[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[minion-cvs] Agree with most; disagree with a bit
Update of /home/minion/cvsroot/doc
In directory moria.seul.org:/tmp/cvs-serv20295
Modified Files:
minion-spec.tex
Log Message:
Agree with most; disagree with a bit
Index: minion-spec.tex
===================================================================
RCS file: /home/minion/cvsroot/doc/minion-spec.tex,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -d -r1.46 -r1.47
--- minion-spec.tex 12 Jul 2002 18:05:40 -0000 1.46
+++ minion-spec.tex 12 Jul 2002 19:05:22 -0000 1.47
@@ -17,8 +17,11 @@
batch of them, so that the nodes can prove they have sent the
messages. I do not think that anything breaks if we get rid of
them. -GD]
-
+ Hm. Well, since I already implemented them, and I do agree with
+ the 'warm feeling' observation, I'll leave them unless anyone
+ objects. -NM
+
2. Email encryption: what do we do?
Proposal: SURBs include an encryption key; anonymous SURB-using
@@ -49,6 +52,25 @@
``Payload encryption''
http://archives.seul.org/mixminion/dev/May-2002/msg00060.html
+ The public key idea as specified in your email has its own
+ problems. If a SURB generator creates a new public key for each
+ message, generating SURBs becomes a far more expensive operation.
+ (Roughly 30-70 times worse.) Right now, a good processor can
+ generate 170 8-hop SURBs per second. If you need to generate a
+ 1024 RSA key for each SURB, it can only generate 4.5 SURBs per
+ second. IMO, this is a big loss.
+
+ On the other hand, if you don't generate a new public key for each
+ SURB, your SURBs are now linkable.
+
+ I think that the threat model (an adversary makes you get the
+ correct SURB but the wrong encryption key) is a bit bogus. An
+ adversary who can replace the encryption key can replace the entire
+ SURB and achieve similar results.
+
+ The padding idea is neat, but I think you could use a hash of a
+ symmetric key instead with no ill effects. -NM
+
2b. Mail gateways. We should specify these.
XXXX
@@ -56,6 +78,9 @@
I feel it should be part of a different standard. Since it is a
service (like others) that runs on top of Mixminion. -GD
+ Agreed, but it should be a standard. Perhaps a set of addenda is
+ in order. -NM
+
3. Email transport exchange format.
Proposal: At the final hop, when the delivery mechanism is SMTP, we
@@ -83,6 +108,13 @@
that is dealt in a different document along with how to send
email. -GD
+ Hm. I agree with what you say, but keep in mind that the set of
+ deployed exit applications needs to be pretty uniform in its
+ behavior and support, or else we'll endanger anonymity. How about
+ we move the above to an additional document, and not implement it
+ until we have all of the spam issues straightened? -NM
+
+
4. Stateless replies and SMTP (depends on 2 and 3, if I understand correctly)
Proposal: stateless replies put E_recipient_key(nHops | seed) as
@@ -92,6 +124,9 @@
See http://archives.seul.org/mixminion/dev/Jul-2002/msg00003.html
for more discussion. Should we pick one, or both? -RD
+ For now, I'll implement the one where you store E_password(key) on
+ disk. -NM
+
5. Do we support other SSL modes for MMTP?
Proposal: server-to-server connections must use DHE/RSA/AES128/SHA1,
@@ -134,6 +169,11 @@
Local/ListServ
Acting as different service ports. -GD
+ I think we're saying the same thing. What you mean by
+ 'Local/Mailbox', I mean by 'Modules/Local'. I like your names
+ better, though, and I think we should rename the 'LOCAL' routing
+ type to 'MBOX' below to correspond. -NM
+
8b. Server descriptor rules for SMTP mode.
XXXX
@@ -150,6 +190,8 @@
provide meachanisms fo doing dummy messages and link padding we
should not specify anything in the spec. -GD
+ This is probably ok _for now_. I'll add a note. -NM
+
11. Need to write: algorithm for processing a reply.
XXXX
@@ -184,6 +226,8 @@
I have no experiance with XML so as long as we can sign and trust
the thing I have no problem with it. -GD
+
+ Okay; I'll pick one. -NM
14. Sensible support for multiple directory servers.
@@ -198,6 +242,7 @@
napkins and additional issues. May be this is a better place to
define general SMTP transport (except for last hop of SURB)
instead of the general mixminion spec document. -GD
+ Cool. -NM
16. We'll also want somebody from the Mixmaster crowd to go through and
write a "backward compatibility with Mixmaster" addendum, to specify
@@ -206,6 +251,8 @@
If we could have a hack so that both services can run as different
binaries, it will be easier to phase out the mixmaster stuff. -GD
+
+ Fear not. Modularity is what I live for. ;) -NM
\section{Message Format}