and 44 Farquhar Street someone who drinks too much and sees Boston, MA 02331 USA snakes." -- Bertrand Russell (617) 323-7923 From anonymous-remailer at shell.portal.com Sat Feb 4 14:12:44 1995 From: anonymous-remailer at shell.portal.com (anonymous-remailer at shell.portal.com) Date: Sat, 4 Feb 95 14:12:44 PST Subject: finney's perl scripts Message-ID: <199502042212.OAA09528@jobe.shell.portal.com> hal , gotta question regarding your perl scripts . i ran em thru sh and d/l'd em , and here are the results of my tests . first , i pgp'd a file in binary format , then ran " perl pgppadt.pl test.pgp 10 " . the error i got was " Couldn't create test.pgp.pad " . so i renamed the file to " test " and tried again with good results ! i got " Input file test has size 732 bytes 10 bytes pgppad returns code -3 " . then , iran " perl pgppad.pl test 10 " and after the bit about perl running under dos/4gw protected mode , i get dropped to my command prompt . i took a look at the file , and it's size wasn't any different , so i renamed the file to test.pgp and ran it again and got the same results . so i guess i'm wonderin' if it added the padding , or what might be the problem ? for your info , i'm using perl 4.0. From sdw at lig.net Sat Feb 4 14:31:31 1995 From: sdw at lig.net (Stephen D. Williams) Date: Sat, 4 Feb 95 14:31:31 PST Subject: How the cypherpunks nearly got me fired (long) In-Reply-To: <9502011435.AA26645@snark.imsi.com> Message-ID: > > > Michael Sattler says: > > At 22:10 1/31/95, David Mandl wrote: > > > > [really horrid story about true life at a corporate dinosaur deleted] ... > > I'm a consultant. However, I won't take on clients with sufficiently > distasteful business practices. This is something I consider to be > sufficiently distasteful. > > Perry Absolutely! Good net access and good business practices are becoming requirements for employment for many techies now. It might be worthwhile to start keeping a list, a la 'The Great Piss List' (whatever happened to it?), on business practices and net availability at various companies. Not to mention use and attitude toward privacy, encryption, etc. A name... How about "Cyber-Work-Space Report". I'll volunteer to start the list if people want to email me anything. I can put it on my (slow but permanent) web site also. Even if I don't have much time, which is probable, I can make the messages available. I can come up with details on at least 4. The only issue I can think of is being careful of not violating non-disclosures, but for the most part I don't think it'll be a problem. It's not much different from asking: "How's the cafeteria", or "is the phone system nice". I'll also strip identity if requested. You could always write a description and ask for an OK from your manager to tell friends because it would help them decide whether to work there. (Which is actually true.) Since this is only partially tied into to cypherpunks, feel free to cross- post and add attributes. Initial attribute list: Company: Type of job: (ie.: techies probably have more likelyhood of net access, etc.) Plans: (ie.: things promised or talked about seriously) Privacy of email: Routine scanning: Encourage/discourage encryption: Key management: (ie.: Any planning for the 'Mack truck' scenario) Net Access: (email/Netnews/telnet/ftp(in/out)/irc/aol/various/Web server(public/internal), Business only/Educational-curiosity/Full use (a true fringe)) Justification: (What was the argument used to get and/or maintain net access) Platforms and software typically used: Strategies used, good or bad, to limit 'addiction': sdw -- Stephen D. Williams 25Feb1965 VW,OH sdw at lig.net http://www.lig.net/sdw Senior Consultant 513-865-9599 FAX/LIG 513.496.5223 OH Page BA Aug94-Feb95 OO R&D AI:NN/ES crypto By Buggy: 2464 Rosina Dr., Miamisburg, OH 45342-6430 Firewall/WWW srvrs ICBM/GPS: 39 38 34N 84 17 12W home, 37 58 41N 122 01 48W wrk Pres.: Concinnous Consulting,Inc.;SDW Systems;Local Internet Gateway Co.28Jan95 From mikepb at freke.lerctr.org Sat Feb 4 15:42:16 1995 From: mikepb at freke.lerctr.org (Michael P. Brininstool) Date: Sat, 4 Feb 95 15:42:16 PST Subject: Forward: Teleco/Cabe REg. & Free speech In-Reply-To: <199502041358.AA09885@panix.com> Message-ID: <1995Feb4.153121.29573@freke.lerctr.org> In article <199502041358.AA09885 at panix.com> habs at panix.com (Harry S. Hawk) writes: >TELECOM REFORM, REPUBLICAN-STYLE Sen. Larry Pressler (R-SD) has >proposed a telecommunications reform plan that would drop all cable TV >rate regulations; allow local phone and cable competition and >cross-ownership in one year; ease foreign ownership restrictions; and >allow local phone companies to compete in long distance in three >years. A formal counter proposal is expected from the Democrats >February 14, and it's expected that there will be objections to most >of the provisions outlined in Pressler's bill. (Investor's Business >Daily 2/2/95 A4) > >(((cut here))) > >For those that don't know I have my Master's in Interactive >Telecommunications, and have long looked at cable and teleco from >several angles including freemarket and cypherpunk viewpoints. I have to