Re: Acceptability of in-kind donations [was RE: Last Call Comments on draft-iasa-bcp-04.txt]

2005-01-17 Thread Vernon Schryver
> From: "Wijnen, Bert (Bert)" <[EMAIL PROTECTED]>
> To: Carl Malamud <[EMAIL PROTECTED]>, Scott Bradner <[EMAIL PROTECTED]>
> Cc: [EMAIL PROTECTED], ietf@ietf.org
> Subject: Re: Acceptability of in-kind donations [was RE: Last Call Comments 
> on draft-iasa-bcp-04.txt]

> Seems we forgot to send issues as ONE ISSUE per EMAIL PLEASE
> and use a proper SUBJECT line, so that we can easily check
> all mail/postings related to one single issue.

That's fine for you people who are continuing to do what you promised
weeks ago to stop doing.  What about those of us who are growing weary
of dozens of such messages per day?  Shouldn't the dozen or so of you
have already retired to a special purpose mailing list as you promised?

It's bad enough that many of your messages consist of thousands of
bytes saying no more than "Me too" or "I agree."  Now you would multiply
them several fold?


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: The process/WG/BCP/langtags mess...

2005-01-11 Thread Vernon Schryver
> From: Sam Hartman <[EMAIL PROTECTED]>

> No, currently this draft is in Ted's hands.  It makes no sense for
> people to withdraw drafts or to make any hasty decisions at all.  

That's fine, but does suggest some questions:

 - Is the Last Call over?

 - If so, was its result "no supporting consensus"?

 - If the result was "no supporting consensus", will the current document
 nevertheless be published as a BCP?

 - If the result was "no supporting consensus", will a revision of
the document be published as a BCP without a new Last Call?

Last week I saw a comment that seemed to answer first question with Yes.
If the answers to the other questions are not Yes, No, and No, then
as others have said, the IETF has far more serious process problems
than how to account for the expenses of the to be hired help. 
If Last Calls are meaningless exercises in noise, then the honest
thing to do is shut down this mailing list or redirect it to the
old TCP-IP list that some time ago became the comp.protocols.tcp-ip
netnews hierarchy.
If outside groups can publish IETF BCPs without the let, leave, or
hindrance of the IETF, then the honest thing to do is to get rid
of all of that tiresome WG stuff.
The IETF meetings could continue, but as part of NetWorld+Interop.

On the other hand, if the answers are Yes, Yes, No, and No, then
contrary to the other person's request, there is no good reason to
talk about the language tags document here and now. 

That would sound like a decision to me, but I'm not sure I'd call
it hasty even as committee clocks count time.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: The process/WG/BCP/langtags mess...

2005-01-11 Thread Vernon Schryver
> From: "Addison Phillips [wM]" <[EMAIL PROTECTED]>

>    In fact we feel that we've been very considerate
> and open in the development of this draft in the language tagging
> community and continue to be open to comments and criticism, no
> matter the source.

Based on what I have seen in this mailing list, I disagree.  


> I would like the community at large to consider this specific
> I-D--both the requirements for it and the technical merits of our
> solution--attempt to understand our choices and provide (objective)
> feedback that will allow us to achieve consensus for or against it
> (or a slight revision thereof). We are trying to work within the
> confines of the IETF's process to achieve what we see as the necessary
> progress on this issue.

If the advocates for this I-D were really trying to follow the IETF's
processes, they would have taken one of the suggestions for the next
step and temporarily (or permanently) retired from the field.  It is
clear that there is no consensus to advance this document.  Even its
authors have admitted that by talking about a new version.

As has been said repeatedly, a new version would require a new Last
Call.  Last Calls are on documents, not promises to produce a new
document that might address objections to the current document.  Long
time spent in IETF processes is not a reason to ignore the clear answer
from the IETF processes of "No Consensus," even when the long time
actually is spent in the IETF processes.  The IETF process involves
official IETF Working Groups and official IETF WG mailing lists.  Time
spent in an unrelated mailing list is not part of IETF standards process
any more then the time spent by an Informational RFC author thinking
about things is part of the IETF standards process.

Besides, isn't the Last Call officially over?  Isn't the topic of the
language tags BCP closed, dead, kaput, finished, and done until the
IESG and the individual submitters of the document choose the next step?

I can't see any significance for Mr. Phillips comment except as yet
more evidence that the default answer for individual submissions
must be "ABSOLUTE NO!"  He is basically saying "You must publish our
BCP because we followed all of the steps as we understood them and the
default result of that is surely to publish."


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: individual submission Last Call -- default yes/no.

2005-01-10 Thread Vernon Schryver
> From: Misha Wolf <[EMAIL PROTECTED]>

> vs> unless the incredible "I'm gona tell the Liason on you" 
> vs> threat was the vacuous, standards committee politicing 
> vs> as usual that it sounded like.
>
> That appears to be a rather paranoid reading of my:
>
> mw> Now the IETF is, of course, free to do whatever it likes, 
> mw> but I would urge that any course of action which would 
> mw> cause a parting of the ways between the IETF and the W3C 
> mw> (and other Industry Consortia) should be avoided.  I 
> mw> suggest that it may be time to escalate this matter to 
> mw> the IETF/W3C Liaison group.
>
> Where is the threat?  I was suggesting that as the IETF and 
> the W3C have a liaison group and as there appear to be 
> disagreements as to how to move forward, the matter be raised 
> at the liaison group.  Is that not what such groups are for?

Please credit some of us with understanding the meaning of "escalate"
in the intended sense of "evoke to an authority that will issue a writ
of mandamus."  Other words in Mr. Wolf's message including "any course
of action which would cause a parting of the ways" were not lacking
in forcefulness.  Then there was the awesome list of authorities that
the IETF list members is ignoring at its peril.
See http://www1.ietf.org/mail-archive/web/ietf/current/msg33563.html

When I read Mr. Wolf's message the first time, I was reminded of an
IETF slogan about rejecting kings and presidents as well as ancient
friction between the DDN protocol designers and users and the ISO.


I suspect that the language tag saga is not as bad as it seems and
that some good new IETF documents might come of it.  It should also
serve as a red flag for another instance of the general problem of the
quality of IETF documents.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: individual submission Last Call -- default yes/no.

2005-01-10 Thread Vernon Schryver
> From: Juergen Schoenwaelder <[EMAIL PROTECTED]>


> [I do understand what people are concerned about here but I also find 
>  it important to remind myself from time to time how we are all working
>  towards raising the bar, and once raised, someone will speak up to
>  raise it even further. Why are we not trusting the system that has 
>  worked remarkable well most of the time so far? Perhaps thats human
>  nature - if I look what it takes to release a new Linux kernel these
>  days or how difficult it is to make the next Debian release, I may
>  conclude that raising the bar is a normal part of such societies.]

That is seriously wrong.  The issue does not involve rising bars, but
falling bars that need to be caught or at least seen to be falling.
The IETF is, as it has been for 10 or 15 years, under attack from those
who use it for ends not consciously chosen by the IETF.

15 years ago there would have been blank looks of incredulity to
the suggestion that an outside, sometimes ostensibly ad hoc and
other times supposedly offical standards organization should push
through a document with as official a designation as "BCP" without
the let, leave, or hindrance of IETF consensus.  However, that is
the case today.

10 years ago no one would have considered the notion that individual
submissions should become official standards (of course I include
"Proposed" as an offical IETF standard) of the IETF with a yes vote
assumed from everyone outside the IESG.

Of course, 20 years or 25 years ago, things were nominally different.
In practical terms, the bar was higher still.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: individual submission Last Call -- default yes/no.

2005-01-10 Thread Vernon Schryver
> From: Ted Hardie <[EMAIL PROTECTED]>

> And the point I'm trying to make is that there are multiple records. 
> When we have
>a mailing list like "ietf-types" or "ietf-languages" where there is a long term
> community of interest around a specific issue, should a discussion there
> be taken into account when assessing an individual submission?  I think
>the answer is "it depends" and certainly may be "yes".  It should not over-ride
> ...

I'm bothered by the talk of "community of interest" and "support" as if
they were fungible, as if every community of interest is the same as the
IETF.  That is a potentially catastrophic slippery slope.  There are
very good reasons for IEEE PARs.  Turf is the most fought over commodity
of standards organizations.  Turf is more highly valued than any single
document.  Letting random groups of people call themselves "communities"
and so automagically give themselves the IETF imprimatur is a very bad
thing.  Whether the random group has a mailing list that includes the
string "ietf" in its private part should be obviously irrelevant, but
judging from recent cases, isn't.  Whether the group's mailing list
happens to use an ietf.org domain name is close to irrelevant.  Whether
the supposed "community" includes leaders of other standards organizations
should also obviously be irrelevant, but evidently isn't.

Instead of a "default no" for BCPs or standards track RFC from individual
submissions, it would be better to make it a simple "no."  If the IETF
does not feel like investing the substantial effort and delays to form
a WG and the rest of the tiresome, formal IETF dance, then that in
itself is proof that the issue is unworthy of the IETF's official seal.

Previous efforts to borrow the IETF's printing press and official
seal have involved "Informational."  Evidently the many forces that
want to borrow the IETF's seal have figured out that "Informational"
is not valuable enough and are trying a new tactic.

Giving BCP or standards track to individual submissions is evil on
more than one front.  It's not just that it risks blessing non-standards
and deluting the value of BCP and the standards track.  It is evidence
that the IETF as an organization is getting lazy about its real work.
If every I-D were worth publishing, there would never have been a need
for WGs, Last Calls, and the rest.  The whole "community consensus"
thing is absolutely required for anything that deserves the word
"standard."  You can't have a worthwhile standards publisher without
the work of editing.  Other standards bodies use voting.  Book publishers
use editors.  The IETF uses "consensus".  Letting the editors off the
hook for jobs will have results as bad in their own way as results we
saw from letting the directors of Enron and MCI sleep on their jobs.

The IESG, IAB, and ADs are not the IETF and do not define the IETF
consensus.  They might gauge it, but if it does not exist outside
them, then it does not exist.

It is definitely not good that the IETF is spending so much time
writing a job description and paying so little attention to ostensibly
important Internet standards like language tags.

It's not only true that "A [standards committee's] gotta know [its]
limitations," but it must also know what it doesn't care about enough
to work on.  If the IETF doesn't want to work on language tags by
having a WG and the rest of those delays and work, then so be it.  Let
the standards body that evidently does care do it...unless the incredible
"I'm gona tell the Liason on you" threat was the vacuous, standards
committee politicing as usual that it sounded like.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Excellent choice for summer meeting location!

