[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Open Questions with Mixminion design -> trusting remailer keys, how?
Sorry if I haven't introduced myself, but I am working on a replacement
system for Mixmaster (Lance Cotrell) and Nym (Frans Kaashoek) myself.
In short, I use these primitives to archive my goals:
o Single use remailer keys
o Loads of hashcash for everything that might DoS the remailer
o Outside in a remailer message everything will be in crypto with garbage
appended, only the secret key can detect where a message ends by looking at
the inside of a message
o I dropped fixed message size in favor of messages filled with garbage
till 4096 octed boundries. This drops remailer loads due to fragmentation
and reassembly and allows large messages (binaries) at a price -->
potentionally being spotted (cutting up binaries will solve this though)
o I will try to concatenate messages together if they go to the same
address. The receiving remailer should be able to demangle them by
decrypting at every 4096 octed boundry
o I will allow remailer users to drop of their own public keys at every
remailer they want to and I will use the RFC 822 data in these messages to
route the messages back. This is the central thesis of *my* protocol (not
mixminion, I believe this has never been done or been published about
before)
o Something new I came up with today is on the cleanup process. I figure it
would be best to send a special message to any address associated with a
public key that need to be cleaned up. Due to the way I designed this
(draft) protocol remailers will always be at full load, limited somewhat by
the use of hashcash for clients
For the rest, it is pretty much Mixmaster 2.04 without the cypherpunk (but
with the garbage, cutmarks and replyblock functionality added in a better
way than PGP provides).
So that is who I am. Just a drop out from computer science in Amsterdam
somewhere.. (I am still trying to prove myself to the world, so forgive my
arogance and relentless violence at times, it's 'psychological', working on
that).
HERE is my question to the group;
o PGP has WoT
o S/MIME has TTP
I think these things are very basic ingredients to any type of public key
communications, so what does Mixminion do to solve a Key Tagging Attack as
I will call it here?
TIA,
Thomas (I will read this majordomo list for the next couple of weeks and I
expect people to be honest with me, not nescisarity nice or anything, the
less time I spend on something useless, the better for me!)
Refs: <http://mixminion.net>, <http://www.cypherspace.org>,
<http://mixmaster.sourceforge.org>, <http://nym.alias.net>
P.S. I would probably sign this message, but I am not too confident with
the mail clienting I have been using for about a week now and I don't want
to look stupid for having a bad signature on my first message to this group
(I also miss my Netscape 4.8 spell checker :-((( )