home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.privacy      Discussing privacy, laws, tinfoil hats      112,147 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 111,855 of 112,147   
   Gabx to All   
   fog v1.3.3 - Anonymous SMTP Relay with S   
   02 Nov 25 14:17:06   
   
   XPost: sci.crypt, alt.privacy.anon-server   
   From: info@tcpreset.invalid   
      
   ## What is fog?   
      
   fog is an anonymous SMTP relay system that uses the Sphinx mixnet   
   protocol to provide strong sender anonymity through multi-hop routing   
   over Tor hidden services.   
   Messages are encrypted in layers (onion routing) and forwarded   
   through 3-6 randomly selected nodes before reaching their destination.   
      
   ### What Works ✓   
      
   - **Sphinx Mixnet Protocol**: Full implementation with AES-256-GCM   
   encryption   
   - **Variable-Hop Routing**: Random 3-6 hops per message   
   - **Random Route Selection**: Complete shuffling of available nodes   
   - **Batch Processing**: Messages batched and shuffled to resist timing   
   attacks   
   - **Forward Secrecy**: Ephemeral ECDH keys for each hop   
   - **Tor Integration**: All inter-node communication over Tor hidden services   
   - **SMTP Gateway**: Standard SMTP interface for sending messages   
   - **Persistent Keys**: Node keys saved and reloaded across restarts   
   - **Multi-Node Network**: Successfully tested with 4 nodes   
      
   ### Technical Details   
      
   Encryption:   
      - AES-256-GCM for payload encryption   
      - Curve25519 ECDH for shared secrets   
      - HKDF for key derivation   
      - HMAC-SHA256 for authentication (first hop only)   
      
   Security Features:   
      - Adaptive padding (512 bytes to 128KB buckets)   
      - Exponential timing delays (Poisson distribution)   
      - Replay protection (24-hour cache)   
      - Rate limiting (100 msg/hour per IP)   
      - No metadata retention   
      - Key rotation every 24 hours   
      
   Performance:   
      - Message processing: ~1-5 seconds per hop   
      - Batch delay: 5-60 seconds random   
      - Total latency: ~30-120 seconds for 3-6 hops   
      - Max message size: 10MB   
      
   ### Known Issues / Limitations   
      
   1. **Exit Node Visibility**: Final delivery to clearnet email is not   
   encrypted   
       (inherent limitation of SMTP protocol)   
      
   2. **Node Discovery**: Currently uses static JSON file for node directory   
       (no DHT or dynamic discovery yet)   
      
   3. **Scalability**: Tested with 4 nodes, larger networks untested   
      
   4. **Key Synchronization**: Requires manual distribution of nodes.json   
       after key rotation   
      
   5. **No Built-in Directory Authority**: PKI management is manual   
      
   6. **Limited Error Recovery**: Network failures may cause message loss   
      
   7. **Tor Dependency**: Requires properly configured Tor hidden services   
       on all nodes   
      
   ## Future Development Goals   
      
   ### Short-term (1-3 months)   
      
   - **Automated PKI Updates**: Nodes should publish their keys to a   
      distributed directory automatically   
      
   - **Better Error Handling**: Retry logic and message queue persistence   
      
   - **Monitoring Dashboard**: Real-time statistics and health monitoring   
      
   - **Testing Tools**: Automated testing suite for multi-node deployments   
      
   - **Documentation**: Comprehensive deployment guide and API documentation   
      
   ## Technical Architecture   
      
   Current implementation:   
      - Language: Go 1.21+   
      - Dependencies: golang.org/x/crypto, golang.org/x/net   
      - Transport: Tor SOCKS5 proxy   
      - Storage: JSON files (temporary)   
      - Configuration: Command-line flags   
      
   Code quality:   
      - Single-file implementation (~2000 lines)   
      - No external databases   
      - Minimal dependencies   
      - BSD-style license (planned)   
      
   ## Why Not Just Use Tor?   
      
   Good question! Tor provides excellent anonymity, but:   
      
   1. **Exit nodes see plaintext**: Tor exit nodes can read SMTP traffic   
   2. **Timing attacks**: Correlation attacks possible with global adversary   
   3. **No batching**: Messages forwarded immediately   
   4. **Limited padding**: Tor cells are fixed 512 bytes   
   5. **No mixing**: Direct circuit, no message mixing/reordering   
      
   fog adds an additional layer:   
      - Batch multiple messages together   
      - Add variable random delays   
      - Shuffle message order   
      - Adaptive padding beyond Tor's capabilities   
      - No single point sees both sender and content   
      
   Think of it as: Tor protects the transport, fog protects the timing.   
      
   ## Current Deployment   
      
   We currently operate a small test network:   
      - 4 nodes across different geographic locations   
      - All on Tor hidden services   
      - Approximately 90% uptime   
      - Processing ~10-50 test messages per day   
      
   We need feedback on:   
      
   1. Is the threat model realistic?   
   2. Are the security features sufficient?   
   3. Is the latency (30-120s) acceptable for email?   
   4. Should we prioritize anonymity or performance?   
   5. What features are most important?   
      
   ## Contact & Links   
      
   Project status: **Alpha** (use at your own risk)   
      
   We're sharing our work openly,   
   including limitations and bugs. If you're interested in anonymous   
   communication systems, we'd love your input.   
      
   Gabx   
   --   
   0745 074D FEAA 9CB7 62E9  D89D 3E54 F490 F2CC 5A82   
   https://yamn.virebent.art   
   https://news.tcpreset.net   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca