Panta Rhei Remailer Web Page - Part II |
This is Jack B. Nymble's main window from which various tasks may be launched, and files may be maintained. Although JBN allows you to use any folder for storing your files, the suggested folder for Message Books and Templates is C:\JBN2\Books, and the suggested folder for Nym Books and their associated files is C:\JBN2\Books\Nyms To open a file, click on the folder and then double-click on the file to open. You may open any kind of file from within JBN, and you can move and copy files to other folders by dragging them or by using the Files|Selected menu (also available by right-clicking on the file list). Using the keyboard, any file or folder may be opened by entering its name and pressing Enter. HTTP URLs may also be entered in this box, and will be opened in the Stats Browser. The drop-down list stores recently opened filenames and folder names for quick access. The Open Window button is used to indicate that you want a book opened in a new window. When you double-click on a book, JBN will load the book into any available book window. If you select the file and press Open Window, the book will be opened in a new window. The Open Window button may also be used to open the current folder in Windows Explorer. Click on the folder, or enter its name, then click Open Window. The drop-down pattern list above each list of files allows you to choose which file types are listed. If View|Double List is checked, two file lists are displayed, and each may display a different type of file. As you become accustomed to using JBN, you will understand why two file lists of the same folder are useful. In the Books folder, Templates may be in one list and Message Books in another. In the Nyms folder, Nym Books may be in one list, and their resulting Message Books in another. The list file patterns may be customized by choosing View|Edit Patterns. The log box at the bottom of the window displays task completion and error messages. If you leave JBN unattended for a period of time, you can check what activity took place in your absence. The log box may be expanded to full size by selecting the Log tab at the top of the window, or by double-clicking in the log window. If unattended errors have occurred, a red error icon will appear in the corner of the log. Clicking this icon will show just the errors which have occurred. Right-clicking the icon will clear the icon without displaying the errors. Other important items in the Explore window:
This menu, also available by right-clicking in the file panes, allows you to move, copy, delete, wipe, and rename files. Use the Copy Files or Cut Files option to copy selected filenames to the copy buffer. Then move to a destination folder, and select Paste Files.
Tools|Check Email/Get News
Tools|Abort Connection
Tools|Disable Auto Functions
Options|Pop-up Messages
Options|Verify Connection
Options|Dial When Needed; Hang Up Automatically
|
When a mail message is created from a Message Book, it is sent to JBN's centralized mail queue. When the message is read into the queue, it is given a random Schedule send time, based on when it was created plus a value in the Add random latency range specified. (For example, 2:00 to 5:30.) Dummy messages are given a Schedule time which sends them within one hour from the current time. If Add random latency is checked, JBN will not send messages until their Schedule time and date. If Add random latency is not checked, JBN will send all messages, regardless of Schedule time. If Send in random order is unchecked, JBN will send messages according to their Created time and date (or their Schedule time and date, if Add random latency is checked). If Send in random order is checked, pending messages (which must be older than their Schedule time if Add random latency is checked) will be sent in random order. (If messages are queued using several Send Profiles, JBN will group the sending so that it only needs to connect to each SMTP server once.) To reschedule queued messages based on a new latent time, enter the new latent time, then select Que|Refresh. (This menu is also available by right-clicking on the mail list pane.) Each message is sent via its Send Profile. To change the profile of a message, right-click on the profile name and select change profile. To delete one or more messages from the queue, select the messages (hold down the Ctrl key and click on each message), then select Delete from the Que menu. To delete all currently displayed messages in the queue, select Clear Que. If you want a particular message or group of messages to be given immediate priority for sending, select the messages and select Give Priority. These messages will be sent before other messages, and will not obey their Schedule time. To cancel the priority, select Que|Refresh. To view a message in the queue, select the message and select Que|View Message. Press the Send button in to enable sending of mail. Keep this button out to hold messages in the queue. To stop sending, press the Send button out and wait for the current message to finish sending, or press Abort to stop sending immediately. Note: Messages queued for sending via disabled or non-existent profiles will not be sent. IMPORTANT: If you queue messages to be sent via a particular Send Profile, and then change the name of that profile, the queued messages will not be sent until you change their profiles to a current, enabled Send Profile. Dummy messages are generated and queued if a send profile has the Generate dummies option(s) checked. JBN2 will not generate dummy messages until all queued dummy messages have been sent. (This prevents large numbers of dummy messages from backing up when you are offline.) When dummy messages are read into the queue, they are scheduled for sending within one hour of the current time, regardless of when they were created. After one hour has elapsed, and if no dummy messages remain in the queue, more dummy messages may be generated. JBN2 will generate a maximum of two Cypherpunk and two Mixmaster messages per hour. Dummy messages follow a chain of AUTO remailers, and are discarded by the final remailer. You may preview dummy message creation by checking Que|Preview Dummies.
|
JBN's Log is used to record successful net functions, such as sending and retrieving mail and refreshing stats, and to record errors and problems which occur.
|
The View Mail window is used to display retrieved email and news messages, and includes additional features to facilitate the use of nym accounts. JBN stores mail in subfolders located in the Mail Folder (set in Window|Retrieval Config|Mail Folder). The Inbox subfolder is the default location for incoming mail, and is the folder automatically opened when the View Mail window loads.
