Re: DARPA get's it right this time, takes aim at IT sacred cows

2004-03-16 Thread jfcm
At 21:45 15/03/04, Scott Michel wrote:
jfcm wrote:
Interesting as this matches the conclusions of our own meetings in Dec/Jan
on national vulnerability to internet.
Sounds like the internet is a threat, not a tool. (Ok, I know you're not a 
native English speaker, but it was hard to resist.)
It sounds right. The threats are the weaknesses of the tool. And their 
impact on cirtical resources.
Let assume the DNS "stops" (attacked, polluted, hijacked, disputed): what 
is the impact on the nation?

We identified five main (immediate/middle terms) threats (and agree with 
the USG they may be critical [we say "vital"]):
- DNS centralization
- IPv6 unique numbering plan
- mail usage architecture (not SMTP)
- governance confusion
- non concerted national R&Ds (starting withthe US one)

This lead to the notion of "national firewall". Not the same architecture 
and layers as a local firewall, but an equivalent mission. One can consider 
global, users groups and local firewalling. Global means to prevent 
destructive access to the nets (like sending spammers to jail, making sure 
the root is stable, secure and safe, reaction to PathFinder like attempts). 
Users Groups (nations, regions/states, cities, structures, coporations 
etc.) mean addressing, directory, access portall protection. Local is what 
we are used to (but here port and traffic filtering should be less and less 
the main issue and call for more sophisticated tools).


Agreed. But for a non US observer this sounds in line with the pro-IPv6
stance of DoD: obeying http://whitehouse.gov/pcipb marching orders.
To be fair, it was NATO and the Allies who started in the v6 direction 
first. DoD is just merely keeping up with its various international partners.
hmmm. May be you did not evaluate what the worldwide control of IPv6.001 
gives to who allocates the addresses (ICANN) and whould build an run an 
IPv6 "DNS".

May be am I candid, but I tend to think that when a military person speaks,
it is with a purpose. And usually that telling what you exactly want is the
best way to obtain it. The article does not say they want to kill IP, but
that they want solutions. There are three possibilities to support changes:
- to fix IP
- to change IP
- to replace IP
Generally speaking, military officers do speak with a purpose in mind, but 
I disagree that the thrust you're enumerating. "Fix IP" is probably true, 
"Change IP" fits with "Fix IP", but "Replace IP" is patently untrue. After 
all, the DoD spent a lot of time and money on ATM in the mid and late 90's 
only to fall back to IP. ATM was an abject failure.
I will not comment on ATM. "Fix IP" means in my mind to keep IPv4/IPv6 and 
modifiy some features. "Change IP" means to look at a new IPvX. "Replace 
IP" means another kind of protocol/paradigm. I do not talk abuot what DARPA 
may do, but what we have as options.

I read they have identified a need (the same as NSI said they had a need
through PathFinder) and that the ball is in the IAB and IETF's field (for a
short while if you consider how long NSI awaited before suing ICANN)
I'm not sure I agree with this at all -- the research community is much 
more agile than the IETF and IAB, so it's more likely that the IETF will 
play catch-up as the DARPA reearch produces tangible results.
I think we agree there. I say the ball is in IAB/IETF field, and that they 
have to move fast, or DARPA and many others will take the lead.

The problem is that this "agility" is to be housed somewhere. Let assume 
DARPA produces tangible results soon (what I is quite credible) we are not 
in the 80s anymore, on "ARPA Internet". We are on Global Internet, and a 
Global body is to publish it. This leads to ITU. And as long as ITU-I has 
not been created on purpose, I am afraid it is acceptable to no one.

Let see the situation through military eyes. The battlefield is what it is.
For the new Cyber Forces, the internet battlefield is what is used
today. So they are interested in what is available/under serious
development - or in what worked before/aside the IP technology and
which could be deployed quick (so, most probably a total change for
a clean sheet, low cost and confidential restart).
The emphasis is and has been "network centric warfare". The current DARPA 
director is interested in a good mix of solutions that can be deployed in 
the immediate, near and future terms. "Deployed" as in "deployed out in 
the field with the warfighter" (on the back of a US Marine.)
We agree. But we are considering today/tomorrow warfare. The Irak action 
started with the first real "cyberbattle", a two days saturation spamming 
preparation. Exactly like before a Marines landing with artillery (what 
they had on the boarder too if I am right?).

Snipers coordinate through cyberspace. Soft unstabilization of Europe is 
hopefully right now a cyber activity, rather than a Marines one :-).

Throwing away the current IP infrastructure or completely redesigning the 
protocols would be one of those way o

Re: Apology Re: Principles of Spam-abatement

2004-03-16 Thread Dean Anderson
On Tue, 16 Mar 2004, Dr. Jeffrey Race wrote:

> On Mon, 15 Mar 2004 18:12:22 -0800, Ed Gerck wrote:
> >BTW, how can we talk about "actions that have consequences" in terms of a 
> >technical solution that the IETF can pursue?
> 
> 
> The whole point is there are NO TECHNICAL SOLUTIONS and never will be.

Correct, and I gave an explanation for this in inforamtion theory.

> (There are some technical aspects to improving traceability, however.)

The traceability is about as good as it will get.  If you have an IP
address and a time, that is all you need, and like a phone number, all you
might hope to get.  While an open proxy can hide the true IP of the
abuser, you still get the IP of the open proxy.  Likewise, if the dialup
account is stolen, you may get the IP address assigned to users of the
dialup gateway, which also isn't the culprit.

Even cryptographic methods start by having ISP's issues certificates. The 
certificates, like other accounts might be thought of as disposable. Or 
they might be stolen.  

Authentication is not a solution to spam.  

As you might recall, after the east coast power outage, it was suspected 
that the outage might have been related to a virus.  While it turned out 
not to be, it didn't take long for the virus author to be tracked down by 
law enforcement. There is nothing wrong with the current traceability.

What anti-spammers want is to have access to private information. This
will not happen without proper legal procedures. CAN-SPAM explicitly
permits information to be obtained by subpoena, but basically, this was
all obtainable before, as AOL and many others have demonstrated.

