Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-08-02 Thread John Kelsey
  -Original Message-
  From: "Major Variola (ret)" <[EMAIL PROTECTED]> 
  Sent: Jul 30, 2004 10:25 PM
  To: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
  Subject: Re: Email tapping by ISPs, forwarder addresses, and crypto  proxies


  The "profitably" part is a non-issue when you have black budgets,
  ie $400 toilet seats.

This is silly.  They have black budgets, but not infinite ones.  Given their budget 
(whatever it is), they want to buy the most processing bang for their buck.  I doubt 
they can do that substantially better than anyone else.  I'd expect them to be really 
clever at finding tricks to optimize keysearch of various kinds, but not to have 
better microprocessor technology than the rest of the world.  

  Bottom line: they're not ahead in tech, but they can make things that
  private-co engineeers only dream of.  DesCrack is a suitcase, get it?

So, then they can break 3-key 3DES with moderate numbers of texts as soon as they can 
build 2^{56} such suitcases, right?  And power them, and get rid of their waste 
heat

  I'll let you speculate on AESCrack :-)

Do the math, and you'll see how implausible 128-bit keysearch is.  Maybe there are 
better attacks on AES (the algebraic stuff doesn't seem to have gone anywhere, but it 
still might), but if keysearch is all we have to worry about, and nontrivial quantum 
computers remain impractical to build, then 128-bit keys are as secure as we're ever 
likely to need, and 256-bit keys more or less eliminate keysearch of any kind from the 
list of things we need ever worry about again.
  

--John






Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-08-01 Thread Major Variola (ret)
At 12:36 PM 7/29/04 -0400, Tyler Durden wrote:
>"Remember that the spookfabs don't have to contend with *economics and
>yield*."
>
>Damn, this is precisely where I wish Tim May was still around.

We are all just echoes of the voices in his head.

But I did work for a company that owned fabs.  And have kept up with
the semiconductor lit.  Yield is a big deal ---you either fit it on a
square
inch of Si or you don't make it (profitably).

The "profitably" part is a non-issue when you have black budgets,
ie $400 toilet seats.

Bottom line: they're not ahead in tech, but they can make things that
private-co engineeers only dream of.  DesCrack is a suitcase, get it?

I'll let you speculate on AESCrack :-)





Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-08-01 Thread Major Variola (ret)
At 12:07 AM 7/29/04 -0500, J.A. Terranson wrote:
>On Wed, 28 Jul 2004, Major Variola (ret) wrote:
>
>> Did you know that your teeth enamel contain isotope ratios that
>> encode regions where you might have grown up around age 6?
>
>Yes.  I am also aware that tooth enamel has the interesting property of

>trapping a fantastic number of parmaceuticals.

No.  Your tooth enamel is static after you grow adult teeth.  Your bones

recycle every 10-20 years.  Your hair gives away your indulgences
though,
which is what you allude to.

Of interest to anthropologists, eg the folks who pinned Otzi's
birthplace
to other than where he was found.

Anyone who wants to piss-test me will find his desk fully irrigated next
day.






Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-08-01 Thread Bob Jonkman
This is what J.A. Terranson <[EMAIL PROTECTED]> said
about "Re: Email tapping by ISPs, forwarde" on 24 Jul 2004 at 18:44

> 
> On Sat, 24 Jul 2004, Major Variola (ret) wrote:
> 
> > There might be blind cypherpunks, we don't discriminate[1],
> 
> There Is No We.
> 
> > [1] the original phone phreaks were blind,
> 
> This is a ridiculous statement, and even worse, leaks information
> about your nym: [young enough to have not been there].
> 
> You are thinking of Joe "Whistler" Joe Egressia (sp?), and the kid
> form New York whose names escape me at the moment.  These two do not
> even com close to "the original phone phreaks were blind".  More like
> "at least two of the original batch of phreaks were blind".

Or are you thinking of the "Three Blind Phreaks", profiled in Wired 
magazine earlier this year?

http://www.wired.com/wired/archive/12.02/phreaks.html


--Bob.



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-29 Thread Tyler Durden
"Remember that the spookfabs don't have to contend with *economics and
yield*."
Damn, this is precisely where I wish Tim May was still around.
Certainly, the Spooks have their own fabs, and I don't think they even hide 
this fact (I doubt they could, ultimately). And certainly, the Spooks crank 
out all sort of special ASICs using their own IP as well as some 
store-bought stuff they drop onto their designs.

However, where I have some BIG doubts is whether their fab is X generations 
ahead of the most advanced commercial fabs. Frankly, I bet they have a 
pretty good fab that was modified by a commercial vendor to support small 
production runs. This fab, however, does not utilize cosmic rays for etching 
or whatever. It's probably 0.13 microns at best (wait...I think Taiwan Semi 
and a couple of other places are one step ahead of this). This limits what 
they can do with a chip or chipset, and implies that they won't be orders of 
magnitude better at opening up LOTS of traffic.

(In non-troll mode.)
-TD


From: "Major Variola (ret)" <[EMAIL PROTECTED]>
To: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
Subject: Re: Email tapping by ISPs, forwarder addresses, and crypto  
proxies
Date: Wed, 28 Jul 2004 21:34:59 -0700

At 03:52 PM 7/27/04 -0400, Tyler Durden wrote:
>Variola wrote...
>>In the *public* lit.
>
>Well, perhaps but perhaps not. Burst-mode signaling, transceivers, and
>networking technology are a good example. If you see DISA, NSA, and
DARPA
>all working with the acknoledged experts inthe academic field, and if
you
>see them spending $$$ on burst-mode testbeds, then it's clear that
there are
>some issues they haven't solved.
You're right on this, I admit.  Its clear that things like smart dust
and gait recognition and
autonomous cruising across the desert are not things the Beast has yet.
>There just happen to be
>physical limitations. But I have zero doubt that the NSA can't make a
laser
>that is siginificantly more efficient than what I can buy off the
shelf.
I'm not one to dispute physics.  However most professional skeptics
(eg cryptographers) grant the adversary anything from 2 to 10 x the
COTS tech.  Do you *really* think the NSA's DesCrack was built
with old Sun chassis like Gilmore, Kocher, et als???
Remember that the spookfabs don't have to contend with *economics and
yield*.
They can use *radioisotopes*.  Subs can lay independant cable.
Not a lot of folks walk along the undersea cables,
to say nothing of how bribable telecom folks are.
Conservativism sometimes means being liberal in modelling others'
capabilities.
--
Be Useful -the Baron

_
Overwhelmed by debt? Find out how to ‘Dig Yourself Out of Debt’ from MSN 
Money. http://special.msn.com/money/0407debt.armx



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-29 Thread Major Variola (ret)
At 03:52 PM 7/27/04 -0400, Tyler Durden wrote:
>Variola wrote...
>>In the *public* lit.
>
>Well, perhaps but perhaps not. Burst-mode signaling, transceivers, and
>networking technology are a good example. If you see DISA, NSA, and
DARPA
>all working with the acknoledged experts inthe academic field, and if
you
>see them spending $$$ on burst-mode testbeds, then it's clear that
there are
>some issues they haven't solved.

You're right on this, I admit.  Its clear that things like smart dust
and gait recognition and
autonomous cruising across the desert are not things the Beast has yet.

>There just happen to be
>physical limitations. But I have zero doubt that the NSA can't make a
laser
>that is siginificantly more efficient than what I can buy off the
shelf.

I'm not one to dispute physics.  However most professional skeptics
(eg cryptographers) grant the adversary anything from 2 to 10 x the
COTS tech.  Do you *really* think the NSA's DesCrack was built
with old Sun chassis like Gilmore, Kocher, et als???

Remember that the spookfabs don't have to contend with *economics and
yield*.
They can use *radioisotopes*.  Subs can lay independant cable.
Not a lot of folks walk along the undersea cables,
to say nothing of how bribable telecom folks are.

Conservativism sometimes means being liberal in modelling others'
capabilities.

--
Be Useful -the Baron




Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-29 Thread J.A. Terranson

On Wed, 28 Jul 2004, Major Variola (ret) wrote:

> Did you know that your teeth enamel contain isotope ratios that
> encode regions where you might have grown up around age 6?

Yes.  I am also aware that tooth enamel has the interesting property of
trapping a fantastic number of parmaceuticals.  The teeth can be used to
lay out a life history of drug [ab]use, from simple tetracycline use as a
kid through to the occasional lines as an adult.  AFAIK, the tests now
available are simply qualitative, and without accurate date-stamping, but
I am no expert in this area (so if it's important to you, seek
Knowledgeable Assistance (tm)).


> I once worked for a guy who hired Capt'n Crunch, *briefly*.

Yeah.  Most people find John a bit difficult to stomach for long.  While I
won't go into my personal interactions with him here, it is worth noting
that I take pains to point out that John is *not* representative of the
"average" phreak when I teach classes touching on that area.

Remember: John spent a great deal of time bemoaning the fact that
"secrets" was published, and that it was "going to end phreaking", yet
*he* was the one who spent all the time talking to the goddamned reporter!
John is not, IMNSHO, well pasted together.

Besides, he has the most disturbing physical motions I have ever seen in
another human being.  The way he moves his body tells you there is
something wrong - you don't even need to talk to him before the hairs on
the back of your neck start screaming for cover :-(

>  [This is reference to a digression later in the thread.  His dentition
> was not discussed.]

Thank god...


-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  "...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them."  Osama Bin Laden
- - -

  "There aught to be limits to freedom!"George Bush
- - -

Which one scares you more?



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-29 Thread Major Variola (ret)
At 06:44 PM 7/24/04 -0500, J.A. Terranson wrote:
>On Sat, 24 Jul 2004, Major Variola (ret) wrote:
>
>> There might be blind cypherpunks, we don't discriminate[1],
>
>There Is No We.

touche'

>> [1] the original phone phreaks were blind,
>
>This is a ridiculous statement, and even worse, leaks information about

>your nym: [young enough to have not been there].

Yes.

Did you know that your teeth enamel contain isotope ratios that
encode regions where you might have grown up around age 6?
Ask Otzi.


>You are thinking of Joe "Whistler" Joe Egressia (sp?), and the kid form

>New York whose names escape me at the moment.  These two do not even
com
>close to "the original phone phreaks were blind".  More like "at least
two
>of the original batch of phreaks were blind".

Ok, so this was book reading.  Sosume.

I once worked for a guy who hired Capt'n Crunch, *briefly*.  [This is
reference
to a digression later in the thread.  His dentition was not discussed.]

--
WE are all just voices in Tim May's head.




Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-27 Thread Tyler Durden
Variola wrote...
While this cannot be discounted in toto, the tech comes to them from
academia (most of the time), so generally, if you are widely read,
you'll
have a pretty good idea of what's *possible*.  You are likely dead-on
accurate about the fabs though.

In the *public* lit.
Well, perhaps but perhaps not. Burst-mode signaling, transceivers, and 
networking technology are a good example. If you see DISA, NSA, and DARPA 
all working with the acknoledged experts inthe academic field, and if you 
see them spending $$$ on burst-mode testbeds, then it's clear that there are 
some issues they haven't solved. Of course, they may not be the issues WE 
think they are, but you get some idea.

What that also hints at is that they can't actually always backhaul 
EVERYTHING. Their interest in burst-mode indicates they still view bandwidth 
as an obstacle (and not dark fiber, but actual lit bandwidth). Of course, 
their bandwidth "problem" is probably at orders of magnitude greater than 
we'd consider a problem, but their continued interest in burst mode probably 
indicates there are times when they have huge amounts of data that needs to 
get through i a short amount of time, and they don't want to clog up a 
channel.


Fair 'nuff.  You know that 5 year predictions are too conservative, and
20 year predictions too liberal.  Ask Orwell.
Well, there's the famous Adaptive Optics story centered around bringing 
Manua Kea online. When the Manua Kea designers were trying to solve some of 
the big issues ca. 1988, the military (as part of one of their dual-use 
programs) declassified Laser Guidestar research they had done in 1962!