The Mail List Messages are listed by Subject, Sender, Sent, Recd, and K. Subject is the Subject header of the message. (If the item is a file, the filename is shown.) Sender is the name in the From header (or the destination address of a sent message). Sent shows the date and time the message was sent by the sender (according to the message's Date header), in local time. Recd shows when the message was retrieved or decrypted, whichever is later. (The format used to display the dates may be configured in Window|Retrieval Config|Options|Date Display Format.) K shows the length of the message in kilobytes. To sort the mail list, click on a column header. The message will be sorted by that column in ascending order (+). To sort in descending order (-), click the column header a second time. To resize or hide columns, drag the divider bars between the column headers.
Displaying a Message Each message may contain up to two parts: the original message and the decrypted message. A plain message or a message which has not been decrypted will have only one part, which will be displayed on the Original tab. The Decrypted tab will be empty, indicating that this message has not been decrypted. Click the Decrypt Now button to decrypt the message. (Note: The Decrypt Now button is not available if the message is already queued for decryption.) JBN can decrypt a message successfully only if the correct passphrases are in the Nym Accounts Registry. If a message has been decrypted, the decrypted message will be displayed on the Decrypted tab. To see the original undecrypted message, select the Original tab. If the Original tab is blank, this means that the original message is not available (it has been deleted, or the message was decrypted from the clipboard). To decrypt a message again, select the message, right click on the mail list and select Decrypt. Above the text is a label showing what kind of message you are viewing (eg Plain Message, News Article, Decrypted Message, Reply-Block Message). If a Reply-Block message, the reply-block number (from the Nym book) is shown. The number of conventional decryptions the message underwent is also displayed [n Conv], which is useful for verifying that all ek remailers in your reply-block are encrypting the message en route as expected. If the reply-block was private-key decrypted, "[PK]" will appear. Tip: Double-clicking in the text box is the same as selecting View|Full Text. The Headers checkbox above the text determines how the message's headers are displayed. If unchecked, only some headers are displayed (From, Subject, Date, To, CC, Newsgroups). If checked, all headers of the message are shown. In the case of Reply-Block messages, note that several headers are added to the top to indicate the validity of the nym-server signature. In the case of copies of sent messages, headers are added to indicate what remailers were used and what attachments were included. If the Raw checkbox is checked, the entire message is displayed as plain text with no MIME or UUE decoding. When Raw is checked, the displayed message may be edited and saved to correct formatting problems, etc. To reply to a displayed message, select a template from the Reply Via drop-down list (Configured in Window|Retrieval Config|Reply Templates Folder). To follow-up a news article, click once on the text label "Reply Via". The label will change to "Follow-up Via". Now select a template. Follow-up Via works similarly to Reply Via except that any To address in the template is preserved. This is useful for presetting a mail2news gateway address or a mailing list address in the template. When viewing a sent message (archived using the Message Archive facility of the Message Book window), if the book was archived, you may press the Open Book button (upper right corner) to open the associated book file, to resend or replay the message. Click on the Info tab to display statistics about the message, including the original and decrypted filenames, and any reply-block associated with the message. Press the Trash button (or press Ctrl-Insert) to move the message to the Trash folder. (JBN does not use the Windows recycle bin.) Press the Delete button (a red triangle with exclamation point) (or press Ctrl-Delete) to delete the message. Note: If more than one message is selected in the mail list, all the selected messages will be trashed/deleted. Press the left or right arrow button to display the previous or next message in the list.
Attachments
ATTACHMENT VIRUS WARNING
Even if a message's headers appear to be from a sender you trust, it may have been intercepted and altered en route. Do not trust any attachment which is not PGP signed by the sender and which you have not verified the PGP signature of manually using PGP directly. Even so, you still may incur a risk if the sender was unaware that the file was infected. Keep in mind that virus detection programs do not detect all types of viruses.
In general, unless you have manually verified the attachment signature and trust the sender, do not open or save the attachment. (Merely saving the attachment is not a risk as long as you save it to a non-system, non-program folder, except that you or another user may unknowingly run it later.)
