1996-05-19 - Re: SEVERE undercapacity, we need more remailer servers FAST

Header Data

From: Matts Kallioniemi <matts@pi.se>
To: cypherpunks@toad.com
Message Hash: c286e82f51c32e001d6f6e5f1f7e2b6f93a1fe7df2701d3ad990307824fa78a9
Message ID: <2.2.32.19960519152746.00392f04@mail.pi.se>
Reply To: N/A
UTC Datetime: 1996-05-19 18:41:04 UTC
Raw Date: Mon, 20 May 1996 02:41:04 +0800

Raw message

From: Matts Kallioniemi <matts@pi.se>
Date: Mon, 20 May 1996 02:41:04 +0800
To: cypherpunks@toad.com
Subject: Re:  SEVERE undercapacity, we need more remailer servers FAST
Message-ID: <2.2.32.19960519152746.00392f04@mail.pi.se>
MIME-Version: 1.0
Content-Type: text/plain


At 18:29 1996-05-15 -0400, Black Unicorn wrote:
>
>I would really like to see a remailer that is somehow blinded.
>
>I don't know enough about how mail paths are generatered, but is it
>impossible to conceal the origin of remailer postings?

IP spoofing would do this nicely.Since SMTP doesn't require any
significant responses, you can send blind and fake your IP address.
To do that you need root access on your mailer machine and an
ISP that doesn't sniff and filter its network for spoofing attacks.

See ftp://info.cert.org/pub/cert_advisories/CA-95:01.IP.spoofing for
a good description of spoofing attacks and defenses.

If you're not up to writing spoofing code into your (re-)mailer, then
an easier solution is to send everything through anon.lcs.mit.edu after
you have removed all headers that point at you.

Matts






Thread