> IETF would not apply the consequences; the victims would apply the
> (behavioral) consequences using  established guidelines, employing
> technical measures already established in RFCs.
> 
> IETF and other standards bodies can bless agreed procedures for using
> the existing technical steps in new behavioral ways.
> 
> There are two reasons this is crucial:
> 
> 1) Courts often, perhaps usually, defer to declared norms of industry
>standards bodies, in establishing reasonableness of disputed 
>behavior.   We can be decisive in establishing these norms.  The
>courts can't easily act to use the COMPLETELY ADEQUATE EXISTING
>LAWS in part because of this lacuna.

Example?

Given that you seem to think open relays are bad (from you proposal), and
since the only time I've ever heard such a claim involved open relays, I'm
guessing that's what you mean.

Having litigated the issue--it was so frivolous that it didn't get to a
filing but there were lawyers involved, I can report to you that the
reasonableness of running open relays in particular has nothing to do with
technical standards.  The central issue is that there a genuine reasons to
provide unauthenticated or post-authenticated relay services outside one's
assigned IP address space, and secondly, the claims that open relays are
somehow associated with spam or provide some benefit to spammers doesn't
hold up to legal scrutiny.  Open relays are not the same as anonymous
relays.  Open relay use doesn't in any way impede investigation of spam.  
Nor does open relay use impede spam blocking.

There are two types of people who speak against open relays:  The first
type are misled. They have very little idea of what an open relay is or
why they would be used. They've just been told that open relays are bad,
and have come to believe this fervently themselves.  It is an article of
faith, and not of logic.  The second type abuses them.  Genuine spammers
of the sort that would be subject to the CAN-SPAM act do not abuse open
relays.  Only radical anti-spammers search for, and abuse open relays.

> 2) Normative documents, and personal leadership, convert a group or a 
>mob into an "emergent structure" (say a business firm, a dance
>company, a charitable organization, a military unit, a religious
>order, a teen gang) in which the norms absolutely bind the behavior 
>of the participants, even to death.
> 
> I say, in a completely non-deprecating way, that these points from law
> and sociology may not be apparent to engineers (or in fact to anyone else
> who is not an attorney or a sociologist) but they are completely true
> and completely binding on human behavior.
> 
> 
> >The consequences are not 
> >technical. In addition, they would need to be arbitrated and we know how 
> >long, ineffective and expensive that can be.
> 
> 
> No arbitration needed.  Please re-read the proposal.
> 
> My proposal (which received input from many people) is basically just
> common sense.   That's what we need now.   The answers are in.  The
> proof is in.  Let's do it.  Now.

Actually, common sense would be that anytime you interfere with someone's
rights, there will be legal procedures involved.  But this is another
weakness in the cherished assumptions of the radical anti-spammers. They
seem to think that they are the only people with rights.

Re: [ga] LatinoamerICANN publica versión en españolde los Estatutos delICANN

2004-03-16 Thread Dave Aronson
On Mon March 15 2004 23:19, Jeff Williams wrote:
 > Dave Aronson wrote:
 > > Jeff Williams wrote (though I get the impression he's summarizing
 > > other people's objections, not raising them himself, as he then
 > > answers them):
 >
 >  I sure did, and for what should have been an obvious reason.  It
 > seems in your case Dave, what is plainly obvious escapes you.  That
 > is indeed a sad commentary on the IETF...

Well excuse... mee!!!  B-P  Your diatribe that I responded 
to, was the first appearance of this thread on the IETF list, at least 
according to my trash-folder.  Looks like you crossposted it.  If you 
don't want our input, then don't bother us.

 > > 1)  The people at the UN are, generally speaking, career
 > > diplomats. Knowing foreign languages and cultures is part of their
 > > way of life.
 >
 >   This is true in some UN agencies, and certainly not in others as
 > several are almost entirely volunteers...

Fair enough.  I was speaking mainly of the General Assembly delegates, 
though they are a minority of the entirety of UN employees, observers, 
etc.  Even regarding the others, the UN's entire point is international 
cooperation for basically its own sake (even if specific agencies have 
more specific missions).  It seems obvious to me that they will be more 
often people who have an interest in foreign languages, than will most 
other groups, even those that operate internationally.

 > > Even if they do not know the particular language someone else is
 > > speaking in, they should at least be basically familiar with the
 > > most popular languages of the world.
 >
 >   Agreed as should most IETF'ers or ICANN'ers as they espouse to
 > be an international organization.

I suspect that many, if not most, of us would still be here even if the 
network were only available in our own respective nations.  (Though 
admittedly, it would then be less useful, especially to the smaller 
nations.)  That it lets me also communicate with the other side of the 
world is great, but frankly, the vast majority of the people I 
communicate with via the Internet, live here in the US.  So, the 
international aspect of it is not as important *to me* (I won't presume 
to speak for anyone else), as (I ass-u-me) the UN's is to its people.  
Again, recall that the international aspect is basically the entire 
point of the UN

 > So Erick in this instance should
 > have been easily to be able to provide an english translation as
 > would be in keeping with good manners.  However he did not...

Whatever.  Remember, the IETF list did not get the background messages 
to which you refer.

 > Jeffrey A. Williams
 > Spokesman for INEGroup LLA. - (Over 134k members/stakeholders
 > strong!) "Be precise in the use of words and expect precision from
 > others" - Pierre Abelard

"Be conservative in what you send, and liberal in what you accept."
-Popular paraphrasing of Jon Postel from RFC 791 (Internet Protocol)

-- 
Dave Aronson, Senior Software Engineer, Secure Software Inc.
Email me at: work (D0T) 2004 (@T) dja (D0T) mailme (D0T) org
(Opinions above NOT those of securesw.com unless so stated!)
WE'RE HIRING developers, auditors, and VP of Prof. Services.




Re: move to second stage, Re: Principles of Spam-abatement

2004-03-16 Thread Yakov Shafranovich
Ed Gerck wrote:
In a separate thread, under Yakov's suggestion, the solution part of 
this discussion is now probably moving on to the closed ASRG list 
(with open archive) as posted in 
http://article.gmane.org/gmane.ietf.asrg.smtpverify/300

I'd like to now address the other part of Yakov's reply below, or
"Why not keep the old design if we can get back to the old assumption?"
Comments inlined.

The solution to spam lies squarely in the IETF hands. We need an Internet 
design where the end points are less trusted than the connection. The opposite
of what we have today. Only then, IMHO, can we have those kind of solutions
that the IETF can take on in order to really reduce the problem. 