Non-MIME multi-part messages are not placed in Multi and are not automatically assembled by JBN. To assemble these types of messages, you need to piece the parts together manually. Check Raw, then load each message part in order, copy it to the clipboard, and paste it into a final message. Save the final message and decrypt it if necessary. Another alternative is to export the messages to a client which assembles these types of messages, such as Agent.
Text Files
Messages may be selected and dragged to other folders. To copy messages to another folder, select the messages, hold down the Control key, and drag them to the folder.
File|Selected Messages To decrypt a batch of messages, select the messages and choose Decrypt. If the message(s) have already been decrypted, the decrypted portion will be deleted, and the messages will be queued for decryption. Select Save As... to save one or more messages to a UNIX Message File. (This format may be imported by many email apps, such as Agent, Netscape, and Eudora.) Use Append As to add the messages to an already existing UNIX Message File. The Delete functions operate as follows:
Delete Original deletes only the original part of the message(s), and leaves the decrypted portion. Original messages which have not been decrypted are not deleted. This function allows you to free up disk space by deleting message parts which have already been decrypted, without deleting plain messages or messages which have not yet been decrypted. If archived Sent messages are selected, any book or replay files archived with the message will be deleted by Delete Original. Delete Decrypted deletes only the decrypted part of the message(s), and leaves the original, if any. As long as the original remains and the passphrases are available in the Nym Accounts Registry, the message can be decrypted again. Wipe, Wipe Original, and Wipe Decrypted work similarly, except that the files are wiped instead of deleted. For greater security move your entire Mail Folder to an encrypted drive.
The Mark Read and Mark Unread items allow you to set the read status of selected messages. Unread messages appear with a red icon and cause a red flag to appear in the folder list.
File|Import Messages
File|Empty Trash
Edit|Find/Find In Messages Note that when searching messages, JBN first searches the raw message. It will then load and display the message momentarily if the text is found. If you do not have Raw checked, and the search text was only visible in the Raw view, it will move on. This allows you to control whether your search applies to the raw or displayed message by setting Raw appropriately before searching. If a message has both Original and Decrypted parts, only the decrypted portion (indexed in the mail list) is searched.
Tools|Decrypt Select File to decrypt one or more messages in a file. If the file contains more than one PGP message, JBN will take just the PGP messages and decrypt each as a separate message. This allows you to decrypt UNIX Message Files containing one or more messages exported by Agent, for example. In most cases you can also decrypt all the messages in Netscape, Eudora, Pegasus, and Outlook Express mail folders using this function. (These programs' mail folders are actually files. JBN will scan them and extract the PGP messages.) Select Selected Messages to decrypt messages. If the message has already been decrypted, the decrypted part will be deleted and it will be decrypted again. Select Cancel to clear the decryption queue. Enabling Diagnostic Mode will cause JBN to display each intermediate stage during decryption. This is useful for tracking down decryption problems. If using PGP 2.6.x, you may wish to set Window|Global Config|DOS Mode to Window Paused for additional detail.
|
Jack B. Nymble's Stats Browser is used to download and view remailer reliability statistics pages and keys, view JBN's User's Manual and Remailer Reference, and may also be used as a basic web browser. Reliability stats and keys URLs are configured in Window|Stats Config. To refresh stats from within the Stats Browser, select Tools|Refresh Stats. JBN downloads the stats, using secondary URLs if the primary URLs fail, then creates and displays a small web page which contains all stats links and the current active stats. This Stats page may also be bookmarked in your other web browsers. It is normally located in C:\JBN2\Stats\Stats.htm, or wherever you installed JBN, and is updated every time stats are refreshed in JBN. In addition, the active CPunk stats are written to CPunk.htm (or CPunk.txt) and Mix.htm (or Mix.txt). In addition to refreshing stats, if Window|Stats Config|Options|Refresh capability strings is checked, your remailer capability strings, listed in Window|Remailers Config|Capabilities will be updated with new or changed strings. To update your Cypherpunk remailer keys, select Tools|Get CPunk keys. JBN will download the URLs you select and send them to PGP, where they will be added to your keyring. To update your Mixmaster keys and the list of available Mixmaster remailers (type2.lis and pubring.mix), select Tools|Get Mix Keys. You may wish to only download Mix keys from the most up-to-date source, or older versions of keys may be added to your keyring.
