ietf-asrg
[Top] [All Lists]

Re: [Asrg] 6. Email Path Verification

2003-09-12 16:39:41
You might want to check out the camram.org project.

        http://camram.org/

(Above URL is broken, use http://www.camram.org/ instead.)

I like the idea of hashcash as an increase-spammer-costs strategy, but there's one big fly in the ointment. The computational requirements effectively make a hashcash-based system impractical for small, ultra-portable or autonomous devices.

A modern PC might only take a few seconds to generate a 20-bit hashcash, but an ARM-based PDA or mobile phone might take a lot longer (burning battery power all the while), and a toaster would take forever. Not to forget the old Macs (usually 68030 based) that are commonly resurrected to help elderly, disadvantaged or disabled people establish lines of contact. (Yes, I know someone who actually does this. Old Macs are amazingly durable.)

IIRC, the '030 (which is a contemporary of the i386) is neither superscalar nor pipelined, usually has a pitifully low clock speed, and is therefore hopelessly slow by modern standards. Even simple image-compression algorithms are hard work for such a machine. How long is it acceptable for a hashcash algorithm to take on such a low-end box? That's the limiting factor when deciding how much each mail will "cost".

Finally, I should point out that it is possible to implement most crypto algorithms in hardware, resulting in a much greater hashcash availability to a determined organisation (such as a spammer ring) after some capital investment. The EFF showed that it was possible for 3DES with "Deep Crack", and while it cost $250K to build Deep Crack, an equivalent machine would be much cheaper today because of the availability of inexpensive FPGAs.

A 20-kilogate FPGA development kit costs $300, individual 20Kgate FPGAs cost in the $tens, and a set of custom PCBs can be had for $hundreds at worst. So, let's say the incremental cost is of the order of $25 per FPGA, giving perhaps 25 hashcash tokens per second on average (yes, I'm being faintly optimistic). Even allowing for one-off development and equipment-manufacture costs, spam would appear to be worth enough to make such a system affordable. That puts Granny and her long-suffering Mac*[1] at even more of a disadvantage.

However, a system that uses hashcash as a fallback for other authentication methods would be an interesting concept. For example, use hashcash only to initiate "stranger" communications, and use a strongly-authenticated whitelist otherwise. Reading the rest of that site, I see that's in fact what it suggests. It still doesn't help Granny if it takes her (say) 4 hours to make hashcash, even if she only needs to do that once in a blue moon.

However, there's another problem with CAMRAM, though it's less obvious. Users will build up a list of public keys over time, presumably stored on their own machine. Their private keys will also presumably be stored locally. It's reasonably trivial for a worm to pick up a selection of these keys as it propagates, and deliver them to the black-hats by any of a variety of means.

Suddenly, they have the means to send spam to a lot of people - and even better (in the case of a mass-mailing attachment-based worm), these are mostly the clueless types who are most likely to respond positively to spam and scams. Oh dear.

This second problem is the main reason why any mainstream authentication solution requires the authentication to be done via third-party, (semi-)trusted servers. It's much harder to pick keys off a dedicated server than some newbie's desktop, and if they are, that server can be de-listed quite quickly until it fixes the problem.

*[1] - Mac IIcx, 16MHz 68030+68882, 5MB 120ns RAM, 40MB HD, 640x480, monochrome. I pulled one of these out of a skip last year, and after drying it out I found that it still works. It has similar capabilities to Macs I've heard of being distributed, free of charge, to disadvantaged folks in the American desert. So, if someone wants to know exactly how long a given algorithm will take on that machine, there's at least half a chance I'll run it and let them know.

--------------------------------------------------------------
from:     Jonathan "Chromatix" Morton
mail:     chromi(_at_)chromatix(_dot_)demon(_dot_)co(_dot_)uk
website:  http://www.chromatix.uklinux.net/
tagline:  The key to knowledge is not to rely on people to teach you it.


_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg