1994-12-19 - List of reliable remailers

Header Data

From: Raph Levien <raph@CS.Berkeley.EDU>
To: cypherpunks@toad.com
Message Hash: 0873ceb5d37414498be917809bf10e4c53f395f3e050f2b338face8cb10dbd4f
Message ID: <199412191450.GAA03870@kiwi.CS.Berkeley.EDU>
Reply To: N/A
UTC Datetime: 1994-12-19 18:30:20 UTC
Raw Date: Mon, 19 Dec 94 10:30:20 PST

Raw message

From: Raph Levien <raph@CS.Berkeley.EDU>
Date: Mon, 19 Dec 94 10:30:20 PST
To: cypherpunks@toad.com
Subject: List of reliable remailers
Message-ID: <199412191450.GAA03870@kiwi.CS.Berkeley.EDU>
MIME-Version: 1.0
Content-Type: text/plain


   I operate a remailer pinging service which collects detailed
information about remailer features and reliability.

   To use it, just finger remailer-list@kiwi.cs.berkeley.edu

   There is also a Web version of the same information, at:
http://www.cs.berkeley.edu/~raph/remailer-list.html

   This information is used by premail, a remailer chaining and PGP
encrypting client for outgoing mail, which is available at:
ftp://ftp.csua.berkeley.edu/pub/cypherpunks/premail/premail-0.30.tar.gz

   For the PGP public keys of the remailers, as well as some help on
how to use them, finger remailer.help.all@chaos.bsu.edu

This is the current info:

                                 REMAILER LIST

   This is an automatically generated listing of remailers. The first
   part of the listing shows the remailers along with configuration
   options and special features for each of the remailers. The second
   part shows the 12-day history, and average latency and uptime for each
   remailer. You can also get this list by fingering
   remailer-list@kiwi.cs.berkeley.edu.

$remailer{"vox"} = "<remail@vox.xs4all.nl> cpunk pgp. post";
$remailer{"avox"} = "<anon@vox.hacktic.nl> cpunk pgp post";
$remailer{"extropia"} = "<remail@extropia.wimsey.com> cpunk pgp special";
$remailer{"portal"} = "<hfinney@shell.portal.com> cpunk pgp hash";
$remailer{"alumni"} = "<hal@alumni.caltech.edu> cpunk pgp hash";
$remailer{"bsu-cs"} = "<nowhere@bsu-cs.bsu.edu> cpunk hash ksub";
$remailer{"rebma"} = "<remailer@rebma.mn.org> cpunk pgp hash";
$remailer{"jpunix"} = "<remailer@jpunix.com> cpunk pgp hash latent cut post ek";
$remailer{"c2"} = "<remail@c2.org> eric pgp hash";
$remailer{"soda"} = "<remailer@csua.berkeley.edu> eric post";
$remailer{"penet"} = "<anon@anon.penet.fi> penet post";
$remailer{"ideath"} = "<remailer@ideath.goldenbear.com> cpunk hash ksub";
$remailer{"usura"} = "<usura@replay.com> cpunk pgp. hash latent cut post";
$remailer{"desert"} = "<remail@desert.xs4all.nl> cpunk pgp. post";
$remailer{"nately"} = "<remailer@nately.ucsd.edu> cpunk pgp hash latent cut";
$remailer{"xs4all"} = "<remailer@xs4all.nl> cpunk pgp hash latent cut post ek";
$remailer{"flame"} = "<tomaz@flame.sinet.org> cpunk pgp hash latent cut post ek";
$remailer{"rahul"} = "<homer@rahul.net> cpunk";
$remailer{"mix"} = "<mixmaster@nately.ucsd.edu> cpunk hash latent cut ek";
$remailer{"q"} = "<q@c2.org> cpunk hash latent cut ek";
catalyst@netcom.com is _not_ a remailer.

Last ping: Mon 19 Dec 94 6:00:03 PST
remailer  email address                        history  latency  uptime
-----------------------------------------------------------------------
usura    usura@replay.com                 +***++*+****     7:47  99.99%
alumni   hal@alumni.caltech.edu           *+*****+****     4:24  99.99%
c2       remail@c2.org                    +++-+++++-++    41:24  99.99%
penet    anon@anon.penet.fi               *****+*+****    29:39  99.99%
nately   remailer@nately.ucsd.edu         ++++++.+++++  1:29:04  99.99%
portal   hfinney@shell.portal.com         ************     2:19  99.99%
flame    tomaz@flame.sinet.org            ***+-++**+*      8:57  99.99%
ideath   remailer@ideath.goldenbear.com   *-*++**+****    11:44  99.97%
bsu-cs   nowhere@bsu-cs.bsu.edu           -**++*******     5:59  99.96%
mix      mixmaster@nately.ucsd.edu        **+++*.+++++  1:26:32  99.96%
desert   remail@desert.xs4all.nl          .--------.-- 14:21:48  99.99%
jpunix   remailer@jpunix.com              ** +-++**+*      8:35  99.78%
q        q@c2.org                              *-+--++    49:41  99.79%
vox      remail@vox.xs4all.nl             --..-----.   17:07:50  99.99%
rahul    homer@rahul.net                  ****** ****+    10:59  99.50%
soda     remailer@csua.berkeley.edu       ._........   10:05:18  99.41%
xs4all   remailer@xs4all.nl               ****+  +****     8:09  99.10%
rebma    remailer@rebma.mn.org            *---___..-.- 30:10:54  82.77%
extropia remail@extropia.wimsey.com       -.-+          5:00:06  27.26%

For more info: http://www.cs.berkeley.edu/~raph/remailer-list.html

   History key
     * # response in less than 5 minutes.
     * * response in less than 1 hour.
     * + response in less than 4 hours.
     * - response in less than 24 hours.
     * . response in more than 1 day.
     * _ response came back too late (more than 2 days).

   Options and features

   cpunk
          A major class of remailers. Supports Request-Remailing-To:
          field.

   eric
          A variant of the cpunk style. Uses Anon-Send-To: instead.

   penet
          The third class of remailers (at least for right now). Uses
          X-Anon-To: in the header.

   pgp
          Remailer supports encryption with PGP. A period after the
          keyword means that the short name, rather than the full email
          address, should be used as the encryption key ID.

   oldpgp
          Remailer does not like messages encoded with MIT PGP 2.6. Other
          versions of PGP, including 2.3a and 2.6ui, work fine.

   hash
          Supports ## pasting, so anything can be put into the headers of
          outgoing messages.

   ksub
          Remailer always kills subject header, even in non-pgp mode.

   nsub
          Remailer always preserves subject header, even in pgp mode.

   latent
          Supports Matt Ghio's Latent-Time: option.

   cut
          Supports Matt Ghio's Cutmarks: option.

   post
          Post to Usenet using Post-To: or Anon-Post-To: header.
          
   special
          Accepts only pgp encrypted messages.

   ek
          Encrypt responses in relpy blocks using Encrypt-Key:
          header.


   Comments and suggestions welcome!

Raph Levien





Thread