File: README

package info (click to toggle)
mixmaster 3.0b2-4
  • links: PTS
  • area: main
  • in suites: etch-m68k
  • size: 1,356 kB
  • ctags: 1,173
  • sloc: ansic: 18,314; sh: 1,285; yacc: 698; perl: 314; makefile: 161
file content (200 lines) | stat: -rw-r--r-- 8,313 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
Mixmaster 3.0 -- anonymous remailer software -- (C) 1999 - 2004 Anonymizer Inc.
-------------------------------------------------------------------------------

PREVIEW VERSION  ---  WARNING: THIS SOFTWARE IS UNDER DEVELOPMENT!

This program consists of

* a remailer client:

  The remailer client supports sending anonymous mail using Cypherpunk
  and Mixmaster remailers. It supports OpenPGP encryption (compatible 
  with PGP 2, PGP 5 and up, and GnuPG).

  The client can be used with a menu-based user interface and with
  command line options.

* a remailer:

  The remailer supports the Cypherpunk and Mixmaster message formats.
  It can be integrated with the mail delivery system of Unix-based
  computers or use the POP3 and SMTP protocols for mail transfer.
  Mixmaster includes an automated abuse-handling system.

Please report any problems via the bug and patch trackers at
http://sourceforge.net/projects/mixmaster/


Installation:
------------

Libraries:

  Mixmaster requires the libraries OpenSSL, zlib, and pcre. 
  
  If you want to use the menu-based user interface, you also need the
  ncurses library. If these libraries are not installed on your
  system, you will need to obtain the latest versions from the
  sources below and extract them in the the Src/ directory first.

  OpenSSL is available from http://www.openssl.org/source/

  Ncurses can be obtained from http://ftp.gnu.org/pub/gnu/ncurses/

  The Perl Compatable Regular Expressions library can be obtained from
  ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/

  The zlib compression libraries can be obtained from
  http://www.gzip.org/zlib/

To install or upgrade Mixmaster, type `./Install'.

Mixmaster uses lists of currently operating remailers and information
about their reliability. You can get the current remailer lists from
http://stats.melontraffickers.com/ and http://www.noreply.org/ and via
finger from nym.alias.net:

  pubring.asc    Type 1 remailer keys
  pubring.mix    Type 2 remailer keys
  rlist.txt      List of reliable type 1 remailers
  mlist.txt      List of reliable type 2 remailers
  type2.list     List of known type 2 remailers (optional)

If you wish to participate in the Remailer Abuse Blocklist[1], you will need
to obtain the blocklist file from http://www.paracrypt.com/remailerabuse/
and place it in your Mix directory. This may be automated with cron.

For support for multiple RAB services, edit the file Src/config.h manually,
and add additional block files to the existing line, such as:

#define DESTBLOCK "dest.blk rab.blk rab2.blk rab3.blk"

Note that only the first file should the the local block list, as it is the
only file mixmaster will open for writing. Most users will not need to edit
config.h.

[1] Update: As of the release of Mixmaster 3.0, the Paracrypt RAB site is 
defunct. This information has been left in the documentation should 
another service take its place.

Using the remailer client:
-------------------------

To use the menu-based user interface, simply run `mixmaster'. To send an
anonymous or pseudonymous reply to a message from within your mail or
news reader, you can pipe it to `mixmaster'.

The interactive mode supports sending mail and contains a simple
mail reading function. OpenPGP messages are encrypted and decrypted
automatically. 

In the non-interactive mode, Mixmaster reads a message from a file or
from its standard input. The command line options are described in the
manual page (mixmaster.1).


Mixmaster as a remailer:
-----------------------

The Mixmaster remailer can be installed on any account that can
receive mail. Non-remailer messages will be delivered as usual. If
you have root access, you may want to create a new user (e.g.,
`remailer') and install Mixmaster under that user id.

The Install script provides a simple way to set up the remailer. More
information about configuring Mixmaster can be found in the manual
page. Typically, incoming mail is piped to "mixmaster -RM". In a UUCP
setting, it may be useful to use just "mixmaster -R", and run 
"mixmaster -S" once all messages have arrived.

Announcing a new remailer to the public is most commonly done by posting
the remailer keys and capabilities to alt.privacy.anon-server as well as
the "remops" mailing list. Information about the remops list can be found
here: http://lexx.shinn.net/mailman/listinfo/remops


Installation problems:
---------------------

In case one of the libraries Mixmaster uses is installed incorrectly
on your system, place the library source code (available from
the locations listed above) in the Src directory, remove the old
Makefile, run the Install script again and answer `y' when asked
whether to use the source code.

The ncurses library can use termcap and terminfo databases. The
Mixmaster Install script tries to find out whether terminfo is
available. If you get a "Can't open display" error when starting
the Mixmaster menu, run "./configure --enable-termcap; make lib/libncurses.a"
in the ncurses directory.


Security notes:
--------------

The ciphers and the anonymizing mix-net protocol used in Mixmaster
correspond to the state of the art (see the Security Considerations
section of the Mixmaster Protocol specification for details). However,
no security proofs exist for any practical cryptosystem. It is
unlikely that their security will be broken, but there is no "perfect
security". Software can also contain implementation errors. The
complete Mixmaster source code is available for public review, so that
everyone can verify what the program does, and it is unlikely that
security related errors or secret back doors in the software would go
unnoticed.

No software is secure if run in an insecure environment. For that
reason you must make sure that there is no malicious software (such as
viruses) running on your computer. Deleted files and even passphrases
can in many cases be read from the hard disk if an adversary has
access to the computer. The use of disk encryption programs is
recommended to avoid this risk.

Anonymous messages are secure as long as at least one of the remailers
you use in a chain is honest. You can use up to 20 remailers in a
chain, but reliability and speed decrease with longer chains. Four is
a reasonable number of remailers to use. Many remailer operators sign
their keys. You should verify those signatures with OpenPGP to make
sure that you have the actual remailer keys.

Anonymous keys usually cannot be introduced to the OpenPGP web of
trust without giving up anonymity. For that reason, this client will
use any OpenPGP key found on the key ring, whether it is certified or
not. Your key ring must not contain any invalid keys when used with
this program.

If you want to use a pseudonym, the client will ask you for a
passphrase to protect the nym database. Your passphrase should be
long, and hard to guess. Anyone who gets hold of your nym database and
private keys and can determine the passphrase will be able to
compromise your pseudonymous identities. Note that some operating
systems may store your passphrase on your hard disk in clear.

While a good client passphrase can protect your keys if someone gets
hold of your files, the remailer passphrase offers only casual
protection for the remailer keys. If you install a remailer, the
remailer passphrase must be different from your private passphrases.


Copyright:
---------

Mixmaster may be redistributed and modified under certain conditions.
This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF
ANY KIND, either express or implied. See the file COPYRIGHT for
details.

A license is required to use the IDEA(TM) algorithm for commercial
purposes; see the file idea.txt for details.

Mixmaster uses the compression library zlib by Jean-loup Gailly and Mark
Adler, the free ncurses library and the regex library by Philip Hazel.
This product includes cryptographic software written by Eric Young
(eay@cryptsoft.com). This product includes software developed by the
OpenSSL Project for use in the OpenSSL Toolkit (http://www.OpenSSL.org/).
For some platforms: This product includes software developed by the
University of California, Berkeley and its contributors.

All trademarks are the property of their respective owners.

$Id: README 710 2004-01-21 00:47:21Z rabbi $