anonget 1.0 (formerly uinmyn)

14 views
Skip to first unread message

StealthMonger

unread,
Aug 29, 2011, 11:34:05 PM8/29/11
to
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


NEW IN THIS RELEASE

anonget (1.0)

* Name change from "uinmyn" (last version was 0.07)
* Optional send confirmation now available, providing a progress
report of the URL request and to help diagnose failures.
* Reformat anonget-list-gotten-urls.py output for easier reading.
* Change "is-not-my.name" to "mixnym.net".
* Rewrite the documentation.
_ __ ___
_______ __ ____ _ __ _____ ____ _| |_ / | / _ \
/ _ | '_ \/ _ \| '_ \/ _ // _ \_ _| | || | | |
| |_| | | | | |_| | | | | |_| | |/ / | | | || |_| |
\___/_|_| |_\____/|_| |_\ __/ \___/ |__| /___O\___/
/ /__
\____|
__________________________________________
| |
| |
| IS THIS ANONYMOUS BROWSING, OR WHAT?! |
| |
|__________________________________________|

N.B.: Below, replace all occurrences of "<AT>" with "@".

WHAT IS IT?

anonget facilitates browsing the Internet with strong anonymity via
url<AT>mixnym.net [1].

HOW IT WORKS

Given a list of URLs, anonget encrypts the list and a fresh random key
and formats it for mailing by mixmaster [2] to url<AT>mixnym.net
through a chain of anonymizing remailers. The request contains
nothing to identify you or your site, and the outgoing mail is
indistinguishable from other remailer traffic that you may generate.

url<AT>mixnym.net then gets the requested information from the
Internet, encrypts it to the fresh key, and broadcasts it worldwide on
Usenet newsgroup alt.anonymous.messages.

The fresh key (saved by anonget) is used to recognize and decrypt the
reply.

No one, not even the mixnym.net administrator, is able to link content
being fetched with any particular user, or with other requests.

EXAMPLE 1

The command

echo http://www.banana.mixmin.net | anonget-fetch-body.py db \
| mixmaster url<AT>mixnym.net

generates a fresh random key for the encryption and hsub of the reply,
adds the key to db (which need not have existed beforehand), formats
and encrypts key and list of URLs (just http://www.banana.mixmin.net
in this case) as required by url<AT>mixnym.net, and sends it. db is
plain ASCII, so you can look at it to better see what's happening.

Later, in a directory full of fresh a.a.m articles, the command

for f in *; do anonget-do-aam-article.py db < $f >> mbox; done

will append the requested content to mbox if it has arrived.

ADDING SEND CONFIRMATION

Alternatively, a request can be formulated to not only get the wanted
information as above, but to send confirmation that it was mailed from
the last remailer in the chain. This provides a progress report of
the request and can help to diagnose failures. A copy of the request
is sent to a mail-to-news gateway with Subject: another hsub generated
with the same fresh key.

EXAMPLE 2

(echo 'Chain: *,*,kulin'; echo http://www.banana.mixmin.net \
| anonget-fetch-whole.py db) | mixmaster

Unlike anonget-fetch-body.py of example 1, anonget-fetch-whole.py
generates a whole mail, including To:, Cc:, and Subject: headers,
instead of relying on mixmaster to provide them. (Yet more headers,
like the Chain: in example 2, can be added as shown. Note the
parentheses in the command.)

When anonget-do-aam-article.py processes the article in example 1, it
emits the inner reply mail and deletes the db entry. But when it
senses that the article is not the returned data, but the request
itself, it constructs a confirmation message and leaves the db entry
intact. (Note that if the fetched data get processed before the
request confirmation (due to net lag), the request confirmation will
not be noticed because the database entry will already have been
deleted. But in this case it doesn't matter.)

CACHING OR ARCHIVING THE REPLY, AND RENDERING IT

A convenient way to save and render an anonget reply is to insert it
into the browser-accessible cache provided by wwwoffle [3]. The
script anonget-to-wwwoffle-cache.py is provided for this purpose.

To just list the URLs contained in an "inner mail", the script
anonget-list-gotten-urls.py can be applied.