2005-01-01 Thread Vernon Schryver
> From: Jari Arkko <[EMAIL PROTECTED]>

> First, I tend to find tourists and MFLD rather harmless.
> In fact, I think they are good for our financing. Some
> might say necessary. And they usually stay out of the mike,
> don't disturb presentations, and don't comment on the mailing
> list where the real consensus is verified. But if some of
> them do, that's even better - then we have attracted new
> contributors. And we DO need new contributors.

>From my perspective as someone with a decades long perfect
non-attendance record at the IETF parties, I think that is wrong
on all counts.  There are WGs that exist only because it is the
go-ers who feel the greatest need to prove to the folks back at the
factory or to the readers of their trade rag inter-ad filler that
their contributions to the Standards Process are vital to peace,
prosperity, and the continued existence of the Internet.

But then I have the archaic and obsolete notion that the IETF needs
good and useful standards more than it needs contributors.


> In short, I wouldn't worry too much about the touristy nature
> of a location. 

Judging purely from good and bad results in the WG mailing lists, I think
that is right and wrong.  Venues that are too hard to reach are attended
by only the most dedicated and so produce agreements that do not reflect
the consensus of the WG mailing list; recall the "agreement" to pick the
ISO OSI Protocol Suite as IPng.  Venues that are extremely popular also
produce bogus agreements by not drawing a representative sample of the
WG as defined by the mailing list, albeit not quite as bad.

If had been asked years ago, I'd have said the IETF WG meetings should
be abolished in favor of the WG mailing lists supplemented by ad hoc
telephone calls among at most 2-4 people to hammer out the relatively
few issues that need "high bandwidth."  I've no doubt that administrative
groups such as the IAB and IESG need real meetings, but in decades of
watching WGs, I cannot think of single case where an IETF WG meeting
was necessary.  Judging from the effects on documents I've watched but
often not contributed to, WG meetings have only neutral or negative
effects.  Good specifications require thinking and understanding.  The
heat of battle in a conference room or any meeting of more than 3 or
4 essentially always precludes anything that might honestly be called
deliberation.  This is true even when you have 3 or 4 people playing
to a silent audience.

Abolishing the WG meetings would also end the silly political
correctness games in the choice of venues.

Of course, I don't expect anything of the sort to happen.  The opposite
of ever more emphasis on meetings and the form of the IETF and less
on useful protocol specifications will continue.  The IETF of 10 years
ago would not have spent a fraction as much time writing RFCs about
accounting and job descriptions as it has in recent months.  Such stuff
would have been flatly inconceivable for the IETF of the 1980s.  However,
it's best to acknowledge and deal with such irresistible changes.
They're the stuff of life and death.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: List of Old Standards to be retired

2004-12-16 Thread Vernon Schryver
> From: Eric Rosen <[EMAIL PROTECTED]>

> I see this exercise has already reached the point of absurdity. 
>
> How can it possibly be worth anyone's time to look at each telnet option and
> determine whether it  is deployed?  What possible purpose  could be achieved
> by  changing the  standards status  of some  telnet option?   Is  there some
> chance that someone is going to implement one of these by mistake somehow? 
>
> A similar comment applies to the FDDI  MIB.  Are we trying to make sure that
> no one  implements that MIB by mistake?   Or that no one  implements FDDI by
> mistake, just because he thinks there's an IETF standard about it? 
>
> Let me echo Bob Braden's "if it's not broken, why break it?" query. 

Spending time revising old RFCs of living protocols is unlikely to do
much good and has potential for plenty of harm.  It's hard to avoid
the temptation to fix things (parts of RFC 1668 and RFC 1661 tempt
me), but such fix-it efforts usually produce incompatible protocols.
The IETF definition or RIPv1 was compatible only because it was a
strict subset of the real protocol.  The IETF version of the printer
protocol was just plain broken.

Other targets of this exercise describe protocols that were never
implemented and should never have been allowed on the standards track.
Why not scale back the exercise to attack only obvioulsy dead or
stillborn protocols?  


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: New Last Call: 'Tags for Identifying Languages' to BCP

2004-12-14 Thread Vernon Schryver
> From: John Cowan

> ... 
> > For example, I'm
> > unhappy about an apparent sentiment that would put ABNF on a lower
> > footing that the English text.  I think I'm like most implementors and
> > perhaps unlike non-engineers in reversing that precedence.  Whenever
> > I read an RFC, I rely first and foremost on the ABNF.  I use the English
> > only for hints, and follow the ABNF instead of the English whenever
> > there is a conflict.
> 
> Then you would be incapable of implementing any programming language compiler,
> or an XML parser, for the specs for these things include literally hundreds
> of constraints that are specified only in technical English and not in the
> BNF.  As far as the BNF is concerned, this is good sound C:
> 
>   main(argv, argc) {
>   float Argv;
>   int* Argc;
>   print(32);
>   }

In contexts other than UNIX applications with modern compilers,
that fragment is perfectly sound, if not something I'd write.  An
example context is before typing of formal args and in what ANSI/ISO
9899-1990 calls a "freestanding environment" where main() is not
special.  I've suppressed most of the memories, but I seem to recall
that what Microsoft calls threaded WIN32 applications are such
things, or were before the POSIX additions.

Besides, I didn't say that one should ignore the English, but that
implementors give precedence to the ABNF.  When you are writing an RFC
that you hope will be implemented, you MUST remember that programmers
are lazy.  We transliterate the ABNF to build the parser and so implement
the syntax and read the English to figure out and so build the semantics.
As I said, if you must have contradictions between your ABNF and your
English, you must accept the fact that most technical people will
assume your ABNF is right and your English is wrong.  That fact seemed
to me to conflict with statements in this thread, and that suggests a
problem in your working group and your RFC.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: New Last Call: 'Tags for Identifying Languages' to BCP

2004-12-13 Thread Vernon Schryver
> From: "Peter Constable" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Cc: [EMAIL PROTECTED]

> This is a multi-part message in MIME format.
>
> --===1521567419==
> Content-class: urn:content-classes:message
> Content-Type: multipart/alternative;
>   boundary="_=_NextPart_001_01C4E16C.40BF0707"
>
> This is a multi-part message in MIME format.
>
> --_=_NextPart_001_01C4E16C.40BF0707
> Content-Type: text/plain;
>   charset="us-ascii"
> Content-Transfer-Encoding: quoted-printable
>
> Bruce Lilly has posted comments on the IETF list in response to the
> last-call announcement for a proposed revision to RFC 3066. His comments
> were generally negative, raising a number of concerns. I and others
> involved in preparation of the revision have discussed Bruce's concerns
> with him, but they were not made available on the IETF list since those
> of us other than Bruce were not subscribed to this list. I wish to
> briefly summarize the outcome of that discussion for the benefit of
> people here.
>
> =20
> ...

> In conclusion, I think that some of Bruce's concerns were valid, and
> suggestions for changes have been presented to the authors accordingly.
> I believe all of these changes can be considered to be for clarification
> purposes, rather than technical changes. (No changes affecting the set
> of valid tags have been made.)
> ...


> --_=_NextPart_001_01C4E16C.40BF0707
> Content-Type: text/html;
>   charset="us-ascii"
> Content-Transfer-Encoding: quoted-printable
>
> 
>
> 
>  charset=3Dus-ascii">
> 
> 

Re: Sunshine Law

2004-10-25 Thread Vernon Schryver
> From: John C Klensin 

> Two additions to Brian's comment, with which I agree...
>
> (1) The type of discussions he describes are especially
> important in situations in which an alternative is to try to
> make large structural or procedural changes in order to solve
> problems with personalities.  Such changes almost never succeed
> if the relevant personalities are still in place, and they can
> add serious additional friction to the process while solving
> problems that don't exist and not solving those that do.

Gordian Knots are hard unless you are a mythic hero.  It sounds better
deal first with the personality problem and then fix the structural
problem.  I think conflating the two even in private is bound to lead
to serious errors and distortions in the procedural repairs.  But
sometimes that's impossible and you can't cut the knot.

I trust this is not directly relevant to the reorganization stuff.



> Perhaps I'm just getting too old, but while I think IETF
> benefits from clear discussions in frank language, I don't think
> the nit-picking, out of context, abuse, especially that which is
> based on long-ago comments, benefits anyone.

Yes, but much of that comes from letting everyone have a say as
opoosed to letting everyone see what is said.

I have big problems mustering any interest in whether the IETF is
incorporated in Elbonia or whatever the reorganization is really about,
but doing things in secret is always expensive.  Sometimes the costs
of secrecy are less than the alternatives, but they always exist.  In
this case, I'm now convinced that the reorganization stuff is less
boring than I assumed.  I still prefer to let you and others deal with
it in private than to read those minutes.  But please see those costs.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Sunshine Law

2004-10-25 Thread Vernon Schryver
> From: Brian E Carpenter 

> >>  Private discussions
> >>> are sometimes a necessity, as is the ability to float what might
> >>> be stupid ideas without having them quoted for years as one's
> >>> firm position. 
> > 
> > I have trouble imagining such tender feelings in anyone who should be
> > allowed to participate.  
>
> That's not quite the point. Both in an ad hoc group like Adminrest,
> and in the IAB and IESG, it is entirely possible that in a discussion
> of the real issues, something like the following would be said:
>
> A: The real problem here is X, who simply can't do his/her job.
> ...

That misses what I tried to say as well as the objections that have
been raised.  All of the various state sunshine laws have exceptions
for personnell, legal, and other matters that truly must be discussed
in private.


> I won't reply in more detail to Margaret's note, except to say
> that if the confidentiality clauses she quotes are used *except*
> for the above sort of discussion, they're being misused IMHO.

As I wrote, since the Colorado Sunshine Law was enacted decades ago,
there have been many mini-scandals in which government officials have
been accuser of lying, often justly, about what they're talking about
behind closed doors.  People who want political power often also want
to be gatekeepers of any and all information that they happen to find,
as well as needing to avoid having their decisions examined.

If you are saying that deliberations involving the administrative
reorganization should as secret as people seem to be saying they were,
because they included statements like "real problem here is X, who
simply can't do his/her job," then it sounds like one of those
mini-scandals.  As far as I can tell, "X" in those discussions would
have been agencies instead of people.  Besides, even if some Xs were
people, one of the uncomfortable parts of jobs serving public committees
is that performance reviews and so forth do not get nearly as private
as jobs elsewhere, even governments with sunshine laws.


> Truth in advertising: I drafted the confidentality clause
> in the IAB charter, which was of course last-called as a BCP.
> Harald borrowed it for the IESG charter.