agree. When I first moved to Austin Texas, the rates for cable were not too bad, we were in an area that had a choice between two cable companies. After a couple years, a third company, a wireless company came into town. I then moved to Plano Texas, outside of Dallas, and was absolutely SHOCKED at the cable prices. Of course, in Plano, there was ONE cable company, and all the channels except broadcast channels were scrambled, so you HAD to get the cable box. In Austin, I could use the VCR tuner. The only scrambled channels were the premium channels. The service in Austin was better and about 2/3 the cost. I definately feel that competition is a MUST! ---------------------------------------------------------| | #include "std/disclaimer.h" Michael P. Brininstool | | mikepb at freke.lerctr.org OR mikepb at netcom.com | |--------------------------------------------------------- From lwp at garnet.msen.com Sat Feb 4 16:57:38 1995 From: lwp at garnet.msen.com (Lou Poppler) Date: Sat, 4 Feb 95 16:57:38 PST Subject: Vinge on PKE ? Message-ID: Apologies if I repeat a question which has already been answered. My only gateway onto the Net is very expensive, and I miss many important postings. Some time ago it was asked why Vernor Vinge made passing reference to humans' naivete in trusting public key encryption, and some posters were seeking to contact professor Vinge for clarification. Has any further explanation been discovered for his distrust of PKE? From jim at acm.org Sat Feb 4 17:52:44 1995 From: jim at acm.org (Jim Gillogly) Date: Sat, 4 Feb 95 17:52:44 PST Subject: Vinge on PKE ? In-Reply-To: Message-ID: <199502050152.RAA07725@mycroft.rand.org> > lwp at garnet.msen.com (Lou Poppler) writes: > important postings. Some time ago it was asked why Vernor Vinge > made passing reference to humans' naivete in trusting public key > encryption, and some posters were seeking to contact professor I don't recall the conversation, but it could refer to his recent novel "A Fire Upon the Deep." Our galaxy is divided into a number of zones where computation can be easier or harder than in the particular section where the Earth hangs out. The fastest zones have computational ability so far beyond what's physically possible in our zone that we don't understand it. In this situation you can't trust your security to merely computationally difficult problems like factoring large numbers: the denizens of the faster zones could crack them faster than slower communicators could enumerate them. The protagonists spent a fair amount of time on a courier ship that was carrying as its cargo 1/3 of a one-time-pad, which was intended to get to the buyer and be XORed with the other two pieces. This was a valuable cargo. After it became clear that this 1/3 was potentially compromised it was used for some important but less provably reliable communications. Jim Gillogly Trewesday, 15 Solmath S.R. 1995, 01:49 From lwp at garnet.msen.com Sat Feb 4 18:33:47 1995 From: lwp at garnet.msen.com (Lou Poppler) Date: Sat, 4 Feb 95 18:33:47 PST Subject: Vinge on PKE ? In-Reply-To: <199502050152.RAA07725@mycroft.rand.org> Message-ID: On Sat, 4 Feb 1995, Jim Gillogly wrote: > "A Fire Upon the Deep." Our galaxy is divided into a number of zones where > computation can be easier or harder than in the particular section where /.../ > In this situation you can't trust your security to merely computationally > difficult problems like factoring large numbers: the denizens of the faster > zones could crack them faster than slower communicators could enumerate them. Yes, and even in the here and now, we suspect the existence of Powers with computational resources far in excess of our own. But do we know for sure that PKE *must* rely on computational obfuscation? Is it demonstrable that access to a public key always yields the secret key, given sufficient computational power? Or is this only a result of the clumsy way we construct our keypairs here in the slow zone? From anonymous-remailer at shell.portal.com Sat Feb 4 18:43:14 1995 From: anonymous-remailer at shell.portal.com (anonymous-remailer at shell.portal.com) Date: Sat, 4 Feb 95 18:43:14 PST Subject: Why encrypt intra-remailernet. Message-ID: <199502050242.SAA00239@jobe.shell.portal.com> > Date: Sun, 29 Jan 1995 17:56:34 -0800 > From: Hal > > Of course it was Chaum himself in his 1981 paper (which I think is > available from the CP FTP site) who described the duplicate-message > attack. I don't see that inter-remailing encryption helps much, > because the attacker can still notice that whenever they inject > message A, _something_ goes to Bob. The real solution, as Chaum > pointed out, is that the remailer must reject duplicate messages, > even when separated by days. Doing this without keeping a database > of all messages ever sent is left as an exercise. Perhaps the postage could integrally contain the request-remailing- to field. Supose the postage were encrypted to the remailer. Then replayers would want to copy the to-address into a new piece of postage. But, we assume, they can't figgure out what it is because they don't have the key for the remailer. If the remailer