[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

what about SMTPS over Tor?



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Greetings,

Several friends of mine have lately expressed the wish to be able to
send email anonymously. They have really good reasons and I believe many
others do as well, so I'm looking for easy to use and set up solutions.
I've looked into annonymous remailers like Mixminion et al, but they
don't seem to be mature enough and have the number of users required for
any effective anonymity, so Tor seems to be the way. Mixminion doesn't
even seem to have a GUI beyond Tork for non-Windowos users, which kind
of would force everyone to install KDE.

Web mail + Tor is of course an option, but then they'll loose the nice
PGP intergration provided by most MUA:s (e.g. Enigmail/Thunderbird), and
PGP (for end-to-end encryption) is _essential_ for my friends' purposes.
Of course, there are things like FireGPG which can be used to
sign/verify/encrypt/decrypt any texts in Firefox, which would work for
web mail, but FireGPG is simply to flaky and have to much encoding
issues to be usable right now. Therefore, web mail is not satisfactory.

So I'm investigating the possibility of using SMTPS (i.e. SMTP over SSL)
on Thunderbird with Torbutton. In fact, this email should have been sent
over Tor. But as we know, there are several issues with using a mail
client and SMTP with Tor. On the other hand, there's a lot of issues
using Tor with web browsers (javascript, flash, cookies, Firefox
extensions and many non-http(s) features etc). So is this really such a
bad idea some people are suggesting? What are the issues? Things I've
thought or read about myself are the following:

* All types of SMTP is rejected by Tor's default exit policy
During my testing, it has worked well. It seems there are quite a few
people who still allow SMTPS (port 465) and SMTP with submission (port
587) as I've had different exit nodes for all five of my test emails.
Standard SMTP seems to be completely blocked. BTW, is it possible to do
queries over all exit nodes to see which of them that allow certain
services?

* The mail header might contain identifying information
- From my experiments, I've seen fields like User-Agent, x-mozilla-status,
 x-enigmail-version and openpgp (key ID and key URL) which are not
terribly dangerous (assuming that the key is only used for anonymous
mail). The openpgp info is quite useful to keep, actually, and the
others are very easily scraped away by some plugin (Torbutton for
Thunderbird should alter this as it does with Firefox?). Also, I've
heard that certain particularities of how the header is made might be
used to identify that UA of a given mail. All in all, I'm not too
worried about user agent stuff and similar right now (I need this
solution fast), only of unique identifiers (but I agree that some effort
should be made for this, perhaps in Torbutton). Please feel free to
point out if my current mail header contains any other dangerous
information that should taken into account.

* EHLO/HELO message contains IP address or hostname
First of all, the exit node shouldn't see anything since SSL is used.
But what about the SMTP server? If you examine the header of this mail,
you'll see that the first "Received:" field reports that it came from
0.0.0.0 plus hostname and IP address of the exit node (at least that's
what happened in my experiments). Is that the same as what is reported
in the EHLO/HELO to the SMTP server? If so, all is fine.

So, what do you think? Are there any more issues? Is Thunderbird + Tor +
Torbutton + SMTPS safe?
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHcS0xp8EswdDmSVgRAnNRAKCI0zBFfu2pvKcYFcg+e9UmNaXKMACdH9ru
C3uo0dM/Zcfp4E7P2tEEpDI=
=wdMT
-----END PGP SIGNATURE-----