RFC 2850 says 

   The IAB publishes minutes of all its meetings on the Internet, and
   conducts an open meeting at every IETF meeting. It publishes all its
   findings as RFCs, Internet Drafts or messages to the IETF mailing
   list. However, discussion of personnel matters and possibly legal and
   financial matters may sometimes be required to be kept confidential,
   and the chair may, with the consent of the full members, exclude
   liaison and ex officio members from such discussions.

Those words in RFC 2850 giving the power of participants to close doors
are wrong, if only because they are not specific enough.  You cannot
rely on committees to keep themselves open; that's why there are
sunshine laws and why you put that paragraph in RFC 2850.  That those
words passed a last call does not mean that they are not subject to
reconsideration.  Perhaps the NonCom should examine each claimed need
for confidentiality.

Feel free to call me stupid, but I cannot relate this reorganizaing
to personnel matters.  You don't re-organize because an employee is
sluffing off.  There are evidently financial matters, but those
particular financial matters also seem inappropriate for confidentiality.

I don't care about bureaucratic organizing and almost certainly would
not read published minutes of whatever.  I don't see any issues that
aren't better handled by people other than me.  Or until the supposed
need to keep stuff secret was invoked, I assumed there were no such
issues.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Sunshine Law

2004-10-23 Thread Vernon Schryver
> From: John C Klensin 

> Now, the reasons the discussions and mailing list archives were
> not made public.  I don't think we really discussed it, but all
> of us who are familiar with the IETF process, yourself included,
> have noticed how rapidly the S/N ratio can deteriorate in
> "public" discussion of things for which the "public" doesn't
> take the time to understand the details.

Discussions that are made public can differ from discussions by the
public.  Publishing a mailing list archive is not the same as letting
the peanut gallery contribute to it.  If knowing that the archive for
a mailing list is public would make contributors as noisy as professional
politicians, then you need different contributors.

>   Private discussions
> are sometimes a necessity, as is the ability to float what might
> be stupid ideas without having them quoted for years as one's
> firm position. 

I have trouble imagining such tender feelings in anyone who should be
allowed to participate.  Besides, that reasoning would justify keeping
everything private except the final conclusions, and often even those.
The fear of looking foolish seems to be a major reason why governments
try to keep everything secret including their firm positions.  Anyone
who fears looking foolish should stay out of the kitchen, or learn to
phrase ideas tentatively until they've become firm positions.

Or follow the old advice to never write anything that would seriously
embarrass you if reported by CNN or read in court.


> When issues that either involve people's jobs,
> that can get highly emotional, or that may involve legal claims
> are at issue, the importance of holding private discussions
> becomes even greater (and we have seen all of those things in
> various pieces of the Admin restructuring/reorg process).I'd
> actually favor changing the rules to make that more explicit.

I think Colorado's old Sunshine Law allows private personnel discussions.
There are periodic mini-scandals about abuses of exceptions to the
law, but it generally seems to work.  Judging from
http://www.google.com/search?q=sunshine+law
other states' sunshine laws are similar.

However, that old advice about not saying dumb things even in private
holds, as demonstrated by Microsoft and SAVVIS.  See
http://www.google.com/search?q=savvis+spam+memo

> I think there is a huge
> difference between "We are going to discuss X with Y. Those
> discussions need to be private because they touch on sensitive
> issues, but a summary of conclusions and justifications will be
> made available as soon as that is possible consistent with that
> level of sensitivity" and "the community isn't entitled to know
> that the discussions are being held". 

True.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Shuffle those deck chairs!

2004-10-22 Thread Vernon Schryver
> From: [EMAIL PROTECTED] (scott bradner)

> see http://www.wordiq.com/definition/Prior_art
>
> prior art is still useful

but not necessarily in naive, open compilations that do patent
holders the most good.  I was told by participants in the XOR-cursor
court battle that it was lost because the opposition learned of the
killer prior art in time to weave a defense. 
Recall the results of the re-examination of the LZW patent.
Prior art is not nearly as effective as it is supposed to be according
to people who've never spent time and money with patent lawyers.

The notion that the IETF can do anything about bogus patents is at
best the obverse of the bad coin that let Motorola-Codex mess up CCP
and try to attack Van Jacobson Compression in the PPPEXT WG for years
starting about 10 years ago.  The IETF administration professed to
take those patents seriously.

A list of relevant patents without pretensions of prior art lets people
use their own judgement.  If you are competent to implement a protocol,
then you probably have a fair idea of the readily available prior art.
The important data are the names of the patent holders.  When you look
at patents, you should not be trying to decide whether your lawyers
can use prior art to break them in court, even in the unlikely case
that you are competent to have legal opinions.  You should be deciding
whether the patent holders would want to block the sale or use of your
implementation.  If the patents are only defensive or if you are writing
open source, then you might choose to go ahead no matter what you think
of the validity of the patents.  If by virtue of their owners, the
patents seem likely to be used for extortion or to enforce a monopoly,
then the bogosity of the patents and prior art are also irrelevant,
since a successful court battle would cost years and zillions of
dollars.  You also have noticed that court attacks on patents are
rarely successful.

At worst the notion that the IETF can do more than say "these IPR
claims are known" is a mechanism for people who claim to be spokesmen
for large communities to inflate themselves.  If the Open Source
Community were much more real than Jeff William's "INEGroup LLA. -
(Over 134k members/stakeholders strong!)" and able to work with the
IETF to fix the patent mess, then it could fix the patent mess without
help from the debating society that is the IETF.  The power and the
glory of the IETF is that it is literally just a debating society.

In that supposedly monolitic Open Source Community, users, particularly
redistributors and packagers, have far more compelling reasons than
authors of open source to care about patents.  The calls for the IETF
and open source authors to get involved in patent fights can be seen
as efforts by politicians and redistributors of our work to shift even
more of the burden of making their profits and reputations to us.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Shuffle those deck chairs!

2004-10-21 Thread Vernon Schryver
> From: "Eric S. Raymond" <[EMAIL PROTECTED]>

> Let's put an end to these far-reaching interpretations of
> "representation", which are a product of Mr. Schryer's fevered brain
> overinterpreting my original statement.
>
> Originally, somebody asked that the open-source community get its act together
> about what acceptable patent-license terms would be.
>
> I said this: if IETF wants to know what form of patent license will be
> acceptable to the open-source community, the people to ask are Richard
> Stallman (representing FSF) and myself (representing OSI).
>
> Between us (and especially if we agree), I believe we can speak *with
> regard to this question* for 95% of the open-source community.  This
> does not make either of us power-mad dictators intent on domination,
> just most peoples' recognized experts on what constitutes an
> acceptable open-source license.
>
> If either Mr. Schryer or yourself chooses not to be considered part
> of that "most people", fine -- the fact remains there are an awful damn lot
> of developers expecting RMS and myself to *do* *this* *job* so they don't
> have to.

If it existed, that job would conflict with the way the IETF works.
No contributor to an IETF WG or mailing list is supposed be presenting
anything but personal opinions.  When Mr. Raymond writes here about
acceptable patent-license terms, his views get careful reading, but
not because he represents anyone but himself.

If the IETF were to make an exception and count votes on this issue,
then it should weight votes based on relevant open source, since
concerns about patents on parsing C matter less to the IETF than patents
on address prefix lookups and compression.  However, any kind of voting
would be bad.  More and larger (including commercial) organizations
would declare themselves champions of open source and demand votes in
proportion to their programmers, customers, or market shares.


> Cripes.  It'd be easier trying to serve a gang of baboons, sometimes...

Many people besides baboons and refuseniks consider it unseemly to
demand gratitude for unwanted gifts, and not only because some political
activites are painfully obvious and familiar.  Being recognized as the
official spokesman for the open source community by the IETF would
help Mr. Raymond's efforts to get the world to believe the phrase "open
source community" is not silly nonsense like "netizen," that it has
spokesmen, and that he is one.


Vernon Schryver[EMAIL PROTECTED]


P.S. I don't entirely agree with Mr. Vixie's patent suggestion.
Requiring that WG participants make such disclosures would be very
nice in theory, but seems as realistic as the IETF simply declaring that
it has opted-out of the patent extortion game.  However, that's all
been said before more than once.


P.P.S. I think this started with concerns about quoting parts of RFCs.
Is there more fire than smoke there?

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Shuffle those deck chairs!

2004-10-19 Thread Vernon Schryver
Someone wrote me privately:

] For an open source guy he 
] has some pretty funny legal language:
] 
] http://www.catb.org/~esr/copying.html

That page includes this restriction:

}  You may not make or redistribute static copies (whether print or
}  online) without my express permission.

HTML and English are not C, C++, asm86, perl, or even php and I
don't expect anyone who writes some open source to write only open
source.  I would also like a way to stop my perpetual problems with
people using and redistributing ancient or distorted and preverted
versions of my epistles in C.  Still, someone who claims to represent
refuseniks like me in negotiations concerning open source with an
organization in which I've been particpating for decades ...


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Shuffle those deck chairs!

2004-10-18 Thread Vernon Schryver
n source users
than authors, but there is plenty wrong with appointing yourself to
represent people outside your organization.

If you truly understood and supported the notion of open source, you
would not be doing as you are and have been doing.  What you are doing
is the political realm's equivalent to the theft that some corporations
commit or attempt with open source.  (e.g. AT&T and the BSD TCP/IP
code, except I think AT&T made an almost innocent mistake in that
case).  You are trying to "leverage" the reputations and work of open
source programmers for your personal gain and political power without
even deigning to give us credit.


And save the stuff and nonsense about being trustworthy and not having
power over me.  Don't insult my intelligence.  Your efforts here to
be named co-negotiator for open source authors are intended to exercise
power over me.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Shuffle those deck chairs!

2004-10-15 Thread Vernon Schryver
> From: "Eric S. Raymond" <[EMAIL PROTECTED]>

> Your two people to go to on this would be RMS (representing the FSF)
> or me (representing the OSI); between us I believe we can speak for
> over 95% of the community.

I hate it when elected politicans presume to speak for me.  I will not
sit quietly and let self-appointed individuals try the same.  *DO NOT*
tell me to my face that you are negotiating on my behalf or even just
for 95% of the other people who write or have written software that
might be called "open" by virtue of being freely redistributable and
in use by lots of people until you can can point to the results of a
real plebiscite.  Even then, you won't be speaking for me until I
personally and explicitly say so.

If you and Mr. Stallman want to speak for your respective organizations,
then peachy.  If you want to speak based on what you consider your own
great experience and deep thoughts on the issues, then that's also
good.  If you want to pretend that you speak for me out of my earshot,
then I'll do my best to not hear.  Just don't stand in front of me
telling me that you have my best interests at heart and that I must
trust you.