In other cases you can, however, take a reasonably good guess. Remember, 
during the bubble there was billions poured in by the private sector in 
making lasers more efficient, smaller, etc...There just happen to be 
physical limitations. But I have zero doubt that the NSA can't make a laser 
that is siginificantly more efficient than what I can buy off the shelf.


You think subs are just toys?
Actually, this is a most interesting point. Those cables are not merely 
giant rubber hoses running around on the sea floor...the telecom equipment 
is actually powered via an electrical layer in the cable sheath. And then 
remember that there are lots of fibers in any one of those cables, and that 
the signal therein might easily need to be amplified due to splice losses. 
So that Sub (which I know exists) must really be something to see. Almost 
makes me want to join the dark side!

(Oh yeah, come to think of it I did actually work on an NSA project that 
examined some undersea optical component failures out of one of their 
networks. From the components we looked at, I can only guess what their 
network topology must have been (OC-3 ATM, BTW), but I can only take vague 
guesses as to what it must do).

-TD
_
Don’t just search. Find. Check out the new MSN Search! 
http://search.msn.click-url.com/go/onm00200636ave/direct/01/



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-26 Thread J.A. Terranson

On Sun, 25 Jul 2004, Bill Stewart wrote:

> Cap'n Crunch may have bad teeth, but his eyes were fine the last time I saw
> him.

Yeah, but what's left of his mind is more like what's left of his teeth
:-(


-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  "...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them."  Osama Bin Laden
- - -

  "There aught to be limits to freedom!"George Bush
- - -

Which one scares you more?



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-26 Thread Bill Stewart
At 04:44 PM 7/24/2004, J.A. Terranson wrote:
> [1] the original phone phreaks were blind,
This is a ridiculous statement, and even worse, leaks information about
your nym: [young enough to have not been there].
You are thinking of Joe "Whistler" Joe Egressia (sp?), and the kid form
New York whose names escape me at the moment.  These two do not even com
close to "the original phone phreaks were blind".  More like "at least two
of the original batch of phreaks were blind".
Cap'n Crunch may have bad teeth, but his eyes were fine the last time I saw 
him.




Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-25 Thread J.A. Terranson

On Sun, 25 Jul 2004, Declan McCullagh wrote:

> On Sun, Jul 18, 2004 at 10:35:19PM -0700, Major Variola (ret) wrote:
> > You don't know about tape robots, or offline indexing, eh?
>
> FYI from a recent trip to the NSA crypto museum:
> http://www.mccullagh.org/image/10d-15/storagetek-automated-cartridge-system.html
> http://www.mccullagh.org/image/10d-15/robot-arm-tape-cartridge.html
>
> I think that was circa 1994 (I'd have to look at the high-res image
> to see the date on the brass plaque to be sure).
>
> -Declan

I've actually worked with slightly more recent tech from the same company.
Note the limited size of the library (300tb), and also note that seek time
to any one sector on any one tape is *incredibly* long.  This is strictly
a near-line bulk solution - useless for anything but permanent archives
with an occasional pull.

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  "...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them."  Osama Bin Laden
- - -

  "There aught to be limits to freedom!"George Bush
- - -

Which one scares you more?



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-25 Thread Declan McCullagh
On Sun, Jul 18, 2004 at 10:35:19PM -0700, Major Variola (ret) wrote:
> You don't know about tape robots, or offline indexing, eh?

FYI from a recent trip to the NSA crypto museum:
http://www.mccullagh.org/image/10d-15/storagetek-automated-cartridge-system.html
http://www.mccullagh.org/image/10d-15/robot-arm-tape-cartridge.html

I think that was circa 1994 (I'd have to look at the high-res image
to see the date on the brass plaque to be sure).

-Declan



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-25 Thread Declan McCullagh
On Wed, Jul 07, 2004 at 01:11:58AM -0700, Bill Stewart wrote:
> Google's Gmail is an interesting case.
> Unlike Councilman's ISP, who were sneaky greedy wiretapping bums,
> Google tells you that they'll grep your mail for advertising material,
> and tells you how much of that they'll leak to the advertisers
> and makes you some promises not to leak more.
> The data's just sitting there waiting for a subpoena,
> and there's not much point in having it all encrypted because
> the cool features of Gmail aren't much use on cyphertext.

FYI here's something I wrote in April... --Declan



http://news.com.com/Is+Google+the+future+of+e-mail%3F/2010-1032_3-5187543.html

If Google wanted to veer in a more privacy-protective direction, it
could look to the intriguing model of Vancouver, Canada-based Hush
Communications, which runs the Hushmail Web mail system. Unlike
rivals, Hush encrypts mail sent between Hush users. It uses a
Java-based technique that allows for only its intended recipient--and
not Hush employees--to decrypt a scrambled e-mail message. If a
subpoena arrives, or if a security breach ever happens, disclosure
would be limited.

Hush offers 2-megabyte-limit free accounts and pay accounts, and it
said 900,000 accounts have been created since its May 1999 launch. The
company also lets users store files in an encrypted volume and this
week plans to announce a feature that permits encrypted volumes to be
shared among multiple users.

Hush's patent No. 6,154,543 covers some aspects of encrypted
e-mail. The company said it'd happy to license it to
Google. Originally, Hush Chief Technology Officer Brian Smith said,
the patent was quite broad, but "we have narrowed the patent to apply
only to e-mail and messaging systems. The modifications were accepted
but don't yet appear" on the U.S. Patent and Trademark Office's Web
site.

True, if the archived e-mail is encrypted, Gmail won't be able to
search message bodies very efficiently, but users might be willing to
give up that feature and even pay a monthly charge in exchange for
additional security.

"We'll think about it," said Google's Rosing. "We don't have any
explicit plans right now...If someone really needs to encrypt a lot of
e-mail, maybe they should be putting that on their laptop. We're
trying to provide a service that offers some utility to our users. If
you change the service to take away all the value of the service,
you're back where you started."

Maybe. But until that happens, would-be users of Gmail or any similar
service should recognize that their so-called free e-mail comes at a
price.



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-25 Thread James A. Donald
--
On 23 Jul 2004 at 12:40, Thomas Shaddack wrote:
> Depends on whom. Often the money are the main motivation. Of
> course, your own country won't pay you as well as the other
> one, and will try to appeal to your "patriotism" like a bunch
> of cheapskates - it's better to be a contractor.

The Soviet Union was notorious for absurdly low pay, yet had no
difficulty getting lots of servants.

It cultivated a sense of identification.   The CIA would give
you a crate of money, a crate of guns, and some say a crate of
cocaine.   but the KGB would ask about your dental problems and
arrange for a free dental appointment.  If you were a key
scientist or something, rather than just some regular guy, they
would discover your sexual tastes or your tastes in art and
send around a girl or boy to suite, or some art that probably
could not be obtained by mere money, or perhaps a boy carrying
some art.  To the best of my knowledge no one EVER got any
decent sized cash payment from the Soviet Union for any act of
treason, no matter how crucial. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 TKc9QQNccF421kjpfih8YdB96RpYw17p3sjofelQ
 4yBG3NNFrBGZu5Zy/GwjHsjbhkfnJhmOU2OYDAyFn



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-24 Thread Riad S. Wahby
"Major Variola (ret)" <[EMAIL PROTECTED]> wrote:
> Back when the protocols were unprotected... much like the 'net today :-)

Hell, as recently as three years ago the pay phones in Boston could
still be red boxed.  It may actually still be possible---I haven't tried
in a while.  Haven't done it here in Austin, either.

I discovered (probably not the first time it's been discovered, but new
to me anyway) a while ago that the autodial phones in ATMs that connect
you to the bank's Retard Line could be fooled into making phone calls
for free.  You just have to start pulse dialing with the hook before the
autodialer kicks in; if you do it right the dial tone goes away fast
enough that the autodialer never activates. I never tried simply using
my own tone dialer, but it's likely that would also work unless they're
smart enough to mute the mic.

-- 
Riad S. Wahby
[EMAIL PROTECTED]



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-24 Thread J.A. Terranson

On Sat, 24 Jul 2004, Major Variola (ret) wrote:

> There might be blind cypherpunks, we don't discriminate[1],

There Is No We.

> [1] the original phone phreaks were blind,

This is a ridiculous statement, and even worse, leaks information about
your nym: [young enough to have not been there].

You are thinking of Joe "Whistler" Joe Egressia (sp?), and the kid form
New York whose names escape me at the moment.  These two do not even com
close to "the original phone phreaks were blind".  More like "at least two
of the original batch of phreaks were blind".

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  "...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them."  Osama Bin Laden
- - -

  "There aught to be limits to freedom!"George Bush
- - -

Which one scares you more?



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-24 Thread J.A. Terranson

On Sat, 24 Jul 2004, Riad S. Wahby wrote:


> for free.  You just have to start pulse dialing with the hook before the
> autodialer kicks in;

The easier way is to wait for the retard to answer, then curse at them.
They'll hang up, and in ~60 seconds you'll be back to a dial tone, and the
dialer will be none the wiser.

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  "...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them."  Osama Bin Laden
- - -

  "There aught to be limits to freedom!"George Bush
- - -

Which one scares you more?



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-24 Thread Major Variola (ret)
At 09:47 PM 7/23/04 -0500, J.A. Terranson wrote:
>> What I meant was, Ames and that FBI dude Hansen (sp?), at least the
KGB
>> got Ames' wife as part of the package, whereas the FBI CI dude
>> let his wife off as part of the deal he cut.  Nice xian that he was,
he
>> was into strippers.
>
>Aren't we *all* into strippers?

There might be blind cypherpunks, we don't discriminate[1], and most
provincial
(in both senses) laws prohibit touch.  Probably beer and sweat
overwhelms
any smells that the blind might dig.

Ever see "scent of a woman" that Al Pacino (IIRC) movie?

[1] the original phone phreaks were blind, looking (unintended pun) to
converse for free,
having lots of time, and being precise listeners of DTMF frequencies.
Back when the protocols were unprotected... much like the 'net today :-)









Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-24 Thread J.A. Terranson

On Thu, 22 Jul 2004, Major Variola (ret) wrote:

> >Undersea taps are hard.  No matter how you figure it.
>
> You think subs are just toys?

Yes.  Big ass toys for a bunch of boyz without brainz :-)  And remember,
"Ivy Bells" technology won't work here.

That aside, I'm not arguing that it is un-doable, I am arguing that it is
so difficult that it must be reserved for only those "special cases" where
the risk/cost/benefits can all be balanced out (and where there is some
backhaul available).

Attempting to do this on a universal scale, just won't, well, *scale*.
Not yet.  I am looking eagerly towards entangled photons though, just to
be sure we never reach the point of scalability  ;-)


> >The actual intel/counterintel guys make shit for money.
>
> What I meant was, Ames and that FBI dude Hansen (sp?), at least the KGB
> got Ames' wife as part of the package, whereas the FBI CI dude
> let his wife off as part of the deal he cut.  Nice xian that he was, he
> was into strippers.

Aren't we *all* into strippers?

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  "...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them."  Osama Bin Laden
- - -

  "There aught to be limits to freedom!"George Bush
- - -

Which one scares you more?



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-23 Thread Major Variola (ret)
At 12:39 AM 7/22/04 -0500, J.A. Terranson wrote:
>On Wed, 21 Jul 2004, Major Variola (ret) wrote:
>
>> I'm following the Principle of not underestimating the
>> adversary,
>
>Don't go overboard: remember that there is a difference between
>underestimating your adversary and unrealistically *over*estimating
your
>adversary.

Good point.  Channelling Hettinga, crypto is economics.