Of course, updating the Internet design to fit its current operating conditions
is useful not only to stop spam. Social engineering and spoofing attacks
also rely on the old honor system where users are trusted. "Trust no one" 
should be the initial state under the new Internet paradigm.

So the bottom line is that we lack trust. This echoes the comments made 
by the IAB in section 3.1 of 
(http://www.iab.org/documents/drafts/draft-iab-e2e-futures-05.txt).

How would introducing trust help with the spam problem? Would the cost 
of doing so perhaps would be so prohibitive that we will not be able to 
do so? Is it really possible to introduce trust that will actually work?

Yakov



Re: Apology Re: Principles of Spam-abatement

2004-03-16 Thread Ed Gerck


Dean Anderson wrote:
> 
> On Tue, 16 Mar 2004, Dr. Jeffrey Race wrote:
> >
> > The whole point is there are NO TECHNICAL SOLUTIONS and never will be.
> 
> Correct, and I gave an explanation for this in inforamtion theory.

What information theory says is that the probability of detecting
spam is less than 100%. This has nothing to do with what or what not
the IETF can do to prevent spam. This result is useful only for 
an end-user, to feel good about his spam filter not being 100% 
effective. This is a user result, not an IETF goal.

What interests the IETF are technical spam solutions, for example, 
that would prevent email that comes from unidentifiable or rogue 
senders/MTAs to be ever received. Not because spam is detected as 
such but because untrusted, unidentifiable or rogue senders/MTAs 
are detected. Yeah, this would still leave room for trusted and 
identifiable senders/MTAs to send spam messages. But such spammers 
are no longer a hidden target. And it would be a lot harder for 
someone to send spam on behalf of you.

These are examples of feasible technical, IETF-relevant solutions to 
spam, not at all denied by information theory. To implement these 
solutions, we need an Internet design where we recognize that the 
end points have become much less trusted than the connection. This 
is the opposite of what the DARPA Internet assumed and was designed 
for. So, some things gotta change.

For example, saying that you're "[EMAIL PROTECTED]" should not be so 
easy to do when you're sending email, even though it should still 
be easy to set "[EMAIL PROTECTED]" as your address in your MUA. 

Cheers,
Ed Gerck



Re: move to second stage, Re: Principles of Spam-abatement

2004-03-16 Thread Ed Gerck

Yakov Shafranovich wrote:

> So the bottom line is that we lack trust. 

Depends how you define trust. In my view, the bottom line is that
trust depends on corroboration with multiple channels while today 
we have neither (a) the multiple channels nor (b) the corroboration
mechanisms. So, we lack trust because we can't communicate it.
It's an even more basic limitation than just lacking it ;-)

> How would introducing trust help with the spam problem? 

By allowing trust to be earned between humans and machines, and to 
each other. Machines can then become our agents also in terms of trust
decisions.

> Would the cost
> of doing so perhaps would be so prohibitive that we will not be able to
> do so? 

Anything else will be more expensive because there is no other solution. 
Trust is that which provides meaning to information (Shannon: information 
is that which you do not expect, information is surprise). Without 
trust, all we have is a string of bits. Let me give you some examples.

1. If I ask you whether the expression in quotes "1=1" is true or 
false, what would you say? Looks simple enough, no?

HINT: Your answer depends on the meaning you assign to the expression
"1=1", which depends on what you rely upon (i.e., what you trust) when you
evaluate it.  The same process is reflected in software when that 
expression is evaluated to true or false. For example, the above 
expression is incorrect in C.

2. if I tell you I'll send you a GIFT, can you tell me what you think 
I'll send:

(a) a present
(b) a poison
(c) anything

HINT: To answer this question, you also need to assign a meaning to the
word GIFT, which depends on what you rely upon (i.e., trust) in regard
to me (since I formulated the question). Again, the same process is 
reflected in software when a tag is evaluated in a protocol. In English,
(a) is correct. In German, (b) is correct.

> Is it really possible to introduce trust that will actually work?

It works every day. Otherwise we would not be able to cook, earn
money or even talk. We just have to transpose this knowledge from
our wetware to the software.

Cheers,
Ed Gerck



Re: move to second stage, Re: Principles of Spam-abatement

2004-03-16 Thread Eric A. Hall

On 3/16/2004 3:41 PM, Yakov Shafranovich wrote:

> How would introducing trust help with the spam problem? Would the cost 
> of doing so perhaps would be so prohibitive that we will not be able to 
> do so? Is it really possible to introduce trust that will actually work?

Trust is a contiuum, like everything else related to security.

Different people will have different levels of trust; having a marketplace
of trust brokers -- each of whom provide different levels and strenghts
based on different factors -- is appropriate. Some people and/or services
will require notarization-based trust, others will be happy knowing that
blacklist-dujour.org doesn't think the sender is scum.

I don't see what cost has to do with it. The IETF only needs to provide
standardized mechanisms for negotiating trust between end-points. Leave
the brokerage functions (and the implementation costs) to the service
providers who want to enter the market.

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/



Re: Apology Re: Principles of Spam-abatement

2004-03-16 Thread Doug Royer


Ed Gerck wrote:



What interests the IETF are technical spam solutions, for example, 
that would prevent email that comes from unidentifiable or rogue 
senders/MTAs to be ever received. Not because spam is detected as 
such but because untrusted, unidentifiable or rogue senders/MTAs 
are detected. Yeah, this would still leave room for trusted and 
identifiable senders/MTAs to send spam messages. But such spammers 
are no longer a hidden target. And it would be a lot harder for 
someone to send spam on behalf of you.
 

Yes!
I agree that the IETF can not stop spam. A very reasonable goal would be
to stop or make very unlikely, or difficult to send forged spam. Or at least
make it detectable early in the process of accepting email and hang up
on the spammer.
--

Doug Royer |   http://INET-Consulting.com
---|-
[EMAIL PROTECTED] | Office: (208)520-4044
http://Royer.com/People/Doug   | Fax:(866)594-8574
  | Cell:   (208)520-4044
 We Do Standards - You Need Standards




smime.p7s
Description: S/MIME Cryptographic Signature


Re: Apology Re: Principles of Spam-abatement

2004-03-16 Thread Dean Anderson
On Tue, 16 Mar 2004, Ed Gerck wrote:

> 
> 
> Dean Anderson wrote:
> > 
> > On Tue, 16 Mar 2004, Dr. Jeffrey Race wrote:
> > >
> > > The whole point is there are NO TECHNICAL SOLUTIONS and never will be.
> > 
> > Correct, and I gave an explanation for this in inforamtion theory.
> 
> What information theory says is that the probability of detecting
> spam is less than 100%. 

No, information theory doesn't say that at all.  Indeed, the probably of
detecting spam is probably very close to 100%

> This has nothing to do with what or what not the IETF can do to prevent
> spam.

No, it is quite useful: The IETF can do nothing to prevent spam.

> What interests the IETF are technical spam solutions, for example, 
> that would prevent email that comes from unidentifiable or rogue 
> senders/MTAs to be ever received. 

The only thing that can acheive this is to turn off the computer.  

> Not because spam is detected as such but because untrusted,
> unidentifiable or rogue senders/MTAs are detected. Yeah, this would
> still leave room for trusted and identifiable senders/MTAs to send spam
> messages. But such spammers are no longer a hidden target. And it would
> be a lot harder for someone to send spam on behalf of you.
> 
> These are examples of feasible technical, IETF-relevant solutions to 
> spam, not at all denied by information theory. 

The IETF can specify protocols with certain features, say PKI, but doing 
so will not prevent spam, since the IETF (nor anyone else) cannot specify 
a 'spam-free' protocol.  This is a result of information theory.

> To implement these solutions, we need an Internet design where we
> recognize that the end points have become much less trusted than the
> connection. This is the opposite of what the DARPA Internet assumed and
> was designed for. So, some things gotta change.




Re: move to second stage, Re: Principles of Spam-abatement

2004-03-16 Thread Dean Anderson
On Tue, 16 Mar 2004, Yakov Shafranovich wrote:

> So the bottom line is that we lack trust. 

Nothing truer has ever been said.  This is a feature of human society:
People are not trustworthy.

Lacking any way to positively, uniquely, and inalterably identify people
from birth to death, we cannot implement a trust system.  People (abusers)
would just change their (electronic) identities or steal someone elses.  
What would people do who had their identities stolen?  How could you
_trust_ the claim of electronic identity theft?

Credit card companies substantiate such claims when the purchases could
not have been made by the person whose credit card was stolen.  Yet it is
still a major problem, and it is crime, and a lot of money is involved. My
GF signed up for a Red Sox Credit card at a booth outside fenway a couple
years ago.  Then she got a call for activity on a credit card that she
never got.  Fortunately, the purchases were in stores in London, and she
hadn't been to London. The credit card was deactivated and the charges
removed.

How do you plan to solve a "trust" problem that costs no money, and must
be essentially free to the user? If you have a solution, don't bother with
spam. Call Visa, and be rich. On second thought, call me. I'll split it
with you :-)

> This echoes the comments made 
> by the IAB in section 3.1 of 
> (http://www.iab.org/documents/drafts/draft-iab-e2e-futures-05.txt).
> 
> How would introducing trust help with the spam problem? Would the cost 
> of doing so perhaps would be so prohibitive that we will not be able to 
> do so? Is it really possible to introduce trust that will actually work?
> 
> Yakov
> 
> 




Re: Apology Re: Principles of Spam-abatement

2004-03-16 Thread Dean Anderson
On Tue, 16 Mar 2004, Ed Gerck wrote:

> To implement these solutions, we need an Internet design where we
> recognize that the end points have become much less trusted than the
> connection. This is the opposite of what the DARPA Internet assumed and
> was designed for. So, some things gotta change.

I was going to say something before about this. In the original design,
only _some_ ports were to be more trusted, those below 1024. Back in the
mainframe day, the mainframe itself was clearly more trusted.  But it was
still the case that users could open untrusted ports, so the entire
machine was not trusted, and all endpoints were not assumed to be trusted.

And contrary to belief, we had spam (or abuse) back before
commercialization, too.  I remember starting a "network software engineer"
job in 1991 that included system administration at Kendall Square Research
(KSR). KSR was a supercomputer company, and employed some very smart
people.  Never-the-less, in my first week, I got to meet one bright young
VLSI engineer who had a cron job running that sent an email every 5
minutes saying "you're a jerk" to someone he had gotten into a flamewar on
some usenet news group. (We had a uucp 9600baud leased line, and were
waiting on a 56K to Nearnet)  That was a fun way to meet new people.  
"Hi, I'm the new guy in Swee's group. By the way, that special cron job
you have going, Knock it off."

> For example, saying that you're "[EMAIL PROTECTED]" should not be so 
> easy to do when you're sending email, even though it should still 
> be easy to set "[EMAIL PROTECTED]" as your address in your MUA. 

The From: address is just dressing. It makes no difference what its actual
value is, nor that it can or can't receive email.  As was pointed out,
many things only send email, and don't receive it. Those things will have
informative (or not) from addresses that are invalid for reception.

--Dean






Re: DARPA get's it right this time, takes aim at IT sacred cows

2004-03-16 Thread Scott Michel
jfcm wrote:

At 21:45 15/03/04, Scott Michel wrote:
We identified five main (immediate/middle terms) threats (and agree with 
the USG they may be critical [we say "vital"]):
- DNS centralization
- IPv6 unique numbering plan
- mail usage architecture (not SMTP)
- governance confusion
- non concerted national R&Ds (starting withthe US one)
You've managed to identify operational problems, not protocol problems. The 
Internet's continued operation may face some serious challenges if certain 
trends continue, vraiment. It's not a compelling reason for a "national 
firewall" as you described. At the risk of being particularly crass, it 
sounds a lot like building the Internet equivalent of the Maginot line.

It's a noteworthy proposal, as you described it, but the management of such 
an entity would be hideous. Even if the management and policies of Internet 
operation/management could be compartmentalized as you describe, you'd still 
have roughly the same problems with domain names, address allocation, etc. 
I'm not sure I see what the advantages would be.

To be fair, it was NATO and the Allies who started in the v6 direction 
first. DoD is just merely keeping up with its various international 
partners.


hmmm. May be you did not evaluate what the worldwide control of IPv6.001 
gives to who allocates the addresses (ICANN) and whould build an run an 
IPv6 "DNS".
A few years back, I was a co-author on a few whitepapers for customers who 
were wondering whether they should head down the IPv6 road because European 
partners were already heading down that road. I'm familiar with some of the 
history.

The problem is that this "agility" is to be housed somewhere. Let assume 
DARPA produces tangible results soon (what I is quite credible) we are 
not in the 80s anymore, on "ARPA Internet". We are on Global Internet, 
and a Global body is to publish it. This leads to ITU. And as long as 
ITU-I has not been created on purpose, I am afraid it is acceptable to 
no one.
I was waiting for the ITU to get dragged into this discussion. Yup, the same 
folks who brought us all of the other unsuccessful networking standards. 
Sorry if I'm biased here, but as it is said, history books are written by 
the winners. So, getting back to that discussion about ATM... :-)

We agree. But we are considering today/tomorrow warfare. The Irak action 
started with the first real "cyberbattle", a two days saturation 
spamming preparation. Exactly like before a Marines landing with 
artillery (what they had on the boarder too if I am right?).

Snipers coordinate through cyberspace. Soft unstabilization of Europe is 
hopefully right now a cyber activity, rather than a Marines one :-).
What you're referring to is not network-centric warfare at all. You're 
referring to a specific tactic in the psychological warfare operations side 
of the military. It's a important as the "kinetic response" (USAF and USN 
dropping bombs, the USMC landing ashore, etc.) It's merely part of attacking 
a national infrastructure just as much as reducing electrical power plants 
to rubble attacks a national infrastructure's capabilities.

Network-centric warfare has nothing to do with psyops. N-C has more to do 
with command and control of assets deployed to a theater, assessing and 
prioritizing threats, etc.

hmmm. I think you really need to read http://whitehouse.gov/pcipb. The 
documented priority is not only the warfighter's life, but the nation's 
life and way of life, in protecting critical installations and systems. 
SCADAs are a priority. I agree that DARPA looks also how to quickly 
deploy responses for urban warfare. But it is "also". All the more than 
cyberwarfare is a very important key to urban warfare.
DARPA and DHS (and its DHSARPA) are two separate entities with different 
missions. DARPA's focus is the warfighter, DHSARPA's focus is homeland 
security. The two missions may be integrated via a White House position 
paper but it takes the two agencies to execute the vision.

BTW: DARPA doesn't deploy anyone to anywhere... it does research and 
evaluation. The respective military service branches deploy people to places 
using technologies that may have been influenced by DARPA research or 
evaluated by DARPA (e.g., Internet, M-16s, ceramic armor, UAVs, etc.)

The model I use is only partly 3D (a cylinder figured through half a 
covering elipse on the top - like an open binder you would look from the 
cover side). This is only to show two things:
- the unlimited continuity there should be at the same layers - whatever 
the layers may be. And to sort it (like from individual to groups)
- the fact there are common spines.
Your model still sounds much to complex for ordinary mortals to grasp. While 
it sounds like it should show the interactions between layers of different 
types and models cleanly, it would probably be sliced apart by Occam's 
Razor. This is why the 4- and 7-layer models work so well: they are the 
simplest models that suffice.

Well, s

Re: DARPA get's it right this time, takes aim at IT sacred cows

2004-03-16 Thread Stephen Sprunk
Thus spake "Scott Michel" <[EMAIL PROTECTED]>
> As one other responder said, there is a need to accomodate different
> addressing styles that separate identity from location. I agree with the
> sentiment. So, [erhaps it is only necessary and sufficient to extend or
> redefine IP's addressing?

When you add in the (assumed) requirements of backwards compatibility with
existing routers and hosts that don't implement a proposed extension, it
gets messy real quick.

HIP is a good start, but it's still only a BOF and the involvement is
nowhere near what one would expect for (IMHO) the most significant IETF
project since IPv6.

> Or perhaps it's only necessary and sufficient to design a universal
> application-level forwarding layer? (Warning: plug for my own research
> called FLAPPS, http://flapps.cs.ucla.edu/)

While that's certainly interesting in its own right, what I think DARPA (and
the IETF) is looking for is something between the network and transport
layers, not something above transport.

S

Stephen Sprunk"Stupid people surround themselves with smart
CCIE #3723   people.  Smart people surround themselves with
K5SSS smart people who disagree with them."  --Aaron Sorkin




Re: Apology Re: Principles of Spam-abatement

2004-03-16 Thread Ed Gerck

Dean Anderson wrote:
> 
> On Tue, 16 Mar 2004, Ed Gerck wrote:
> > For example, saying that you're "[EMAIL PROTECTED]" should not be so
> > easy to do when you're sending email, even though it should still
> > be easy to set "[EMAIL PROTECTED]" as your address in your MUA.
> 
> The From: address is just dressing. It makes no difference what its actual
> value is, nor that it can or can't receive email.  As was pointed out,
> many things only send email, and don't receive it. Those things will have
> informative (or not) from addresses that are invalid for reception.

Things that send email but don't receive them can nonetheless
have a valid email entry for 'no mail accepted', with no mailbox.
In terms of trust as I defined before here [1], an email address 
for those things (or any other things) should have a *minimum* 
of three values:

+   trusted according to policy(+)
0   trust value not assigned
-   distrusted according to policy(-)

Of course, the positive and negative range can be expanded
in values as well. How to assign these values? How the trust
model works? Let me copy from an earlier discussion elsewhere.

 This is the wrong question to ask. The real answer is, "what trust 
 model would you like?" There is a built-in notion (given by the
 abstract trust definition in [1]) of the meta-rules that a trust 
 model has to follow, but I might buy a trust model from someone 
 and add that, design my own, or even augment one I bought. Thus, 
 I can ask for a fingerprint and check it against the FBI, Scotland
 Yard, and Surite databases, check their PGP key to make sure that 
 it was signed my Mother Theresa, ask for a letter of recommendation 
 from either the Pope or the Dalai Lama (except during Ramadan, when 
 only approval by an Iman will do), and then reject them out of 
 hand if I haven't had my second cup of coffee. 

 As flippant as I'm being, this has a lot of value. I write with a GUI
 framework because I don't have to worry my pretty little head about the
 details of how to draw a checkbox. I ask the system to draw it for me, and
 it does. It even handles what happens when it's clicked. I just ask the
 checkbox if it's on or off, and it tells me. If I want a special checkbox,
 I can make one of those as a subclass, and once I've done that work, I
 don't have to think about it again, I just use it. Similarly, if I use
 such a concept of trust, I may have to do some up front work to get 
 things the way I want but I can always use an off-the-shelf validity 
 mechanism. In either case, I just ask the trust framework if the 
 trust assertion is valid. The framework can combine rules of thumb 
 with special-cases as appropriate, and without my having to worry my 
 pretty little head about it.

Trust on the sender cannot be proven by the sender (self-assertions cannot 
induce trust -- e.g., "trust me" doesn't work), but must be calculated using 
sources independent of the sender. The sender may hint to a specific trust 
service used, and even provide it and its values, but we should be able to get 
that information from the service directly and/or chose our own trust services
independently. In doing so, trust on the sender is what the receiver 
determines at a specific time based on a behavior model for the sender.
If the sender cooperates, the process can be faster and easier. But the
sender cannot determine the process.

The problem is, thus, not how do you determine trust, especially with all 
the different definitions of spam possible, but how do you want to do it.

Cheers,
Ed Gerck

[1] http://nma.com/mcg-mirror/trustdef.htm



Re: DARPA get's it right this time, takes aim at IT sacred cows

2004-03-16 Thread Scott Michel
On Tue, Mar 16, 2004 at 07:09:12PM -0600, Stephen Sprunk wrote:
> When you add in the (assumed) requirements of backwards compatibility with
> existing routers and hosts that don't implement a proposed extension, it
> gets messy real quick.

The immediate handwave would be "Tunnel it." I'm not denigrating backwards
compatibility, but a lot of good work has relied on tunneling in the past,
e.g., Mbone and v6-v4. I'm currently waiting with baited breath the day
that service providers provide v6-to-v4 as the special case to v4-only
hosts.

> HIP is a good start, but it's still only a BOF and the involvement is
> nowhere near what one would expect for (IMHO) the most significant IETF
> project since IPv6.

Must find more copious free time. Must find more copious free time.

> While that's certainly interesting in its own right, what I think DARPA (and
> the IETF) is looking for is something between the network and transport
> layers, not something above transport.

You never know until you submit a proposal what DARPA **really** wants
even after you get through the program-speak. FLAPPS got funded for a while
under the Fault Tolerant Networks program, as did a lot of other research.

Might be that there are multiple shim layers between network and transport,
transport and application. That said, a lot of things can be solved in the
application layer (or adding thin layers underneath the app layer) because
adding them to the network and transport layer is less tractable. A good
example is multicast -- it works well and fits into the network layer but
the problems with routing protocols to get the distribution tree built turns
out to be a long IETF standards process exercise. Application-layer mcast
seems to be more of a winner than network-layer (just my perception, you
may now fire at will.)

In any case, it's fuel for interesting discussions.


-scooter



Re: Apology Re: Principles of Spam-abatement

2004-03-16 Thread Ed Gerck
Dean Anderson wrote:
> 
> On Tue, 16 Mar 2004, Ed Gerck wrote:
> > What information theory says is that the probability of detecting
> > spam is less than 100%.
> 
> No, information theory doesn't say that at all. 

Sure it says, and that's why a spam filter will never be 100%
effective. I guess we agreed on this before ;-) We also agreed
that spam filters are a user matter, not IETF matter.

Now, you may want to refer to that mythical element, the 'spam-free' 
protocol, a protocol that an information theory model says cannot 
be built. I guess we also agreed before that a 'spam-free' protocol 
is impossible. The IETF should not attempt to develop it.

Thus, in asking for IETF technical solutions for spam, it is
obvious that I do not mean spam filters or 'spam-free' protocols.  
We would all be very happy with a protocol that is almost 
spam-free -- in fact, I believe we would be quite happy with 90% 
at this time. Me thinks we don't need 100% ;-)

An IETF technical solution to reduce spam is doable. Your comment
on 'spam-free' is useful-free ;-)

> No, it is quite useful: The IETF can do nothing to prevent spam.

;-) this mantra is becoming a spam.
 
> > What interests the IETF are technical spam solutions, for example,
> > that would prevent email that comes from unidentifiable or rogue
> > senders/MTAs to be ever received.
> 
> The only thing that can acheive this is to turn off the computer.

No, it's a matter of degree. Even if not all spam is preventable,
preventing email address spoofing (even to a degree) would have
a range of benefits. For example, I would no longer receive
those "undelivered" messages for email that I purportedly sent,
but actually never did. And people receiving email from me could 
actually trust to some extent the outcome of their filters. And, 
to be clear, I'm not talking about PKI. 

> The IETF can specify protocols with certain features, say PKI, but doing
> so will not prevent spam, since the IETF (nor anyone else) cannot specify
> a 'spam-free' protocol.  This is a result of information theory.

Because it can't be perfect, it can't be done? No one needs perfection.
All we need is to have a degree of spam-freeness that is acceptable.

Sterilized milk is not bacteria-free, it just has a reduced count
of bacteria -- which count is low enough to guarantee its stated
shelf life.

Cheers,
Ed Gerck, who doesn't believe in rejecting every possible spam bit.



Re: DARPA get's it right this time, takes aim at IT sacred cows

2004-03-16 Thread Stephen Sprunk
Thus spake "Scott Michel" <[EMAIL PROTECTED]>
> On Tue, Mar 16, 2004 at 07:09:12PM -0600, Stephen Sprunk wrote:
> > When you add in the (assumed) requirements of backwards compatibility
> > with existing routers and hosts that don't implement a proposed
extension,
> > it gets messy real quick.
>
> The immediate handwave would be "Tunnel it." I'm not denigrating
> backwards compatibility, but a lot of good work has relied on tunneling in
> the past, e.g., Mbone and v6-v4. I'm currently waiting with baited breath
> the day that service providers provide v6-to-v4 as the special case to
> v4-only hosts.

The Mbone and 6bone are different beasts, as they're about tunneling traffic
from capable hosts across an incapable core.  In the case of an identity
layer between IP and TCP, we would need to be backwards-compatible with
non-capable hosts and applications (not just non-capable routers) and so
tunnels don't seem a workable solution.

> > HIP is a good start, but it's still only a BOF and the involvement is
> > nowhere near what one would expect for (IMHO) the most significant
> > IETF project since IPv6.
>
> Must find more copious free time. Must find more copious free time.

Ditto...

> > While that's certainly interesting in its own right, what I think DARPA
(and
> > the IETF) is looking for is something between the network and transport
> > layers, not something above transport.
>
> You never know until you submit a proposal what DARPA **really** wants
> even after you get through the program-speak.