It's been many years since I came to expect such behavior from the
FSF.  I had a better image of/delusions about the OSI.  I guess I
should know better.  Just as the self-named Internet Society attracts
people far more interested in politics and telling me how I should
view the Internet than designing, implementing, deploying, and maintaining
what I think of as network stuff, any self-described open software
organization will be run by people telling me whether I'm really writing
free code and where my best interests really lie.


The appareance of such stuff in proximity to the IETF administrative
reoganization...uh...negotiations is not really irony.  Such things
tend to attract each other.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Shuffle those deck chairs!

2004-10-05 Thread Vernon Schryver
> From: Harald Tveit Alvestrand 

> the MARID WG was shut down because it was unable to reach consensus.
>
> That is, indeed, a failure of the IETF. But not the one you argue.

On the contrary, recognizing the hopeless lack of consensus and
refusing to continue dancing to the tune of various interests was
an outstanding success of the IETF.

The failure by the MARID WG to reach consensus can be viewed as a
failure or a success.  Neither the IETF nor any other voluntary standards
organization can force standards on the world, as the ISO and governments
demonstrated with the OSI protocols.  When consensus cannot be reached,
it is wrong to continue, as the ISO also demonstrated with the OSI
protocols.  One of the worst things that committees (not just standards
committees) can do in such binds is to produce kitchen sink non-designs.
The essence of designing consists of making choices, and that consists
of saying "yes" to one or maybe few things and "no" to almost everything.
When consensus is impossible for making choices, the right response
is to stop spinning.

As has long been true, a bigger danger to the IETF than patents are
the special interests that try to use the IETF for ends unrelated
to ensuring the interoperability of network protocols.  The baloney
started by some SPF advocates and widely repeated by others about
the reasons the MARID WG was shut down are more harmful to the IETF
than embrace-extend-and-patent games, even if such games were in
play, which is not at clear.
 

Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: WG Review: Behavior Engineering for Hindrance Avoidance

2004-09-25 Thread Vernon Schryver
> From: [EMAIL PROTECTED] (Noel Chiappa)

> It's not at all clear to me that this was the wrong engineering choice on
> their part. If they didn't GC dead connections after some sort of timeout (and
> would it make any significant different whether it was 5 minutes, or 1 hour)
> it would consume resources and perhaps lead to problems. 
>
> Although I suppose they could impose an LRU algorithm on state blocks,
> instead. I'd have to think about it for a while, to see if there were other
> problems caused by not GC'ing inactive mappings.

Problems in doing it right?  hph.  More recent boxes from some of
the same vendors that have killed my ssh sessions do not kill my ssh
sessions despite days of inactivity.

That's not to say the newer boxes don't still have problems that can
only be solved--er--attacked by power cycling when they stop responding
every week or so.  My current tactic involves solid state relays that
driven by taking less than 5 ma from an RS-232 pin 20 and simple code
that looks for signs of illness in the junk.  (Yes, I know of far better,
UL certified implementations.  They cost more than the NAT junk.)

Besides, if "GC" refers to "garbage collection," my prejudice is that
you don't garbage collect active data.  I've had the junk kill active
ssh sessions.  Whether they run a timer or just have bugs that appear
after an hour or two, only someone with access to source could say.


> Furthermore, it's relatively easy to avoid the SSH session problem - my
> default login on Unix boxes has for many years now included starting this
> shell script in the backgound:
>
> while 1
> echo " "
> sleep 600
> end
>
> precisely to avoid having them shut down due to NAT timeouts (no matter how
> long I go without typing on them).

I try to avoid building failures into anything, especially if the
failures are obscure and intermittent.  That might keep an ssh session
alive despite boorken NAT junk, but depending on imponderables including
tty "driver" output buffering vs. application context switching on the
ssh server side, it will also occassionally break curses programs
including `top`, `sysstat`, `vi`, and `emacs`.

Having a standards committee write more documents that say "DON'T BE
STUPID!" sounds unlikely to solve many problems in NAT boxes, even if
committee "solutions" weren't the hallmark of the design and implementation
of garbage, probably including the junk NAT boxes at issue.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: WG Review: Behavior Engineering for Hindrance Avoidance (behave) (fwd)

2004-09-23 Thread Vernon Schryver
> From: Pekka Savola <[EMAIL PROTECTED]>
> To: Harald Tveit Alvestrand <[EMAIL PROTECTED]>

> > Well my house was behind 2 levels of NAT until last week.
> > Once i got rid of one level (the one I don't control), some of my 
> > operational problems with keeping SSH sessions up simply went away.
> > And SSH is a client-server protocol.
> > 
> > Don't underestimate the capability of badly implemented and/or configured 
> > NATs to make things go boom in the night.
>
> FWIW, I don't think this is something that can be fixed whatever
> guidance the IETF would give.  NATs will always need to keep some
> state for all the protocols, including TCP, and that state must be
> removed after a timeout.

Who said anything about necessary state and reasonable timeouts?  I've
seen more than one brand of consumer-grade box with NAT features that
could not be turned off, and that even in their most permissive settings
kill ssh sessions after an hour or two whether the ssh sessions had
been active or not.

Then there are notions of "DMZs," "game playing mode," and "VPN
support." What you might guess from feature-list bullet items
probably sound reasonable, but you'd probably guess wrong about
what the bullet items really mean in products delivered to users.

Harald misstated his injunction.  You should never underestimate the
capabilities of people to build things that make you say "no one would
do that!" and then defend their braindamage as valuable features.

Perhaps more NAT RFCs would help; they couldn't hurt much.  They'd be
a lot of work and would certainly be ignored by many people who consider
themselves designers.  I can't personally get enthused about telling
people things that are obvious and that will be ignored, like much of
what would go in new NAT RFCs.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: archives (was The other parts of the report....

2004-09-14 Thread Vernon Schryver
> From: Scott W Brim 

> WG status or become RFCs, people have to work very hard to find out if a
> particular draft is outdated.  This is a major factor in their depending
> on wrong information.  So, instead of trying to suppress information,
> which we can't, we should create and offer the meta-information people
> need to avoid mistakes.  

That should include the meta-information that the draft being sought
expired without being advanced.  Today it is hard for the uninitiated
to distinguish expired drafts that led to BCPs or standards track
RFCs from the expired drafts about encoding more than 4,294,967,296
addresses in 32 bits in order to avoid the hassles of IPv6.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: How IETF treats contributors

2004-08-31 Thread Vernon Schryver
> From: "Olaf M. Kolkman" 

> I'd like to expand on what Dean said: "Credit and attribution is about
> intellectual honesty [ and _courtesy_ ] not about copyright law".

Ok, but in the case at hand, 

  - None of the versions of Mr. Danish's proposal that I've seen
 credited Mr. Vixie's document or some others than preceded Mr.
 Danish's work.  I think that was due to ignornance and disinterest
 instead of malice, but it does reduce Mr. Danish's standing to 
 more credit than he already receives.

  - Mr. Danish's proposal was always an obvious non-starter for various
 reasons, including the requirement for defining new DNS RR types
 before it could be deployed or even tested.

  - Mr. Vixie's proposal is a lot closer to what I understand of the
 current MARID mechanisms than Mr. Danish's proposal.

  - It is ironic or something that few people who are openly concerned
 about credit for their work have enviable reputations.  They tend
 to be inventors of such as IPv8.

  - As far as solving the spam problem is concerned, RMX, SPF, the
 commercial proposals, the MARID proposals, and all other sender
 authentication mechanisms are more like IPv8 than IPv6.  Squashing
 the current modes of spam forgery will have just as much effect
 as the squashing years ago of the forgery of 8-digit user names
 @aol.com.  The new anti-forgery mechanisms are more general than
 the old regular expressions, but sender forgery is not a required
 aspect of spam.  Some large spammers have long been using domain
 names that they register, use for literally a few days, and
 discard.  For example, some time ago I grew bored with accumulating
 the domain names of one such operation in
 http://www.rhyolite.com/anti-spam/bin/group.cgi?group=151
 Some of the domain names of smaller (in counts of names) operations
 are in http://www.rhyolite.com/anti-spam/bin/group.cgi?group=197
 http://www.rhyolite.com/anti-spam/bin/group.cgi?group=30
 http://www.rhyolite.com/anti-spam/bin/group.cgi?group=140 and
 http://www.rhyolite.com/anti-spam/bin/group.cgi?group=165
 Spammers can deploy sender authentication mechanisms far faster
 than their victims.

  - This thread has the wrong subject.  It should be more like
"How some would-be contributors treat the IETF."


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: 'The APPLICATION/MBOX Media-Type' to Proposed Standard

2004-08-12 Thread Vernon Schryver
> From: "Eric A. Hall" <[EMAIL PROTECTED]>
> To: Tony Hansen <[EMAIL PROTECTED]>

> > The information about the mbox format being anecdotally defined is 
> > incorrect. The mbox format has traditionally been documented in the 
> > binmail(1) or mail.local(8) man pages (BSD UNIX derivatives) or mail(1)
> >  man page (UNIX System 3/5/III/V derivatives).
>
> I checked each of those and none of them seem to adequately describe the
> message or database format.


> Do you have a specific URL to a specific man page that you think would be
> appropriate and authoritative?

There are plenty of man pages and documentation for UNIX mbox formats.
Outfits such as Netscape have figured the stuff out (painfully simple
as it is) to make libraries to deal with local mailboxes.

However, that seems irrelevant unless an auuthority ceeds change control
for the UNIX mbox format to the IETF.  Never mind that the notion of
an authority that could exercise any authority over any UNIX mbox
format other than in its own source trees would be crazy.  There's no
law that says Dragonfly, NetBSD, FreeBSD, OpenBSD, Linux, IRIX, HP/UX,
AIX, etc. and so forth and so on must have a common mbox format or
that they cannot switch to something better, not withstanding things
like that Netscape library.  The old mbox formats are fine for a VAX-750
or 3B2, but are very bad ideas for more than a few hundred messages.

The most you could do is define your own interchange mbox format that
would by coincidence be extremely similar to one format such as the
System V or 4.3 BSD (I think I recall small differences between those
two), and tell implementors of your MIME type to convert into and out
of your format.

There is an overriding question.  Where is the market demand for
an IETF standards track RFC defining a UNIX mbox interchange type?
Who would use it?  
I can imagine "importing" and "exporting" mboxes, but not via SMTP.
Is anyone thinking about new code to convert among Netscape, Exchange,
and UNIX mbox mailboxes?  Doesn't enough of that code already exist,
and doesn't all of it use transport mechanisms other than SMTP?

Isn't the IETF supposed to be about on-the-wire bits and keep its
noses out of host data structures?


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: 'The APPLICATION/MBOX Media-Type' to Proposed Standard

2004-08-11 Thread Vernon Schryver
> From: "Eric A. Hall" <[EMAIL PROTECTED]>
>
> > If there are no defined semantics for the content of an application/mbox
> > part, how does the type differ from application/octect-stream?
>
> It provides an identifier for the content, so that transfer agents can
> perform specific tasks against the data (such as importing or searching a
> remote mailstore, or handing the data to an agent that knows what to do
> with it). The agent still needs to deal with content-specific issues like
> determining the EOL markers, applying default domains to relative
> addresses, and so forth. That's a pretty common separation of powers;
> application/postscript doesn't relieve the system from needing a
> postscript interpreter, and we leave things like ~version tags for the
> content agent to worry about instead of the transfer agent.
>
> > [regarding creating a spec for a mailbox file format]
> > 
> >>I'd like to see one, and I'd like to see whatever *NIX consortium is
> >>responsible for such things get together and define one.
> > 
> > At that point, would application/mbox be updated to refer to said spec,
> > rendering non-compliant some chunk of the previous uses, or would a new
> > content-type be specified?
>
> Given that the current proposal specifies minimal formatting (essentially
> being limited to the likely presence of some kind of From_ line), I'd
> think that a reasonably authoritative spec could be referenced in an
> update to this proposal. It would depend in large part on the depth and
> comprehensiveness of the specification, I'd imagine.

I cannot understand that except as saying that this document explicitly
and intentionally does not provide enough information for the recipient
of a message defined by the document to decode the message.  I understand
that statement as saying that the data is essentially opaque.

Isn't the point of any RFC on the standards track to promote
interoperability?  What good is an RFC that says "consult as yet
unwritten specifications from undetermined sources to handle the data
standardized by this RFC"?   Isn't the first sanity test of a standard
whether one can determine if an implementation is compliant?  As far
as I can see, Eric Hall is saying that compliance of senders and
receivers of such messages could not be determined until some.

Aren't there already enough opague application data MIME types?


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


RE: Email account utilization warning. (Final)

2004-07-07 Thread Vernon Schryver
> From: "Jasen Strutt" 

> Would you give it a rest already? Take your issue(s) up with the appropriate
> person(s) in a separate, mutually exclusive thread, and stop blasting the
> IETF list.  

I would rather not offend you, but please consider that good advice.
Please do not respond to those whose only interest is provoking a
response, any response from anyone and so being reassured they exist
and that people care about them, even if those concerns are negative.
Many of us know of their messages only when people respond to them,
and would rather not have that particular clipping service.

The differences among trolling, trollbaiting, countering trolls, and
everything else related to trolling are almost entirely in the minds
of the players.  To the rest of the world it is all useless, costly noise.


As for the Internet experts who still don't recognize phishing or
Microsoft worm noise when it hits their mailboxes, the Secretariat
should interpret complaints sent to the thousands of readers of this
list as requests to be unsubscribed with prejudice from all IETF mailing
lists, particularly when their complaints are double-encrypted in
base64 and HTML.  Such people are better served reading IETF mailing
lists through archives such as http://www1.ietf.org/mail-archive/web/ietf/

I promise to try to apply that policy to the minor, non-IETF lists
that I run.

I don't intend any criticism of those who choose on their own to use
archives instead of subscribing.  That's how I follow some mailing
lists that for various reasons I choose to not give my address.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: non-solution

2004-06-24 Thread Vernon Schryver
> From: Bill Sommerfeld 

> Substantially similar capabilities are present in all of the SMTP
> MTA's I'm familiar with.  If a message delivery attempt is rejected
> early, only envelope information is logged, but if the message was
> rejected in error, that's generally sufficient to identify what needs
> to be whitelisted.

Yes, but after you've had them, you find that facilities that log the
fewest few dozen KBytes of SMTP bodies are very valuable.  SMTP envelope
logs are unitelligible to most users, not only because they are terse
but because the SMTP envelope is a mystery to the fewer users that
know about it.  Delaying filter rejections until the SMTP DATA command
and so capturing the message body resolves a lot of complaints of the
form "Why did your idiotic spam filter reject that perfectly good mail
message?"  That can significantly reduce whitelisting requirements.

Logging bodies involve some obvious privacy hassles.  You must keep the
logs private.  The logs can have only censored copies of the envelope
so that recipients can't know who else was sent the same message.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: What exactly is an internet (service) provider?

2004-06-22 Thread Vernon Schryver
> From: Markus Stumpf <[EMAIL PROTECTED]>


> If you want to buy a car and ask if it has air bags and nobody can
> give you a definite answer, would you buy the car if it is important to
> you to have an air bag?

Buging a car with a feature with well defined characteristics is quite
different from buying Internet services which don't even have common
names.  Air bags, at least in the U.S., must do exactly what they do
even if that is known to kill people who are short.  Your "private
use" Internet service is basically whatever you feel like selling.
That you apparently call it "private use" instead of one of the more
common names is yet another symptom of the problem.


> If the ISP can't answer the question about improtant product details,
> why do you sign a contract with that provider? Because he is cheaper
> than others? Now what would most probably be the reason?

I'm in the insignificant minority that can ask the right questions
about IP service and recognize when I'm not getting answers, but I can
neither ask good questions about air bags, nor recognize nonsense
answers.  I don't know much about air bags except that they are bombs
in bags, which is as much as most sales people.  Still, I can buy a
car with an air bag and know I'm getting something that might do some
good (unless I'm short or sit too far forward) and meets a standard.
Without the standardization of "air bag," I could not.

We have a classic standardization problem that is affecting
interoperability.  The market has gotten ahead of the IETF and is
buying and selling a many quite different things all called "Internet
service."   It is more the job of the IETF to define standards
including a taxomony in this area than to define yet another MIB.

It is not the job of the IETF to try to stop anyone from selling
services that differ from what we used to get via NSF any more than
it is the job of the IETF to prevent the sales of NAT boxes and PPPoE,
no matter how nasty and evil NAT, PPPoE, and slum IP services are.  It
is right, proper, and necessary that the IETF has NAT and PPPoE
standards.  We should also have standards for your "private use Internet
service" as distinct from the services I bought 20 years ago, even if
you agree with me that "slum IP service sold by virtual slumlords to
fools" is as accurate and more clear than "client only, private address."



> > Since there are always providers, you can't sue simply because you
> > bought an account with limits you failed to clarify.
>
> This is the important part: "you failed to clarify".

Unless you are among the insignificant minority who knows the difference
between an ICMP Port-Unreachable and an ICMP Administrative-Prohibited,
you are incapable of clarifying.  Worse, unless you know more than all
available employees at many Internet services providers, you are
incapable of knowing whether you're being told nonsense.

Standards for the various flavors of "Internet service" would solve
those problems for both users and service providers.


> >   - which of the classes in 
> > http://www.ietf.org/internet-drafts/draft-klensin-ip-service-terms-02.txt
> > is closest to a "DSL Surf Accounts"?
>
> It is probably something like "Web connectivity" or "Client connectivity
> only", but I find the terms in the draft *very* fuzzy and overlapping.
> And no I haven't yet thought about it long enough to make suggestions ;-)

What about adding explicit lists of the packets that are (not) filtered,
frequency of DHCP reassignment, DSL PPP disconnections, and whatever?

The draft currently gives the equivalents of "driver's side", "passenger,"
"side impact air bags," for consumers but does not include the technical
stuff equivalent to the rules for air bags.  Something like the "Client
connectivity only" now in the draft is needed by consumers and front
line technical support people, but it is not sufficent for a provider
(or a government) to determine compliance.

Maybe this needs a WG.


> In general I support all what you said to some extent.

In that case it would be nice if you would not write as if you vehimently
opposed the notion of standardizing terms for classes or kinds of
Internet service.  Except for that single sentence, I have the impression
that you agree with the individual from Japan that the whole idea of
the draft is entirely wrong and destructive.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: What exactly is an internet (service) provider?

2004-06-21 Thread Vernon Schryver
> From: Markus Stumpf 

> You have a contract. This should be listed in the contract and you
> can read it before signing it. If the contract doesn't talk about
> limits and they do limit you, sue them.

Sue on what grounds?  Who says that Internet service has no limits?
All reputable service providers have terms of service that include
limits, starting with something about network abuse.  (Never mind 
how well those limits are enforced.)  Many service providers limit
their users to not running "servers," but good luck finding someone
who knows what they mean by "server." 
Since there are always providers, you can't sue simply because you
bought an account with limits you failed to clarify.


Trying to find first line technical support people (never mind sales)
at a consumer grade ISP who knows has any idea what sort of filtering
their employer does is hopeless.  It's generally foolish to expect to
find someone who even understands the question.


 > (And, btw, some of the statements are incorrect.
> > - Some providers intentionally cut their customers
> >   off after 24 hours in order to force them to have
> >   a new IP address.

(Some "DSL modems" including the Actiontec 1524 kill TCP connections
after an hour or two all by themselves)


> You have to look at what they sell. They sell "DSL Surf Accounts".
> Surfers usually aren't online for 24 hours without interuption and
> they don't have problems with the interupt in "normal use". If you get a
> "business access" you will not have the problem in most of the cases.

I've not seen anyone selling "DSL Surf Accounts," but I've never looked,
and certainly not in Germany.

In any case, 
  - which of the classes in 
http://www.ietf.org/internet-drafts/draft-klensin-ip-service-terms-02.txt
is closest to a "DSL Surf Accounts"?

 - Should one of those four categories be renamed "DSL Surf Accounts"?

 - Should a new class named be "DSL Surf Accounts" be added?

 - exactly what filtering is imposed on a "DSL Surf Account"?  Is
 port 25 filtered?   22?  135 and 138?  Some or all UDP?  ICMP?

 - and the same questions for "business access."

Telling people to read contracts ISP today is disingenuous.  If the
IETF would define "DSL Surf Accounts" and "business access," then you
could hope to ask for one or the other.  You might then sue if you
didn't get whichever you wanted.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: What exactly is an internet (service) provider?

2004-06-20 Thread Vernon Schryver
> From: Ole Jacobsen 

> assigned something that looked like a "real" routable IP address, but
> as a consumer of paid-for Internet service (that works) is there any
> reason (apart from religion) that I should care??

If you have no reason to care, then you shouldn't, except that Full
Internet connectivity is significantly more expensive to provide.  It's
not the bits that are more expensive, but the people who deal with the
naughty bits that come with Full Internet Connectivity.

