(Note: this article came from remailer-operators/cypherpunks. The author is RProcess and this article is reprinted with permission.) firstname.lastname@example.org
The following is a (somewhat long) discussion of what I consider to be some of the primary vulnerabilities in the current Cypherpunk/Mixmaster anonymous remailer system, and how I suspect some of these vulnerabilities are being quietly exploited.
It is not my intention to undermine confidence in the current system, which does offer substantial security and usefulness, but to discuss potential and probable threats with the goal of long-term improvement.
To date I have written three remailer clients (Potato, JBN 1 and 2) and a Windows remailer (Reliable), and in attempting to test the features thoroughly over several years time, have observed various problematic aspects of the remailer system, and have attempted to analyze anomalies very carefully. I am sharing these observations now because I am fairly confident that if they are not accurate, they are at least plausible fiction, and thus worthy of consideration.
Briefly, I have observed the same thing that many remailer users have complained about for some time - lost mail. The possible difference is that I have investigated it a little more deliberately than most users would care to do. Some mail sent through remailers vanishes. This has previously been explained as unreliable software, hardware, networking, etc. However I have found these explanations to be insufficient to explain my observations.
One of the goals of writing Potato (and likewise JBN) was to provide a remailer client that would be very accurate and dependable, thus providing a means to produce consistent and dependably formatted mail. By allowing users to save templates of message constructions, it removes a lot of human error. It also provides an artificial memory by which a user can verify whether or not a missing message was constructed properly.
Likewise, Reliable (as the name implies) was designed to do everything possible to eliminate disappearing messages. Reliable is very reluctant to discard messages, and has several tiers of message disposal, with the ability to requeue messages which are unprocessed due to misconfiguration or other questionable problems. In addition, the Freedom and Mixmaster remailers have undergone a lot of work by Johannes Kroeger and Ulf Moller which I believe has made them much more dependable (and secure) than remailers operating some years ago.
As a result of these improvements we have clients and servers which run consistently and with a large degree of reliability. So why is it so very difficult to generate a dependable and secure reply-block?
Some of my observations:
Isolated incidents can be dismissed as coincidence, due to traffic levels, and other variations, but over time the trends become very clear and disturbing, the reasons ever diminishing. I think most remailer and nym users are well acquainted with this behavior, to the point where they take it for granted, and I think some of those who work in providing remailer services or software are unaware of the problem simply because they don't actually use the services extensively.
I think one of three basic possibilities exist for an explanation of the unreliability. One, unreliable remailer software (servers discarding the messages despite their delivery and clients generating malformatted messages). Two, an unreliable network which is not delivering the messages. Three, a third influence, deliberate or otherwise, which is preventing their delivery or processing.
I have satisfied my own questions regarding the first. While I admit that software problems do occur, they are not widespread and subtle to the extent which would cause this much lost mail and unpredictability, and predictable loss without discernable and reproducible cause.
Regarding the second possibility, internet reliability has increased. How often does plain email disappear into a void? Not often. Nor would this explain the 'intelligent' nature of the losses I have observed.
Despite trying to resist the paranoid alternative, I have come to conclude that the third alternative is the case - that something or someone is interfering between the users and remailers, and between remailers, engaging in a very subtle and selective DoS attack.
DoS refers to Denial of Service. One kind of attack on encrypted or secure communication involves sabotaging the communication, or denying the service. An example is a mail bomb sent to a remailer. While recovering from the mail bomb the remailer is unable to process messages, and thus users are denied service, are unable to communicate.
By selective denial of service I refer to the ability to inhibit or stop some kinds or types of messages while allowing others. If done carefully, and perhaps in conjunction with compromised keys, this can be used to inhibit the use of some kinds of services while promoting the use of others. An example:
User X attempts to create a nym account using remailers A and B. It doesn't work. He recreates his nym account using remailers A and C. This works so he uses it. Thus he has chosen remailer C and avoided remailer B. If the attacker runs remailers A and C, or has the keys for these remailers, but is unable to compromise B, he can make it more likely that users will use A and C by sabotaging B's messages. He may do this by running remailer A and refusing certain kinds of messages chained to B, or he may do this externally by interrupting the connections to B.
User Y attempts to create a very secure reply-block using advanced anti- analysis features (perhaps long latency, random hops, superior encryption, etc). His reply-block fails outright or is so unreliable that he decides to change it. He forgoes some of his advanced features for a more reliable (yet less secure) reply-block. Thus the attacker has induced the user to use less secure features, or perhaps has discouraged the use of remailers completely.
