All Projects → ehloonion → Onionmx

ehloonion / Onionmx

Onion delivery, so delicious

Programming Languages

ruby
36898 projects - #4 most used programming language

Projects that are alternatives of or similar to Onionmx

Tor Router
A SOCKS, HTTP and DNS proxy for distributing traffic across multiple instances of Tor
Stars: ✭ 69 (-50%)
Mutual labels:  dns, tor
Toriptables2
Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor network.
Stars: ✭ 287 (+107.97%)
Mutual labels:  dns, tor
Esp wifimanager
This is an ESP32 / ESP8266 WiFi Connection Manager with fallback web configuration portal. Use this library for configuring ESP32, ESP8266 modules' WiFi, etc. Credentials at runtime. You can also specify static DNS servers, personalized HostName, fixed or random AP WiFi channel. With examples supporting ArduinoJson 6.0.0+ as well as 5.13.5- .
Stars: ✭ 125 (-9.42%)
Mutual labels:  dns
Spf Tools
Shell scripts for taming the SPF (Sender Policy Framework) records in order to fight 10-maximum-DNS-look-ups limit.
Stars: ✭ 131 (-5.07%)
Mutual labels:  dns
Python Whois
Python module/library for retrieving WHOIS information of domains 💻❤
Stars: ✭ 128 (-7.25%)
Mutual labels:  dns
Caa helper
Generate a CAA policy
Stars: ✭ 125 (-9.42%)
Mutual labels:  dns
Desec Stack
Backbone of the deSEC.io Free Secure DNS Hosting Service
Stars: ✭ 130 (-5.8%)
Mutual labels:  dns
Andiodine
Android VPN over DNS (no root required). Repo moved to gitlab
Stars: ✭ 122 (-11.59%)
Mutual labels:  dns
Elk Hole
elasticsearch, logstash and kibana configuration for pi-hole visualiziation
Stars: ✭ 136 (-1.45%)
Mutual labels:  dns
Ymhttp
基于 libcurl 的 IO 多路复用 HTTP 框架,适用于 iOS 平台,支持 HTTP/HTTPS/HTTP2/DNS(SNI)
Stars: ✭ 127 (-7.97%)
Mutual labels:  dns
Rind
DNS server with REST interface for records management built on Golang
Stars: ✭ 132 (-4.35%)
Mutual labels:  dns
Ldns
LDNS is a DNS library that facilitates DNS tool programming
Stars: ✭ 127 (-7.97%)
Mutual labels:  dns
Private Tor Network
Run an isolated instance of a tor network in Docker containers
Stars: ✭ 125 (-9.42%)
Mutual labels:  tor
Docker Mailserver
Docker Mailserver based on the famous ISPMail guide
Stars: ✭ 129 (-6.52%)
Mutual labels:  postfix
Bash Utils
A collection of hand-crafted bash scripts for various common tasks.
Stars: ✭ 124 (-10.14%)
Mutual labels:  dns
Blocklists
Domain-ONLY Filter Lists (for use with DNS / Domain blocking tools)
Stars: ✭ 133 (-3.62%)
Mutual labels:  dns
Zeyple
Postfix filter/hook to automatically encrypt outgoing emails with PGP/GPG
Stars: ✭ 122 (-11.59%)
Mutual labels:  postfix
Prcdns
准确、CDN友好
Stars: ✭ 126 (-8.7%)
Mutual labels:  dns
Docker Mailman
Dockerfiles for the mailman suite.
Stars: ✭ 130 (-5.8%)
Mutual labels:  postfix
Dnspython
a powerful DNS toolkit for python
Stars: ✭ 1,838 (+1231.88%)
Mutual labels:  dns

Introduction

Onion mail delivery: so delicious!

Why deliver mail over Tor?

Even if you use TLS for your connections they are opportunistic. Even if you use OpenPGP for your connections, it is relatively easy for someone passively monitoring email traffic to correlate interesting metadata: who is communicating with whom, when and how much. Worse, it is trivial for a third party to know that two people are communicating.

By joining our little caramelized onion party, we can deliver mail over Tor onion services, and we can prevent this unauthorized privacy violation.

Let's turn out the lights and cook some onions.

Why do it over onion services, and not just use Tor itself?

The problem with this approach is that most exit nodes are blacklisted by RBLs so it’s very probable that the emails sent will either not reach their target or will get marked as spam.

Also with onion services you get to omit the potential of malicious exit nodes sniffing your traffic.

Why not deliver to onion email addresses?

You could create hidden services and make users send emails to each other at their hidden service domains, eg. [email protected]. But no time in the near future will this ever get adopted by normal users, the onion address is too painful for people to remember. The easiest approach to get things going is to setup a map of the real domains to the Tor onion services so the delivery is transparent to the users.

However, there is a way to deliver to onion addresses also, we need to add this information.

Does it work?

Yes! There are many organizations that are delivering mail over onions for over 5 years now. It works dandy. We would like to do this with more of the internet.

What does it look like?

When things are working, it looks like this:

Nov 23 09:05:39 mx1 postfix/smtp[27831]: AA7C9411DC: to=<[email protected]>, relay=wy6zk3pmcwiyhiao.onion[127.0.0.1]:25, delay=1414, delays=1160/249/3.2/1.5, dsn=2.0.0, status=sent (250 2.0.0 Ok: queued as E8798A0DE7)

Lets do this.

Ok.

Configure your MTA

We want to do this first, because if you don't get this setup right, you may become an open relay, that is bad.

Postfix instructions

Exim

Make sure you aren't an open relay

Open relays are bad. Do not become one!

This is the hardest part, and the most important: do not fail to do this right.

Spend some time making sure you aren't an open relay.

Get Tor setup

Now get Tor going

Problems

Are there problems? Why yes there are!

Help this effort

Participate

There is a mailing list to discuss the development of this proposal.

or an IRC channel #onionmx on irc.indymedia.org

Maybe you have a better way? Create issues or pull requests!

Advocate

Get your favorite email provider to do this, tweet at them, file a support request, get them off the clearnet!

Get SOCKS5 native support in postfix!

What would be nice is if someone went to postfix and asked them to add native SOCKS5 support. Ideally, postfix would handle a .onion address to go through a SOCKS proxy by default.

Depending on torsocks is not an elegant solution, and if we are going to scale this it probably is better to do it more "native" than some duct-taped script.

Can you help us get SOCKS5 support in postfix?

FAQ

How can I test my setup

Send a mail to [email protected]. Delivery through onionmx will be blackholed whereas normal delivery bounces.

How do I get on this static tor transport map?

If you got things setup, you aren't an open relay, then you should publish a SRV record in DNS and people can use that. Otherwise scaling is hard.

However, if you can't do that, and you can prove the onion you have is valid, then make pull request for the onion service map to add your domain and onion service.

The ones in this file we have verified, you can trust us on that, or not.

References

This adventure started here

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].