OmniMix • Tutorial • Tor • TorPlus • OrMail PreviousTopNext

The major advantage of remailer networks is unpredictable latency at each server of the delivery chain, which renders correlation attacks useless, an important contribution to its extremely reliable resistance against all kinds of attacks. But that latency may be intolerable with time-critical missions, where also the feedback of a successful transaction is mandatory, which remailers can't provide as well.

That's where direct e-mail communication between sender and recipient through the Tor network may be a viable solution.

It gives you secret end-to-end encrypted data transfers in realtime e.g. between OmniMix installations, which are connected by a circuit of up to 9 anonymizing Tor nodes, without the need of an additional external mail server.

Like anonymous remailing through the Mixmaster and Yamn network OrMail integrates seamlessly into your mail management infrastructure. Use your standard mail client, which may already be configured to route all traffic through OmniMix, and, based on an OrMail recipients list within OmniMix, matching mail is delivered directly through the Tor network and the destination's Tor Hidden Service to the SMTP server attached to it. You only have to know the recipient's .onion address, the port number used by that service and whether the receiving server demands a Hashcash token to accept the mail message. From there the recipient's mail client can download stored messages at any time with a POP3 command. Similar to its nym account management OmniMix supports multiuser environments with OrMail as well, as for each user multiple mail recipient ('To:' header) patterns can be defined. Furthermore you're not restricted in the number of separate Tor Hidden Service addresses and thereby identities usable for different tasks.

At first make sure that at the TorPlus > Server tab the OmniMix SMTP server is activated for OrMail processing.

Tutor_TorPlus_OrMail_Server

Then go to the TorPlus > HSvcs tab to set up such a Hidden Service for incoming OrMail by clicking the '+' button to add a new item.

Tutor_TorPlus_OrMail_HS_Edit

Create a new folder, where Tor deploys Hidden Service data like the .onion address it computes at a later restart. Then enter a random external port number at 'Ext Port'. Better don't use a standard port, which is easier to detect by a port scan done by an adversary. Set 'Int Address' to '127.0.0.1' for the local computer as the device where the OrMail SMTP server resides, and enter its port number into the 'Int Port' field. Be aware, that conflicting port numbers prevent the server from (re)starting. So avoid duplicates and assign each entry its unique internal port. To make mail flooding harder you may instruct your mail server to ask for a Hashcash token in order to accept an incoming mail message. Do so by entering a number above zero, usually 24..30, at the 'Hashcash' bit field.

Now, at the OrMail Address field, you have to enter a regular expression term, which defines all 'To:' addresses of the mailboxes that are bound to that Hidden Service.

With a restart of the OmniMix servers and then Tor the system is ready to receive OrMail messages. That's when the Hidden Service's .onion address is created and gets visible at the AddrExt column of the Hidden Service table. A click on the '*' button of the Hidden Services list now copies the complete OrMail address, external port number and Hashcash bit requirements, looking like

ormail2q4v4tsqtqludlts4cbmk5y5u2d74x6aus7tol642uxi2qh3yd:54321#28

into the clipboard ready to be sent to your communication partner(s) along with the arbitrary mail address you intend to use.

Tutor_TorPlus_OrMail_HS

Warning: Keep the preinstalled SSL/TLS Demo Certificate ('omnimix_demo.pem' at the Cert > Server tab) in place if you intend to use the OrMail SMTP server for anonymity reasons. Otherwise, when replacing it with an individual certificate, an adversary is able to cross-link your Hidden Services based on that certificate's fingerprint! It would therefore be advisable to consider setting up separate OmniMix installations for that purpose. And always keep in mind, that Tor offers an offender many more attack vectors that anonymous remailing including the usage of nym servers. Convenience has its price.

Now go to the 'User' Accounts tab, select your own user item (e.g. the 'OmniMix'/'omnimix' entry) and, for testing purposes, add a '^.*$' item, a regular expression term for all possible addresses, to the 'OrMail Addresses' list. Don't forget to set a check mark to activate that entry.

Tutor_TorPlus_OrMail_User_Edit

At the 'MailP' POP3 client tab you finally have to activate OrMail polling ('optional' or 'mandatory') with POP3 downloads by mail clients.

That's it at the receiving end. Now to the easier task at the sender.

Presuming that Tor is already running you first have to go to the Services > OrMail tab, click the '+' button to add an item and define the OrMail recipient who gave you his Hidden Service .onion address with the associated port number and Hashcash bits by entering them at 'HS Address', 'Port' and 'Hashcash'. With those communication parameters present in the clipboard formatted as mentioned above they are quickly pasted from there by clicking the '<' button. Select SSL/TLS 'enabled', as you can expect the OmniMix SMTP server at the destination to support that data encryption method. Tor connect / read timeout intervals are taken from the AnoMailS > Direct tab.

Tutor_TorPlus_OrMail_Recipient_Edit

Then at 'Local Address' enter a (short) unique describing address term that you use as the recipient's address in your mail client, and at 'External Address' the true address, by which your local term is overwritten before OmniMix forwards your message. The name part outside the angle brackets isn't altered by OmniMix.

Caution: Never use potential real world mail addresses as local OrMail alias addresses, as for security reasons even mail messages that match a deactivated list entry are blocked.

After closing that window check the activation box above the OrMail Recipients list.

Tutor_TorPlus_OrMail_Recipient

Finally, back at the 'User' tab, activate that OrMail address at the 'OrMail Recipients' list for your account as shown in the picture above to make it available. Keep in mind, that if OmniMix recognizes an OrMail recipient term, which isn't unlocked for the respective user, the transmission of that message is aborted to prevent the leakage of information. I urge you to send your first test message to check its routing with OmniMix in Simulation mode. That's the way to avoid unpleasant results!

PreviousTopNext