All too true.  We do, however, know many of the IETF's needs in the
identifier/locator arena, e.g. for Mobile IP and IPv4/6 multihoming.  That
may be a good starting point to determine what, if any, additional
requirements DARPA has.

S

Stephen Sprunk"Stupid people surround themselves with smart
CCIE #3723   people.  Smart people surround themselves with
K5SSS smart people who disagree with them."  --Aaron Sorkin




Welcome to DRIS discussion list!

2004-03-16 Thread wang liang
Welcome to DRIS discussion list!

After holding the BOF in 59th meeting, we will start the WG application
process. As the advice of APPS, we still should found more people to join
its discussion  list. DRIS is a large system, without enough people, the new
WG may not meet its milestone. If you are interested in this topic,
sincerely wish your could join its discussion.

 As the agenda of IIRI (http://www.ietf.org/ietf/04mar/iiri.txt), This new
WG will cover the Internet search engine, Digital Library, Information GRID,
etc. Any related topic could be discussed in this list. We all have a common
goal: a usable Internet information infrastructure.

Although it's the first time that IETF organized the formal discuss for
Internet information retrieval problem, there has been many sporadic
discussion for it in other place like IRTF.  Now search engine has become
the hottest topic since 2003. Some disadvantages in current search engine
attracted many experts to find the better solution. IETF may be the best
place to discuss the new Internet information retrieval system.

Mailing list: [EMAIL PROTECTED]
subscribe: [EMAIL PROTECTED], to subscribe,send a message with title
"subscribe"
new site: http://dris.hust.edu.cn

Regards
Wang Liang





Re: Apology Re: Principles of Spam-abatement

2004-03-16 Thread Robert G. Brown
On Tue, 16 Mar 2004, Ed Gerck wrote:

> Trust on the sender cannot be proven by the sender (self-assertions cannot 
> induce trust -- e.g., "trust me" doesn't work), but must be calculated using 
> sources independent of the sender. The sender may hint to a specific trust 
> service used, and even provide it and its values, but we should be able to get 
> that information from the service directly and/or chose our own trust services
> independently. In doing so, trust on the sender is what the receiver 
> determines at a specific time based on a behavior model for the sender.
> If the sender cooperates, the process can be faster and easier. But the
> sender cannot determine the process.
> 
> The problem is, thus, not how do you determine trust, especially with all 
> the different definitions of spam possible, but how do you want to do it.

I wrote one whole response earlier but deleted it (fortunately, as Dean
went through my points far more tersely than I was about to).  Here I
just can't stand it.

Ed, are you not paying attention?

It is fundamentally, intrinsically, eternally IMPOSSIBLE TO IDENTIFY
INDIVIDUAL HUMANS on the internet.  I can sit at my laptop and create a
hundred entirely real accounts with no humans behind them, with real
humans behind them, with me behind them, with alien invaders who will
eat your head behind them.  From the other side of my network connection
YOU CANNOT TELL which of these are real and which are fake.  You will
never be able to tell without violating so many of my civil liberties
that I (and everybody else on the planet) would be out in the streets
rioting to get them back.

Mail sent out by my perfectly functional MTA (any of them that I might
choose to install or one that I might custom-write to serve a particular
purpose) is for all practical trust-based purposes ANONYMOUS.  Mail has
always been designed to be anonymous (paper mail too).  There are
individually authenticated services and there are anonymous services,
and mail transport is an anonymous service because it crosses
authentication boundaries.

Mail (paper or otherwise) has an envelope, sure, but the only thing on
it that you can trust even a little bit is the set of postmarks it
develops along its route to your mailbox (and even here, you can really
only trust the LAST postmark in the chain, the one one hop upstream).
Your MTA cannot fill in the envelope.  That can only be done by my (the
sender's) MTA unless you've developed that psychic mail transport
mechanism.

This is no different from paper mail.  YOU have to fill in the address
information on a paper envelope.  You control the pen as surely as you
control your sending MTA -- every byte or stroke can be truth or lie.
You can lie about your return address.  You can fill the envelope with
ricin and anthrax or with money and praise (I'd prefer the latter,
naturally).  I cannot tell if the envelope tells the truth before
opening and reading the message.  I cannot even tell with CERTAINTY that
the envelope tells the truth AFTER opening it except by an out of band
communication with the sender.

If you want to argue that all mail has to be sent the electronic
equivalent of "certified mail" in the paper world, forget it and think
through the metaphor.  First of all nobody EVER sends certified mail in
the paper world except when money is on the line because a) it COSTS
money to have it certified; and b) it is a pain in the ass to have it
certified (it costs time).  Finally, even in the paper world, "certified
mail" generally means that you send it TO a positively identified
receiver with a guarantee that they will receive it.  You are generally
NOT required to show some sort of id proving that the return address is
valid and that you are the person corresponding to the return address
and indemnity information.  Maybe you are.  Maybe you aren't.  Maybe
you're just a messenger boy.  Maybe you're sending well-certified
anthrax and lie about everything on the return/sender forms you fill
out.  In any event, you likely own, literally, the certifying machine
(the sender).

Spam and paper mail abuse is not a problem that can be solved by
addressing trust of identities.  It is fundamentally a problem WITH real
identification.  In the HUMAN world, it is remarkably difficult, and
remarkably uncommon, to validate that a human is who they say they are;
most glib examples that have been cited to show that it can easily be
done show the opposite -- that it is NOT easy and it IS expensive and a
PITA.  My kids have to bring birth certificates and photo id's to
certain things (SAT tests, school registrations).  These
documents/tokens are not easy to file, to find, to to keep straight and
available and are easily lost or stolen.  

I have to show certain forms of legally certified id in order to
validate certain transactions, mostly involving money, and I have to
jealously guard them as they are easily lost or stolen.  Rituals
involving them (such as getting a loan or cas

Re: [ga] LatinoamerICANN publica versión en españolde los Estatutos delICANN

2004-03-16 Thread Jeff Williams
Dave and all,

Dave Aronson wrote:

> On Mon March 15 2004 23:19, Jeff Williams wrote:
>  > Dave Aronson wrote:
>  > > Jeff Williams wrote (though I get the impression he's summarizing
>  > > other people's objections, not raising them himself, as he then
>  > > answers them):
>  >
>  >  I sure did, and for what should have been an obvious reason.  It
>  > seems in your case Dave, what is plainly obvious escapes you.  That
>  > is indeed a sad commentary on the IETF...
>
> Well excuse... mee!!!  B-P  Your diatribe that I responded
> to, was the first appearance of this thread on the IETF list, at least
> according to my trash-folder.

