[tor-bugs] #20226 [Core Tor/Tor]: Support DNS-MX resource records with .onion-filtering for TOR as secure/anonymous email transport protocoll
Tor Bug Tracker & Wiki
blackhole at torproject.org
Fri Sep 23 13:59:05 UTC 2016
#20226: Support DNS-MX resource records with .onion-filtering for TOR as
secure/anonymous email transport protocoll
-----------------------------+---------------------------------------------
Reporter: renne | Owner:
Type: enhancement | Status: new
Priority: High | Milestone: Tor: 0.2.9.x-final
Component: Core | Version: Tor: unspecified
Tor/Tor |
Severity: Normal | Keywords: email, DNS, MX, resource record
Actual Points: | Parent ID:
Points: | Reviewer:
Sponsor: |
-----------------------------+---------------------------------------------
Hi,
while a lot of bright minds are working on transport and end-to-end
content encryption of email, the problem of transport meta-data
anonymization is still unsolved.
This can be solved by a network of private SMTP-servers interconnected via
TOR hidden-services like [https://www.own-mailbox.com/#HowWork Own-
Mailbox].
The easiest way to connect the .onion-hostname of a SMTP-server with a
clearnet mail-domain is to use the .onion-hostname of a SMTP-server as a
primary MX DNS resource record. To avoid leaking by a fallback to the
clearnet mail-servers (secondary MX records) it is very helpful if TOR is
able to resolve MX-records AND remove non-.onion-domains from the MX-RRs.
Bottom-line: This would allow encrypted and anonymous email communication
with TOR onion-routing as transport protocol instead of plain TCP.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20226>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list