[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: More thoughts on From: lines
Len wrote:
> I would be happy with a number of solutions, including
> accepting this risk; permitting the nym server to forward
> mail to an exit remailer to be delivered, which would trust
> the nym server's From: line; requiring that the client always
> place the nym server second to last in the chain when doing
> nym mail, so that the user can pick the exit node which in
> turn can trust the From:; etc.
It is not entirely clear to me that we have identified all potential
risks in requiring a nym to use its nym server as the exit hop. The
solution may well be perfectly fine; I just believe that spending a bit
more analysis might be desirable.
This is may be obvious, but I still would like to mention that if the
nym server forwards the email to other hops before it is delivered to
the final recipient, then the requirement to securely authenticate a
sender to the remailer becomes a requirement to securely authenticate a
particular nym server to defend against rogue nym servers.
> I think that doing more complex nym authentication by exit
> nodes is unnecessarily adding complexity to the system.
> Having exit nodes believe nym servers' From: lines should be
> fine. If the nym server is naughty, this is a relatively low
> risk way of discovering that.
>
> > This of course triggers an additional requirement on the client to
> > ensure that outbound nym email is always routed through an
> nym server
> > as the exit hop.
>
> Yes. That would be done for the user by the client. After the
> user opens a given nym profile, the client knows all it needs
> to to make this work.
Yes. Which in turn requires the mixminion client to be aware of nym
profiles.
--Lucky