  No excuse Dave as  this thread originated on the DNSO GA forum,
and your previous response did a disservice to others on that forum by
you removing [EMAIL PROTECTED] from the recipients of that forum.

>  Looks like you crossposted it.  If you
> don't want our input, then don't bother us.

  I "CC'ed" [EMAIL PROTECTED] because my response included the
IETF by name.  Hence it would have been rude and irresponsible
not to ensure those IETF members on the main IETF forum the
opportunity to respond/remark and/or contribute.  If doing so is
offensive to you in particular Dave, you have my empathy...

  However being one that is and has always been interested in,
and supportive of inclusiveness, reasonable transparency as well
as a long time IETF participant, it seemed reasonable and prudent
that I am interested in my fellow IETF participants...  So "us"
is inclusive of you and I, Dave...  >;)


>
>
>  > > 1)  The people at the UN are, generally speaking, career
>  > > diplomats. Knowing foreign languages and cultures is part of their
>  > > way of life.
>  >
>  >   This is true in some UN agencies, and certainly not in others as
>  > several are almost entirely volunteers...
>
> Fair enough.  I was speaking mainly of the General Assembly delegates,
> though they are a minority of the entirety of UN employees, observers,
> etc.

  Well sorry again Dave, but you are still mistaken.  Most of the UN
General Assembly delegates are english speakers and all while in
the general assembly meetings have real time translation capability
both ways...

>  Even regarding the others, the UN's entire point is international
> cooperation for basically its own sake (even if specific agencies have
> more specific missions).  It seems obvious to me that they will be more
> often people who have an interest in foreign languages, than will most
> other groups, even those that operate internationally.

  You MAY have a good point here I will grant you.  But it is a
speculative point at least...

>
>
>  > > Even if they do not know the particular language someone else is
>  > > speaking in, they should at least be basically familiar with the
>  > > most popular languages of the world.
>  >
>  >   Agreed as should most IETF'ers or ICANN'ers as they espouse to
>  > be an international organization.
>
> I suspect that many, if not most, of us would still be here even if the
> network were only available in our own respective nations.  (Though
> admittedly, it would then be less useful, especially to the smaller
> nations.)  That it lets me also communicate with the other side of the
> world is great, but frankly, the vast majority of the people I
> communicate with via the Internet, live here in the US.  So, the
> international aspect of it is not as important *to me* (I won't presume
> to speak for anyone else), as (I ass-u-me) the UN's is to its people.
> Again, recall that the international aspect is basically the entire
> point of the UN

 Also mostly agreed here too.  However as the UN is and has been
less than well respected on an international basis for various reasons
based on repeated errors in judgment and subsequent action they
as a international body, hardly are representative in any superior
way to many other international bodies that are not UN related...

>
>
>  > So Erick in this instance should
>  > have been easily to be able to provide an english translation as
>  > would be in keeping with good manners.  However he did not...
>
> Whatever.  Remember, the IETF list did not get the background messages
> to which you refer.

  True the [EMAIL PROTECTED] forum didn't get the background messages because
the IETF was not mentioned..

>
>
>  > Jeffrey A. Williams
>  > Spokesman for INEGroup LLA. - (Over 134k members/stakeholders
>  > strong!) "Be precise in the use of words and expect precision from
>  > others" - Pierre Abelard
>
> "Be conservative in what you send, and liberal in what you accept."
> -Popular paraphrasing of Jon Postel from RFC 791 (Internet Protocol)
>
> --
> Dave Aronson, Senior Software Engineer, Secure Software Inc.
> Email me at: work (D0T) 2004 (@T) dja (D0T) mailme (D0T) org
> (Opinions above NOT those of securesw.com unless so stated!)
> WE'RE HIRING developers, auditors, and VP of Prof. Services.

Regards,

--
Jeffrey A. Williams
Spokesman for INEGro

Re: Apology Re: Principles of Spam-abatement

2004-03-16 Thread Dr. Jeffrey Race
On Wed, 17 Mar 2004 00:44:58 -0500 (EST), Robert G. Brown wrote:

>Ed, are you not paying attention?
>
>It is fundamentally, intrinsically, eternally IMPOSSIBLE TO IDENTIFY
>INDIVIDUAL HUMANS on the internet.

   "No one knows you're a dog on the Internet" seems to capture it.

   (Dilbert?)




Re: Apology Re: Principles of Spam-abatement

2004-03-16 Thread Ed Gerck


"Robert G. Brown" wrote:
> 
> Ed, are you not paying attention?

Read below and draw your own conclusions, please.
 
> It is fundamentally, intrinsically, eternally IMPOSSIBLE TO IDENTIFY
> INDIVIDUAL HUMANS on the internet.  

Who is talking about humans? I am talking about EMAIL ADDRESSES, 
MTAs, MUAs, END POINTS. Trust at the end points -- the end point 
is able to do TCP/IP, end points are not human. It is also not
relevant if there is, or there is not, a human in control of an 
end point. It can very well be another machine.

I also mentioned that trust should be based on the same definition
betwen machines as we use for millenia between humans. Why? So that 
machines could use well-developed, real-world, tested notions of
trust -- and be thus useful as our agents.

This answers the rest of your email. Are you paying attention? ;-)

Cheers,
Ed Gerck

PS: BTW, take a look at a work some 5 years ago allowing ISPs to 
identify who was at the keyboard by their usage pattern, in a 
household, to properly target advertising. Humans are more
identifiable on the Internet than you think. But this is
100% irrelevant to what I wrote about. Humans can't do TCP/IP.



RE: Apology Re: Principles of Spam-abatement

2004-03-16 Thread Christian Huitema
> >It is fundamentally, intrinsically, eternally IMPOSSIBLE TO IDENTIFY
> >INDIVIDUAL HUMANS on the internet.
> 
>"No one knows you're a dog on the Internet" seems to capture it.
> 
>(Dilbert?)

Actually, this cartoon was published in The New Yorker on July 5, 1993,
by Peter Steiner. "On the Internet, nobody knows you're a dog." (A dog,
sitting at a computer terminal, talking to another dog.) 

-- Christian Huitema