Penet remailer

Penet remailer

The Penet remailer (anon.penet.fi) was a pseudonymous remailer (type 0) operated by Johan "Julf" Helsingius of Finland from 1993 to 1996. Its initial creation stemmed from an argument in a Finnish newsgroup over whether people should be required to tie their real name to their online communications. Julf believed that people should not—indeed, could not—be required to do so. In his own words::"Some people from a university network really argued about if everybody should put their proper name on the messages and everybody should be accountable, so you could actually verify that it is the person who is sending the messages. And I kept arguing that the Internet just doesn't work that way, and if somebody actually tries to enforce that, the Internet will always find a solution around it. And just to prove my point, I spent two days or something cooking up the first version of the server, just to prove a point." [cite journal
last=Grassmuck|first=Volker
date=December 1994
title = "Don't Try to Control the Network Because it's Impossible Anyway" Interview with Johan Helsingius on Anonymous Remailers
journal= IC Magazine
url=http://waste.informatik.hu-berlin.de/Grassmuck/Texts/remailer.html
]

Implementation

Julf's remailer worked by receiving an e-mail from a person, stripping away all the technical information that could be used to identify the original source of the e-mail, and then remailing the message to its final destination. The result provided Internet users with the ability to send e-mails and post to Usenet newsgroups without revealing their true identity.

In addition, the Penet remailer used a type of "Post Office Box" system in which users could claim their own anonymous e-mail address of the form "anXXXXX@anon.penet.fi", allowing them to assign a pseudonymous identity to their anonymous message, and to receive messages sent to their (anonymous) e-mail address.

While the basic concept was effective, the Penet remailer had several vulnerabilities which threatened the anonymity of its users. Chief among them was the need to store a list of real e-mail addresses mapped to the corresponding anonymous e-mail addresses on the server. A potential attacker needed only to access that list to compromise the identity of all of its users. The Penet remailer was on two occasions required by the legal system in Finland (the country where Penet resided) to turn over the real e-mail address that was mapped to an anonymous e-mail address . Another potential vulnerability was that messages sent to and from the remailer were all sent in cleartext, making it vulnerable to electronic eavesdropping.

Later anonymous remailer designs, such as the Cypherpunk and Mixmaster designs, adopted more sophisticated techniques to try and overcome these vulnerabilities, including the use of encryption to prevent eavesdropping, and also the technique known as onion routing to allow the existence of pseudonymous remailers in which no record of a user's real e-mail address is stored by the remailer.

Despite its relatively weak security, the Penet remailer was a hugely popular remailer owing to its ease of anonymous account set-up and use compared to more secure but less user-friendly remailers, and had over 700,000 registered users at the time of its shutdown in September 1996.

First compromise

In the summer of 1994, word spread online of the Penet remailer being compromised, with the announcement being made at the hacker convention Def Con II. Wired Magazine reported at the time:

:An official announcement was made at this year's DC that anon.penet.fi has been seriously compromised. We strongly suggest that you not trust this anonymous remailer. (Word has it that some folks are working on a PGP-based service.) We'll keep you posted. [http://www.wired.com/wired/archive/2.11/net_surf.html]

This was followed a year later by a mention in the announcement for Def Con III:

SPEAKERS
Sarah Gordon, AKA Theora, a veteran of DC II will be presenting anotherspeech this year. Last year she organized a round table discussionwith Phil Zimmermann and Presence, and revealed that the Anonymousremailer anon.penet.fi was compromised. TOPIC: Not Announced Yet. [http://venus.soci.niu.edu/~cudigest/CUDS7/cud710]

There are no known reports detailing the specifics and extent of this compromise.

econd compromise

The second reported compromise of the Penet remailer occurred in February 1995 at the behest of the Church of Scientology. Claiming that a file had been stolen from one of the Church's internal computer servers and posted to the newsgroup alt.religion.scientology by a Penet user, representatives of the Church contacted Interpol, who in turn contacted the Finnish police, who issued a search warrant demanding that Julf hand over data on the users of the Penet remailer. Initially Julf was asked to turn over the identities of all users of his remailer (which numbered over 300,000 at the time), but he managed a compromise and revealed only the single user being sought by the Church of Scientology.