>I (and I suspect you) live in the "high tech" world,

Um, yes :-)

>while a large part of academia tends to believe that the USG is around
ten
>years *behind* them (oh, to have such an ego!).  In my personal
>experience, they tend to have roughly a five year lead on what my
>world considers "bleeding edge".  That said, I'm willing to cut them a
few
>more years of slack when doing the necessary threat assessment, but I
just
>do not believe they are 20, or even 10 years ahead.  And that is not an

>"idle" belief, it's a considered, long formed opinion, based on an
awful
>lot of input data.

Fair 'nuff.  You know that 5 year predictions are too conservative, and
20 year predictions too liberal.  Ask Orwell.

My point is only that they will be killed should they leak their
actual capabilities.

>> Perhaps that grants the Maryland trogdyltes too much, but again,
>> conservatism rules in this game.
>
>Conservatism in the real world, unreasonable paranoia in the academic
>world (a necessary thing in that context).

My academic experience had nothing to do with networking.  I'm just
a manic mechanic, okay?


>> They also get radioisotope power supplies, etc.
>
>This is actually a *very* good point.  It would also address the
off-shore
>splice vs power issue nicely.  But we are still constrained by
backhaul.

Ergo my dark fiber remark, even if naif.

>Yes, VA and DC have gluts of glass.  In fact, that is one of the most
>concentrated glut areas.

And most worth observing...

>While this cannot be discounted in toto, the tech comes to them from
>academia (most of the time), so generally, if you are widely read,
you'll
>have a pretty good idea of what's *possible*.  You are likely dead-on
>accurate about the fabs though.

In the *public* lit.

>> Albeit, "Nortel" (even if Canadian, eh?)
>
>Yup.  The Irony Meter is hanging out at the right of the scale again
:-)

Bent so many needles, I don't even know my real name...

>Undersea taps are hard.  No matter how you figure it.

You think subs are just toys?

>The actual intel/counterintel guys make shit for money.

What I meant was, Ames and that FBI dude Hansen (sp?), at least the KGB
got Ames' wife as part of the package, whereas the FBI CI dude
let his wife off as part of the deal he cut.  Nice xian that he was, he
was
into strippers.

All under $2e6, all capable of reading their own records.  Go figure,
eh?

See you in Athens, or before :-)







Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-23 Thread Thomas Shaddack

On Thu, 22 Jul 2004, Major Variola (ret) wrote:

> My point is only that they will be killed should they leak their
> actual capabilities.

Well... I am reading a book about intelligence now. Specifically, "Ernst 
Volkman: Spies - the secret agents who changed the course of history". 
Amusing book; describes many ways of intelligence fieldwork, most of them 
pretty lowtech. Eg, using business representatives as business/technology 
spies (as eg. a skilled steelworker can assess the capacity and capability 
and current processing of a factory quite at a glance, and he's often let 
in during contract negotiations), using pretty women to lure officers into 
honeytraps... or, recruiting young pretty men to seduce the not exactly 
pretty old maids who so often work as secretaries in important places.

You don't need a *LOT* of money to pull smaller-scale tricks of this kind. 
Also, using "amateurs", private enterpreneurs in the arts of burglaries, 
safecracking and other relevant areas, instead of "governmental" 
employees, poses a counterintelligence advantage that these recruits are 
unknown to the adversary (and to most of your side too, so there's less 
chance somebody will be caught or changes sides and squeaks on them).

There are many ways to get access to even pretty sensitive info. Patience 
and persistence and plethora of approaches are important here.



> >Undersea taps are hard.  No matter how you figure it.
> 
> You think subs are just toys?

"Hard" doesn't imply "impossible". It however hints on the likely success 
rate.


> >The actual intel/counterintel guys make shit for money.

Depends on whom. Often the money are the main motivation. Of course, your 
own country won't pay you as well as the other one, and will try to appeal 
to your "patriotism" like a bunch of cheapskates - it's better to be a 
contractor.

> What I meant was, Ames and that FBI dude Hansen (sp?), at least the KGB 
> got Ames' wife as part of the package, whereas the FBI CI dude let his 
> wife off as part of the deal he cut.  Nice xian that he was, he was into 
> strippers.
> 
> All under $2e6, all capable of reading their own records.  Go figure,
> eh?

And many of them disclosed their colleagues when politely asked.

But a big truth remains here - SIGINT and COMINT aren't everything, often 
a drop of HUMINT is the missing secret sauce.


Q: What's the difference between a secret service director and a gardener?
A: None. Both have their turf full of moles.



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-23 Thread Major Variola (ret)
At 10:27 AM 7/22/04 -0400, Tyler Durden wrote:
>>Gilmore et al used a bunch of old Sun Chassis for his & Kocher's
>>DEScracker.  You think this is somehow more than 100 watts, in a
>>diplo suitcase, nowadays?

My point was, Gilmore et al were way behind what's capable.
Proof of concept needn't be compact.
A suitcase can handle his DesCrack, with all due respect,
nowadays.


>OK, so you're saying that this suitcase takes in say 10 OC-192s,
demuxes all
>of them down to the DS1 level (we're at 50,000 DS1s), demaps and
unpacks the
>ATM cells, and then reassembles all of the packets therein? Questions:

Just for yucks, look up the specs on an Intel IXA processor.


>1) How does this majic box store all that data?

No store, just bridge.

>2) I've been in dozens of COs myself, and have worked extensively with
>people who have spent (collectively speaking) centuries in them. They
never
>saw such a magic box a you describe, and indeed would certainly know
about
>someone trying to install one. Or perhaps the NSA has developed a
cloaking
>device making the box invisible?

Do you think they so naif they'd expose themselves to a poster who dares

post *here* ?


>2) What silicon does t use? Are you saying that the government can do a
LOT
>better than 0.13 microns these days?

I'm saying that tech xfer on metal coated diamond is not just
for fun.  And years behind reality, for those with $400 toilet seat
budgets.


>3) If the majic box doesn't store the data, how does it get it back to
HQ?
>Telepathy?

One more time: dark fiber and compact drivers.  Or even your more subtle

unused-bandwith usage, "back atcha".


>As for trolling, well when I do it I do it with friggin' style
m'friend.

True 'nuff.  I mean no harm, only to provoke some to think, is all.
Clearly you are the uber-Sonet-troll.

:-)






Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-22 Thread Tyler Durden
Variola:
You say a lotta good shit here, but you're really out of your area in this 
case. You seem to miss the basic points, and then fill in your blindspot 
with pure theoretical conjecture. Let me point out some of the lil' flaws in 
your thinking


With all due respect, you think Ft. Meade uses the same COTS crap
as you are forced to deal with?  Bwah hah hah.
For some things, sure. Actually I know from first hand experience. (I've 
actually been in an NSA, DISA, and a few other experimental network nodes.) 
Lots of the equipment I saw was from the big vendors, most notably Lucent 
and Nortel. Somewhere deeper than I had access to, however, they almost 
certainly use special silicon.

Gilmore et al used a bunch of old Sun Chassis for his & Kocher's
DEScracker.  You think this is somehow more than 100 watts, in a
diplo suitcase, nowadays?
OK, so you're saying that this suitcase takes in say 10 OC-192s, demuxes all 
of them down to the DS1 level (we're at 50,000 DS1s), demaps and unpacks the 
ATM cells, and then reassembles all of the packets therein? Questions:

1) How does this majic box store all that data?
2) I've been in dozens of COs myself, and have worked extensively with 
people who have spent (collectively speaking) centuries in them. They never 
saw such a magic box a you describe, and indeed would certainly know about 
someone trying to install one. Or perhaps the NSA has developed a cloaking 
device making the box invisible?
2) What silicon does it use? Are you saying that the government can do a LOT 
better than 0.13 microns these days? Somehow I doubt it. Look at the 
off-the-shelf SONET chip architectures. Sure, there's lots of stuff onboard 
that you wouldn't need for what you're talking about, but getting rid of 
that stuff would still put the most advanced chip lightyears behyind what 
you're talking about.
3) If the majic box doesn't store the data, how does it get it back to HQ? 
Telepathy? Or, does it use a bank of lasers that somehow are several orders 
of magnitude more efficient that off-the-shelf lasers? (And let us remember 
that there's a fundamental constraint with bulk optics..an optical 
multiplexer or ciculator can't be an order of magnitude smaller than the 
wavelength it will support.)

JA's comments about fiber exhaust are dead-on, and were not known to most of 
the Telecom Bubble participants. (Indicates the dude knows what he's talking 
about with respect to telecom.)

But dark fibers aren't a real concern. It would be easy to develop a DWDM 
system that operated over the L or M bands, "under" the C-band wavelengths 
used by a carrier. So the problem isn't the fiber, it's lighting it.

As for my comments about cable landings, I explicity stated that the splices 
back to VA were seen and known. And yes, I was in a position to know. 
(There's not a lot you can hide in a CO...it's not like they staff them with 
NSA agents or something.)

As for trolling, well when I do it I do it with friggin' style m'friend. But 
sometimes, the truth is so mundane it looks fairly boring. Sorry to 
dissappoint you. I'm going to have to confiscate your copy of "Deepness in 
the Sky"...

-TD
_
MSN Toolbar provides one-click access to Hotmail from any Web page – FREE 
download! http://toolbar.msn.click-url.com/go/onm00200413ave/direct/01/



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-22 Thread J.A. Terranson

On Wed, 21 Jul 2004, Major Variola (ret) wrote:

> At 10:09 AM 7/21/04 -0400, Tyler Durden wrote:
> >Variola wrote...
> >
> >Dark fiber.
> >
> >"Dark Fiber" ain't a talisman you merely wave at data to get it to
> magically
> >move to where you want it to.You've got to LIGHT that fiber, and to
> light
> >that fiber you need LOTS and LOTS of power-hungry, space-occupying
> >equipment. In other words, you'd need to duplicate a significant
> fraction of
> >the current public transport network.
>
> With all due respect, you think Ft. Meade uses the same COTS crap
> as you are forced to deal with?  Bwah hah hah.

Sorry Major, I'm gonna have to call you on that one.  Yes, they are
lighting that fiber on COTS.  Likely on Nortel gear, which I can tell you
from personal experience requires an incredible amount of power, cooling,
and rackspace.

> Gilmore et al used a bunch of old Sun Chassis for his & Kocher's
> DEScracker.  You think this is somehow more than 100 watts, in a
> diplo suitcase, nowadays?

Totally different animal.  We are talking about lighting single mode fiber
and doing so for long distances: likely to standard 60-per-hop rule.  You
can't send light out that kind of distances without BIG power inputs:
lasers are not very efficient.

> Just curious as to the depth of navite in the field

As we are curious of yours.

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  "...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them."  Osama Bin Laden
- - -

  "There aught to be limits to freedom!"George Bush
- - -

Which one scares you more?



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-22 Thread Major Variola (ret)
At 10:12 PM 7/21/04 -0500, J.A. Terranson wrote:
>On Wed, 21 Jul 2004, Major Variola (ret) wrote:
>>
>> With all due respect, you think Ft. Meade uses the same COTS crap
>> as you are forced to deal with?  Bwah hah hah.
>
>Sorry Major, I'm gonna have to call you on that one.  Yes, they are
>lighting that fiber on COTS.  Likely on Nortel gear, which I can tell
you
>from personal experience requires an incredible amount of power,
cooling,
>and rackspace.

>> Just curious as to the depth of navite in the field
>
>As we are curious of yours.

Fair 'nuff.  I'm following the Principle of not underestimating the
adversary,
who does plenty of R&D, just look at their tech-transfer program,
multiply
by a few decades in capacity..

Perhaps that grants the Maryland trogdyltes too much, but again,
conservatism
rules in this game.

Remember, "Nortel" is cost-bound.  TLAs are not.  They also get
radioisotope power supplies, etc.  And unpublished tech made in
unknown fabs.

