Donate for the Cryptome archive of files from June 1996 to the present


1 January 2015. This has been fixed.

31 December 2014

John Gilmore: Cryptography list is censoring my emails


To: jya[at]cryptome.org, gnu[at]toad.com
Subject: Cryptography list is censoring my emails
Date: Tue, 30 Dec 2014 22:07:02 -0800
From: John Gilmore <gnu[at]toad.com>

Hi John,

Perhaps you could publish this, or forward it to Perry?

Two different censorship bureaus (sorbs.net and barracudacentral.org)
have blocked both the cryptography mailing list, and Perry Metzger's
individual email address.

Y'all should try living behind a blacklisted mail server sometime.
The free and open Internet is an ugly place sometimes, when centrally
managed email censorship has become the norm, and the central censorship
bureaus don't actually care who they censor.

        John

------- Forwarded Message

Return-Path: MAILER-DAEMON
Delivery-Date: Tue Dec 30 21:58:11 2014
Return-Path: <MAILER-DAEMON>
Received: from localhost (localhost)
        by new.toad.com (8.12.9/8.12.9) id sBV5wBCl013967;
        Tue, 30 Dec 2014 21:58:11 -0800
Date: Tue, 30 Dec 2014 21:58:11 -0800
From: Mail Delivery Subsystem <MAILER-DAEMON>
Message-Id: <201412310558.sBV5wBCl013967[at]new.toad.com>
To: <gnu[at]new.toad.com>
MIME-Version: 1.0
Content-Type: multipart/report; report-type=delivery-status;
        boundary="sBV5wBCl013967.1420005491/new.toad.com"
Subject: Returned mail: see transcript for details
Auto-Submitted: auto-generated (failure)

This is a MIME-encapsulated message

- --sBV5wBCl013967.1420005491/new.toad.com

The original message was received at Tue, 30 Dec 2014 21:58:01 -0800
from localhost.localdomain [127.0.0.1]

   ----- The following addresses had permanent fatal errors -----
<perry[at]piermont.com>
    (reason: 550 5.7.1 Service unavailable; client [209.237.225.253] blocked using dnsbl.sorbs.net)

   ----- Transcript of session follows -----
... while talking to mail1.piermont.com.:
>>> RCPT To:<perry[at]piermont.com>
<<< 550 5.7.1 Service unavailable; client [209.237.225.253] blocked using dnsbl.sorbs.net
550 5.1.1 <perry[at]piermont.com>... User unknown

- --sBV5wBCl013967.1420005491/new.toad.com
Content-Type: message/delivery-status

Reporting-MTA: dns; new.toad.com
Received-From-MTA: DNS; localhost.localdomain
Arrival-Date: Tue, 30 Dec 2014 21:58:01 -0800

Final-Recipient: RFC822; perry[at]piermont.com
Action: failed
Status: 5.7.1
Remote-MTA: DNS; mail1.piermont.com
Diagnostic-Code: SMTP; 550 5.7.1 Service unavailable; client [209.237.225.253] blocked using dnsbl.sorbs.net
Last-Attempt-Date: Tue, 30 Dec 2014 21:58:11 -0800

- --sBV5wBCl013967.1420005491/new.toad.com
Content-Type: message/rfc822

Return-Path: <gnu[at]new.toad.com>
Received: from new.toad.com (localhost.localdomain [127.0.0.1])
        by new.toad.com (8.12.9/8.12.9) with ESMTP id sBV5w1Cl013966;
        Tue, 30 Dec 2014 21:58:01 -0800
Message-Id: <201412310558.sBV5w1Cl013966[at]new.toad.com>
To: "Perry E. Metzger" <perry[at]piermont.com>, gnu[at]toad.com
Subject: Cryptography list is censoring my emails
Date: Tue, 30 Dec 2014 21:58:01 -0800
From: John Gilmore <gnu[at]new.toad.com>

Welcome to living behind a blacklisted site.  This happens to me at
various sites all the time.  It's sad to see metzdowd.com going the
censorship route, though.  Of course, there is no due process and no
appeal at the centralized (barracudacentral.org) censorship site.  If
they don't like how you run your site, they ban you, and all the sites
stupid enough to be their clients then ban you too.

