John: Thanks you for all the great information. -- Jeff
John Long <codeb...@inbox.lv> writes: >On Mon, Feb 15, 2016 at 08:32:18PM -0800, Jeffery Small wrote: >> >> I just installed mixmaster on my Ubuntu 15.10 system and am trying it out. >> I have a question. The mutt manual says: >> >> "To use it [i.e., mixmaster], you'll have to obey certain restrictions. >> Most important, you cannot use the Cc and Bcc headers." >I think this must be a newer version of Mixmaster. I would question the >worthiness of that. See if you can find an older version. It compiles easily >on Linux. Look on sourceforge or elsewhere. Get a known good copy of PGP, >preferably 6.5.8 command line and/or 2.6 Disastry (2.6.3?). Disastry is 2.6 >with new hashes and ciphers to bring you up and in some cases past 6.5.8. >Mixmaster strips headers. If you are concerned send a few test posts to >yourself at various email addresses. You can test it by creating fake mix >nodes and a fake nodes file (forgot what it's called but it is the stats >file that Mixmaster uses to select remailers) with your own keys and use the >outfile option. The mail won't be sent. Then you can repeatedly decrypt it >with the keys for the fake nodes and see exactly what is being sent. >> >> When I look in my /etc/mixmaster/filter.conf >Seems to me this is a new thing. I played around with mixmaster back in the >day and I don't remember this. I could be wrong. >> So what are the restrictions on Cc: and Bcc: as it seems that mixmaster is >> prepared to use (or at least pass) them? Mostly, I'm just asking out of >> curiosity. >Normally Mixmaster will strip all headers that could leak info. If you want >to just post to a newsgroup use the newsgroups header. If you want to mail >anonymously I don't know why you couldn't use cc or bcc also. >If you want to communicate two way via Mixmaster you'll have to learn to >create a reply block. The new nyms at Steve Crook's site are ok if you think >about what you are doing and use Mixmaster to set it up and don't ever view >the website except over TOR or known good proxy.. I'm not sure how many old >school nym servers are still around but they are better if you know what >you're doing. Plenty of info around on this but you'll have to put the >pieces together. Not much has changed, the old info is still valid. >You'll need to get handy with command line gpg and pgp and you should also >keep in mind the 1024 mix pubkeys are no longer safe for serious use and >also if you are going to communicate securely you need end-to-end >encryption with big pubkeys. >/jl >-- >ASCII ribbon campaign ( ) Powered by Lemote Fuloong > against HTML e-mail X Loongson MIPS and OpenBSD > and proprietary / \ http://www.mutt.org > attachments / \ Code Blue or Go Home! > Encrypted email preferred PGP Key 2048R/DA65BC04