http://echo.znet.de:8888/ c:\JBN2\Stats\Stats.htm finger: rlist@anon.efga.org rlist@anon.efga.org rlist@anon.efga.org@anon.lcs.mit.eduWhen entering an HTTP URL which is a directory and not a file (such as http://www.panta-rhei.dyndns.org/) a trailing slash is recommended to speed access. The Stats Browser can be used to download most basic web pages. It does not support Java, Javascript, cookies, and some types of forms. This limitation can be used beneficially if you are concerned about a web page with possible viruses or other malicious code. It is highly unlikely (virtually impossible) that such a page could adversely affect your system when downloaded in JBN's Stats Browser, as it does not support the functions required for such viruses and macros. The Stats Browser also does not write any information to your Windows registry, and does not store URLs you visit between sessions. All bookmarks are stored in your JBN configuration file, which may be encrypted with Secure Mode. Retrieved pages are temporarily stored in the cache folder, configured in Window|Stats Config. ALL files are deleted from this folder when the Stats browser window is closed. You may specify this folder be located on a RAM drive or an encrypted drive for improved security. (Be sure the cache folder has ample space for the pages and images you will be downloading, or data may be written to the Windows TEMP folder.) In addition HTTP proxies may be configured for use with the Stats Browser in Window|Stats Config. After you have set the proxy URL(s), select Options|Proxy Visits Via A or B to indicate which proxy is to be used. (Only one proxy is used at a time.) When the proxy is active, the URL field label will be red. HTTP retrieval of stats may also be proxied (although this is generally not particularly helpful) in Options. Finger retrieval is not proxied, but may be chained. IMPORTANT: Please test the Stats Browser thoroughly with the proxy you plan to use before relying upon it for security. Pascal's Header Echo, among other similar resources, is recommended: http://echo.znet.de:8888/
Redirection, which means a URL is forwarded to another URL, may also be disabled in Options. If disabled, you will be shown an Object Moved page indicating the forward link.
|
Program Required global settings pertaining to general program operation.
The folder where temporary files should be written. This should be a very short-named directory. C:\TMP is recommended. For greater security use a RAM drive or an encrypted drive.
Mail Queue Folder
Wipe Files With
DOS Mode
Window Paused opens a DOS window, and waits for the user to press Enter when the task has completed. This setting is primarily for diagnostic purposes. Min with Focus open a DOS session as a minimized icon in the taskbar which is given the Windows focus. The focus will improve the speed at which the DOS program runs, but may be inconvenient if you're using several applications at once, because JBN will take the focus whenever a DOS session runs. When running in this mode, you may click on the minimized icon to open the DOS window. Min without Focus open a DOS session as an unfocused, minimized icon in the taskbar. This provides greater running speed than Hide mode.
The font size used in many of JBN's windows.
Preferred Language
Secure Mode
PGP Settings pertaining to your required PGP installation.
Indicate what version of PGP JBN should interface with. You may have both versions installed and switch between them by changing this setting. Note: If using PGP 5.5.3 or 6, you must use a version which supports encryption with RSA keys. [PGP Installation Instructions]
Preferred Algorithm
Version Report If Version Report is left blank, clearsigned messages are always reported as "Version: N/A" (they are not assigned random Version lines).
Dialer Optional settings affecting JBN's automated dialer.
Select the Windows connection you wish JBN to use for dialing. You must configure this connection in My Computer|Dialup Networking.
Username
Password
Dial when needed every n minutes
Hang up automatically
Start the following apps on connect
|
Options Mail and news retrieval and decryption settings.
The folder containing your mail subfolders. C:\JBN2\Mail is the default location. For greater security, move your mail folder to an encrypted drive.
Reply Templates Folder (Your books folder)
Date Display Format
Filter News Duplicates
Trash Nym Duplicates When you select Window|View Mail|Empty Trash, the duplicate messages are deleted. Nym confirmation messages are not moved to Duplicates. Your nym account must have +cryptrecv enabled for this function to work properly.
Update AckSend.TXT Note that the AckSend.TXT file will continue to grow without limit, and should be trimmed periodically. To trim it, open it in the View Mail window, remove the top portion, and select File|Save Message As. Or, just trash the file. If you use the Update AckSend.TXT feature, you may want to have JBN discard the acknowledgement replies automatically. To do so, set an accurate Anti-SPAM filter. (See below.)
Decrypt new messages
If checked, only messages which are PGP encrypted are automatically decrypted. (Only the first 4K of the message, including headers, is scanned for a PGP header. PGP messages later in the message will not trigger automatic decryption.)
During decryption, if JBN encounters a PGP message encrypted to a private-key for which it does not have the passphrase, should it prompt you for the passphrase? Note that you will be prompted for each message decrypted - JBN does not store your passphrase. For greater automation set the passphrase in Window|Nym Accounts Registry|Key Passphrases.
