1996-06-17 - List of reliable remailers

Header Data

From: Raph Levien <raph@CS.Berkeley.EDU>
To: cypherpunks@toad.com
Message Hash: 06414c5a730992bd666da97ff30d5b039a995e0e135c8d8976965d66fde1ac00
Message ID: <199606171350.GAA22019@kiwi.cs.berkeley.edu>
Reply To: N/A
UTC Datetime: 1996-06-17 20:52:39 UTC
Raw Date: Tue, 18 Jun 1996 04:52:39 +0800

Raw message

From: Raph Levien <raph@CS.Berkeley.EDU>
Date: Tue, 18 Jun 1996 04:52:39 +0800
To: cypherpunks@toad.com
Subject: List of reliable remailers
Message-ID: <199606171350.GAA22019@kiwi.cs.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain


   I operate a remailer pinging service which collects detailed
information about remailer features and reliability.

   To use it, just finger remailer-list@kiwi.cs.berkeley.edu

   There is also a Web version of the same information, plus lots of
interesting links to remailer-related resources, at:
http://www.cs.berkeley.edu/~raph/remailer-list.html

   This information is used by premail, a remailer chaining and PGP
encrypting client for outgoing mail. For more information, see:
http://www.c2.org/~raph/premail.html

   For the PGP public keys of the remailers, finger
pgpkeys@kiwi.cs.berkeley.edu

This is the current info:

                                 REMAILER LIST

   This is an automatically generated listing of remailers. The first
   part of the listing shows the remailers along with configuration
   options and special features for each of the remailers. The second
   part shows the 12-day history, and average latency and uptime for each
   remailer. You can also get this list by fingering
   remailer-list@kiwi.cs.berkeley.edu.

$remailer{"extropia"} = "<remail@miron.vip.best.com> cpunk pgp special";
$remailer{"portal"} = "<hfinney@shell.portal.com> cpunk pgp hash";
$remailer{"alumni"} = "<hal@alumni.caltech.edu> cpunk pgp hash";
$remailer{"c2"} = "<remail@c2.org> eric pgp hash reord";
$remailer{"penet"} = "<anon@anon.penet.fi> penet post";
$remailer{"flame"} = "<remailer@flame.alias.net> cpunk mix pgp. hash latent cut post reord";
$remailer{"mix"} = "<mixmaster@remail.obscura.com> cpunk mix pgp hash latent cut ek ksub reord ?";
$remailer{"replay"} = "<remailer@replay.com> cpunk mix pgp hash latent cut post ek";
$remailer{"ecafe"} = "<cpunk@remail.ecafe.org> cpunk mix";
$remailer{"amnesia"} = "<amnesia@chardos.connix.com> cpunk mix pgp hash latent cut ksub";
$remailer{'alpha'} = '<alias@alpha.c2.org> alpha pgp';
$remailer{'nymrod'} = '<nymrod@nym.jpunix.com> alpha pgp';
$remailer{"lead"} = "<mix@zifi.genetics.utah.edu> cpunk pgp hash latent cut ek";
$remailer{"treehole"} = "<remailer@mockingbird.alias.net> cpunk pgp hash latent cut ek";
$remailer{"exon"} = "<remailer@remailer.nl.com> cpunk pgp hash latent cut ek";
$remailer{"vegas"} = "<remailer@vegas.gateway.com> cpunk pgp hash latent cut";
$remailer{"haystack"} = "<haystack@holy.cow.net> cpunk mix pgp hash latent cut ek";
$remailer{"ncognito"} = "<ncognito@rigel.cyberpass.net> mix cpunk pgp hash latent";
catalyst@netcom.com is _not_ a remailer.
lmccarth@ducie.cs.umass.edu is _not_ a remailer.
usura@replay.com is _not_ a remailer.

Groups of remailers sharing a machine or operator:
(c2 alpha)
(flame replay)
(alumni portal)

Use "premail -getkeys pgpkeys@kiwi.cs.berkeley.edu" to get PGP keys
for the remailers. Fingering this address works too.

Note: The remailer list now includes information for the alpha
nymserver.

Last update: Mon 17 Jun 96 6:46:17 PDT
remailer  email address                        history  latency  uptime
-----------------------------------------------------------------------
replay   remailer@replay.com              ****+*+***+*     6:14  99.98%
alumni   hal@alumni.caltech.edu           #######**#+#     2:57  99.97%
ecafe    cpunk@remail.ecafe.org           *##.-#+--#+#    50:08  99.96%
vegas    remailer@vegas.gateway.com       -** **+*#*+#     6:21  99.90%
mix      mixmaster@remail.obscura.com     .-+++++++-+   3:15:05  99.90%
c2       remail@c2.org                    -++-++++-++   1:07:45  99.89%
flame    remailer@flame.alias.net         +++++++++++   1:05:51  99.76%
penet    anon@anon.penet.fi               _______._    60:16:03  99.64%
portal   hfinney@shell.portal.com         ##*###  ##+#     2:46  99.49%
nymrod   nymrod@nym.jpunix.com             +**#++*+* *     9:43  99.45%
lead     mix@zifi.genetics.utah.edu       +-++++++++++    45:49  99.29%
exon     remailer@remailer.nl.com         *** *++***+*     5:07  99.23%
haystack haystack@holy.cow.net            *#* +--#*-*+    23:51  99.18%
amnesia  amnesia@chardos.connix.com       ------- ---   3:19:01  96.26%
extropia remail@miron.vip.best.com        ---.-- ----   6:23:54  94.00%
ncognito ncognito@rigel.cyberpass.net      -....- ..   14:29:58  89.44%
treehole remailer@mockingbird.alias.net   +-++++++      3:28:59  62.60%
alpha    alias@alpha.c2.org               ++***+-         37:51  49.39%

   History key
     * # response in less than 5 minutes.
     * * response in less than 1 hour.
     * + response in less than 4 hours.
     * - response in less than 24 hours.
     * . response in more than 1 day.
     * _ response came back too late (more than 2 days).

   cpunk
          A major class of remailers. Supports Request-Remailing-To:
          field.
          
   eric
          A variant of the cpunk style. Uses Anon-Send-To: instead.
          
   penet
          The third class of remailers (at least for right now). Uses
          X-Anon-To: in the header.
          
   pgp
          Remailer supports encryption with PGP. A period after the
          keyword means that the short name, rather than the full email
          address, should be used as the encryption key ID.
          
   hash
          Supports ## pasting, so anything can be put into the headers of
          outgoing messages.
          
   ksub
          Remailer always kills subject header, even in non-pgp mode.
          
   nsub
          Remailer always preserves subject header, even in pgp mode.
          
   latent
          Supports Matt Ghio's Latent-Time: option.
          
   cut
          Supports Matt Ghio's Cutmarks: option.
          
   post
          Post to Usenet using Post-To: or Anon-Post-To: header.
          
   ek
          Encrypt responses in reply blocks using Encrypt-Key: header.
          
   special
          Accepts only pgp encrypted messages.
          
   mix
          Can accept messages in Mixmaster format.
          
   reord
          Attempts to foil traffic analysis by reordering messages. Note:
          I'm relying on the word of the remailer operator here, and
          haven't verified the reord info myself.

   mon
          Remailer has been known to monitor contents of private email.
          
   filter
          Remailer has been known to filter messages based on content. If
          not listed in conjunction with mon, then only messages destined
          for public forums are subject to filtering.
          

Raph Levien





Thread