issued it's own non-blinded stamps, the remailer would have to keep a list of canceled stamps. (For as long as that series of stamps remains valid.) If the remailer used Chaumiam e-cash no logs would need to be kept at all. > Another aspect worth mentioning is that message splitting can make > the kinds of statistical correlations that Wei Dai was looking at > more of a danger. [...] Ideally you'd want to dribble them out at > some standard rate, a rate at which you always send a message > whether you have something to send or not. But this may introduce > unacceptable latency. If everybody ran a second level remailer, and if they always forwarded something (of very nearly the same size) when they recieved an encrypted message, then without compromising the users machine it would be imposible to say when a message was delivered. Some of the messages forwarded would need to be junk. Is there a polite way to send mail to a remailer, and ask it to junk the mail? Some of the messages forwarded would have to be 'part n of m' messages. Noyb From habs at panix.com Sat Feb 4 19:26:57 1995 From: habs at panix.com (Harry S. Hawk) Date: Sat, 4 Feb 95 19:26:57 PST Subject: Forward: Teleco/Cabe REg. & Free speech In-Reply-To: Message-ID: <199502050326.AA26218@panix.com> > paid for by digital cash. Such a means of exchanging print, audio, > video, or any software might be virtually impossible to censor. Would it > be possible to build such a network using current cable systems? It is a reasonable bet that all data into the home will come on cable systems which means they require encrytion anyway.. there are bridged, not point-to-point... And other traffic like mobile voice and data will use some RF technology... which also requires encryption... Existing cable systems are now running 1 gigahertz of bandwidth and I had presentations from TW staff indicating 2 gigahertz is easily reachable.. Figure 2 gigahertz of bandwidth (split between analog and digital services) in each neighborhood and a ATM switch pulling those signals back to the "head-end/central office" via fiber, and you have the cable system of the future.. (e.g, for the next 5 to 20 years).. /hawk From david.lloyd-jones at canrem.com Sat Feb 4 23:00:50 1995 From: david.lloyd-jones at canrem.com (David Lloyd-Jones) Date: Sat, 4 Feb 95 23:00:50 PST Subject: Vinge on PKE ? In-Reply-To: Message-ID: <60.19880.6525.0C1CDEB4@canrem.com> LP+Apologies if I repeat a question which has already been answered. +My only gateway onto the Net is very expensive, and I miss many +important postings. Some time ago it was asked why Vernor Vinge +made passing reference to humans' naivete in trusting public key +encryption, and some posters were seeking to contact professor +Vinge for clarification. Has any further explanation been +discovered for his distrust of PKE? I once had a girlfriend who factored five digit numbers just by looking at them. "29367? No, that's not prime. It's 117 times 251..." Good ol' Elizabeth. That's what you get for an "IQ" of around 175. Surely there might be higher "IQ's" someplace else in Universe? Albert Szent-Georgi once told me his thought that an IQ difference of thirty points meant that one person solves by inspetion problems which no amount of explanation can make clear to the other. He added that in a normal day we run into people spanning three such gulfs. If an IQ of 100 routinely factors two digit decimal numbers, and you get another digit for every twenty or thirty points, then you're looking for beings with IQ's in the 1,000 range to factor 100 digits binary... Cheers, -dlj. david.lloyd-jones at canrem.com * 1st 1.11 #3818 * "640k should be enough for anybody" - Bill Gates, 1981. From erc at s116.slcslip.indirect.com Sat Feb 4 23:17:28 1995 From: erc at s116.slcslip.indirect.com (Ed Carp [khijol Sysadmin]) Date: Sat, 4 Feb 95 23:17:28 PST Subject: Vinge on PKE ? In-Reply-To: <60.19880.6525.0C1CDEB4@canrem.com> Message-ID: > LP+Apologies if I repeat a question which has already been answered. > +My only gateway onto the Net is very expensive, and I miss many > +important postings. Some time ago it was asked why Vernor Vinge > +made passing reference to humans' naivete in trusting public key > +encryption, and some posters were seeking to contact professor > +Vinge for clarification. Has any further explanation been > +discovered for his distrust of PKE? > > I once had a girlfriend who factored five digit numbers just by > looking at them. "29367? No, that's not prime. It's 117 times > 251..." Good ol' Elizabeth. That's what you get for an "IQ" of > around 175. Surely there might be higher "IQ's" someplace else in > Universe? > > Albert Szent-Georgi once told me his thought that an IQ difference of > thirty points meant that one person solves by inspetion problems which > no amount of explanation can make clear to the other. He added that > in a normal day we run into people spanning three such gulfs. > > If an IQ of 100 routinely factors two digit decimal numbers, and you > get another digit for every twenty or thirty points, then you're > looking for beings with IQ's in the 1,000 range to factor 