Decode all PGP messages inline If checked, all PGP messages regardless of content will be decrypted and included inline as text. Use this setting only if JBN fails to detect text which contains a large proportion of binary characters. Depending on content, this setting may cause a software failure during message decryption or display.
Filters Settings which affect the storage and display of mail and news messages.
In this box list search strings, one per line, used to detect unwanted messages. A search string may contain wildcards. Each mail and news message is scanned after retrieval and again after decryption. The top 4K (about 2 pages) of each message is scanned, including headers. If a search string is detected, the message is moved to the Trash\Spam folder located in the Mail Folder. Note that when you select Window|View Mail|File|Empty Trash, these messages are then deleted. Be sure to use accurate and not overly general search strings to prevent lost mail.
From Aliases From Aliases are used to solve this problem. If the alias address is detected in the From header of a message, the sender will be identified as the alias name. This only affects the Sender column of the View Mail window. It does not affect the From header of the message. From Aliases have no effect on outgoing mail, and their use is not required.
To set a From Alias, enter the email address (or a portion of it) which appears in a remailer's From header. (Note that this address usually differs from the remailer's incoming mail address.) Follow this with at least one space and enter the alias name. For example: nobody@xyzremailer.com XyzEnter one alias text/name pair per line. After updating the From Aliases, you will need to select Folder|Rebuild Index in the View Mail window (for each folder) to see the change on previously indexed mail. After a remailer shuts down, remove its alias.
|
Options Options affecting the behavior of Message Books and Nym Books.
Should JBN ask you before overwriting an existing book file?
Confirm text overwrite
Prompt to save changes
Confirm clear
Zero remailers warnings
Pop-up capability warnings
Pop-up stats warnings
Uptime-Hist Preferred
Alter PGP Timestamp IMPORTANT: Reliable remailer operators should never use this option while Reliable is running, as the system clock change will interfere with Reliable's functioning. Other programs on your system may also be adversely affected if they rely on the system clock. If this option is checked, all signed PGP messages produced by JBN will use this effect. Some minor deterioration of system clock accuracy may be expected with this feature.
Double-click opens full
Text Font / Size
Quote message in reply
Quote characters
Reply Heading Variables, such as $from, $date, $newsgroup, etc., may be used in the reply heading. JBN will substitute the appropriate value. For a list of variables see the drop-down list. IMPORTANT: The Reply Heading settings are global. If you have multiple nym accounts or online identities, using a unique reply heading may help others to correlate your posts and/or email. In this case you may wish to use the default reply heading (first in the list), or no reply heading.
Global Signature
Choice Lists The choice lists are used to customize the drop-down lists in Message and Nym Books.
This list should contain email headers which you commonly use in your messages. You may include just the header name and colon, or a complete header. Once configured, this list will appear in the drop-down list beneath the header box in Message Books.
Directive Choice List
|
Auto Settings which determine which Cypherpunk and Mixmaster remailers may be chosen as AUTO remailers. These settings also affect when pop-up stats warnings are displayed for remailers you choose explicitly. Pop-up stats warnings may be disabled in Window|Books Config|Options.
The minimum uptime value (between 0 and 100) which a Cypherpunk AUTO remailer must have in stats. 95-98 is the recommended range. This setting also affects when pop-up stats warnings are displayed for explicit remailers.
Max Latency (hh:mm) (CPunk)
Minimum Distance (CPunk)
Use Defaults
Consider History
Never choose these remailers as AUTO or RANDOM Note: When updating this setting, for a change to take effect for RANDOM remailers, stats must be refreshed.
The following list has no effect [Variable]
Mixmaster Settings for your Mixmaster installation, required if you are using Mixmaster with JBN. Some of these settings also affect AUTO and RANDOM remailer selection, and when pop-up stats warnings are displayed for Mixmaster remailers you choose explicitly.
This must be set to the folder which contains mixmaste.exe, usually C:\Mix
Mixmaster Version
MINREL
MAXLAT
DISTANCE
Change Advanced Settings
MIXPATH
Auto-maintain mixmaste.con
Type2.lis
Pubring.mix
RELLIST
Mix Keys This tab allows you to edit and update your Mixmaster remailer list and keys (type2.lis and pubring.mix). This list affects what remailers appear in the drop-down list in Message Books. To add a new remailer, or to update the key for a remailer, paste the remailer's full Mixmaster key into the lower box and press Add/Update. (You can also add and update Mix keys automatically by selecting Window|Explore||Tools|Get Mix Keys.) To remove a remailer from your list, select the remailer and press Remove. The remailer's key will also be removed. Remailer capability strings and other regularly updated information is stored here.