AUTOMATIC DISPOSITION OF THE REPLY

Instead of the explicit anonget-do-aam-article.py command above,
procmail [4] can be used to forward the reply as local configuration
may require. Return codes from anonget-do-aam-article.py are useful
for procmail, which might be checking the same message for other hits.
The following .procmailrc clause sequence will send the decrypted
"inner posting" to "local-recipient".

:0fW
| anonget-do-aam-article.py /path/to/anonget_pending_requests_db

:0a
! local-recipient

RESPECTING YOUR PRIVACY

Out of respect for your privacy, anonget doesn't require you to access
any web site for its installation or use (though you may if you wish:
mailto:stealthsuite<AT>nym.mixmin.net?subject=send%20index.html).
Everything is right here in this posting.

ABOUT THE CODE

Succinctness and readability are given priority here over efficiency.
If efficiency becomes an issue, there are lots of opportunities here
for speedup.

These scripts are meant mainly as hints for you to adapt to the needs
of your particular case. But they could be used verbatim if you like.

INSTALLATION

Have python, gnupg, and mixmaster installed.
Have public key '94F204C28BF00937EFC85D1AFF4DB66014D0C447' on your
gnupg keyring.
Copy the scripts from below to somewhere on your executables path.

Of course, you are taking a full feed of a.a.m at all times without
interruption, separating wheat from chaff only after it's all behind
closed doors. Otherwise, the world is informed about which articles
you find interesting.

Remember, long random latency is part of the price of anonymity. It
can't be done with TOR or any other low-latency method.

FOOTNOTES

[1] http://www.mixnym.net
[2] http://sourceforge.net/projects/mixmaster/
[3] WWW OFFLine Explorer http://www.gedanken.demon.co.uk/wwwoffle/
[4] http://www.procmail.org/

CHANGE LOG

0.07

Use long keyid, not send<AT>mixnym.net, to identify encryption
key, foiling fake key postings. Contributed by Steve Crook.

Use Python's internal encode('base64') instead of imported Base64
to encode the random key. Contributed by Steve Crook.

Use Python "%"-style string substitution for type conversion and
tidier code (yet to be finished). Contributed by Steve Crook.

Support hsub's ranging from 48 to 80 chars in length. Contributed
by Steve Crook.

Systematically code all email addresses to avert Google corruption
of its archived version of this posting.

0.06

Add time-stamps to database entries to facilitate removal of old,
stale entries.

Changed slogan from "Is this anonymous surfing, or what?".

Documentation improvements.

0.05

Quote URL in uinmyn-do-aam-article.py against shell interpretation.

0.04

Did TODO item:
Use PIPE for the gpg stdin in uinmyn-do-aam-article.py.
(eliminating previous stupid size limit).

0.03

Add "decode=True" in uinmyn-to-wwwoffle-cache.py to capture coded
files, such as .pdfs.

Change the www.bananasplit.info reference to www.banana.mixmin.net.

0.02

Add a script to enter gotten pages into a local browser-accessible
cache.

Improvements to the documentation.


Here are the scripts.

8<--------8<------- anonget-fetch-body.py --------8<--------8<--------
#! /usr/bin/python

# SYNOPSIS
# anonget-fetch-body.py <pending-requests-dict>

# DESCRIPTION

# Reads URLs from standard input, one per line, generates a fresh
# random key to encrypt the reply and for its hsub, adds the key and
# the requested URLs to pending-requests-dict (creating it anew if
# it doesn't exist), constructs and encrypts a request for
# url<AT>mixnym.net, and writes it to standard output.

from os import urandom
import sys, os, time
import pprint
from subprocess import Popen, PIPE

ANONGET_PENDING_REQUESTS = sys.argv[1]
NYMSERV_KEY = '94F204C28BF00937EFC85D1AFF4DB66014D0C447'

# same key for both encryption and hsub:
key = urandom(15).encode('base64').rstrip()

gpgcmd = 'gpg --armor --encrypt --recipient %s ' % NYMSERV_KEY
gpgopts = '--trust-model always --no-emit-version --batch'
gpgproc = Popen(gpgcmd + gpgopts, shell=True, stdin=PIPE)
gpgproc.stdin.write("KEY %s\n" % key)

urls = [time.time()] # time-tag precedes the urls in the db entry
for line in sys.stdin.readlines():
urls.append(line.rstrip())
gpgproc.stdin.write('SOURCE %s\n' % line.rstrip())

gpgproc.stdin.close()