100 digits > binary... There is a class of people called "idiot savants" who contain people who can also solve such problems by inspection - their IQs are often much lower than 100, so that blows Albert's theory. These so-called "idiot savants" can easily factor 100 digit numbers. The ability to solve such problems is not tied to IQ, as there are many such people with IQs of 150+ who cannot solve them. -- Ed Carp, N7EKG Ed.Carp at linux.org, ecarp at netcom.com 801/534-8857 voicemail 801/460-1883 digital pager Finger ecarp at netcom.com for PGP 2.5 public key an88744 at anon.penet.fi ** PGP encrypted email preferred! ** Cop: "How many beers have you had tonight, bro?" Suspect: "Seventy." -- from the TV show "Cops" From lcottrell at popmail.ucsd.edu Sun Feb 5 00:22:00 1995 From: lcottrell at popmail.ucsd.edu (Lance Cottrell) Date: Sun, 5 Feb 95 00:22:00 PST Subject: Why encrypt intra-remailernet. Message-ID: > If the remailer issued it's own non-blinded stamps, the remailer >would have to keep a list of canceled stamps. (For as long as that >series of stamps remains valid.) If the remailer used Chaumiam e-cash >no logs would need to be kept at all. I was not under the impression that Chaum e-cash was free from the need to keep a list of spent cash. Do you meant that it would be the bank, not the remailer, that would keep the database? > >> Another aspect worth mentioning is that message splitting can make >> the kinds of statistical correlations that Wei Dai was looking at >> more of a danger. [...] Ideally you'd want to dribble them out at >> some standard rate, a rate at which you always send a message >> whether you have something to send or not. But this may introduce >> unacceptable latency. > > If everybody ran a second level remailer, and if they always >forwarded something (of very nearly the same size) when they recieved >an encrypted message, then without compromising the users machine it >would be imposible to say when a message was delivered. Some of the >messages forwarded would need to be junk. Is there a polite way to >send mail to a remailer, and ask it to junk the mail? Some of the >messages forwarded would have to be 'part n of m' messages. > > Noyb Messages are not identifiable as "part n of m" except at the last hop. If you are a remailer, then they are only visible as such to you. In transit they appear as any other message. Yes, there is a polite way to send to a remailer's bit bucket with some remailers. Ghio remailers will trash any message sent which requests remailing to "null". Remailer at nately is a Ghio remailer. I can't remember if I implemented that in Mixmaster. If not, I will. -------------------------------------------------- Lance Cottrell who does not speak for CASS/UCSD loki at nately.ucsd.edu PGP 2.6 key available by finger or server. Encrypted mail welcome. Home page http://nately.ucsd.edu/~loki/ Check out my essay on the next generation remailer Mixmaster on the WWW page. For anon remailer info, mail remailer at nately.ucsd.edu Subject: remailer-help "Love is a snowmobile racing across the tundra. Suddenly it flips over, pinning you underneath. At night the ice weasels come." --Nietzsche From lcottrell at popmail.ucsd.edu Sun Feb 5 00:53:11 1995 From: lcottrell at popmail.ucsd.edu (Lance Cottrell) Date: Sun, 5 Feb 95 00:53:11 PST Subject: Mixmaster client release Message-ID: -----BEGIN PGP SIGNED MESSAGE----- I have put a SPARC executable for the Mixmaster client on my home page. It is easy to install, just run one script. Please send me any comments. -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAwUBLzSSA1Vkk3dax7hlAQGhyAP8DkA2AetIpCHfFhnUDP8qiKdPJ3ish36V ZFA/W3Gx+6Glzj+5ri7fnug6N3ENyLJ3eoUfWVWjJ6uK5yMczMQB6wX4m3Afhrwz xUw9WCKwbP0cktnLnMvbufDxyLTsGxA6yvWaRdCRVcqP4eyAVN4SiHCftE8EbI6Y Pg+3SYtjDf4= =5lAa -----END PGP SIGNATURE----- -------------------------------------------------- Lance Cottrell who does not speak for CASS/UCSD loki at nately.ucsd.edu PGP 2.6 key available by finger or server. Encrypted mail welcome. Home page http://nately.ucsd.edu/~loki/ Check out my essay on the next generation remailer Mixmaster on the WWW page. For anon remailer info, mail remailer at nately.ucsd.edu Subject: remailer-help "Love is a snowmobile racing across the tundra. Suddenly it flips over, pinning you underneath. At night the ice weasels come." --Nietzsche From strick at yak.net Sun Feb 5 02:03:31 1995 From: strick at yak.net (strick at The Yak) Date: Sun, 5 Feb 95 02:03:31 PST Subject: The SKRONK protocols (version 0.6) Message-ID: <199502051002.CAA01090@nando.yak.net> ======================================================================== The SKRONK protocols version 0.6 ======================================================================== Henry Strickland Sun Feb 5 1995 This is a working document, subject to change. Please comment on it! Skronk is a user-level C library that re-implements the usual "posix i/o" (unix man 2) functions and "berkeley socket" functions with a set of functions that can use enhanced or alternate ("skronked") protocols for TCP connections. (Typical enhancements could be authentication and/or