All current remailers should have a capability string here, both Cypherpunk and Mixmaster. This tells JBN what capabilities a remailer has, which affects AUTO remailer selection and pop-up capability warnings. JBN determines what Cypherpunk remailers are available using this string list. (Available Mixmaster remailers are determined by type2.lis in Remailers Config|Mix Keys.) It is important to keep this list up-to-date, and to remove strings of extinct remailers. To add a Cypherpunk remailer which is not listed in your stats to JBN, just paste its capability string here. All PGP remailers listed must have a key on your PGP keyring.
Auto-Refresh [Remailer Capability Strings]
Machine and Chain Info
Auto-Refresh [Machine and Chain Info]
|
Options Settings affecting automated stats retrieval and general operation of the Stats Browser window.
If checked, JBN will automatically retrieve stats when the specified number of hours have elapsed since the last refresh, providing you are online. Minimum accepted setting is 1 hour. Recommended setting is 4-6 hours. This option helps insure that AUTO remailers are chosen using fresh reliability statistics, and that your drop list of remailers displays current information. If unchecked, JBN will not refresh stats unless you initiate retrieval explicitly.
Refresh capability strings
Refresh machine and chain info
Temporary Cache Folder
Files To Cache
Proxy A
Proxy B
Text Color; Link Color; Background Color
Restore Default Colors
Cypherpunk Settings affecting retrieval of Cypherpunk reliability statistics and keys. These settings should be regularly updated with current URLs for best results. Check the Potato Software Helpful Links page for URLs (Stats Browser|Software|Helpful Links).
List all known URLs (one per line) for Cypherpunk stats here, in order of preference. Note that a 'URL' in the Stats Browser may be an http URL, an email address to finger, or a local disk file pathname. JBN2 reads both version 1 and version 2 Cypherpunk stats reports. (Use version 2 when available for more detail.) The first URL listed is considered your primary source and will be the only URL used to update capability strings and machine and chain info, when applicable. The other URLs listed are backup stats URLs, and are accessed only if the primary URL fails. All are displayed on the Stats page for reference.
CPunk Chain Stats URLs
CPunk Keys URLs
Mixmaster Settings affecting retrieval of Mixmaster reliability statistics and keys. These settings should be regularly updated with current URLs for best results. Check the Potato Software Helpful Links page for URLs (Stats Browser|Software|Helpful Links).
List all known URLs (one per line) for Mixmaster stats here, in order of preference. Note that a 'URL' in the Stats Browser may be an http URL, an email address to finger, or a local disk file pathname. JBN2 reads both version 1 and version 2 Mixmaster stats reports. (Use version 2 when available for more detail.) The first URL listed is considered your primary source and will be the only URL used to update capability strings and machine and chain info, when applicable. The other URLs listed are backup stats URLs, and are accessed only if the primary URL fails. All are displayed on the Stats page for reference.
Type2.list ; Pubring.mix URLs
Bookmarks Bookmarks for commonly accessed URLs may be set here. These appear in the drop-down URL list of the Stats Browser.
This is the name or title of the page which will appear in the drop-down list.
URL
New
Delete
Up / Down
|
Send profiles are used to specify how mail is sent from JBN. When a message is queued, it is queued to a specific Send Profile.
Each SMTP tab contains a group of settings, or profile, for sending mail. If you use more than one ISP, SMTP server, or email address to send mail, you can configure a different profile for each. These settings affect how final messages are sent directly from JBN's mail queue. When using remailers, these settings are not seen by the final recipient. IMPORTANT: The profile tab which is on top when you press OK is used as your Default SMTP Profile for sending mail.
If checked, this profile may be used for queuing and sending mail. When unchecked, mail may not be queued to this profile, and any queued mail is held indefinitely.
Profile Nickname
SMTP Server Note: If you need to specify a remote port, follow the host name with a colon and the port number, eg smtp.myisp.com:25
From Header youremail@address.com youremail@address.com (Your Name) Your Name <youremail@address.com> "Your Name" <youremail@address.com>Note: If SMTP From Address (below) is blank, and if no Reply-To header is specified, the address in the From header is used as the SMTP From Address. Some ISPs require this address to contain a valid domain, or require it be from their domain. It is generally advisable to place your real email address here, unless you specify an SMTP From Address or a Reply-To header below.