# Not dealt with here: Mutually exclusive access to the
# ANONGET_PENDING_REQUESTS database, as would be required if request
# issuance might be concurrent with a.a.m. processing.

if os.path.isfile(ANONGET_PENDING_REQUESTS):
execfile(ANONGET_PENDING_REQUESTS)
else:
anonget_pending_requests = {}
anonget_pending_requests[key] = urls

new_upr_fd = open(ANONGET_PENDING_REQUESTS, 'w')
new_upr_fd.write('anonget_pending_requests =\\\n')
pprint.pprint(anonget_pending_requests,stream=new_upr_fd)
8<--------8<------- anonget-do-aam-article.py ----8<--------8<--------
#! /usr/bin/python

# SYNOPSIS
# anonget-do-aam-article.py <pending-requests-dict>

# DESCRIPTION

# Reads an article from standard input. If its Subject: might be an
# hsub, check it against each key in pending-requests-dict in turn.
# If a hit is found, decrypt the inner posting and write it to
# standard output.

import sys, os
from hashlib import sha256
import email
import pprint
from subprocess import Popen, PIPE

ANONGET_PENDING_REQUESTS = sys.argv[1]

posting = email.message_from_file(sys.stdin)

# Abort if Subject doesn't exist, otherwise get its length
if 'Subject' in posting:
sublen = len(posting['Subject'])
else:
# No Subject, no hSub.
sys.exit(1)

# hSubs must fall within the length criteria
if sublen < 48 or sublen > 80:
sys.exit(1)

try:
iv = posting['subject'][:16].decode('hex')
except TypeError:
sys.exit(1)

# Not dealt with here: Mutually exclusive access to the
# ANONGET_PENDING_REQUESTS database, as would be required if request
# issuance might be concurrent with a.a.m. processing.

if os.path.isfile(ANONGET_PENDING_REQUESTS):
execfile(ANONGET_PENDING_REQUESTS)
else:
anonget_pending_requests = {}


for key, urls in anonget_pending_requests.iteritems():
hsub = (iv + sha256(iv + key).digest()).encode('hex')[:sublen]
if posting['Subject'] == hsub:
# Doing part of the job in shell:
gpgproc = Popen('mkfifo $HOME/passwdf ; (echo ' + key + ' > $HOME/passwdf &); gpg --passphrase-fd 3 3<$HOME/passwdf --trust-model always --batch ; rm $HOME/passwdf', stdin=PIPE, stderr=PIPE, shell=True)
gpgstderr = gpgproc.communicate(input=posting.get_payload())[1]
if gpgstderr.find('decryption failed') < 0:
# Other processing that could be done here:
# Deal with discrepancies between requested and obtained URL lists.
# Save the used key in an archive, rather than losing it forever.
del anonget_pending_requests[key]
new_upr_fd = open(ANONGET_PENDING_REQUESTS, 'w')
new_upr_fd.write('anonget_pending_requests =\\\n')
pprint.pprint(anonget_pending_requests,stream=new_upr_fd)
sys.exit(0)
else:
# gpg says 'decryption failed'; assume it's a send confirmation.
print 'Subject: URL request send confirmation ' + key
print ''
print 'Key: ' + key
print 'Request-time: ' + str(urls[0])
print 'URLs: ' + str(urls[1:])
print 'gpg-stderr:'
print gpgstderr
sys.exit(0)
sys.exit(1)
8<--------8<--------8<------- anonget-fetch-whole.py -------8<--------
#! /usr/bin/python

# SYNOPSIS
# anonget-fetch-whole.py <pending-requests-dict>

# DESCRIPTION

# Alternative to anonget-fetch-body.py includes send confirmation.

# Reads URLs from standard input, one per line, generates a fresh
# random key to encrypt the reply and for its hsub, adds the key and
# the requested URLs to pending-requests-dict (creating it anew if
# it doesn't exist), constructs and encrypts a request for
# url<AT>mixnym.net, and writes it to standard output, prepended
# with mail headers for send confirmation.