encryption of the connection.) A simple negotiation protocol allows the clients and servers to agree on what enhancements are desired or required. Skronk is designed so that your common unix network clients and servers (telnet, sendmail, ftp, nntp, X11, etc.) can be merely relinked with the skronk library (libskronk.a) without changing the source code for the programs. As a matter of configuration and policy, skronked clients and servers may choose either to interoperate with normal (non-skronked) client and servers or to forbid normal connections. In order to not interfere with non-skronked programs, skronked connections take place an alternate TCP server port numbers. /* "Skronk" is a musical term, for a new-york-ish free-jazz * massively saxaphonish kind of music, e.g. John Zorn */ ---- THE UDP PROTOCOL BEGINS HERE ---- THE SKRONK MAP DAEMON A skronk map daemon is a UDP service that tells what skronked services are available from a site, and what alternate TCP server port numbers they use. The skronk map daemon receives "skronk map request" packets and returns "skronk map reply" packets that list pairs of port numbers, mapping normal server port numbers to corresponding skronked port numbers. The skronk map reply packet is sent to the same IP address and host port that the request was received from. If there is no map reply in a certain time, after a couple of map request resends, the skronk map client should assume that skronked services are not currently available on that host. SKRONK MAP REQUEST PACKET See "struct skronk_map_request" below. The comment will say something like "finger skronk at yak.net for info", to explain what is going on to network administrators who see these packets for the first time probing their hosts. SKRONK MAP REPLY PACKET See "struct skronk_map_reply" below. The "serial" field should match the serial field of the map request packet. Replies be cached, using the "ttl" time-to-live field for a timeout. If the request packet cannot be replied to (perhaps because the action was not understood, or the version was wrong), a reply with action SKRONK_MAP_NACK should be returned. If the magic field of the request is wrong, do not reply. (The magic number should be changed if the first five fields are changed; otherwise, version and opcode may be changed to implement new protocols.) Skronk map clients should also recognize as a reply the relevant ICMP packets indicating that there is no skronk map daemon. Version numbers 128 through 255 will not be assigned and are available for experimentation. Action codes 128 through 255 will not be assigned and are available for experimentation. Initial prototypes use UDP port 333 for the skronk map service, until a number is officially allocated. -------------------------------- /* unsigned long = 4 octets, "network" order */ /* unsigned short = 2 octets, "network" order */ /* char = 1 octet, ASCII encoding, NUL terminated */ struct skronk_map_request { unsigned long magic; /* SKRONK_MAGIC */ unsigned long serial; unsigned short version; /* SKRONK_VERSION */ unsigned short action; /* SKRONK_MAP_REQUEST */ unsigned long reserved; /* (corresponds to ttl) */ char comment[1]; /* variable length, NTBS */ /* after NUL, remained of packet ignored */ }; #define SKRONK_MAGIC 0x1F1206FB /* tail(md5("SKRONK_MAGIC\n")) */ #define SKRONK_VERSION 0x0101 /* major 1 minor 1 */ #define SKRONK_MAP_REQUEST 63 /* '?' */ #define SKRONK_MAP_RESPONSE 46 /* '.' */ #define SKRONK_MAP_NACK 33 /* '!' */ #define SKRONK_DEFAULT_TTL 3600 /* one hour */ #define SKRONK_NUM_TRIES 3 /* try three packets */ #define SKRONK_WAIT_TIME 3 /* wait three seconds */ struct skronk_map_reply { unsigned long magic; /* SKRONK_MAGIC */ unsigned long serial; /* matches map request serial */ unsigned short version; /* SKRONK_VERSION */ unsigned short action; /* SKRONK_MAP_REPLY or _NACK */ unsigned long ttl; /* cache time to live, in seconds */ unsigned short map[1]; /* variable length, 0 terminate */ /* after 0, remainder of packet ignored */ }; -------------------------------- EXAMPLE SKRONK MAP REQUEST AND REPLY Map Request Packet: ip header: UDP protocol 128.32.43.52 source_ip_address 199.170.88.5 destination_ip_address udp header: 1066 source_port skronk destination_port (number not assigned yet) body: 0x1F1206FB skronk_magic 2001 skronk_serial 1 version '?' action (SKRONK_MAP_REQUEST) "finger comment (for paranoid net admins) skronk at yak.net for info" Map Request Reply: ip header: UDP protocol 199.170.88.5 source_ip_address 128.32.43.52 destination_ip_address udp header: skronk source_port (number not assigned yet) 1066 destination_port body: 0x1F1206FB skronk_magic 2001 skronk_serial (copied from request) 1 version '.' action (SKRONK_MAP_REPLY) 3600 ttl (one hour) map list: 23, 423, /* skronked TELNET on port 423 */ 25, 425, /* skronked SMTP on port 425 */ 70, 470, /* skronked GOPHER on port 470 */ 80, 480, /* skronked HTTP on port 480 */ 514, 914, /* skronked shell on port 914 */ 750, 350, /* skronked shell on port 350 */ 6000, 6400, /* skronked X11 on port 6400 */ 0 /* zero marks end of list */ /* ... assume other services cannot be skronked */ /* * Notice the skronked ports on this host (199.170.88.5) * have been allocated by the system administrator * using a simple (but arbitrary) rule: * * add 400 to the normal number, unless this has * problems (like it would bring a less-than-1024 * port number to be greater-than-1024), in which * case subtract 400. * * I propose this rule as a default, since it does not seem * to collide with common port numbers, but because we * have and always use the skronk map daemon, each site * could pick different numbers. */ ---- THE UDP PROTOCOL ENDS HERE ---- SKRONK PER-CONNECTION NEGOTIATION /* * The current skronk prototype temporarily works on * a simpler negotiation scheme, but below is the * intended scheme. */ /* * Good questions: * 1. Would telnet-style negotiations be better? * * I conclude not: * -- this offers options to be combined at once * -- this does fewer passes from server to client * -- this uses ASCII names rather than numbers * for options, which allows liberal * experimentation with "x-" names. * * 2. Do we need some escape-character & character-stuffing * to re-open negotiations? * * Maybe... but flow of control probably never returns * to the skronk layers with any such requests, so let's * let some escape-octet (with escape-octet-stuffing) * option for return-to-negotiation be a negotiated * option that can be added later. */ The skronk library does a negotiation at the beginning of each TCP connection, after "connect()" and "accept()" rendezvous, before returning flow of control to the application. This negotiation is transparent to the application, but may be configured with skronk configuration files or environment variables. These negotiations should not be confused with other negotiations specific to the program, such as TELNET negotiations, which would occur later, once control is returned to the application. /* * I should first define 'negotiation line', 'acceptance line', * and 'disconnect' to describe the following... */ When the connection is made, the server writes a line of 10 to 999 octets, composed of ASCII characters, terminating with CRLF, to the client. This line must begin with the eight characters 'S' 'K' 'R' SPACE h t o SPACE where h, t, and o are three decimal digits '0'-'9' (hundreds, tens, and ones places), with leading a zero in the hundreds place if required, specifying the length of this line, counting the CRLF at the end. Thus the minimum length of the line is 10. The reason for putting the length of the line in the front is so that the client can first read 8 characters, and then read the rest of the line, but not try to read any characters beyond that size. After the "SKR hto " follow zero or more words of the regexp form [A-Za-z0-9+][A-Za-z0-9/.+-]* separated by one or more SPACE characters. Case matters. These words specify protocols, and should registered with strick at yak.net, or begin with "x-" for experimental protocols. By sending this line, the server volunteers to server this protocol skronked with any of the listed protocols. The server should list the protocols in order of preference, its favored protocols first. The client reads this line, chooses one (or more) protocols, and responds with a similar line, listing only the protocol(s) that it chooses to use, in a specific "stacking" order, from the first protocol applied to the last. For instance, if it chooses "gzip" compression followed by "des" encryption, it should list them in the order "gzip des". Some protocols choices may not be compatible, and some protocol choices may not have stacking order; this will have to be described when the protocols are defined. If the client does not like any of the choices offered, it may hang up the connection, instead of replying with a line. If the server accepts the protocol the client chose, it responds with 8 characters 'S' 'K' 'R' SPACE 'O' 'K' CR LF If not, it may either disconnect the connection, or it may send another initial negotiation line, which should be different from the initial line offered (probably with fewer options for the client to choose). If the negotiation is accepted, what happens next depends on the accepted protocols, and on the actions of the rest of the program. Typically a selected protocol may have to do some more negotiation or trading of data before control is returned to the application. And later reads and writes from the application to the skronked socket may be intercepted and frobbed. PRIMORDIAL PROTOCOLS For stream encryption: /* needs work */ A simple initial protocol named "dh/idea.1". Use Diffee-Hellman key exchange from RSAREF 2.0. Let the server declare the R_DH_PARAMS, and the size of things. Use IDEA encryption in CFB mode from PGP 2.6. No authentication -- susceptible to man-in-the-middle attacks at connection time. For authentication: /* needs lots of work */ A simple initial protocol named "auth-pgp.1" Use PGP public keys and certificates to create a web of trust and thereby authenticate hosts. Can be combined with "dh/idea.1" or used separately. (This probably requires having secret key pass phrases on multiuser machines, so it's one small step forward.) -------------------------------- END $Header: /x/nepal/x/yak/strick/work/skronk-write/RCS/skronk.proto,v 1.3 95/02/05 01:18:49 strick Exp Locker: strick $ From jya at pipeline.com Sun Feb 5 07:05:34 1995 From: jya at pipeline.com (John Young) Date: Sun, 5 Feb 95 07:05:34 PST Subject: NYT on Tera and UUNet Message-ID: <199502051504.KAA09875@pipe3.pipeline.com> John Markoff writes today on Tera Computer's supercomputer prayers. For email copy (13k) send blank message to with subject: TER_nup And, Laurie Flynn writes on UUNet's tender tap by Microsoft. For copy (13k), same, with subject: UUN_zzz From jcorgan at aeinet.com Sun Feb 5 08:50:30 1995 From: jcorgan at aeinet.com (Johnathan Corgan) Date: Sun, 5 Feb 95 08:50:30 PST Subject: Here we go again... Message-ID: +---------------------------------------------------------+ ##### # # # # # ##### #### ##### # ## ## # # # # # # # # # ### # # # # # # # # # ### #### # # # # # ####### ####### # # # # # ##### # # # # # # ##### ##### # # # +---------------------------------------------------------+ -> EMA ALERT <- News For and About the Members of the ELECTRONIC MESSAGING ASSOCIATION ============================================================ February 3, 1995 -- Number 18 <----------------------------------------------------------> ***** SPECIAL ALERT ***** - Congress to consider making all system operators liable for messaging content. Bill would force employers to monitor message content. ACTION NEEDED NOW! <----------------------------------------------------------> UNREASONABLE NETWORK POLICING PROPOSED Yesterday, Senator Jim Exon (D-NE) introduced S.314, the Communications Decency Act of 1995, in the United States Senate. In an effort to stamp out digital pornography, it makes all telecommunications providers doing business in the United States (from the telephone companies all the way down to offices that use LANs) liable for the content of anything sent over their networks. To avoid the possibility of tens of thousands of dollars in fines and up to two years in jail, business owners would be forced to police their networks and monitor in advance all messages sent over them. WITHOUT ACTION - COULD BE LAW IN MONTHS This bill is substantially the same as the one he put forward last year. He will offer it as an amendment to the pending telecommunications deregulation legislation in the U.S. Senate, which is expected to be enacted by July. Last year, his amendment was adopted even though many thought it hastily drafted and poorly thought out. Fortunately, the telecommunications deregulation legislation died. This year, a more conservative U.S. Congress may be even more reluctant to challenge a "morality" amendment; and its legislative vehicle, the telecommunications deregulation legislation, stands a much better chance of passage this year. ACTION NEEDED NOW Action by the business community is needed now. Please notify your corporate government affairs office and/or your legal counsel. This measure could be adopted as an amendment to the telecommunications bill IN A MATTER OF WEEKS (or potentially added to any legislation pending on the U.S. Senate floor), if business does not mobilize against it. S.314 will not stop digital pornography, but it could devastate the messaging business. If you are interested in further information or are able to participate in lobbying efforts over the next few weeks, contact Sarah Reardon at EMA (see below). ------------------------------------------------------------ EMA ALERT is published and copyrighted (1995) by the Electronic Messaging Association. Permission to reproduce and/or redistribute with attribution is hereby given to all EMA members. For more information about anything in EMA ALERT, contact EMA via e-mail - use either X.400 (S=info; O=ema; A=mci; C=us) or Internet (info at ema.org) address, facsimile (1-703-524-5558), or telephone (1-703-524-5550). Any EMA staff member can be addressed directly via e-mail by using, for X.400, G=; S=; O=ema; A=mci; C=us, and, for Internet, @ema.org. EMA's postal address is 1655 N. Fort Myer Dr. #850, Arlington, VA 22209 USA. == Johnathan Corgan "Violence is the last refuge of the incompetent." jcorgan at aeinet.com -Isaac Asimov From yusuf921 at uidaho.edu Sun Feb 5 09:55:12 1995 From: yusuf921 at uidaho.edu (Syed Yusuf) Date: Sun, 5 Feb 95 09:55:12 PST Subject: No Subject Message-ID: Does anyone have a an list of a current remailers? /sy/ From nobody at tower.techwood.org Sun Feb 5 10:02:38 1995 From: nobody at tower.techwood.org (Anonymous) Date: Sun, 5 Feb 95 10:02:38 PST Subject: BROKEN REMAILERS Message-ID: <199502051758.MAA02142@bb.hks.net> -----BEGIN PGP SIGNED MESSAGE----- I have tested remailers and their PGP keys over some time now and this is what I have found: MIXMASTER is a great, fast and reliable remailer but you can't PGP with it. REMAILER at NATELY.UCSD.EDU is just as fast and reliable (same guy) and you can use PGP, but a few weeks ago it started acting really funny: It will forward any ATTACHED files, but it will only read the first commandline of a PGP block that has been pgp'ed with Nately's public key. In other words, if you wrap layers of