Albeit, "Nortel" (even if Canadian, eh?) etc are 0wn3d by the USG, so
taps through COTS are not so hard, and my "dark fiber" only means the
physical capacity is there.
And of course people are cheaper than tech.  Hell, the counter-intel
folks seem
to be real bargains, whether FBI or CIA.

But if you prefer to believe they play on the same field as us, go
ahead, I'll
still read your posts, and appreciate the questioning.

MV











Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-22 Thread Major Variola (ret)
At 11:28 AM 7/21/04 -0400, Tyler Durden wrote:
>
>As for the cable landings, likewise I've never heard anyone mention
that
>they saw any government equipment at the landings, so I suspect it's
>relatively minimal.


I'm sorry but I have to puke at your cluelessness.  Do you actually
think the folks in the Know would let *your kind* know of their
taps?

Frankly, you trolls are too easy; but you're probably not, which
is even more painful.  Take it as a compliment, if there really is a
TD.









Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-22 Thread Major Variola (ret)
At 10:09 AM 7/21/04 -0400, Tyler Durden wrote:
>Variola wrote...
>
>Dark fiber.
>
>"Dark Fiber" ain't a talisman you merely wave at data to get it to
magically
>move to where you want it to.You've got to LIGHT that fiber, and to
light
>that fiber you need LOTS and LOTS of power-hungry, space-occupying
>equipment. In other words, you'd need to duplicate a significant
fraction of
>the current public transport network.

With all due respect, you think Ft. Meade uses the same COTS crap
as you are forced to deal with?  Bwah hah hah.

Gilmore et al used a bunch of old Sun Chassis for his & Kocher's
DEScracker.  You think this is somehow more than 100 watts, in a
diplo suitcase, nowadays?

Just curious as to the depth of navite in the field




Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-22 Thread J.A. Terranson

On Wed, 21 Jul 2004, Major Variola (ret) wrote:

> I'm following the Principle of not underestimating the
> adversary,

Don't go overboard: remember that there is a difference between
underestimating your adversary and unrealistically *over*estimating your
adversary.

> who does plenty of R&D, just look at their tech-transfer program,
> multiply by a few decades in capacity..

I (and I suspect you) live in the "high tech" world, so we have a pretty
good grasp of the current state of the art.  As a rule, Joe Sixpack thinks
that the g'mint is a couple of trillion years ahead of Moore's Law ("Shure
they can break all that there commie crypto ssl hidden horsesheet!"),
while a large part of academia tends to believe that the USG is around ten
years *behind* them (oh, to have such an ego!).  In my personal
experience, they tend to have roughly a five year lead on what my
world considers "bleeding edge".  That said, I'm willing to cut them a few
more years of slack when doing the necessary threat assessment, but I just
do not believe they are 20, or even 10 years ahead.  And that is not an
"idle" belief, it's a considered, long formed opinion, based on an awful
lot of input data.

> Perhaps that grants the Maryland trogdyltes too much, but again,
> conservatism rules in this game.

Conservatism in the real world, unreasonable paranoia in the academic
world (a necessary thing in that context).  These are the right move.  But
in real-world assessment, if you use the academic paranoia model, you will
never be able to engineer an appropriate solution (i.e., one that
successfully balances current and expected lifetime threats, along with
project expense and elegance of implementation.

I truly think we are all addressing the very same thing - we are just
approaching it from slightly different perspectives.  I see these as
"real" engineering problems, while you are looking at them as pure
academic excersizes.  We will obviously be reaching different endpoints
this way, since we are assuming a different input set :-)

> Remember, "Nortel" is cost-bound.  TLAs are not.

Ahhh, but they are!  That's why they went to COTS in the first place (they
were forced).  The scale of that cost binding may be difficult to
ascertain since their outer cost limit is just astronomical (unless you
are Shrub, who thinks he can just print more money when he runs out), but
it does exist.

> They also get radioisotope power supplies, etc.

This is actually a *very* good point.  It would also address the off-shore
splice vs power issue nicely.  But we are still constrained by backhaul.

In answer to the earlier question of how much dark fiber is there: roughly
12% of the fiber now in the ground is lit.  Yes, there is a shitload of
capacity sitting unused.  Unfortunately, the people who buried all that
glass were all competing in pretty much the same basic areas, so what we
ended up with was orders of magnitude too much capacity around several
large hub cities, while there is a critical shortage in other places.
Yes, VA and DC have gluts of glass.  In fact, that is one of the most
concentrated glut areas.


> And unpublished tech made in unknown fabs.

While this cannot be discounted in toto, the tech comes to them from
academia (most of the time), so generally, if you are widely read, you'll
have a pretty good idea of what's *possible*.  You are likely dead-on
accurate about the fabs though.

> Albeit, "Nortel" (even if Canadian, eh?)

Yup.  The Irony Meter is hanging out at the right of the scale again :-)

>  etc are 0wn3d by the USG, so taps through COTS are not so hard,

Undersea taps are hard.  No matter how you figure it.  Pressurized cables
with PSI monitors and microsecond resolution monitoring is not something
you can break into and splice without a great deal of care.  For the
record, yes, I believe it can be, and is being done.  I would be surprised
if it was on a large scale though - even with "nukular poweer".

> and my "dark fiber" only means the physical capacity is there.

Or not, depending on geographic location.

> And of course people are cheaper than tech.

Always.  And *this* is the lesson most often forgotten.

> Hell, the counter-intel
> folks seem  to be real bargains, whether FBI or CIA.

Man, you would not believe what these guys are [not] paid!  A senior guy
may naver break 100K in his lifetime (unless s/he (a) has a
terminal degree, (b) swallows, and (c) decides to work a desk as an ASAC
or somesuch.  The actual intel/counterintel guys make shit for money.

> But if you prefer to believe they play on the same field as us, go
> ahead, I'll still read your posts, and appreciate the questioning.

Thanks, I think :-)

> MV

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  "...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them."  Osama Bin Laden
- - -

  "There aught to be limits to freedom!"G

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-21 Thread J.A. Terranson

On Wed, 21 Jul 2004, Tyler Durden wrote:

> I guess the question arises as to whether the FBI, for instance, shares it's
> network with the NSA.

You've got it backwards.

> -TD

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  "...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them."  Osama Bin Laden
- - -

  "There aught to be limits to freedom!"George Bush
- - -

Which one scares you more?



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-21 Thread Tyler Durden
Eugen Leitl wrote...
It's clearly not viable to process much underwater. How much machine room
square meters do you need at those cable landings, though?
Not that much, if all you need to do is send a spliced copy over to your own 
undersea Optical Fiber Amplification node or undersea DWDM OADM.

As for the cable landings, likewise I've never heard anyone mention that 
they saw any government equipment at the landings, so I suspect it's 
relatively minimal. A the least, it's a splice over to the FDF (THAT they've 
seen). At the most, they have a card in the carrier's transport gear where 
they've dropped-and-continued some of the traffic.

I guess the question arises as to whether the FBI, for instance, shares it's 
network with the NSA.

-TD
_
Don’t just search. Find. Check out the new MSN Search! 
http://search.msn.click-url.com/go/onm00200636ave/direct/01/



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-21 Thread Eugen Leitl
On Wed, Jul 21, 2004 at 10:20:36AM -0400, Tyler Durden wrote:

> Yes, but I think it's fairly clear that if one needs to dissasemble the 
> OC-Ns in the field, you simply need too much gear. It's going to be far 

It's clearly not viable to process much underwater. How much machine room
square meters do you need at those cable landings, though?

http://cryptome.quintessenz.at/mirror/cable-eyeball.htm

> easier to grab whole swathes of it and ship it back to Montana or wherever 
> for it to be sifted through later.

There is no "later", there's only "elsewhere". Traffic filtering is an
embarrassingly parallel problem.

It's the data mining that needs to integrate and correlate. Here is your
centralized bottleneck.

How many .gov in http://top500.org/list/2004/06/ ? Data mining is different
from Linpack.
 
> What they probably do, however, is grab specific DS1s/3s locall and switch 
> those via CALEA back to optical access points, where all of this stuff is 
> pulled together into OC-192s or (very soon) OC-768s. As Variola suggests, 
> once you get it back then you can plow through it at your leisure. Got a 
> disident you want to shut down? "Surely he's said SOMETHING over the last 2 
> years that you could incriminate him onfind it, dammit!"

-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpTm29tosZBD.pgp
Description: PGP signature


Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-19 Thread Tyler Durden
"Gimme an intel IXA network processor and no problem.  ATM is fixed
size data, not as tricky as IP decoding.  Predicatable bandwidth.
Stream all into megadisks, analyze later."
I'm gonna have to challenge this bit here, Variola.
Let's back up. You've got an OC-48 or OC-192 fiber and you want to grab ALL 
of the data in this fiber. Now I'll grant that in real life there's going to 
be a lot telephony circuit in there, but let's take a worst-case and assume 
you need ALL the data.

What's in this OC-192? Right now it definitely ain't 10Gb/s of packets. It's 
going to have LOTS of DS1s, DS3s and, if you're lucky, and STS-3c or two. So 
you'll need to first of all demux ALL of the tributaries.

Next, you've got to un-map any ATM in each of the DS1s, etc, and then pull 
out the IP data from the ATM cells, remembering to reassemble fragmented 
packets (and there will be plenty with ATM). And remember, you may have to 
do this for 5000 simultaneous DS1s. Oh, and let's not forget pointer 
adjustments. You can't just blindly grab stuff...remember that all those 
tribs come from different STRATUM 1/3 clocks, so they'll be moving at 
different speeds and as a result have periodic slips w.r.t the STS-192 
container.

And that's just one fiber. How will you actually get all of this traffic 
back to HQ? Remember, it keeps coming and won't stop.

No, I think I'm becomming convinced that they can't yet get ALL of it. But 
they DO probably grab complete wavelengths and backhual them, storing them 
for later study. (They must do some grooming too. For instance, they 
probably CALEA everything into and out of Brooklyn, and then that will get 
switched over to the Beltway where it will be packed into a GIG-BE OC-768 
back to storage and processing.)

-TD

From: "Major Variola (ret)" <[EMAIL PROTECTED]>
To: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
Subject: Re: Email tapping by ISPs, forwarder addresses, and crypto  
proxies
Date: Sun, 18 Jul 2004 22:35:19 -0700

At 01:07 PM 7/18/04 -0500, J.A. Terranson wrote:
>Let me fill in what he left out.  Yes, the industry is moving towards
>MPLS over POS.  That's not where it is now though.  At least not for
most
>interfaces.  Right now the industry is chock full of lagacy gear,
mostly
>old fashioned ATM.  You think you can just casually reassemble this
crap
>in transit?  Let's see it!
Gimme an intel IXA network processor and no problem.  ATM is fixed
size data, not as tricky as IP decoding.  Predicatable bandwidth.
Stream all into megadisks, analyze later.
You need to tap the MPLS  label assignment service (or watch all the
egress ports and correlate to endpoints) too to know which ATM chunks
went where.
>Besides that old fashioned transport diversity, we have the original
>problem: even if you could do it (maybe in three to five years), what
are
>you going to do with the data you've snarfed?  Backhaul it?  Shove it
into
>TB cassettes?  Better keep a guy on staff to change the tray!!
You don't know about tape robots, or offline indexing, eh?


_
Don’t just search. Find. Check out the new MSN Search! 
http://search.msn.click-url.com/go/onm00200636ave/direct/01/



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-19 Thread Tyler Durden

As suggested, tapping oversea fibres in shallow waters is probably the Way 
To
Do It.
Apparently NSA has it's own splicing sub for this purpose. As for US fibers, 
I've spoken to folks who have actually seen the splice in cable landings 
that went over to W. VA or wherever.

-TD
_
Don’t just search. Find. Check out the new MSN Search! 
http://search.msn.click-url.com/go/onm00200636ave/direct/01/



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-19 Thread Eugen Leitl
On Mon, Jul 19, 2004 at 07:56:05AM -0500, J.A. Terranson wrote:

> None of which qualify here - remember, the discussion was based upon a
> "quiet" implementation.

