[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
List of reliable remailers
I operate a remailer pinging service which collects detailed
information about remailer features and reliability.
To use it, just finger [email protected]
There is also a Web version of the same information, plus lots of
interesting links to remailer-related resources, at:
http://www.cs.berkeley.edu/~raph/remailer-list.html
This information is used by premail, a remailer chaining and PGP
encrypting client for outgoing mail, which is available at:
ftp://ftp.csua.berkeley.edu/pub/cypherpunks/premail/premail-0.33.tar.gz
For the PGP public keys of the remailers, as well as some help on
how to use them, finger [email protected]
This is the current info:
REMAILER LIST
This is an automatically generated listing of remailers. The first
part of the listing shows the remailers along with configuration
options and special features for each of the remailers. The second
part shows the 12-day history, and average latency and uptime for each
remailer. You can also get this list by fingering
[email protected].
$remailer{"vox"} = "<[email protected]> cpunk pgp. post";
$remailer{"avox"} = "<[email protected]> cpunk pgp post";
$remailer{"extropia"} = "<[email protected]> cpunk pgp special";
$remailer{"portal"} = "<[email protected]> cpunk pgp hash";
$remailer{"alumni"} = "<[email protected]> cpunk pgp hash";
$remailer{"bsu-cs"} = "<[email protected]> cpunk hash ksub";
$remailer{"rebma"} = "<[email protected]> cpunk pgp. hash";
$remailer{"c2"} = "<[email protected]> eric pgp hash reord";
$remailer{"penet"} = "<[email protected]> penet post";
$remailer{"ideath"} = "<[email protected]> cpunk hash ksub reord";
$remailer{"hacktic"} = "<[email protected]> cpunk mix pgp hash latent cut post ek";
$remailer{"flame"} = "<[email protected]> cpunk mix pgp. hash latent cut post ek reord";
$remailer{"rahul"} = "<[email protected]> cpunk pgp hash filter";
$remailer{"mix"} = "<[email protected]> cpunk mix pgp hash latent cut ek ksub reord";
$remailer{"syrinx"} = "<[email protected]> cpunk pgp reord mix post";
$remailer{"ford"} = "<[email protected]> cpunk pgp";
$remailer{"hroller"} = "<[email protected]> cpunk pgp hash mix cut ek";
$remailer{"vishnu"} = "<[email protected]> cpunk mix pgp hash latent cut ek ksub reord";
$remailer{"crown"} = "<[email protected]> cpunk pgp hash latent cut mix ek reord";
$remailer{"replay"} = "<[email protected]> cpunk mix pgp hash latent cut post ek";
$remailer{"spook"} = "<[email protected]> cpunk mix pgp hash latent cut ek";
$remailer{"gondolin"} = "<[email protected]> cpunk mix hash latent cut ek ksub reord";
$remailer{"rmadillo"} = "<[email protected]> mix cpunk pgp hash latent cut";
[email protected] is _not_ a remailer.
[email protected] is _not_ a remailer.
[email protected] is _not_ a remailer.
Use "premail -getkeys [email protected]" to get PGP keys
for the remailers. Fingering this address works too.
21 Apr 1995: The new version of premail (0.33) is out, with direct
posting, perl5 and better MH support, and numerous bug fixes.
Last ping: Mon 24 Jul 95 6:07:21 PDT
remailer email address history latency uptime
-----------------------------------------------------------------------
hacktic [email protected] *+********** 12:38 99.99%
spook [email protected] *--********* 25:21 99.99%
flame [email protected] +-++++++++++ 57:34 99.99%
replay [email protected] *+****++***+ 13:12 99.99%
rmadillo [email protected] +++++++++++ 49:13 99.99%
crown [email protected] --+-+++-+--+ 1:25:56 99.98%
bsu-cs [email protected] ###*-#*#**** 13:47 99.98%
portal [email protected] #######***** 4:03 99.96%
vishnu [email protected] ++*******+** 13:36 99.73%
gondolin [email protected] +*----*----- 1:45:44 99.73%
vox [email protected] .------.-- 15:58:51 99.99%
ideath [email protected] ........-. 14:21:20 99.32%
ford [email protected] #-#+#++-**-* 39:46 99.26%
extropia [email protected] _ --. -..-- 13:25:43 99.20%
hroller [email protected] +*-++#+#*--* 1:13:04 99.05%
syrinx [email protected] +-------- -- 3:28:31 99.01%
penet [email protected] --+++------ 8:45:41 98.69%
alumni [email protected] #*#** ***** 4:36 97.24%
rahul [email protected] *##+-##***++ 10:07 99.98%
rebma [email protected] +--+-.-+_.- 21:34:08 86.95%
c2 [email protected] ++-+++- -- 2:41:11 85.54%
mix [email protected] ---+ 3:12:31 77.55%
For more info: http://www.cs.berkeley.edu/~raph/remailer-list.html
History key
* # response in less than 5 minutes.
* * response in less than 1 hour.
* + response in less than 4 hours.
* - response in less than 24 hours.
* . response in more than 1 day.
* _ response came back too late (more than 2 days).
cpunk
A major class of remailers. Supports Request-Remailing-To:
field.
eric
A variant of the cpunk style. Uses Anon-Send-To: instead.
penet
The third class of remailers (at least for right now). Uses
X-Anon-To: in the header.
pgp
Remailer supports encryption with PGP. A period after the
keyword means that the short name, rather than the full email
address, should be used as the encryption key ID.
hash
Supports ## pasting, so anything can be put into the headers of
outgoing messages.
ksub
Remailer always kills subject header, even in non-pgp mode.
nsub
Remailer always preserves subject header, even in pgp mode.
latent
Supports Matt Ghio's Latent-Time: option.
cut
Supports Matt Ghio's Cutmarks: option.
post
Post to Usenet using Post-To: or Anon-Post-To: header.
ek
Encrypt responses in reply blocks using Encrypt-Key: header.
special
Accepts only pgp encrypted messages.
mix
Can accept messages in Mixmaster format.
reord
Attempts to foil traffic analysis by reordering messages. Note:
I'm relying on the word of the remailer operator here, and
haven't verified the reord info myself.
mon
Remailer has been known to monitor contents of private email.
filter
Remailer has been known to filter messages based on content. If
not listed in conjunction with mon, then only messages destined
for public forums are subject to filtering.
Raph Levien