The anonymous user in question used the handle "-AB-" when posting anonymously, and their real e-mail address indicated that they were an alumnus or alumna of the California Institute of Technology. The document he posted was an internal report by a Scientology private investigator, Gene Ingram, about an incident that had occurred involving a man named Tom Klemesrud, a BBS operator involved in the Scientology versus the Internet controversy. The confusing story became known on the Internet as the "Miss Blood Incident".

Eventually the Church learned the real identity of "-AB-" to be Tom Rummelhart, a Scientologist and computer operator responsible for some of the maintenance of the Church of Scientology's INCOMM computer system. The fate of "-AB-" after the Church of Scientology learned his true identity is unknown. Years later in 2003, a two-part story entitled [http://groups.google.com/group/alt.religion.scientology/msg/3d23b12d4264e8fc?"What Really Happened in INCOMM - Part 1"] and [http://groups.google.com/group/alt.religion.scientology/msg/b0949c0e7484657f?"What Really Happened in INCOMM – Part 2"] was posted to alt.religion.scientology by a former Scientologist named Dan Garvin, which described events within the Church leading up to and stemming from the Penet posting by "-AB-".

Other attacks

Julf was also contacted by the government of Singapore as part of an effort to discover who was posting messages critical of the nation's government in the newsgroup soc.culture.singapore, but as Finnish law did not recognise any crime being committed, Julf was not required to reveal the user's identity.

In August 1996, a major British newspaper, "The Observer", published an article describing the Penet remailer as a major hub of child pornography, quoting an United States FBI investigator named Toby Tyler as saying that Penet was responsible for between 75% and 90% of the child pornography being distributed on the Internet. Investigations by online journalist Declan McCullagh demonstrated many errors and omissions in the "Observer" article. In an article penned by McCullagh, the alleged FBI investigator described himself as a sergeant in California's San Bernardino sheriff's office who only consulted with the FBI from time to time, a relationship which the Observer article had in his opinion purposefully misrepresented as some kind of employment relationship. Tyler also claimed that the "Observer" purposely misquoted him, and he had actually said "that most child pornography posted to newsgroups does not go through remailers."

In addition, Julf claimed that he explained to the "Observer" the steps he took to prevent child pornography from being posted by forbidding posting to the alt.binaries newsgroups and limiting the size of messages to 16 kilobytes, too small to allow uuencoded binaries such as pictures to be posted. He also informed the "Observer" of an investigation already performed by the Finnish police which had found no evidence that child pornography was being remailed through Penet. Julf claims that all this information was ignored, stating that the "Observer" "wanted to make a story so they made things up."

Despite voluminous reader mail pointing to the numerous errors in the news story, the "Observer" never issued a full retraction of its claims, only going so far as to clarify that Johan Helsingius had "consistently denied" the claims of child pornography distribution.

In September 1996, the Church of Scientology again sought information from Julf as part of its court case against a critic of the Church named Grady Ward. The Church wanted to know if Ward had posted any information through the Penet remailer. Ward gave Julf explicit permission to reveal the extent of his alleged use of the Penet remailer, and Julf told the Church that he could find no evidence that Ward had ever used the Penet remailer at all.

Third compromise and shutdown

In September 1996, an anonymous user posted the confidential writings of the Church of Scientology through the Penet remailer. The Church once again demanded that Julf turn over the identity of one of its users, claiming that the poster had infringed the Church's copyright on the confidential material. The Church was successful in finding the originating e-mail address of the posting before Penet remailed it, but it turned out to be another anonymous remailer: the alpha.c2.org nymserver, a more advanced and more secure remailer which didn't keep a mapping of e-mail addresses that could be subpoenaed.

Facing multiple criticism and attacks, and unable to guarantee the anonymity of Penet users, Julf shut down the remailer in September 1996. [cite press release | url = http://www.eff.org/Censorship/Foreign_and_local/Finland/960830_penet_closure.announce | title = Johan Helsingius closes his Internet remailer | date = 1996-08-30 | accessdate = 2007-08-30 ]

ee also

* Crypto-anarchism
* Cypherpunk

References

Notes

Additional sources

* cite journal
last=McCullagh|first=Declan
date= September 1996
title=Finnish Line
url=http://www.eff.org/Misc/Publications/Declan_McCullagh/hw.finnish.line.090696.article
journal=Hotwired,The Netizen