A VPN link from a *nivore box streaming filtered info is pretty quiet.

There are plenty of dedicated network processors for packet filtering
purposes: http://leitl.org/ct/2004.1/01/160/art.htm

As suggested, tapping oversea fibres in shallow waters is probably the Way To
Do It.

No way to store the entire traffic, and expect to still be able to mine it.
What is interesting is how they do VoIP voice recognition, if at all. Too
mancy simultaneous channels to screen them all, or are they?

-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpig1tQupMm0.pgp
Description: PGP signature


Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-19 Thread J.A. Terranson

On Sun, 18 Jul 2004, Major Variola (ret) wrote:

> >Besides that old fashioned transport diversity, we have the original
> >problem: even if you could do it (maybe in three to five years), what
> are
> >you going to do with the data you've snarfed?  Backhaul it?  Shove it
> into
> >TB cassettes?  Better keep a guy on staff to change the tray!!
>
> You don't know about tape robots, or offline indexing, eh?

None of which qualify here - remember, the discussion was based upon a
"quiet" implementation.

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  "...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them."  Osama Bin Laden
- - -

  "There aught to be limits to freedom!"George Bush
- - -

Which one scares you more?



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-19 Thread Major Variola (ret)
At 01:07 PM 7/18/04 -0500, J.A. Terranson wrote:
>Let me fill in what he left out.  Yes, the industry is moving towards
>MPLS over POS.  That's not where it is now though.  At least not for
most
>interfaces.  Right now the industry is chock full of lagacy gear,
mostly
>old fashioned ATM.  You think you can just casually reassemble this
crap
>in transit?  Let's see it!

Gimme an intel IXA network processor and no problem.  ATM is fixed
size data, not as tricky as IP decoding.  Predicatable bandwidth.
Stream all into megadisks, analyze later.
You need to tap the MPLS  label assignment service (or watch all the
egress ports and correlate to endpoints) too to know which ATM chunks
went where.

>Besides that old fashioned transport diversity, we have the original
>problem: even if you could do it (maybe in three to five years), what
are
>you going to do with the data you've snarfed?  Backhaul it?  Shove it
into
>TB cassettes?  Better keep a guy on staff to change the tray!!

You don't know about tape robots, or offline indexing, eh?







Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-18 Thread J.A. Terranson

On Sun, 18 Jul 2004, Tyler Durden wrote:

> JA, ya' gotta good point here. Or at least, this sheds a lot of doubt on
> things.
>
> But then again, the purpose of GIG-BE may be precisely to move an optical
> copy (use a $100 splitter) back to processing centers where the traffic is
> stored. In this case, they won't even be trying to break it down to circuits
> prior to storage...they may instead dump the raw OC-Ns directly onto some
> kind of fast storage medium and then sift through it later.
>
> The idea of duplicating all optical traffic seems a little farfetched,
> though, but I bet everything from the cable landings may soon get swallowed
> whole, if it isn't already.

Note that this is totally not the scenario we had under discussion (i.e.,
the intercepts being done at the ISP level).

If you were to ask me if Mr. Fed. was currently capable of (a)
intercepting offshore, say 3-4mi off the formal landings, (b) splice into
transatlantic fibers and send the copy down their own fibers, all of it
underwater, well, that would be a different discussion entirely.  One
we seriously discussed just after a pair of buildings became a pair of
dust factories.

I *firmly* believe this is possible, if not probable, at least on a large
scale (although probably not on a complete scale).  When the towers came
down and the feds were asking everyone to volunteer to host carnivores, we
all thought they gave up *way* too easily when turned away (at least the
were turned away where I worked - my understanding is that this was not
universal).  Subsequently, we discussed, mostly as an academic excersize,
whether we believed this was possible - and the consensus was a resounding
yes.

To listen offshore, just prior to making land, is *doable*.  Completely.
Now, three years and hundreds of hours of federal agencies interaction
later, I'd be surprised if this wasn't at least part of the problem that
NSA has with data saturation:  Are we deaf, or is the volume too loud?

Yes.

> -TD


-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  "...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them."  Osama Bin Laden
- - -

  "There aught to be limits to freedom!"George Bush
- - -

Which one scares you more?



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-18 Thread Tyler Durden
JA, ya' gotta good point here. Or at least, this sheds a lot of doubt on 
things.

But then again, the purpose of GIG-BE may be precisely to move an optical 
copy (use a $100 splitter) back to processing centers where the traffic is 
stored. In this case, they won't even be trying to break it down to circuits 
prior to storage...they may instead dump the raw OC-Ns directly onto some 
kind of fast storage medium and then sift through it later.

The idea of duplicating all optical traffic seems a little farfetched, 
though, but I bet everything from the cable landings may soon get swallowed 
whole, if it isn't already. I'm still thinking they must do some kind of 
"grooming" prior to mass backhauls of traffic. There are just too many 
fibers and too many transmission systems out there for them to duplicate all 
of it. Perhaps at the routers they sniff, and then CALEA whatever circuit 
that conversation came out of.

-TD

From: "J.A. Terranson" <[EMAIL PROTECTED]>
To: Tyler Durden <[EMAIL PROTECTED]>
CC: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Email tapping by ISPs, forwarder addresses, and crypto proxies
Date: Sun, 18 Jul 2004 13:07:10 -0500 (CDT)
On Sun, 18 Jul 2004, Tyler Durden wrote:
> "I think it would be far easier if WAN protocols were plain GBit 
Ethernet."
>
> WAN won't be 1GbE, but it will probably be 10GbE with SONET framing, or 
else
> OC-192c POS (ie, PPP-encapsulated HDLC-framed MPLS). In either case, I
> suspect it will be far cheaper in the long run to monitor a big fat pipe
> than to try to break out a zillion lil' tiny DS1s.
>
> -TD

OK, so Tyler [apparently] works in the business :-)
Let me fill in what he left out.  Yes, the industry is moving towards
MPLS over POS.  That's not where it is now though.  At least not for most
interfaces.  Right now the industry is chock full of lagacy gear, mostly
old fashioned ATM.  You think you can just casually reassemble this crap
in transit?  Let's see it!
Besides that old fashioned transport diversity, we have the original
problem: even if you could do it (maybe in three to five years), what are
you going to do with the data you've snarfed?  Backhaul it?  Shove it into
TB cassettes?  Better keep a guy on staff to change the tray!!
None of the many obstacles curretly in the way will allow this to be done
on the QT.  Semi-openly would be another story, as would the scenario of a
smaller, say regional, ISP.
--
Yours,
J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF
  "...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them."  Osama Bin Laden
- - -
  "There aught to be limits to freedom!"George Bush
- - -
Which one scares you more?
_
Discover the best of the best at MSN Luxury Living. http://lexus.msn.com/


Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-18 Thread Tyler Durden
"I think it would be far easier if WAN protocols were plain GBit Ethernet."
WAN won't be 1GbE, but it will probably be 10GbE with SONET framing, or else 
OC-192c POS (ie, PPP-encapsulated HDLC-framed MPLS). In either case, I 
suspect it will be far cheaper in the long run to monitor a big fat pipe 
than to try to break out a zillion lil' tiny DS1s.

-TD

From: Eugen Leitl <[EMAIL PROTECTED]>
To: "J.A. Terranson" <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
Subject: Re: Email tapping by ISPs, forwarder addresses, and crypto proxies
Date: Sun, 18 Jul 2004 15:34:18 +0200
On Sun, Jul 18, 2004 at 07:50:16AM -0500, J.A. Terranson wrote:
> I have seen a passive tap on a gig line used for IDS, true, but that's
> pretty close to the state of the art right now.  There's an issue with
There are dedicated network processors, though, and one can outsorce the
filter bottlenecks into an FPGA board. This is still reasonably small and
cheap.
> getting the interfaces for the 1U Dell, and then you have the secondary
> issues of just how much encapsulated crap do you need to strip off, and
> how fast.  Remeber, you only get 1 shot, and you *can't* ask for more 
time
> - if your buffer runneth over, you be screwed.
>
> It's not as easy as it feels.

I think it would be far easier if WAN protocols were plain GBit Ethernet.
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
<< attach3 >>
_
Discover the best of the best at MSN Luxury Living. http://lexus.msn.com/


Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-18 Thread J.A. Terranson

On Sun, 18 Jul 2004, Tyler Durden wrote:

> "I think it would be far easier if WAN protocols were plain GBit Ethernet."
>
> WAN won't be 1GbE, but it will probably be 10GbE with SONET framing, or else
> OC-192c POS (ie, PPP-encapsulated HDLC-framed MPLS). In either case, I
> suspect it will be far cheaper in the long run to monitor a big fat pipe
> than to try to break out a zillion lil' tiny DS1s.
>
> -TD

OK, so Tyler [apparently] works in the business :-)

Let me fill in what he left out.  Yes, the industry is moving towards
MPLS over POS.  That's not where it is now though.  At least not for most
interfaces.  Right now the industry is chock full of lagacy gear, mostly
old fashioned ATM.  You think you can just casually reassemble this crap
in transit?  Let's see it!

Besides that old fashioned transport diversity, we have the original
problem: even if you could do it (maybe in three to five years), what are
you going to do with the data you've snarfed?  Backhaul it?  Shove it into
TB cassettes?  Better keep a guy on staff to change the tray!!

None of the many obstacles curretly in the way will allow this to be done
on the QT.  Semi-openly would be another story, as would the scenario of a
smaller, say regional, ISP.

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  "...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them."  Osama Bin Laden
- - -

  "There aught to be limits to freedom!"George Bush
- - -

Which one scares you more?



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-18 Thread Tyler Durden
"At times of 10 GBit Ethernet, OC192 data rate doesn't seem all that
intimidating."
Well, as it turns out the 10GbE standard has a few flavors, and one of them 
uses a 'lite' version of OC-192 framing. So for all intents and purposes, 
consider them the same data rate.

-TD

From: Eugen Leitl <[EMAIL PROTECTED]>
To: "J.A. Terranson" <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
Subject: Re: Email tapping by ISPs, forwarder addresses, and crypto proxies
Date: Sun, 18 Jul 2004 14:46:10 +0200
On Sun, Jul 18, 2004 at 06:13:49AM -0500, J.A. Terranson wrote:
> A NIC?  You gotta realize that we're talking about mesh circuits here:
> OC3-OC48 trunks, OC192 backbones... This is no small job.  A mom/pop or
At times of 10 GBit Ethernet, OC192 data rate doesn't seem all that
intimidating.
A standard 1U Dell should have enough crunch to just filter out the
plain text packets of a 1 GBps Ethernet line.
> midsized regional maybe you could do this - you know, the guy with a 
half
> a dozen DS3s.

--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
<< attach3 >>
_
Express yourself instantly with MSN Messenger! Download today - it's FREE! 
http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-18 Thread Eugen Leitl
On Sun, Jul 18, 2004 at 05:55:02AM -0500, J.A. Terranson wrote:

> Now, *mirroring* to a couple of choke points, sure, but then you ave
> transit and other associated costs (you gotta haul the data to all of the
> collectors).

I was thinking about a box at each incoming/outgoing point with a NIC in
passive mode. Filtered traffic is a tiny fraction of total, and should be
easy to send to a central location (I presume because it's feasible to
process and store world's entire relevant text traffic in a pretty small
central facility, no one is going to bother with true distributed processing;
though filtering at the periphery already qualifies as such).

Otoh, presence of a number of such boxes is goign to need a gag order, and a
really major ISP. Small shops are too informal to be able to hide something
like that.
 
> Just not feasible to do it quietly.  Note, I said quietly.

Hardware required for tapping major arteries is going to need modified
high-end routers (filtering of cloned traffic), no? I don't see how 
this is going to be a limit on organization of the size of NSA & consorts. 