If you have a technical reason to care, perhaps because you need to
run an application not understood by the NAT systems of your hotel,
then you ought to be able to distinguish what you need from what you
are getting while talking to people who have never heard of the IETF.
Perhaps you would like to run applications that talk to systems back
at the factory and that use protocols that don't always play with NAT.
Maybe you are a system admninistrator who needs to check your DCC servers
(anti-spam system), despite your hotel's filters against UDP port 6277.
Perhaps you need to check your DNS servers despite your hotel's filters
and redirection of port 53 or all UDP.  Maybe you just need SSH and
didn't remember to set an sshd listening to port 443 before you left.
Maybe you need to talk to port 25 on your SMTP server to see if it is
sick.  Talk about ALGs, UDP, TCP, and even NAT is cybercrud noise to
a hotel desk clerk.  However, you might someday be able to say "please
upgrade the Internet service for room 1234 from Web Connectivity to
Full Internet Connectivity."

You don't expect airline ticket agents to understand or care what
you're talking about if you go on about stall speeds, rates of sink
or climb, and so forth, but asking for a ticket on a "communter airline"
instead of a "wide body" can be useful.

There is absolutely no chance of less filtering in hotels, 802.11 hot
spots, etc.  There will be terms that distinguish those kind of
Internet service from what many of us consider the real thing.  The
issue is whether we must wait for the market to provide equivalents
to "ham radio," "CB radio," "satellite radio," "AM," "FM," "TV," and
"cell phone."  Arguing against the idea of draft is like saying
"the term 'electormagnetic radiation' is good enough."


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: What exactly is an internet (service) provider?

2004-06-20 Thread Vernon Schryver
> From: Masataka Ohta <[EMAIL PROTECTED]>

> As you introduce "Web connectivity", such people (including
> mobile operators in Japan) claim that they are ISPs, because
> they are offering web connectivity over X.25 without IP. 

WebTV is functionally the same as web connectivity over X.25 without
IP.  Most of the world thinks that part of Microsoft is an "ISP."
Nothing the IETF or even governments could do would change that.

>  That
> is, "The definitions proposed here are clearly of little value
> if service providers and vendors are not willing to adopt them."

Those involved call the services of WebTV either "WebTV" or "Internet
service."  Professionals (including salespeople) who are not employed
by Microsoft in the WebTV operation, especially competitors, would be
happy to call it "Web Connectivity" instead of "WebTV."  Even Microsoft
might like "Web Connectivity" to limit dilution of its "WebTV" trademark.

Thus such concerns are irrelevant to "Web Connectivity."
You'd do better attacking one of the other categories.


> A major mistake is that you are forcing people within IETF
> use your terminology even though you are fully aware that
> "some members of the IETF community that some of these
> connectively models are simply "broken" or "not really an
> Internet service"".

No, the major mistake is thinking the various classes of IP service
do not exist or that you can keep people from naming them with short
English words or phrases.  As the various classes become more popular
and widely recognized, the world will invent and use terms for them.
No one but pedants and marketers will care which words or phrases are
ultimately chosen.  The IETF can speed up and slightly steer the choice,
but no one can prevent it.  We got to choose the word "Internet" but
did not entirely control the definition (recall small 'i' "internet").
We lost on "intranet" "catnet" and many other terms.

The useful things that this draft might accomplish are:

 - make the choice of terms happen within or a year instead of the
years that the current definition "Internet" needed.

 - make the people who have more control than the IETF over the choice
of terms for the emerging clases Internet service think about the
words they want.  They are in marketing organizations.

Consumer ISPs are not offering the kinds or classes of IP service that
I would want.  It is insane to ignore that reality.  It would be little
better to insist that governments will not eventually get involved or
that there will be no common terms for the various common classes of
IP services and ISPs.



]  From: Masataka Ohta <[EMAIL PROTECTED]>

]  > But if we had a precise definition and a taxonomy of the 
]  > different classes of ISPs,
] 
]  Then, all the IP and non-IP providers can now leagaly (some
]  illegaly a little beyond the scope of so generous RFC) say
]  they are ISPs and most end users have no chance to know the
]  differences of the taxonomy.

No, 
  - Whatever happens with this draft, it will not have anything like
 the force of law.  The IETF does not have powers over terms
 equivalent to the groups that name species, chemical compounds,
 and astronomical bodies.

  - all the IP and non-IP providers in most of the world can now
 legally call themselves "ISPs."  The IETF could not change that.

  - The terms the world eventually uses for the various classes of IP
 service and types of ISPs will differ from the consensus of the
 IETF.  This draft can only crystalize the choices.  Seed crystals
 influence the shape of a solid, but do not control it.

  - the main reason "end users have no chance to know the differences"
 delineated by the taxonomy is that the taxonomy does not yet
 exist.  When it exists, users will know as much of it as they
 care to, just as they now know or don't know the differences among
 "web," "Internet," and "telephone." 

 Users who do not distinguish between "web" and "Internet" also
 think "WebTV" is Internet service.  IETF cannot change that.  That
 VoIP, text messaging, and cell phones are changing the definitions
 of "telephone" and "telephone company" is part of my point.

Much of the good this draft might do will be done simply by discussing
in public differences among IP service classes and choices of terms.
After the taxonomy is crystalized, it will be out of the IETF's control.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: What exactly is an internet (service) provider?

2004-06-19 Thread Vernon Schryver
> From: Mark Smith <[EMAIL PROTECTED]>

> > So it would be good to have some kind of 
> > standard or definition, what exactly an 
> > internet provider has to do and what to refrain 

> I tend to come up with the answer to your question the following way :
>
> (Q) What is the "Internet" ?

I prefer the definitions of various kinds of "Internet service" in
http://www.ietf.org/internet-drafts/draft-klensin-ip-service-terms-02.txt

Today, providers that sell sevices to users of Microsoft systems and
do not pay exquisite attention to which of them are infected with the
latest worms and viruses must block and redirect port 25 to their own
SMTP servers and so not provide what that draft calls "Full Internet
Connectivity."


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Response to complaint from Dean Anderson (fwd)

2004-06-18 Thread Vernon Schryver
> From: "Stephen Sprunk" 

> While I disagree with Dean in general and also with most of his current
> argument, I think it is a reasonable request that IETF "officials" be given
> an @ietf.org email alias and that those aliases be published for use in
> situations such as this.

Exactly what is this situation?  Why can't Mr. Anderson say whatever
he needs to say to Mr. Austein here or via a relevant working group
mailing list?


> It's probably going too far to require sending mail from those aliases;
> despite Dean's faults, he's smart enough to use the published alias if he
> gets a bounce from someone's personal or work address.

How would Mr. Anderson use a private IETF alias belonging to Mr. Austein?
If sending a polite, IETF-relevant private message from one IETF
participant were important to Mr. Anderson, he would have long since
sent his message in public via an IETF mailing list.  Any complaints
or other thoughts Mr. Anderson has about a working group, an AD, other
IETF participants, or whatever would have long since been forwarded
via a friend, sent to this mailing list, the IAB, or via the official
appeals process.

There is an important issue here separate from Mr. Anderson's concerns.
Why hasn't Mr. Anderson been told to say whatever he wants to say in
an IETF mailing lists or to the relevant IETF role accounts?  Why has
the notion that individuals have rights enforced by IETF rules to send
private mail to other IETF participants been consistently supported
or at least never refuted?  Mr. Alvestrand's recent message only
disavows the IETF's interest private filters.  What RFC imposes an
obligation to receive private (not to mention unfriendly) mail on ADs,
WG chairs, or any IETF participants? 

Private IETF aliases for IETF officials would be invitations for
harassment and abuse, and it is important that IETF participation not
be contingent on tolerating harassment or abuse.  Harassment and abuse
must be defined by the targets of mail for deciding whether to accept
future private messages.  IETF participants must be allowed their own
definitions of acceptable private mail, no matter how wrong they seem
to mail senders or third parties.  Filtering messages to IETF mailing
lists is justifiably controversial, but private mailboxes are none of
the IETF's business, and not merely because of scaling problems.

I care about this issue because other individual IETF and ASRG
participants have threatened or started attacks on me similar to Mr.
Anderson's attack on Mr. Austein, because my mail systems are configured
to reject their private (not sent via IETF reflectors) mail.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Problem of blocking ICMP packets

2004-06-16 Thread Vernon Schryver
> From: [EMAIL PROTECTED] (Mike S)


> So the fact is, by blocking ICMP, such ISPs have broken IP connectivity, 
> and can no longer claim to be providing Internet (IP) service.

I agree, but which flavor of other than "Full Internet Connectivity"
would it be?  Does
http://www.ietf.org/internet-drafts/draft-klensin-ip-service-terms-02.txt
need a category of "Public address, stupid filtering"?
Or is "Client only, public address" close enough?

Many people who install or defend such stupid filters are offended by
the observation that they are not doing real IP.  Labelling such
filtered access as what it is or at least something other than "Full
Internet Connectivity" would reduce its popularity.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-06-02 Thread Vernon Schryver
> From: Andrew Newton <[EMAIL PROTECTED]>
> To: Paul Vixie <[EMAIL PROTECTED]>

> > If there's a more blatant example of rubber stamping in the history of
> > IETF, then I hope a better historian than I can share the archives with
> > me.
>
> If there's a more blatant example of mischaracterization in the history 
> of IETF

Whether it is an example of rubber stamping can't be determined until
we see the I-D.

Besides, the implication that rubber stamping by the IETF is a bad
thing is wrong.  When the IETF has worked well, it has applied its
stamp of approval to things developed, tested, and initially deployed
outside the IETF.  IETF working groups that try to design things
never do better than can be expected of standards committees, and
that's a step below the sad results of ordinary committees.  The
IETF is often competent to determine and publish the choice of the
market; it is incompetent at inventing.

MARID will provide good service.  For years, the unthinking and snake
vapor oil vendors insisted that "redesigning" SMPTP with authentication
would solve the spam problem.  Now that we have SMTP-TLS, SMTP-AUTH,
S/MIME, and PGP, they have changed their songs to praise sender
authorization.  Sender authorization cannot fix the spam problem, but
MARID will soak up a lot of their noise for months (or years).
When an official sender authorization protocol fails to end spam by
the Sept. 2004 (see http://ietf.org/html.charters/marid-charter.html),
maybe we'll get to hear a new chorus.  Maybe a few will stop praying
for the salvation of business models that depend on abusing the commons
and switch business models.  (e.g. actually deal with abusive users)


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
> From: Mark Smith <[EMAIL PROTECTED]>

> > Yes, spam filtering can be quite effective.
>
> Not using spam filtering ... I don't like the chances of false
> positives or negatives.

