[tor-bugs] #20226 [Core Tor/Tor]: Support DNS-MX resource records with .onion-filtering for TOR as secure/anonymous email transport protocoll

Tor Bug Tracker & Wiki blackhole at torproject.org
Fri Sep 23 13:59:05 UTC 2016


#20226: Support DNS-MX resource records with .onion-filtering for TOR as
secure/anonymous email transport protocoll
-----------------------------+---------------------------------------------
     Reporter:  renne        |      Owner:
         Type:  enhancement  |     Status:  new
     Priority:  High         |  Milestone:  Tor: 0.2.9.x-final
    Component:  Core         |    Version:  Tor: unspecified
  Tor/Tor                    |
     Severity:  Normal       |   Keywords:  email, DNS, MX, resource record
Actual Points:               |  Parent ID:
       Points:               |   Reviewer:
      Sponsor:               |
-----------------------------+---------------------------------------------
 Hi,

 while a lot of bright minds are working on transport and end-to-end
 content encryption of email, the problem of transport meta-data
 anonymization is still unsolved.

 This can be solved by a network of private SMTP-servers interconnected via
 TOR hidden-services like [https://www.own-mailbox.com/#HowWork Own-
 Mailbox].

 The easiest way to connect the .onion-hostname of a SMTP-server with a
 clearnet mail-domain is to use the .onion-hostname of a SMTP-server as a
 primary MX DNS resource record. To avoid leaking by a fallback to the
 clearnet mail-servers (secondary MX records) it is very helpful if TOR is
 able to resolve MX-records AND remove non-.onion-domains from the MX-RRs.

 Bottom-line: This would allow encrypted and anonymous email communication
 with TOR onion-routing as transport protocol instead of plain TCP.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20226>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list