-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpGH8RQ41qnT.pgp
Description: PGP signature


Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-18 Thread Eugen Leitl
On Sun, Jul 18, 2004 at 07:50:16AM -0500, J.A. Terranson wrote:

> I have seen a passive tap on a gig line used for IDS, true, but that's
> pretty close to the state of the art right now.  There's an issue with

There are dedicated network processors, though, and one can outsorce the
filter bottlenecks into an FPGA board. This is still reasonably small and
cheap.

> getting the interfaces for the 1U Dell, and then you have the secondary
> issues of just how much encapsulated crap do you need to strip off, and
> how fast.  Remeber, you only get 1 shot, and you *can't* ask for more time
> - if your buffer runneth over, you be screwed.
> 
> It's not as easy as it feels.

I think it would be far easier if WAN protocols were plain GBit Ethernet.

-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpLxqSDx89Aj.pgp
Description: PGP signature


Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-18 Thread J.A. Terranson

On Sun, 18 Jul 2004, Eugen Leitl wrote:

> On Sun, Jul 18, 2004 at 06:13:49AM -0500, J.A. Terranson wrote:
>
> > A NIC?  You gotta realize that we're talking about mesh circuits here:
> > OC3-OC48 trunks, OC192 backbones... This is no small job.  A mom/pop or
>
> At times of 10 GBit Ethernet, OC192 data rate doesn't seem all that
> intimidating.
>
> A standard 1U Dell should have enough crunch to just filter out the
> plain text packets of a 1 GBps Ethernet line.

I have seen a passive tap on a gig line used for IDS, true, but that's
pretty close to the state of the art right now.  There's an issue with
getting the interfaces for the 1U Dell, and then you have the secondary
issues of just how much encapsulated crap do you need to strip off, and
how fast.  Remeber, you only get 1 shot, and you *can't* ask for more time
- if your buffer runneth over, you be screwed.

It's not as easy as it feels.

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  "...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them."  Osama Bin Laden
- - -

  "There aught to be limits to freedom!"George Bush
- - -

Which one scares you more?



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-18 Thread Eugen Leitl
On Sun, Jul 18, 2004 at 06:13:49AM -0500, J.A. Terranson wrote:

> A NIC?  You gotta realize that we're talking about mesh circuits here:
> OC3-OC48 trunks, OC192 backbones... This is no small job.  A mom/pop or

At times of 10 GBit Ethernet, OC192 data rate doesn't seem all that
intimidating. 

A standard 1U Dell should have enough crunch to just filter out the 
plain text packets of a 1 GBps Ethernet line.

> midsized regional maybe you could do this - you know, the guy with a half
> a dozen DS3s.

-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgphUuwrbnENi.pgp
Description: PGP signature


Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-18 Thread J.A. Terranson

On Sun, 18 Jul 2004, Eugen Leitl wrote:

> I was thinking about a box at each incoming/outgoing point with a NIC in
> passive mode.

A NIC?  You gotta realize that we're talking about mesh circuits here:
OC3-OC48 trunks, OC192 backbones... This is no small job.  A mom/pop or
midsized regional maybe you could do this - you know, the guy with a half
a dozen DS3s.


-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  "...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them."  Osama Bin Laden
- - -

  "There aught to be limits to freedom!"George Bush
- - -

Which one scares you more?



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-18 Thread Eugen Leitl
On Sat, Jul 17, 2004 at 02:06:40PM -0700, Bill Stewart wrote:

> On the other hand, 100,000 employees times two disk drives per desktop
> and a few departmental servers can get you that much capacity.

I understand there is this thing called a black budget. The production 
rate limit of plain text is human fingers. If you want to keep it all
online, your burn rate is a kilobuck/day for hardware.

Filtering traffic to extract relevant parts is going to cost a bit more,
especially if you're using centralized taps and not server clouds in the
periphery.

For those of you who have worked at major ISPs, can the fact that traffic is
routed through a few "customer" boxes be hidden from employees?

-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgp8RNv4H8YKL.pgp
Description: PGP signature


Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-18 Thread J.A. Terranson

On Sun, 18 Jul 2004, Eugen Leitl wrote:

> For those of you who have worked at major ISPs, can the fact that traffic is
> routed through a few "customer" boxes be hidden from employees?

Speaking as someone who qualifies: no.  However, the fact that you even
asked the question begs another question, namely, what do you consider
"major"?  Savvis was, in my opinion, at the very lower end of "major",
operating in ~140 countries, although most of that was vpn and multicast.
Lets guess that internet was considerably less, say ~15-20 countries
directly.

In short, the trouble with trying to stuff all this through a choke point
(or even 10 choke points) is it's going to be either seen directly as a
router hop (if at layer3), or seen indirectly at layer two.  And the kind
of detailed troubleshooting that goes on in the first through third level
support groups just wouldn't be able to miss this - sooner or later
someone whold see something, and then the whole place would know.

Now, *mirroring* to a couple of choke points, sure, but then you ave
transit and other associated costs (you gotta haul the data to all of the
collectors).

Just not feasible to do it quietly.  Note, I said quietly.

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  "...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them."  Osama Bin Laden
- - -

  "There aught to be limits to freedom!"George Bush
- - -

Which one scares you more?



zks source (Re: Email tapping by ISPs, forwarder addresses, and crypto proxies)

2004-07-14 Thread Adam Back
You could try sending an email to Austin Hill <[EMAIL PROTECTED]> to see
if he could organize releasing source for remaining freedom related
source that they are not currently using.

Adam

On Wed, Jul 07, 2004 at 02:34:04PM -0700, Steve Schear wrote:
> I wonder if the mail 2.0 code could be publicly released so it could be 
> used with the forthcoming i2p IP overlay http://www.i2p.net/ ?
> 
> steve 
> 
> At 01:09 PM 7/7/2004, Adam Back wrote:
> 
> >Then we implemented a replacement version 2 mail system that I
> >designed.  The design is much simpler.  With freedom anonymous
> >networking you had anyway a anonymous interactive TCP feature.  So we
> >just ran a standard pop box for your nym.  Mail would be delivered to
> >it directly (no reply block) for internet senders.  Freedom senders
> >would send via anonymous IP again to get sender anonymity.  Used qmail
> >as the mail system.
> >
> >Unfortunately they closed down the freedom network pretty soon after
> >psuedonymous mail 2.0 [3] was implemented.



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-08 Thread Anonymous via the Cypherpunks Tonga Remailer

>I can't imagine any intelligence professional wasting her time reading
>the crap at times coming over this list.

As of mid 2000 most of traffic is recorded. By this time 'most' is very close to 
'all'. But if you e-mail someone with account on the same local ISP, using dial-in at 
the recipient is also using dial-in, and ISP didn't farm-out dial-in access, then your 
message may not be backed up forever.




Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-08 Thread Steve Schear
At 01:09 PM 7/7/2004, Adam Back wrote:
Then we implemented a replacement version 2 mail system that I
designed.  The design is much simpler.  With freedom anonymous
networking you had anyway a anonymous interactive TCP feature.  So we
just ran a standard pop box for your nym.  Mail would be delivered to
it directly (no reply block) for internet senders.  Freedom senders
would send via anonymous IP again to get sender anonymity.  Used qmail
as the mail system.
Unfortunately they closed down the freedom network pretty soon after
psuedonymous mail 2.0 [3] was implemented.
I wonder if the mail 2.0 code could be publicly released so it could be 
used with the forthcoming i2p IP overlay http://www.i2p.net/ ?

steve 



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread J.A. Terranson

On Wed, 7 Jul 2004, Steve Schear wrote:

> Perhaps, but at a Bay Area meeting a few years back held to discuss
> NSA/SIGINT, I think it was held on the Stanford campus, a developer
> disclosed that an American contractor manufacturer had won a contract to
> install 250,000 high-capacity disk drives at one of these agenicies.
>
> stveve

Lets look at that for a second.

"A few years ago".  Lets call it two years ago.  That would make the
average hi-cap drive around 30gb.  We'll have to assume they want these to
be fault-tolerant and with host stanbys, since this *is* the standard
implementation, so:

250,000 drives
divie by 5 to get RAID groups = 50K groups of 90gb each, or
~4.6 petabytes for this one order.

4.6pb may be a lot, but it wouldn't hold much of the worlds traffic -
there's a hell of a lot of filtering going on.

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]

  "...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them."

  Osama Bin Laden





Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread Adam Back
This is somewhat related to what ZKS did in their version 1 [1,2] mail
system.

They made a transparent local pop proxy (transparent in that it
happened at firewall level, did not have to change your mail client
config).  In this case they would talk to your real pop server,
decrypt the parts (they were reply-block like onions), remove
duplicates (as with mixmaster etc you can send duplicates via separate
remailers to improve reliability).  So the transparent proxy would
leave alone your normal mail that you received in the pop box and
remove duplicates only from the reply-block delivered pseudonymous
mail.

Actually they implemented the reply-block from scratch, it always
seemed to me it would have been less development work to use mixmaster
(it was implemented before I started).  The ZKS reply block did not
even use chunking (ala mixmaster) so traffic analysis would have been
trivial as the message size would show through.

At least that's what I recall, no chunking.  However I am finding the
security issues paper [1] says otherwise.  The 1.0 architecture
document [2] is ambiguous, there is no mention of chunking.

(I've sent mail to one of the original developers to check I have it
right).

It was also unreliable because it did not use SMTP, it used its own
transport AMTP and its own retry-semantics on nodes called
MAIPs. (Mail AIPs, an AIP is an "Anonymous Internet Proxy").


Then we implemented a replacement version 2 mail system that I
designed.  The design is much simpler.  With freedom anonymous
networking you had anyway a anonymous interactive TCP feature.  So we
just ran a standard pop box for your nym.  Mail would be delivered to
it directly (no reply block) for internet senders.  Freedom senders
would send via anonymous IP again to get sender anonymity.  Used qmail
as the mail system.

Unfortunately they closed down the freedom network pretty soon after
psuedonymous mail 2.0 [3] was implemented.

There is an interesting trade-off here.  The interactive
communications are perhaps more vulnerable to real-time powerful
adversary traffic analysis than mixmaster style mixed chunked
delivery.  However they are less vunerable to subpoena because they
are forward-secret on a relativey short time-frame.  (1/2 hr if I
recall; however more recent designs such as chainsaw internal
prototype, and cebolla [4] by ex-ZKSer Zach Brown change keys down to
second level by using a mix of backward-security based on symmetric
key hashing (and deleting previous key) and forward security using DH.)

It would be nice to get both types of anonymity, but I suspect for
most typical users the discovery / subpeona route is the major danger,
and if that is thwarted it is unlikely that their activities would
warrant the effort of real time analysis.  Well we have carnivore now,
so they could potentially do real-time traffic analysis more routinely
if they were to distribute enough collaborating analysis carnivore
plugins.

Adam

[1] http://www.homeport.org/~adam/zeroknowledgewhitepapers/security-issues.pdf
[2] http://www.homeport.org/~adam/zeroknowledgewhitepapers/arch-notech.pdf
[3] http://www.cypherspace.org/adam/pubs/freedom2-mail.pdf
[4] http://www.cypherspace.org/cebolla/

On Tue, Jul 06, 2004 at 02:47:43PM -0700, "Hal Finney" wrote:
> Recently there was a proposal for a nym receiving service,
> http://www.freehaven.net/doc/pynchon-gate/, by Bran Cohen and Len
> Sassaman.  They have a complicated protocol for downloading email
> anonymously.  To hide the complexity, they propose to set up a POP
> compatible mail server agent on the user's computer running as a daemon
> process (Windows service).  He would configure his mailer to connect to
> localhost:4949 or whatever, just like any other POP server.  The service
> would periodically go out and poll for email using the fancy protocol,
> but then it would make it available to the local mail agent in perfectly
> vanilla form.  The point is that this architecture hides the complexity
> and makes it transparent for end users to use arbitrarily complex crypto
> for mail receiving.  Something similar would be perfect for your idea.