Today either you filter spam, or you get practically no mail from
strangers.  If your address is exposed for legitimate mail from
strangers, then lots of spam will be sent your way.  At least 50% and
by some accounts more than 80% of all mail is spam.  If you get the
10 legitimate message/day typical of a non-technical user, and your
spam load is 80%, then you also receive 40 spam/day.  My various layers
of filters averaged 521 spam/day for the last 40 days.

Either your computers filter using blacklists, whitelists, various
content filters, and/or other mechanisms, or you filter spam manually.
40, not to mention 521 spam/day are too many to filter manually without
frequently overlooking legitimate mail.  Those are false positives.
Thus, if your mailbox is open to legitimate mail from strangers, then
you have false positives, whether they are human or computer errors.


> My idea is similar to the idea of abandoning a phone number if
> you get too many prank calls. Similar to abandoning a phone
> number, when I abandon an email address, I don't even see the
> spam traffic - I'm not filtering it out.

On the contrary, legitimate messages sent to your abandoned mailboxes
are false positives.  They are filtered out.


> > > I would find not be able to run my own MTA,
> > > unfortunately on a dynamically assigned IP ADSL service, as
> > > that is all I can afford, to be far more costly than the very
> > > negligable reduction in spam I would receive if TCP port 25
> > > was blocked by ISPs.
> > 
> > I cannot understand that as other than a demand that I
> > subsidize your Internet service.
> > 
> > If you think that everyone has the right to run their own MTAs,
> > why don't you insist that Full Internet Connectivity be free?
>
> I struggle to understand how you make such a dramatic jump in
> "position" (I can't think of a better way to describe it at the
> moment). I can't see the logical progression from being able to
> run an MTA, to getting Internet connectivity for free. 

I thought you were repeating the too familiar whine that it would be
Wrong and Evil to be forced to choose between paying for Full internet
Connectivity and having port 25 blocked.  The familiar claims from
others about unblocked port 25 for $30/month being a fundamental human
right of communication are irritating.  Those making those claims want
only a price they can afford, instead of the $0.00 price appropriate
for a fundamental human right.




} From: Mark Smith <[EMAIL PROTECTED]>

} I'm just waiting for the next Outlook based (or alternatively, a
} socially engineered executable based) worm that uses legitimate
} email addresses and "legitimate" (in the sense of
} "legitimate because TCP port 25 is not blocked") MTAs to send out
} spam. 

That is such an obvious countermeasure that you must assume it it
probably is already in use.

}   Blocking TCP port 25 on dialup accounts (or any other
} Internet service) will have no effect in mitigating these types
} of attacks. 

That is mistaken.  Spam, worms, and viruses sent through ISP mail
systems can be filter.  I understand that worm and virus filtering is
quite effective, but don't really know.  Filtering spam from an ISP's
own customers can be extremely effective.  For example, an ISP can
rate-limit customers to 10 or 20 messages/day, and require customers
to make arrangements for higher rates.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
> From: Nathaniel Borenstein <[EMAIL PROTECTED]>

> This is a remarkably reasonable proposal, and I would have no objection 
> to it (just a fear that ISPs might make it unnecessarily hard to get it 
> opened, but they tend to make everything hard).  Heck, I might not even 
> mind paying an extra dollar or two per month to have it open.  As long 
> as consumers have an option, I'm fine with this as a default.  Good 
> idea.  -- Nathaniel

> > I think the easy solution is just to block port 25 unless someone asks
> > for it to be opened. Average users have no idea what
> > port 25 does or even what TCP is, so they won't care.

and how does that proposal differ from what I wrote Thursday?:

]block port 25 for all types of IP
] service except the one that draft-klensin-ip-service-terms-01.txt calls
] "Full Internet Connectivity." 

Mr. Borenstein recently wrote the following apparently about that:

} ... Grocery stores probably have the right to require their
} customers to wear formal attire, but if they don't have a good
} reason to do it, they're going to drive away customers no matter
} what the outcome of any philosophical debates.  My expectation is
} that ISP's who implement anti-spam measures that are both intrusive
} and ineffective are going to drive away customers as long as there's
} a better alternative out there, and I'd be inclined to simply let them
} do it unless they're in near-monopolistic market positions. The latter
} exception is important, however; I'd certainly be upset if my cable
} provider did it, because I don't have any good alternatives.

I don't mind in the least if Mr. Borenstein has changed his mind but
does not wish to say so.  I also don't care if he prefers the ancient
statement of the old idea offered by Perry Metzger.

I will mind if Mr. Borenstein resumes his campaign against the
supposed evils of blocking port 25.  Such unfounded complaints give
aid and comfort spammers and to marketing departments resisting
blocking port 25 for customers who aren't competent to use it.

Until consumer grade services providers such as Comcast do something
to stem the floods of spam they are sending, other organizations will
stem their incoming floods with bad tactics such as rejecting mail
from IP addresses with reverse DNS names containing "dsl".


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
> From: Nathaniel Borenstein <[EMAIL PROTECTED]>

>
> On May 30, 2004, at 2:27 PM, Vernon Schryver wrote:
>
> > So what ISP was blocked?
>
> What are you, the ISP police?  Not that it's any of your business, it 
> was X0 DSL 

Your repeated, unprovoked public complaints about the blocking that
affected you made XO's identity not the business of everyone who cares
about such issues.  Then there were your comments about "near monopolies."

>and I paid just under $100/month and hosted my server at 
> home; it was blacklisted as part of a larger block of IP addresses 
> beyond my control.  When I moved physically, I took the opportunity to 
> move my server to a hosted service for guppylake.com, and NOW am on a 
> normal cable modem at home.  I've been associated with the domain 
> guppylake.com for almost twenty years, however, and I rather like to 
> continue sending mail from that address even though I now obtain my 
> bitstream from Comcast.
>
> But I imagine that X0 is also on your list of ISP's-that-are-evil, so 
> it was my fault for using them in the first place.

That reference that any list of mine of evil ISPs is disingenuous.
Besides, I bet you know as well as I do that RoadRunner probably
blocked that larger block of addresses because of lots of spam.
For a while XO was having difficulty acting against its spamming
customers.  I've not noticed such complaints for a while.

It does sounds as if you have made a habit of hiring ISPs without
exercising due diligence.  If that is true, you might blame your
parents but not me.   I don't blame you for the fact that until
recently I've always paid much more than $100/month to host my
vanity domain, but then it has not been blacklisted.  I have moved
it more than once when I lost confidence in an ISP.


> > Why do I suspect you are being disingenuous
> > and that it was a $30/month account?
>
> I don't know, perhaps because you have a suspicious nature and are 
> quick to assume the worst about people? 

Instead of using ad hominem, you might recall your own words such as

]  ... near-monopolistic market positions. The latter exception
] is important, however; I'd certainly be upset if my cable provider
] did it, because I don't have any good alternatives

Then there is your coyness about XO's identity.  Why didn't you come
out and name it at the start?


>  I am not really the sort of 
> person who tells lies on an IETF list just to make a point.

Where have I lied?  For your part, you have repeatedly intentionally
misrepresented my words and generally been disingenuous.  For example,
your words above imply that I had no business asking which ISP was
involved in the blocking you have repeatedly complained about.  You
made the identity of the ISP a relevant point by your demands that I
stop "random speculating" as well as by your repeated complaints about
RoadRunner's blocking.


> For my part, I am sufficiently paranoid to fear that ISP's might 
> advocate port 25 blocking because they hope it will lock people into 
> email addresses that are less portable (e.g. [EMAIL PROTECTED]).  But 
> when they give other reasons, no matter how irrational I may think they 
> sound, I try at least to give their sincerity the benefit of the doubt. 

That is also disingenuous.  While I share concerns about locking
people into addresses, you know that blocking port 25 is unrelated
if people use some flavors of what you called "a more spam-resistant
infrastructure for SMTP message submission," such as SMTP-SUBMIT,
or simple "web mail."

Why don't you give RoadRunner's sincerity the benefit of the doubt
about the blocking of your XO address?  Did you check any of the well
know resources such as news.admin.net-abuse.sightings for evidence of
spam from your neighbors or did you just start complaining about evil
"near-monopolies"?

Do you have any substantive responses to my counters against your
claims that port 25 blocking is useless and harmful?  I claim 

 - port 25 blocking by $30/month providers would block little more
  than the spam that might someday be blocked by Caller-ID, SPF, etc.  

 - the legitimate mail blocked or false positives caused by port 25
  blocking is similar or less than that for Caller-ID, SPF, etc.

 - port 25 blocking can be implemented today piecemeal by individual
  providers on the sending side in routers and on the receiving side
  using blacklists, while Caller-ID, SPF, etc. must wait at least 5
  or 10 years until most of the Internet implements them.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
> From: Nathaniel Borenstein <[EMAIL PROTECTED]>

> Please stop this random speculating.  The ISP that was blocked is not  
> my current ISP (I moved last fall), so none of this is relevant. 

So what ISP was blocked?  Why do I suspect you are being disingenuous
and that it was a $30/month account?

>   And  
> if I'm dealing with Hurricane now, well, that's the first I'd heard of  
> it, since I'm downstream on a hosted service and never bothered to  
> check who all my upstream providers are. 

As always, the buyer must beware.  Adopting the terminology in
draft-klensin-ip-service-terms-01.txt or similar would help.  Hurricane
Electric could say that its IP addresses may not be optimal for SMTP
clients but are useful for SMTP, HTTP, and other servers.


>   Are you seriously asserting  
> that I deserve to be blocked if I don't confirm that all my upstream  
> ISP's are complying with J. Random Blacklist?

That is a obviously an intentional distortion of my point.  However,
now that you "ask," then yes, you do "deserve" to have your mail
blocked if you buy service from a provider with a reputation for
being friendly to spammers.  Your failure to exercise due diligence
does not impose an obligation to accept more spam on others.  You
"deserve to be blocked" more than the rest of us "deserve" to receive
the spam that helps support Hurricane Electric.


> However, you are right that my current laptop configuration is one of  
> many that won't work when Caller-ID or SPF records come into use for  
> the domain guppylake.com.  At that point, obviously, I will change my  
> laptop's configuration.  My sincere hope is that by the time that  
> happens, I will have a better option for smtp submission.  Blocking  
> port 25 will most assuredly *not* help that problem.  

On the contrary, Caller-ID and SPF would not stop as much spam without
collateral damage as blocking port 25 from TimeWarner, Comcast, and
other $30/month service providers.  Caller-ID and SPF cannot have
significant effects against spam for at least the 5-10 years before
most domains support them.  Caller-ID, SPF, and the rest would in
effect block port 25 about the same IP addresses as simple port 25
blocking of $30/month accounts, in the unlikely event that Caller-ID
etc. ever have any effects.  If you would switch to SUBMIT, you would
not care if your TimeWarner account is port 25 blocked, except that
you might expect TimeWarner's prices to drop for needing even less
abuse-desk staff.  On the other hand, port 25 blocking can be done
today and has immediate good effects against spam, as well as worms
and viruses.