Reply-To Header [Optional]
SMTP From Address [Optional]
Additional Headers [Optional]
Generate CPunk Dummies
Generate Mix Dummies The UNIX profile is a special profile which writes mail to a file or folder instead of sending it via SMTP. If you run a Reliable remailer on your system, you can use the UNIX profile to send mail directly to your remailer's MAILIN folder. The UNIX profile may be selected explicitly when mail is queued. Also, if the default SMTP profile is used to send mail, and the single recipient is listed in the address list below, the UNIX profile will automatically be used in lieu of the default SMTP profile.
If checked, mail may be explicitly or automatically queued to the UNIX profile, and queued messages will be sent (written). If unchecked, no mail will be queued to the UNIX profile, and queued messages will not be sent.
When sending to the following addresses...
...override the default profile and write the message to
From Header
Additional Headers [Optional]
|
Retrieval profiles are used to specify what POP3 servers JBN is to retrieve mail from, which messages should or should not be retrieved, and where the mail is to be saved.
Each POP3 tab contains a group of settings, or profile, for retrieving mail from a POP3 server. If you use more than one ISP or POP3 server, or wish to filter different kinds of messages to different folders, you can configure a different profile for each.
If checked, this profile will be used when mail is retrieved. When unchecked, this profile is ignored.
Profile Nickname
POP3 Server Note: If you need to specify a remote port, follow the host name with a colon and the port number, eg mail.myisp.com:110
POP3 User
POP3 Password
Check mail every n minutes
Ignore mail larger than n K
Save Mail To Folder/File If File is selected, you must specify the pathname of a file. If the file does not exist it will be created. Retrieved messages will be appended to this file in UNIX Message File Format.
Delete saved mail from server
Filtering To retrieve all messages, set the upper filter to Retrieve all messages and the lower filter to The following text has no effect. To limit retrieval to only PGP messages, set the upper filter to Retrieve only PGP messages. In this case, any plain (non-encrypted messages) will be left on the server, perhaps for retrieval by another application. To limit retrieval to custom criteria, set the upper filter to Retrieve only messages containing the following. In the upper filter box, enter search strings, one per line. (Wildcards may be used to generalize search strings.) The headers and first 15 lines of each message will be scanned for the search string(s) you have entered. If any is found, the message may be retrieved. Otherwise, the message will be left on the server. The lower filter works similarly. Search strings are entered, one per line. Depending on the filter setting, any messages which match a search string are left on the server or deleted without retrieval.
|
News profiles are used to specify what news servers JBN is to retrieve articles from, what newsgroups are to be scanned, which articles are to be saved, and where they are saved. JBN is not a full news client. For example, it cannot post via NNTP. Its NNTP features are primarily intended to support nym reply-blocks which terminate in newsgroups. JBN will scan newsgroups for your messages.
Each NNTP tab contains a group of settings, or profile, for retrieving articles from an NNTP server. If you use more than one ISP or NNTP server, or wish to filter different kinds of articles to different folders, you can configure a different profile for each.
If checked, this profile will be used when news is retrieved. When unchecked, this profile is ignored.
Reset Index
Profile Nickname
NNTP Server Note: If you need to specify a remote port, follow the host name with a colon and the port number, eg news.myisp.com:119
NNTP User
NNTP Password
Get news every n minutes
Lines Min to Max [Optional]
Save News To Folder/File If File is selected, you must specify the pathname of a file. If the file does not exist it will be created. Retrieved messages will be appended to this file in UNIX Message File Format.
Newsgroups
Save the following articles
Subject: My Message From: *@myremailer* Subject: Attn: *My Name* My Message 2 Esub: My Encrypted % subjectkeyIf no header is specified, Subject is assumed. Wildcards may be used. Headers other than Subject and From are not scanned. To retrieve and save all articles in a group, enter only an asterisk (*) in the box. To scan for encrypted subjects, Enter "Esub:", a single percent (%) sign, and the Encrypt-Subject key. Note: You can export subjects directly from a Nym Book reply-block by selecting Tools|Export Subject.
Don't save the following articles
SPAM Message From: *@spamdomain*The Don't save criteria takes precedence over the Save criteria.
Fully retrieve all articles in lines range This feature is used to greatly improve your anonymity. No one monitoring your connection or NNTP server is able to determine which messages you are saving. They only know you are retrieving all messages in the newsgroup(s).
|
Nym Accounts The Nym Accounts Registry is used to store information about each of your nym accounts to help automate various tasks. This registry will be updated automatically each time you run (Create) a Nym Book if Options|Update Registry is checked (recommended).