* cite journal
last=Helmers|first= Sabine
date=September 1997
url=http://www.december.com/cmc/mag/1997/sep/helmers.html
title=A Brief History of anon.penet.fi - The Legendary Anonymous Remailer
journal=CMC Magazine

* cite journal
last=Post|first= David G.
date=April 1996
title=The First Internet War
journal=Reason Magazine
( [http://www.cli.org/DPost/X0003_ARTICLE4.html Transcription] hosted by Cyberspace Law Institute).
* cite press release
url = http://www.eff.org/Privacy/Anonymity/960923_penet_injunction.announce
title = Johan Helsingius gets injunction in Scientology case — privacy protection of anonymous messages still unclear
date =1996-09-23
publisher= EFF

* [http://www.xs4all.nl/~kspaink/cos/rnewman/anon/penet.html The Church of Scientology vs anon.penet.fi]
* [http://groups.google.com/groups?q=author:an144108@anon.penet.fi&start=0&scoring=d Google archive of an144108's Usenet postings]
* [http://www.wired.com/wired/archive/2.11/net_surf.html Wired 2.11: Net Surf]
* [http://venus.soci.niu.edu/~cudigest/CUDS7/cud710 Computer underground Digest 7.10]


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Remailer — Saltar a navegación, búsqueda Un remailer es un servidor que recibe emails en un formato especial, los procesa eliminando las cabeceras, y los dirige hasta el destinatario del mensaje. Los emails normalmente están aplicados con criptografía. Para …   Wikipedia Español

  • remailer anonyme — ● ►en loc. m. ►MAIL Expression bâtarde, on devrait dire Réexpéditeur Anonyme . Serveur qui vous propose de recevoir votre courrier et de le réexpédier en faisant comme si c était lui qui en était à l origine. Du coup, vous êtes anonyme. Le… …   Dictionnaire d'informatique francophone

  • Pseudonym Remailer — Ein Nym Remailer ist ein pseudonymisierender Remailer, der verschlüsselte oder unverschlüsselte Nachrichten annimmt, anonymisiert und weiterleitet. Alternative Bezeichnungen sind Nym Server oder Pseudonym Server (englisch auch pseudonymous server …   Deutsch Wikipedia

  • Pseudonymer Remailer — Ein Nym Remailer ist ein pseudonymisierender Remailer, der verschlüsselte oder unverschlüsselte Nachrichten annimmt, anonymisiert und weiterleitet. Alternative Bezeichnungen sind Nym Server oder Pseudonym Server (englisch auch pseudonymous server …   Deutsch Wikipedia

  • Nym Remailer — Ein Nym Remailer ist ein pseudonymisierender Remailer, der verschlüsselte oder unverschlüsselte Nachrichten annimmt, anonymisiert und weiterleitet. Alternative Bezeichnungen sind Nym Server oder Pseudonym Server (englisch auch pseudonymous server …   Deutsch Wikipedia

  • Anonymous remailer — An anonymous remailer is a server computer which receives messages with embedded instructions on where to send them next, and which forwards them without revealing where they originally came from. There are Cypherpunk anonymous remailers,… …   Wikipedia

  • Pseudonymous remailer — A pseudonymous remailer or nym server, as opposed to an anonymous remailer, is an Internet software program designed to allow people to write pseudonymous messages on Usenet newsgroups and send pseudonymous email. Unlike purely anonymous… …   Wikipedia

  • Cypherpunk anonymous remailer — A cypherpunk anonymous remailer is a Type I anonymous remailer that takes messages encrypted with PGP or GPG, or in some cases in plain text, and forwards them removing any identifying information from the header. Contents 1 Sending a Cypherpunk… …   Wikipedia

  • Mixmaster anonymous remailer — Mixmaster Original author(s) Lance Cottrell Developer(s) Len Sassaman and Peter Palfrader Stable release 3.0 / March 3, 2008 Type Anonymous remailer …   Wikipedia

  • Nym-Server — Ein Nym Remailer ist ein pseudonymisierender Remailer, der verschlüsselte oder unverschlüsselte Nachrichten annimmt, anonymisiert und weiterleitet. Alternative Bezeichnungen sind Nym Server oder Pseudonym Server (englisch auch pseudonymous server …   Deutsch Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”