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread Steve Schear
At 07:28 AM 7/7/2004, Tyler Durden wrote:
"If you think the cable landings in Va/Md are coincidental, you are
smoking something I've run out of.  Its all recorded.  I'm sure the
archiving and database groups in Ft. Meade will get a chuckle out of your
"the right to" idioms."
Well, I don't actually believe it's all recorded. As I've attempted to 
explain previously, "they" almost certainly have risk models in place. 
When several variables twinkle enough (eg, origination area, IP address, 
presence of crypto...) some rule fires and then diverts a copy into the 
WASP'S Nest. There's probably some kind of key word search that either 
diverts the copy into storage or into the short list for an analyst to peek it.
Perhaps, but at a Bay Area meeting a few years back held to discuss 
NSA/SIGINT, I think it was held on the Stanford campus, a developer 
disclosed that an American contractor manufacturer had won a contract to 
install 250,000 high-capacity disk drives at one of these agenicies.

stveve 



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread Sunder

On Wed, 7 Jul 2004, Tyler Durden wrote:

> "If you think the cable landings in Va/Md are coincidental, you are
> smoking something I've run out of.  Its all recorded.  I'm sure the
> archiving and database groups in Ft. Meade will get a chuckle out of your
> "the right to" idioms."
> 
> Well, I don't actually believe it's all recorded. As I've attempted to 
> explain previously, "they" almost certainly have risk models in place. When 
> several variables twinkle enough (eg, origination area, IP address, presence 
> of crypto...) some rule fires and then diverts a copy into the WASP'S Nest. 
> There's probably some kind of key word search that either diverts the copy 
> into storage or into the short list for an analyst to peek it.

To channel Mr. May: "All of this of course can be put to rest by reading
some Bamford. (Body of Secrets, Puzzle Palace.)"



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread Eugen Leitl
On Wed, Jul 07, 2004 at 10:28:01AM -0400, Tyler Durden wrote:

> Well, I don't actually believe it's all recorded. As I've attempted to 
> explain previously, "they" almost certainly have risk models in place. When 
> several variables twinkle enough (eg, origination area, IP address, 
> presence of crypto...) some rule fires and then diverts a copy into the 
> WASP'S Nest. There's probably some kind of key word search that either 
> diverts the copy into storage or into the short list for an analyst to peek 
> it.

How much plain text can ~10^9 online monkeys daily enter into their keyboard? 
A ~10^3 average ballpark gives you a TByte/day (minus the redundancy), which
is currently a 1U worth of SATA RAID/day, or 3 years worth of world's entire traffic
in a 10^3 node cluster, which is on the low side these days. 
Hard drive storage density goes up exponentially, and probably
faster than people can go online (the old world has saturated) -- it isn't a
problem, given that population increase doesn't occur at these growth rates. 
You don't have to delete anything, ever.

Given what Google manages with some 10^4..10^5 nodes, this problem set looks puny in
comparison. Keeping the data on a cluster gives you the local crunch to do
some very nontrivial data mining, especially if you narrow the scope down
sufficiently to be able to lock the data in memory and crunch it there.

Fax OCR/telex is just as easy, speech recognition doable, given the budget.

We don't know whether they are actually doing it (I *think* these people are
too conservative to be doing clusters right now, so they're probably doing
storage hierarchies with tape libraries -- but then they as well could be MIB
types years ahead of the mainstream), the point it is that they
could, given the documented amount of hired talent and official budget.

-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpge4v738Vwi.pgp
Description: PGP signature


Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread Major Variola (ret)
>> Absolutely, look at the threat model.  You're not worried about
someone
>> breaking into your computer, you're worried about your ISP legally
>> reading your email.

Guaranteed, and encryption is bait.  Use stego.

>That's very true, however there can be operators you trust more than
your
>ISP, eg. a group of friends running such forwarder offshore.

Until they're busted and open up...

As Zappa sang, the hot iron sausage... and the sinister midget...








Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread Eugen Leitl
On Tue, Jul 06, 2004 at 09:40:29PM -0700, Major Variola (ret) wrote:

> smoking something I've run out of.  Its all recorded.  I'm sure the
> archiving
> and database groups in Ft. Meade will get a chuckle out of your
> "the right to" idioms.

All this stuff goes into some database slot. It will only get reviewed by a
human analyst if the ranking function trips over threshold (or reviewed
forensically after the fact). 

I can't imagine any intelligence professional wasting her time reading 
the crap at times coming over this list.

-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpsbjR4gltul.pgp
Description: PGP signature


Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread Major Variola (ret)
At 06:58 AM 7/7/04 +0200, Eugen Leitl wrote:
>I can't imagine any intelligence professional wasting her time reading
>the crap at times coming over this list.

Frankly sir, that's because you have no idea of their budget,
or their fascistic urges.Its not paranoia to think you're tapped,
its rationality.

---

"Stop shedding our blood to save your own and the solution to this
simple
 but complex equation is in your hands. You know matters will escalate
the more you
delay and then do not blame us but blame yourselves. Rational people do
not risk their
security, money and sons to appease the White House liar."




Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread Bill Stewart
At 02:47 PM 7/6/2004, Hal Finney wrote:
Thomas Shaddack writes:
> There are various email forwarding services, which are nothing more than a
> SMTP server with pairs of [EMAIL PROTECTED] --
> [EMAIL PROTECTED]
Right, mostly for use as disposable email addresses.
I've used spamgourmet to good effect, myself.
They're also marketed as permanent addresses you can keep when
you change ISPs, for example pobox.com was one of the first ones.
Unfortunately, as far as I know, none of the forwarders let you
forward mail from [EMAIL PROTECTED] to [EMAIL PROTECTED],
which means that they don't support tag-based spam protection.
When I want disposable addresses, I either use free providers,
or I use tagged addresses at free / cheap providers like fastmail.fm.
One thing I haven't understood in all the commentary is whether law
enforcment still needs a warrant to access emails stored in this way.
Apparently the ISP can read them without any notice or liability, but
what about the police?
Councilman currently only affects the First Circuit (the Northeast),
and it was only the three-judge-panel version of the Appeals Court,
so he could appeal it to the full court before going to the Supremes.
My reading of the opinions is that the two majority judges totally
failed to grasp the technology, while the dissenting judge got it,
so even if the opinion stands, it's very narrow in scope -
but it's a strong reminder that the current laws don't protect
stored email very well, and that if judges aren't technical enough
to understand it when it's laid out in front of their faces,
they're certainly not going to be sufficiently uncooperative
when police try to get warrants or subpoenas (or at least it
probably won't be hard for police to find a cooperative judge.)
Also, in the Steve Jackson Games case, the courts and Feds got away
with declaring that the ECPA didn't apply to mail that had arrived
in mailboxes, only to mail that was in transit.
It's not clear that ISPs in general can read mail without any
notice or liability - just that the obvious readings of the law
that Councilman sued them under don't currently work in the 1st Circuit.
He might have tried various business-related torts successfully,
but the wiretapping laws looked like a slam-dunk.
But that doesn't usually work against police, just businesses.
Police reading mail like this really is a different case -
they either need some kind of court papers to hand the ISP
(though these days the Patriot Act seems to be used to justify
almost anything and place a gag order on the activity,
and a subpoena is easier to get than a warrant),
or they need some bogus justification that the ISP has to
obey "administrative requests" that aren't court-issued,
or they need to wiretap the bits legally.
Also, what if you run your own mail spool, so the email is never stored
at the ISP, it just passes through the routers controlled by the ISP
(just like it passed through a dozen other routers on the internet).
Does this give the ISP (and all the other router owners) the right to
read your email?  I don't think so, it seems like that would definitely
cross over the line from "mail in storage" to "mail in transit".
One scary thing about Councilman was that it happened in a case
where the government was vaguely neutral and responsible for protecting
the citizen's privacy - when the prosecutors are _trying_ to get
outrageously twisted anti-privacy rulings they're more likely to win.
In particular, does a message count as "in transit" if you're
only hauling IP packets around with parts of the message
rather than the whole message, or does each part count as "in storage"
when it's gotten to a router that has to queue it before
forwarding it on to the next hop?  Or if the whole message
is queued in your ISP's sendmail queue because you've got an MX there?
What about _outgoing_ mail queued at your ISP,
who's being a good anti-spammer and forcing you to use
their mail transfer agent instead of sending directly to the destination?
> There can be an easy enhancement for such forwarder service; GnuPG proxy.
There are several different threat models to think about -
- Greedy ISP reading your mail for their own purposes
- ISP responding to court-ordered wiretapping
- ISP collaborating enthusiastically with police
- Police wiretapping without court orders
- All of the above, but for stored mailboxes, not in-transit
- All of the above, but for traffic analysis / headers, not content
Mail-handling services don't prevent any of the in-transit threats,
but they can eliminate most of the threats to stored mailboxes,
and they do let you move your vulnerability to a different jurisdiction,
which can potentially reduce the likelihood that they'll wiretap you there.
For instance, if you're using your local cable modem company
for mailbox services, and you annoy your local police,
they may try to tap you, but police in Anguilla will probably
only try to tap you if you've gotten the US Feds or MI5/MI6 annoyed.
Police in

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread Tyler Durden
"If you think the cable landings in Va/Md are coincidental, you are
smoking something I've run out of.  Its all recorded.  I'm sure the
archiving and database groups in Ft. Meade will get a chuckle out of your
"the right to" idioms."
Well, I don't actually believe it's all recorded. As I've attempted to 
explain previously, "they" almost certainly have risk models in place. When 
several variables twinkle enough (eg, origination area, IP address, presence 
of crypto...) some rule fires and then diverts a copy into the WASP'S Nest. 
There's probably some kind of key word search that either diverts the copy 
into storage or into the short list for an analyst to peek it.

-TD

From: "Major Variola (ret)" <[EMAIL PROTECTED]>
To: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
Subject: Re: Email tapping by ISPs, forwarder addresses, and crypto  
proxies
Date: Tue, 06 Jul 2004 21:40:29 -0700

At 02:47 PM 7/6/04 -0700, Hal Finney wrote:
>> Messages in storage have much lower judicial protection than messages
in
>> transit. (This does not have much technical merit, in the current
>> atmosphere of "damn the laws - there are terrorists around the
corner",
>> but can be seen as a nice little potential benefit.)
Ie zero.
>One thing I haven't understood in all the commentary is whether law
>enforcment still needs a warrant to access emails stored in this way.
>Apparently the ISP can read them without any notice or liability, but
>what about the police?
You are state meat, whether 5150'd or not.
>Also, what if you run your own mail spool, so the email is never stored
>at the ISP, it just passes through the routers controlled by the ISP
>(just like it passed through a dozen other routers on the internet).
>Does this give the ISP (and all the other router owners) the right to
>read your email?  I don't think so, it seems like that would definitely
>cross over the line from "mail in storage" to "mail in transit".
If you think the cable landings in Va/Md are coincidental, you are
smoking something I've run out of.  Its all recorded.  I'm sure the
archiving
and database groups in Ft. Meade will get a chuckle out of your
"the right to" idioms.



_
MSN 9 Dial-up Internet Access helps fight spam and pop-ups – now 2 months 
FREE! http://join.msn.click-url.com/go/onm00200361ave/direct/01/



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread Major Variola (ret)
At 02:47 PM 7/6/04 -0700, Hal Finney wrote:
>> Messages in storage have much lower judicial protection than messages
in
>> transit. (This does not have much technical merit, in the current
>> atmosphere of "damn the laws - there are terrorists around the
corner",
>> but can be seen as a nice little potential benefit.)

Ie zero.

>One thing I haven't understood in all the commentary is whether law
>enforcment still needs a warrant to access emails stored in this way.
>Apparently the ISP can read them without any notice or liability, but
>what about the police?

You are state meat, whether 5150'd or not.