chained remailers inside each other, you will now have to have NATELY as the *last* link in your chain as it will otherwise discard the rest of the block. Alternatively you can have the chain as a series of attached files. USURA is really quick too and has lately been reliable. But it has always suffered from the same problem as Nately, namely that it will truncate all of the remaining lines in a PGP message encrypted with its own public key, this making it impossible to chain effectively. It will read the first command only. It DOES forward all attached files, however (by which I mean text that have been tagged on OUTSIDE of the pgp block encrypted to Usura). EXTROPIA and VOX suffer from the exact *opposite* problem. They forward the entire inner remains of a pgp block untouched after having only read the first commands to them. But they both ignore and discard all text outside that first initial pgp block encrypted with their public keys. This means that you cannot send a message with multiple pgp's through either of them: because any attached parts get thrown away. As a practical application, it means that you can't use either of these two as part of your nym at alpha.c2.org setup, sadly... BTW, with VOX you will have to add the ::Encrypted: PGP bit whereas you don't have to do that with Extropia (or with alias at alpha.c2.org for that matter). REBMA is ideal in that it does not touch your message: You can use *both* attached files and "wheels within wheels" where you have layers of pgp'ed remailer instructions hidden inside one another. The main problem with REBMA is that she has been down a bit lately and even when she is not down, you have to wait ages: 1 or 2 days, sometimes even more. The best remailer, IMO, is HAL at ALUMNI.CALTECH.EDU which operates in tandem with HFINNEY at SHELL.PORTAL.COM: Both are fast and very reliable. Moreover, neither will throw away attached messages (like Vox and Extropia do) nor throw away the other loops of an inner-encrypted pgp reply block (like Usura and now, lately, unfortunately, also Nately do). Very versatile! I used to like JPUNIX too. Now it seems HOMER at RAHUL.NET is a winner, I don't know if he will stay reliable, but he sure is fast. In terms of PGP, he is just as good as HAL/HFINNEY. Likewise, TOWER: Both work! The DESERT remailer is sometimes fast, sometimes slow. I have a feel it waits until it can send out stuff in batches. So sometimes you have to wait a day or so. It works with Anon-To: last I checked, if I recall correctly. That's the extent of my playing around. I would appreciate corrections and help, especially information with some of the remailers I have not mentioned here. I have not played with Q or with FLAME, for instance. |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| .Signature field left blank (or it wouldn't be anonymous, would it?) |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| - --- [This message has been signed by an auto-signing service. A valid signature means only that it has been received at the address corresponding to the signature and forwarded.] -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Gratis auto-signing service iQBFAwUBLzUR0CoZzwIn1bdtAQGoHQF/ep/uxpNHaCX4JUoETqULLax8Q0vu6VrY Jh1P/ey2QrWi1TKWky3/SJ967S+xoqg0 =gEZ3 -----END PGP SIGNATURE----- From Nobody at eniac.ac.siue.edu Sun Feb 5 10:03:55 1995 From: Nobody at eniac.ac.siue.edu (Anonymous) Date: Sun, 5 Feb 95 10:03:55 PST Subject: BROKEN REMAILERS Message-ID: <199502051800.NAA02153@bb.hks.net> -----BEGIN PGP SIGNED MESSAGE----- Here's a bug report on some remailers that won't work in a nested chain when it is encrypted. First, a look at how a chain is supposed to work. Three good ones, chained like: 1) Tower->Alumni->Homer. OK 2) Homer->Tower->Alumni. OK 3) Homer->Alumni->Tower. OK This was in a test of the new Tower remailer. In other words, it doesn't matter if Tower is at the beginning, middle or end of a chain. The message will reach its intended destination. (In fact, quite fast). But some other remailers fuck up when they become part of a nested, encrypted chain. One of those? The Syrinx remailer. Here are the test results: 1) Syrinx->alumni->Homer. NO 2) Homer->syrinx->alumni. NO 3) Homer->alumni->syrinx. OK The third one came back to be in under an hour. No reply from number 1 and 2. I don't know why it doesn't work but it doesn't! Maybe one explanation is that as Syrinx gets a messages it sees the :: Encrypted: PGP and then decodes it using its key (as it should), but then in the decrypted message it sees another :: Encrypted: PGP and attempts to decode it again using its key (again), fails (of course) and aborts. This to me is the only explanation as to this strange behaviour. It is a serious problem and I do think that it should be brought to the attention of everybody. Now I haven't tested all of the remailers so I don't really know which one also will fail the test. In that test I choose Homer and Alumni because I know that these 2 are reliable and don't care in what order they are in a chain, I also always send the same test message it reads: This is a test line1 line2 line3 line4 Sent