        John

- ------- Forwarded Message

Return-Path: MAILER-DAEMON
Delivery-Date: Tue Dec 30 21:50:47 2014
Return-Path: <MAILER-DAEMON>
Received: from localhost (localhost)
        by new.toad.com (8.12.9/8.12.9) id sBV5okCl013716;
        Tue, 30 Dec 2014 21:50:46 -0800
Date: Tue, 30 Dec 2014 21:50:46 -0800
From: Mail Delivery Subsystem <MAILER-DAEMON>
Message-Id: <201412310550.sBV5okCl013716[at]new.toad.com>
To: <gnu[at]new.toad.com>
MIME-Version: 1.0
Content-Type: multipart/report; report-type=delivery-status;
        boundary="sBV5okCl013716.1420005047/new.toad.com"
Subject: Returned mail: see transcript for details
Auto-Submitted: auto-generated (failure)

This is a MIME-encapsulated message

- - --sBV5okCl013716.1420005047/new.toad.com

The original message was received at Tue, 30 Dec 2014 21:50:36 -0800
from localhost.localdomain [127.0.0.1]

   ----- The following addresses had permanent fatal errors -----
<cryptography[at]metzdowd.com>
    (reason: 550 5.7.1 Service unavailable; client [209.237.225.253] blocked using b.barracudacentral.org)

   ----- Transcript of session follows -----
... while talking to mail1.metzdowd.com.:
>>> RCPT To:<cryptography[at]metzdowd.com>
<<< 550 5.7.1 Service unavailable; client [209.237.225.253] blocked using b.barracudacentral.org
550 5.1.1 <cryptography[at]metzdowd.com>... User unknown

- - --sBV5okCl013716.1420005047/new.toad.com
Content-Type: message/delivery-status

Reporting-MTA: dns; new.toad.com
Received-From-MTA: DNS; localhost.localdomain
Arrival-Date: Tue, 30 Dec 2014 21:50:36 -0800

Final-Recipient: RFC822; cryptography[at]metzdowd.com
Action: failed
Status: 5.7.1
Remote-MTA: DNS; mail1.metzdowd.com
Diagnostic-Code: SMTP; 550 5.7.1 Service unavailable; client [209.237.225.253] blocked using b.barracudacentral.org
Last-Attempt-Date: Tue, 30 Dec 2014 21:50:46 -0800

- - --sBV5okCl013716.1420005047/new.toad.com
Content-Type: message/rfc822

Return-Path: <gnu[at]new.toad.com>
Received: from new.toad.com (localhost.localdomain [127.0.0.1])
        by new.toad.com (8.12.9/8.12.9) with ESMTP id sBV5oaCl013715;
        Tue, 30 Dec 2014 21:50:36 -0800
Message-Id: <201412310550.sBV5oaCl013715[at]new.toad.com>
To: cryptography[at]metzdowd.com, gnu[at]toad.com
Subject: "Catastrophic" for NSA: Tor+ Trilight Zone + Cspace + ZRTP on Linux
Date: Tue, 30 Dec 2014 21:50:36 -0800
From: John Gilmore <gnu[at]new.toad.com>

Nice to hear that there's some software that makes NSA go deaf, dumb
and blind.  Here is the Snowden release that mentions it (page 20):

  "Presentation from the SIGDEV Conference 2012 explaining which encryption protocols and techniques can be attacked and which not"
  http://www.spiegel.de/media/media-35535.pdf

I found cspace (http://cspace.aabdalla.com/), which was a bit obscure
and hasn't seen any maintenance since 2009 or so.  Its dependency
ncrypt-0.6.4's source code is at Pypi and ncrypt-0.6.4 is in current
Ubuntu distros.

But I haven't yet found Trilight Zone.  Any clues?

And I haven't found a reliable, usable, simple, free software VoIP
client for Linux, let alone one that uses ZRTP.  Though I admit I gave
up on looking about a year ago when I couldn't get anything to
actually work.

        John

- - --sBV5okCl013716.1420005047/new.toad.com--

- ------- End of Forwarded Message


- --sBV5wBCl013967.1420005491/new.toad.com--

------- End of Forwarded Message