The full account address of your nym, such as example@nym.alias.net
Account PGP Key
Conventional Passphrases
Prior Passphrases
Key Passphrases This tab is used to give JBN your private-key passphrases for more automation. You may include the passphrases to nym account keys, as well as any other keys. JBN will automatically sign messages and decrypt incoming messages which require a passphrase. Depending on your local security requirements, you may or may not wish to enter your passphrases here. If you do, this information is stored in your configuration file. It is recommended you enable Secure Mode or use disk encryption to protect your passphrases. To add a key passphrase, select a key in the Private Key box and enter the passphrase. (You can also reenter the passphrase in the second box for verification.) Press Add/Update. You can test any passphrase by double-clicking on the entry in the list. To change a key's passphrase, select the entry in the list, enter the new passphrase, and press Add/Update. To remove a passphrase from the list, select the entry and press Remove.
The key for which you wish to provide a passphrase. This should be a private key. Public keys do not require passphrases.
Passphrase
Re-enter Passphrase (Optional)
|
Several configuration items in JBN allow the use of wildcards to generalize search strings. For example, the following search string:
A*Bwould match any string that begins with A (upper or lower case) and ends with B. For example: AAB, ACCB, ABBBB. It is important to make wildcard strings as specific as possible to avoid unintended matches, which may result in unexpected results. A search string can specify more than one line with use of the caret (^), which specifies a carriage return (CRLF). If a caret is placed at the left of the search string, for example, this indicates that the text must be at the left side of a line to be matched. Other wildcard characters are listed in the table below.
|
Program Data Program Data refers to the information on your PC, including JBN2 configuration data, stored email messages, and PGP keyrings. JBN2 includes a number of features which allow it to be used more safely in various environments. The following is a list of data storage areas used by JBN2. In the section which follows, several methods will be discussed for securing this data.
Your JBN2 program folder contains the program itself, JBN2.EXE, help files, and other supplemental files. No files normally in the program folder require security measures. In general you should not interfere with the files in the program folder, or store other files there.
Config Folder
Books Folder
Mail Queue Folder
Mail Folder
Stats Folder
Stats Cache Folder
Work Folders
Windows Temp Folders and Swap File
PGP Keyrings
PGP Temp Folder
Secure Mode Secure Mode is used to secure your JBN2 configuration data with PGP conventional (IDEA) encryption. To enable Secure Mode, check the option in Window|Global Config. You will be prompted for a passphrase. This passphrase will be used to encrypt your configuration. Each time you start JBN2, you will need to enter this passphrase. When encrypting your configuration data (each time it is modified), JBN2 first writes the data to the Global Config|Work Folder. After encrypting it, the file is wiped using Global Config|Wipe Files Using. When decrypting, the reverse of this procedure is used. Note that Secure Mode only secures JBNConf.DAT, which contains your configuration data. JBNData.DAT is not encrypted, nor are Books, Mail, or other data. For greater security and convenience, store your Config folder on an encrypted drive, as described below. IMPORTANT: If you are NOT using an encrypted drive (see below), and you have set private key passphrases in JBN2's Nym Accounts Registry, you should use Secure Mode to protect your passphrases and other data with strong encryption. JBN2 is designed to work flexibly with disk encryption and RAM drive software. This software allows you to conveniently store much or all of your data securely. A (virtual) encrypted drive may be configured on your system using disk encryption software, such as ScramDisk, PGPDisk (included with PGP 6.x), and BestCrypt. This software creates an encrypted file on your hard drive of any size you specify. When you start your system, you mount the file by providing the passphrase, and the file appears as a new drive on your system. Any data may be written to and read from this drive. It is automatically encrypted/decrypted when written/read. When you dismount the drive or shut off your computer, the data is secure. Disk encryption software is fast and quite secure, using the same level of encryption used by PGP. A second data storage device is a RAM drive. A RAM drive is a device driver which simulates a disk drive using a section of RAM (memory). Because it uses RAM, data written to such a drive a) is not written to a physical disk, and thus does not need to be wiped, b) is automatically lost when the computer is shut off. RAM drives are used to store only temporary data. They are also generally much faster than a physical drive. By storing temporary files on a RAM drive, you need be less concerned with leftover work files and recoverable data on the hard drive.
A RAM drive device driver is included with Windows. To add a RAM drive to your system, add or update the following lines (or similar) to the end of your C:\Config.SYS file, and reboot your computer: devicehigh=C:\Windows\himem.sys /testmem:off devicehigh=C:\Windows\ramdrive.sys /E 512The above would add a 512K RAM drive to your system. Note that adding a RAM drive generally causes your CD-ROM to move to a higher drive letter. RAM drives behave just like physical drives except that when you shut your computer off, all data stored on the drive is lost.
Data To Move to Encrypted Drive:
Data To Move To RAM drive:
Additional Security Notes
|