from os import urandom
from hashlib import sha256
import sys, os, time
import pprint
from subprocess import Popen, PIPE
from datetime import datetime

ANONGET_PENDING_REQUESTS = sys.argv[1]
NYMSERV_KEY = '94F204C28BF00937EFC85D1AFF4DB66014D0C447'
HSUBLEN = 48

# same key for both encryption and hsub:
key = urandom(15).encode('base64').rstrip()

# Mail headers
print 'To: url<AT>mixnym.net'
datestring = datetime.utcnow().strftime("%Y%m%d")
print 'Cc: mail2news-' + datestring + '-alt.anonymous.messages<AT>m2n.mixmin.net'
iv = urandom(8) # hsub code adapted from that of Steve Crook
hsub = (iv + sha256(iv + key).digest()).encode('hex')[:HSUBLEN]
print 'Subject: ' + hsub
print ''
sys.stdout.flush() # so headers definitely precede body

gpgcmd = 'gpg --armor --encrypt --recipient %s ' % NYMSERV_KEY
gpgopts = '--trust-model always --no-emit-version --batch'
gpgproc = Popen(gpgcmd + gpgopts, shell=True, stdin=PIPE)
gpgproc.stdin.write("KEY %s\n" % key)

urls = [time.time()] # time-tag precedes the urls in the db entry
for line in sys.stdin.readlines():
urls.append(line.rstrip())
gpgproc.stdin.write('SOURCE %s\n' % line.rstrip())

gpgproc.stdin.close()

# Not dealt with here: Mutually exclusive access to the
# ANONGET_PENDING_REQUESTS database, as would be required if request
# issuance might be concurrent with a.a.m. processing.

if os.path.isfile(ANONGET_PENDING_REQUESTS):
execfile(ANONGET_PENDING_REQUESTS)
else:
anonget_pending_requests = {}
anonget_pending_requests[key] = urls

new_upr_fd = open(ANONGET_PENDING_REQUESTS, 'w')
new_upr_fd.write('anonget_pending_requests =\\\n')
pprint.pprint(anonget_pending_requests,stream=new_upr_fd)

gpgproc.wait()
8<--------8<--------8<------- anonget-list-gotten-urls.py --8<--------
#! /usr/bin/python

# SYNOPSIS
# anonget-list-gotten-urls.py

# DESCRIPTION

# List the URLs in the url<AT>mixnym.net "inner mail" on standard
# input together with the sizes of the fetched pages.

import sys, email

pages = email.message_from_file(sys.stdin)
for page in pages.get_payload():
print repr(len(page.get_payload())).rjust(8),page.get('Content-Description')
8<--------8<--------8<------- anonget-to-wwwoffle-cache.py -8<--------
#! /usr/bin/python

# SYNOPSIS
# anonget-to-wwwoffle-cache.py

# DESCRIPTION

# Given a (decrypted) url<AT>mixnym.net "inner posting", enter each
# page that it contains into the wwwoffle cache, overlaying any
# previous content having matching URLs.

import sys, os, email
from subprocess import Popen, PIPE

pages = email.message_from_file(sys.stdin)
for page in pages.get_payload():
p = Popen('wwwoffle-write \'' + page.get('Content-Description') + '\'', stdin=PIPE, shell=True)
p.stdin.write('HTTP/1.0 200 OK\n')
p.stdin.write('Content-Type: ' + page.get('Content-Type') + '\n\n')
p.stdin.write(page.get_payload(decode=True))
p.stdin.close()
p.wait()
8<--------8<--------8<--------8<--------8<--------8<--------8<--------

-- StealthMonger <StealthMonger<AT>nym.mixmin.net>
Long, random latency is part of the price of Internet anonymity.

Key: mailto:stealthsuite<AT>nym.mixmin.net?subject=send%20stealthmonger-key

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.8+ <http://mailcrypt.sourceforge.net/>

iEYEARECAAYFAk5cSdcACgkQDkU5rhlDCl4QKwCeL4TMx0mf3zx8Qx647PVfR0cm
Vb0An0Ca73PPHc5qBddPUwG0UrPZPHnq
=H/dc
-----END PGP SIGNATURE-----

Reply all
Reply to author
Forward
0 new messages