after suffering the hell of #homelab email, why don't we fix it?
-
after suffering the hell of #homelab email, why don't we fix it? Keep the addressing system, but use TOR as the transport.
The Concept: Stop routing email via legacy IP addresses. Use DNS to prove who you are and a DHT to find where you're hiding.
The Identity: Publish your Ed25519 Public Key in a DNS TXT record.
The Discovery: MTAs query a DHT (Kademlia) using a hash of that key to find your current location.
The Pipe: Connect via Tor (.onion) or I2P to bypass ISP blocks and Port 25.
The Payload: Standard SMTP over the dark tunnel.
The Win: It’s just Postfix with a custom "switchboard" script. No new protocols, no "Cloud" gatekeepers, and zero metadata for ISPs to sniff. Easy peasy.
-
R relay@relay.infosec.exchange shared this topic
-
after suffering the hell of #homelab email, why don't we fix it? Keep the addressing system, but use TOR as the transport.
The Concept: Stop routing email via legacy IP addresses. Use DNS to prove who you are and a DHT to find where you're hiding.
The Identity: Publish your Ed25519 Public Key in a DNS TXT record.
The Discovery: MTAs query a DHT (Kademlia) using a hash of that key to find your current location.
The Pipe: Connect via Tor (.onion) or I2P to bypass ISP blocks and Port 25.
The Payload: Standard SMTP over the dark tunnel.
The Win: It’s just Postfix with a custom "switchboard" script. No new protocols, no "Cloud" gatekeepers, and zero metadata for ISPs to sniff. Easy peasy.
@notasnek I have the technical grasp of an infant homelaber, but hell yes. Even I can see the sense in it.
-
after suffering the hell of #homelab email, why don't we fix it? Keep the addressing system, but use TOR as the transport.
The Concept: Stop routing email via legacy IP addresses. Use DNS to prove who you are and a DHT to find where you're hiding.
The Identity: Publish your Ed25519 Public Key in a DNS TXT record.
The Discovery: MTAs query a DHT (Kademlia) using a hash of that key to find your current location.
The Pipe: Connect via Tor (.onion) or I2P to bypass ISP blocks and Port 25.
The Payload: Standard SMTP over the dark tunnel.
The Win: It’s just Postfix with a custom "switchboard" script. No new protocols, no "Cloud" gatekeepers, and zero metadata for ISPs to sniff. Easy peasy.
@notasnek If we are making this kind if change, are we sure we don't want a few other breaking changes?
Built in TLS with bi-directional verification and standardized email encryption would be quite nice.