User Z attempts to create a reply-block, or send a message. Again and again he has failures so he sends himself test messages using similar remailers and features, or if he is inexperienced he may mail his own account directly. By inhibiting the success of his mail, the attacker has made it more likely that the user will expose himself through testing, repetition, and security oversights. How many new users are creating new reply-blocks at any given time? Not that many, especially given a thorough statistical analysis.
Another example: It is somewhat possible to tell how long a reply-block is by examining the size of the encrypted reply-block. Thus the attacker kills some or all messages with longer chains, reducing their use.
Thus through selective denial of service, the following can be accomplished:
How plausible is the scenario that someone is doing this?
Cutting to the chase, I think the most plausible organizations responsible for such an attack would be the usual suspects - NSA, CIA, and other military and intelligence organizations. They have the means and the motives to make such an attack worth their while. Given operations like Echelon (NSA's widespread interception of electronic communication in Europe), and other intelligence networks such as the CIA's meddlesome habits, it is reasonable to assume they are doing *something* with regard to remailers. Remailers potentially allow organizations to communicate in an untraceable fashion worldwide. A lot of intelligence and counterintelligence is based on interrupting untraceable communication. So it is reasonable to assume they are doing something.
What is it likely that they are doing? Given their habits, it is most likely they would do something as subtle as possible. They would prefer their intrusion to be undetected and unverifiable, with no traces left behind. They would prefer to leave the illusion that the system has not been compromised.
The reliability hole in the remailer system provides a way, perhaps the best way, to accomplish these goals. A lost message only provides evidence by its absence, so there is no positive evidence of a third party at work. It provides a way to influence remailer use, and it uses other genuine remailer problems as cover. It also uses the difficulty of producing reliable remailer messages manually as cover, although this has become less of an issue with reliable clients.
As long as remailers have been around, unreliability has been a problem. Further, as remailers became more reliable, chaining reliability began showing inexplicable deficiencies. We take stats lists for granted, but why do we need such an elaborate fix? Why have software and network problems remained for so long? Or have they? After extensive analysis, I see very little evidence of software or network problems causing these losses, and the only alternative explanation remaining is deliberate interference.
I think remailer users and developers have become complacent about the reliability problem, accepting it, and thus accepting a large vulnerability in the system. But is it understandable, because it is a very difficult problem to pinpoint and document.
What are the alternatives to a selective DoS attack?
I will not say these things don't exist or haven't been done, but I have not observed the following directly or indirectly.
Of course there continue to be other vulnerabilities. Anyone can run a remailer, and it stands to reason that one method of intercepting some mail, and selectively deleting some mail, would be for the attacker to run one or more remailers.
There is also the threat of key theft. Based on what I have observed, I consider it a very strong possibility that at least some keys are available to those performing what I suspect is a selective DoS. Given nym.alias.net's location at MIT (home of half of the DOD), a college computer with only reasonable security, and given the fact that the key has not been changed for years, I find it reasonable to suppose that the key has been stolen.
There remains the possibility of keys or messages being cracked. This takes time and could explain some of the curious delay trends observed by myself and others. However one has to suppose that some of the encryption schemes are somewhat secure or there would be no incentive to perform a selective DoS.
I find it plausible that intelligence agencies would construct a campaign to report and generate abuses, causing remailers to be shut down by ISPs, etc., and to generate mail bombs and other attacks when suited to their purposes. This is in general keeping with the history of their indirect involvement.
One argument is that unless you are a spy or a terrorist, it may not matter much that the intelligence agencies read your mail or trace your identity. They don't involve themselves much with law enforcement, preferring to break the laws themselves, except when it suits their purposes.
However these people are unlawfully and often unethically exerting an influence, and most users concerned with privacy and free expression issues are concerned by this kind of interference.
Further, the anonymous remailer system has grown from being vulnerable to the type of attack used against anon.penet.fi, to using nym-servers where even the operator does not know the identity of account owners. One hopes that other vulnerabilities will be addressed as the need for privacy and free expression grows.
Finally, this is of concern to all remailer users as it makes the remailer system devilish to use.
I realize that contemplation of conspiracies are awkward, but in the case of remailers I think it is safe to assume intelligence agencies are involved in some way. The only remaining question is how.
I would like to enumerate several short-term and long-term ideas for how the remailer system can be improved and made less vulnerable to selective DoS and other attacks.
A few thoughts on what next generation remailers should address.
I do not intend to imply that all lost mail is due to involvement of a third party. Especially if you are new to remailers, realize that there are many mistakes which will legitimately cause remailers to discard messages. By design they are quite unforgiving in this regard, and users should not jump to conclusions.
I also wish to add that I still consider anonymous remailers to be one of the few methods on the net for achieving genuinely high levels of strong anonymity and security. It is exactly because of this that I consider it plausible that they are the target of such a subtle and resource-intensive attack.
Please send any questions or comments to email@example.com