>Also, what if you run your own mail spool, so the email is never stored

>at the ISP, it just passes through the routers controlled by the ISP
>(just like it passed through a dozen other routers on the internet).
>Does this give the ISP (and all the other router owners) the right to
>read your email?  I don't think so, it seems like that would definitely

>cross over the line from "mail in storage" to "mail in transit".

If you think the cable landings in Va/Md are coincidental, you are
smoking something I've run out of.  Its all recorded.  I'm sure the
archiving
and database groups in Ft. Meade will get a chuckle out of your
"the right to" idioms.








Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread Thomas Shaddack

On Tue, 6 Jul 2004, Hal Finney wrote:

> > There are various email forwarding services, which are nothing more than a 
> > SMTP server with pairs of [EMAIL PROTECTED] -- 
> > [EMAIL PROTECTED]
> 
> Right, mostly for use as disposable email addresses.  I've used
> spamgourmet to good effect, myself.

I wrote the patch for qmail's fastforward for similar purposes. Everything 
in the name that is beyond the specified wildcard is ignored when 
resolving the mail alias (but stays there for procmail processing). As 
added benefit, the addresses that receive spam can be used for teaching 
bogofilter.

> > Messages in storage have much lower judicial protection than messages in 
> > transit. (This does not have much technical merit, in the current 
> > atmosphere of "damn the laws - there are terrorists around the corner", 
> > but can be seen as a nice little potential benefit.)
> 
> One thing I haven't understood in all the commentary is whether law
> enforcment still needs a warrant to access emails stored in this way.
> Apparently the ISP can read them without any notice or liability, but
> what about the police?

Let's expect them so as well. The ISP can hand them over to the police 
anyway, like a nosy neighbour fink finding your grass stash.

> Also, what if you run your own mail spool, so the email is never stored
> at the ISP, it just passes through the routers controlled by the ISP
> (just like it passed through a dozen other routers on the internet).
> Does this give the ISP (and all the other router owners) the right to
> read your email?  I don't think so, it seems like that would definitely
> cross over the line from "mail in storage" to "mail in transit".

If it passes through their SMTP servers, I am not sure. If it goes only 
through their routers, I'd think it's definitely in transit.

> > There can be an easy enhancement for such forwarder service; GnuPG proxy. 
> > Every email that arrives to the forwarder address, before it is forwarded 
> > to the real recipient, is piped through a GnuPG script; the recipient has 
> > then to upload his public key during the registration of the target 
> > address, otherwise the function is the same.
> 
> That's a great idea.  You'd want to be sure and encrypt the whole message
> including headers, and make the whole thing an encrypted attachment.
> Has the added side benefits of compressing the email, and you could even
> have the server do some spam filtering.

The original idea I based it on was encrypting everything including the 
headers on the sender, then decrypting it on the receiver relay, and 
adding the data about the decryption of the message into the headers in 
some unspoofable way (eg. if the headers were there already when the 
message arrived to the decrypting script, prepend X- to them - not 
really bulletproof but rather decent).

> > For added benefit, the forwarder should support SMTP/TLS (STARTTLS) 
> > extension, so the connections from security-minded owners of their own 
> > mailservers would be protected.
> 
> STARTTLS support at the proxy should pretty much go without saying these
> days, so you might as well do it, but if you're already PGP encrypting
> then it's not adding that much security.  Well, maybe it does, but you're
> talking about a different threat.

It hides the fact encrypted comm is in use. Which may be handy on its own.

> For the problem that ISPs can read your email in storage, STARTLS 
> doesn't help much because it will only protect the email until it gets 
> to your local ISP, who will store your email for you and can read it 
> then (which is where the PGP comes in).

That's true. But it protects the data in transit nearly for free.

> Where STARTTLS would help is with power users who run their own mail
> servers.  But those people don't suffer from the problem we are talking
> about here, legal access to the email by the ISP (I think, see above).
> Nevertheless a mail-receiving proxy that uses STARTTLS connections to
> power users would be kind of cool because it would keep anyone local
> from knowing anything about the incoming mail.  Hopefully, STARTTLS will
> eventually become so widespread that this functionality will be redundant,
> but we are not there yet.

STARTTLS is by far not widespread. Few people use it, including the 
knowledgeable ones. :(((

> > (I know, auto-decryption is dangerous, but we now talk about the system 
> > for one's grandma, transparent to use.)
> 
> Absolutely, look at the threat model.  You're not worried about someone
> breaking into your computer, you're worried about your ISP legally
> reading your email.  To address this threat, auto-decryption is a
> perfect solution.

It's always better to select overly restrictive threat model and then 
loose it when necessary, than the other way. An omission then results in 
more work instead of a security hole.

> He would configure his mailer to connect to localhost:4949 or whatever, 
> just like any other POP server.

With a local 

Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread Thomas Shaddack

Reading some news about the email wiretapping by ISPs, and getting an 
idea.

There are various email forwarding services, which are nothing more than a 
SMTP server with pairs of [EMAIL PROTECTED] -- 
[EMAIL PROTECTED]

Messages in storage have much lower judicial protection than messages in 
transit. (This does not have much technical merit, in the current 
atmosphere of "damn the laws - there are terrorists around the corner", 
but can be seen as a nice little potential benefit.)

There can be an easy enhancement for such forwarder service; GnuPG proxy. 
Every email that arrives to the forwarder address, before it is forwarded 
to the real recipient, is piped through a GnuPG script; the recipient has 
then to upload his public key during the registration of the target 
address, otherwise the function is the same. For added benefit, the 
forwarder should support SMTP/TLS (STARTTLS) extension, so the connections 
from security-minded owners of their own mailservers would be protected.

The recipient himself then can either run his own mailserver and download 
mails through fetchmail, or receive mails using SMTP/ETRN (both methods 
allow automated decryption of such wrapped mail during its receiving), or 
use a POP/IMAP decryption proxy, or have a plugin in mail client.

(I know, auto-decryption is dangerous, but we now talk about the system 
for one's grandma, transparent to use.)

The only vulnerable parts of the mail route then will be the sender's 
computer, the pathway between the sender and the forwarder server (if 
SMTP/TLS is not used correctly or at all), the forwarder server (if 
compromised), and the recipient's computer. The way between the forwarder 
and the recipient's ISP, including the recipient's mailbox, is secured.

What do you think about this scheme?



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread Eugen Leitl
On Tue, Jul 06, 2004 at 11:36:11PM -0700, Major Variola (ret) wrote:
> At 06:58 AM 7/7/04 +0200, Eugen Leitl wrote:
> >I can't imagine any intelligence professional wasting her time reading
> >the crap at times coming over this list.
> 
> Frankly sir, that's because you have no idea of their budget,
> or their fascistic urges.Its not paranoia to think you're tapped,
> its rationality.

Of course we're tapped, despite funky headers like

Received: from positron.jfet.org (positron.jfet.org [66.136.223.122])
(using TLSv1 with cipher EDH-RSA-DES-CBC3-SHA (168/168 bits))
(Client CN "positron.mit.edu", Issuer "positron.mit.edu" (not
verified))
by leitl.org (Postfix) with ESMTP id BDD9D3A8326
for <[EMAIL PROTECTED]>; Wed,  7 Jul 2004 08:39:41 +0200 (CEST)
Received: from positron.jfet.org (localhost [127.0.0.1])
by positron.jfet.org (8.12.11/8.12.11/Debian-3) with ESMTP id
i676giK6021720
(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT)
for <[EMAIL PROTECTED]>; Wed, 7 Jul 2004
01:42:44 -0500

just don't fool yourself about all your fans at Mt. Spook central ejecting 
coffee through their nose at our jokes and witticisms. Databases, despite
much improved, don't have a good sense of humor.

-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpBX7H8lAFAM.pgp
Description: PGP signature


Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread "Hal Finney"
Thomas Shaddack writes:

> Reading some news about the email wiretapping by ISPs, and getting an 
> idea.
>
> There are various email forwarding services, which are nothing more than a 
> SMTP server with pairs of [EMAIL PROTECTED] -- 
> [EMAIL PROTECTED]

Right, mostly for use as disposable email addresses.  I've used
spamgourmet to good effect, myself.

> Messages in storage have much lower judicial protection than messages in 
> transit. (This does not have much technical merit, in the current 
> atmosphere of "damn the laws - there are terrorists around the corner", 
> but can be seen as a nice little potential benefit.)

One thing I haven't understood in all the commentary is whether law
enforcment still needs a warrant to access emails stored in this way.
Apparently the ISP can read them without any notice or liability, but
what about the police?

Also, what if you run your own mail spool, so the email is never stored
at the ISP, it just passes through the routers controlled by the ISP
(just like it passed through a dozen other routers on the internet).
Does this give the ISP (and all the other router owners) the right to
read your email?  I don't think so, it seems like that would definitely
cross over the line from "mail in storage" to "mail in transit".

> There can be an easy enhancement for such forwarder service; GnuPG proxy. 
> Every email that arrives to the forwarder address, before it is forwarded 
> to the real recipient, is piped through a GnuPG script; the recipient has 
> then to upload his public key during the registration of the target 
> address, otherwise the function is the same.

That's a great idea.  You'd want to be sure and encrypt the whole message
including headers, and make the whole thing an encrypted attachment.
Has the added side benefits of compressing the email, and you could even
have the server do some spam filtering.

> For added benefit, the 
> forwarder should support SMTP/TLS (STARTTLS) extension, so the connections 
> from security-minded owners of their own mailservers would be protected.

STARTTLS support at the proxy should pretty much go without saying these
days, so you might as well do it, but if you're already PGP encrypting
then it's not adding that much security.  Well, maybe it does, but you're
talking about a different threat.  For the problem that ISPs can read
your email in storage, STARTLS doesn't help much because it will only
protect the email until it gets to your local ISP, who will store your
email for you and can read it then (which is where the PGP comes in).

Where STARTTLS would help is with power users who run their own mail
servers.  But those people don't suffer from the problem we are talking
about here, legal access to the email by the ISP (I think, see above).
Nevertheless a mail-receiving proxy that uses STARTTLS connections to
power users would be kind of cool because it would keep anyone local
from knowing anything about the incoming mail.  Hopefully, STARTTLS will
eventually become so widespread that this functionality will be redundant,
but we are not there yet.


> The recipient himself then can either run his own mailserver and download 
> mails through fetchmail, or receive mails using SMTP/ETRN (both methods 
> allow automated decryption of such wrapped mail during its receiving), or 
> use a POP/IMAP decryption proxy, or have a plugin in mail client.
>
> (I know, auto-decryption is dangerous, but we now talk about the system 
> for one's grandma, transparent to use.)

Absolutely, look at the threat model.  You're not worried about someone
breaking into your computer, you're worried about your ISP legally
reading your email.  To address this threat, auto-decryption is a
perfect solution.

Recently there was a proposal for a nym receiving service,
http://www.freehaven.net/doc/pynchon-gate/, by Bran Cohen and Len
Sassaman.  They have a complicated protocol for downloading email
anonymously.  To hide the complexity, they propose to set up a POP
compatible mail server agent on the user's computer running as a daemon
process (Windows service).  He would configure his mailer to connect to
localhost:4949 or whatever, just like any other POP server.  The service
would periodically go out and poll for email using the fancy protocol,
but then it would make it available to the local mail agent in perfectly
vanilla form.  The point is that this architecture hides the complexity
and makes it transparent for end users to use arbitrarily complex crypto
for mail receiving.  Something similar would be perfect for your idea.


> The only vulnerable parts of the mail route then will be the sender's 
> computer, the pathway between the sender and the forwarder server (if 
> SMTP/TLS is not used correctly or at all), the forwarder server (if 
> compromised), and the recipient's computer. The way between the forwarder 
> and the recipient's ISP, including the recipient's mailbox, is secured.
>
> What do you think about this scheme?

I think it's