Of course, port 25 is not a panacea for spam, worms, or viruses.
Of course, some viruses and spammers would adopt the obvious
countermeasure of using the ISP's servers, but many would not.
Besides, the ISP is could filter or at least rate limit, and there
are no easy countermeasures for spammers against that.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
> From: Mark Smith <[EMAIL PROTECTED]>

> > people to monitor and deal with their abusive customers.  That
> > is why many of the providers of those $30/month accounts submit
> > their own IP address blocks to various "dynamic" backlists or
> > block port 25 themselves.
>
> Do you have more information or references regarding your
> statements above? I'm interested in any studies etc.

The easiest study is to look at your own spam load.

The most recent public study or reliable comment I'm aware of 
was the statement from Comcast about how much spam they send in
http://news.com.com/Attack+of+Comcast%27s+Internet+zombies/2010-1034_3-5218178.html

See also http://www.senderbase.org/?searchString=comcast.net&searchBy=domain
and http://www.senderbase.org/

(I do not believe SenderBase's numbers are accurate to better than
several percent of total Internet mail or tens of millions of
msgs/day.  I know that their numbers for the domain names and IP
addresses I control are nonsense, but my domains and addresses are
directly involved with 5 or 6 orders of magnitude less mail than
those listed in http://www.senderbase.org/ )



> I would find TCP port 25  being blocked by my ISP to be
> unacceptable. It isn't the Internet anymore. The Internet's job
> is to shunt around IP packets, irrespective of what is in them.

That is inaccurate.  From ancient days it has also been the job
of people running things to prevent traffic that would violate
various agreements, AUPs, TOS, and so forth.


> My anti-spam measures are so effective that I can't remember the
> last spam I received. 

Yes, spam filtering can be quite effective.  I say this based in part
on the results of the DCC, which handled about 136,000,000 mail messages
on May 26.  However, the effectiveness of input filtering is irrelevant
to the need to deal with spam at its sources.

>   I would find not be able to run my own MTA,
> unfortunately on a dynamically assigned IP ADSL service, as that
> is all I can afford, to be far more costly than the very
> negligable reduction in spam I would receive if TCP port 25 was
> blocked by ISPs.

I cannot understand that as other than a demand that I subsidize your
Internet service.

If you think that everyone has the right to run their own MTAs, why
don't you insist that Full Internet Connectivity be free?


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
>Received: from mail.optistreams.net (206-169-2-196.gen.twtelecom.net [206.169.2.196])
>by calcite.rhyolite.com (8.12.11/8.12.11) with ESMTP id i4UG8bio077225
>for <[EMAIL PROTECTED]> env-from <[EMAIL PROTECTED]>;
>Sun, 30 May 2004 10:08:38 -0600 (MDT)

> From: Nathaniel Borenstein <[EMAIL PROTECTED]>

> > Mr. Borenstein and others like him expect the rest of us to subsidize
> > their $30/month connectivity by dealing with the network abuse of his
> > fellow customers, because they find $30/month comfortable.
>
> Just for the record, I spend plenty more than $30 per month on Internet 
> connectivity, as does my employer.  My views on this have nothing to do 
> with the cost of my Internet service, which is why I said nothing about 
> such costs. Since your message seems to be based entirely on a 
> misguided assessment of my motives, there's not much else in it that 
> needs to be answered.  (We could argue forever about what constitutes a 
> monopoly, but I doubt any minds would be changed.)
>
> Port 25 blocking may be sometimes necessary simply to preserve the 
> integrity of a network under heavy spam attack. 

Perhaps I am mistaken, but I believe that Mr. Borenstein has mentioned
his costs in the past.  His recent talk about the supposed "near
monopolies" of "cable providers" makes absolutely no sense except
in the context of $30/month services.

The copy of his message appears to have been sent to my SMTP server
from one of those $30/month accounts.  Mr. Borenstein certainly has
complained about some sort of blocking of his mail.  I think that
blocking involved a cable provider account.  However, if the blocking
that bothered him was not from his TimeWarner acocunt, then perhaps
this is relevant:

traceroute to guppylake.com (64.71.173.70), 64 hops max, 44 byte packets
11  ix-8-0.core1.SanJose.teleglobe.net (66.198.97.18)  59.309 ms
12  pos2-3.gsr12416.pao.he.net (66.220.13.42)  119.297 ms
13  pos2-0.gsr12012.fmt.he.net (64.62.249.121)  61.106 ms
14  64.71.173.70 (64.71.173.70)  62.479 ms

traceroute to thehideout.net (64.71.176.110), 64 hops max, 44 byte packets
13  pos2-0.gsr12012.fmt.he.net (64.62.249.121)  60.953 ms
14  64.71.176.110 (64.71.176.110)  61.028 ms


Hurricane Electric has earned a reputation as a provider that avoids
dealing with reports of spam sent by its customers except by
forwarding them reports to its customers.  See
http://groups.google.com/groups?scoring=d&q=+%22he.net%22+group%3A*email
http://groups.google.com/groups?scoring=d&as_epq=Hurricane%20Electric 
http://groups.google.com/groups?scoring=d&q=+%22he.net%22+group%3A*abuse*

Juging from http://spews.org/html/S2100.html 64.71.173.70 is currently
listed by SPEWS at level 2.  (I do not use or advocate SPEWS' list;
I'm pointing out SPEWS' data only to support my point about the supposed
unfairness of the blocking of Mr. Borenstein's mail.)

>  But I believe that a 
> long-term solution is possible that will be both more effective and 
> less restrictive.  My own focus is on that long-term planning, and I 
> just can't see port 25 blocking as anything more than a rather 
> problematic stopgap measure in advance of a more spam-resistant 
> infrastructure for SMTP message submission.

People have been talking about such ideas since Cyberpromo's day.  The
closest thing that has ever been implemented and proven effective is
blocking port 25 SYNs from blocks of IP address that have a better
than 99.9% probability of sending only spam and worms, namely the IP
addresses of spammers and of "dynamic address."  In practice the latter
is synonmous with block port 25 for $30/month accounts.

Blocking port 25 from $30/month accounts does not affect SMTP-SUBMIT,
which is the IETF standardized "spam-resistant infrastructure for SMTP
message submission."   One must wonder how Mr.  Borenstein's mail could
be blocked by the sort of blocking he has repeatedly complained about
if he used SMTP-SUBMIT to reach reputable MTAs.

Note also the disconnect between the reverse-DNS of Mr. Borenstein's
SMTP client and his envelope Mail_From and header From: values,
and the lack of DNS RRs supporting any of the proposals for DNS-based
sender authentication.  According to the advocates of those mechanisms,
Mr. Borenstein's is "forging" his messages.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
> From: Nathaniel Borenstein <[EMAIL PROTECTED]>

> This would be a very interesting philosophical argument if in fact what 
> we were discussing was something that could take a significant bite out 
> of spam.  In the absence of such an ability, however, the real question 
> is whether user accounts should be crippled in the name of spam 
> fighting when the crippling *isn't* going to help significantly with 
> the spam problem.  And that's not a philosophical debate, just a matter 
> of common sense.Grocery stores probably have the right to require 
> their customers to wear formal attire, but if they don't have a good 
> reason to do it, they're going to drive away customers no matter what 
> the outcome of any philosophical debates.

Grocery stores frequently requires shirts and shoes.  A better analogy
is that grocery stores that sell alcohol or other regulated drugs are
required to pay substantial extra costs.  Complaints about monopolies
in the beer and wine trade are laughed at, as are demands that pharmacies
in grocery stores not charge prices high enough to pay their pharmacists.

As Mr. Borenstein knows, a substantial fraction and probably most spam
is current sent using $30/month consumer accounts.  The spam that is
not sent using such accounts is very easily blocked.  As he knows, if
providers of those services would either filter port 25 or terminate
customers running trojan zombies, that spam would stop.  Providers of
those $30/month accounts have made clear that they cannot afford to
hire the people to monitor and deal with their abusive customers.  That
is why many of the providers of those $30/month accounts submit their
own IP address blocks to various "dynamic" backlists or block port 25
themselves.

Stopping trojan zombies would not end the spam problem, but it would
be a major improvement.  You can see the truth of that in the results
of UUNet's imposition of port 25 filtering on its dial-up resellers.
It would also significantly improve security problems caused by Microsoft
systems, because viruses and worms could be filtered by ISP SMTP servers
from outgoing mail.


>My expectation is that ISP's 
> who implement anti-spam measures that are both intrusive and 
> ineffective are going to drive away customers as long as there's a 
> better alternative out there, and I'd be inclined to simply let them do 
> it unless they're in near-monopolistic market positions.  The latter 
> exception is important, however; I'd certainly be upset if my cable 
> provider did it, because I don't have any good alternatives.  -- 

It is dishonest to imply that cable TV providers have near-monopolistic
market positions in providing Internet service.  They often have near
or true monopolies in providing cable TV service.  However, in no U.S.
market do cable TV providers have anything like monopolies in providing
Internet service.  They may have monopolies in providing some of
services at $30/month, including "Web connectivity," "Client only,
non-public address," and "Client only, public address."  Mr. Borenstein
can buy Full Internet Connectivity from many service providers, although
not at $30/month.

Mr. Borenstein and others like him expect the rest of us to subsidize
their $30/month connectivity by dealing with the network abuse of his
fellow customers, because they find $30/month comfortable.  That position
would be less despicable if they would demand free Internet connectivity,
since that is the only price that billions of other people can afford.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
> From: =?ISO-8859-1?Q?M=E5ns_Nilsson?= <[EMAIL PROTECTED]>

>
> > block port 25 for all types of IP
> > service except the one that draft-klensin-ip-service-terms-01.txt calls
> > "Full Internet Connectivity." 

> I have a *very* hard time seeing an IETF document (or discussion on the
> list) coming even close to endorsing this blocking malpractice. It does not
> scale (forcing people to use central, probably misconfigured, relays, and
> it is IMNSHO thorougly bad engineering to try solving L8 problems on L3/4.

So say each of you who feel you have a right to pay less than what
providing full internet connectivity costs.   Full connectivity is
priced at about $100-$250/month, and plausibly and apparently costs
less to provide.  The $20-$30/month services provided by the providers
that cannot afford real abuse desks or local technical support are not
really Internet service, no matter that you might wish.

What I find really strange thing is the price point chosen for this
divinely ordained right.  Why is $300-$400/year ok but $200/month is
a violation of your fundamental human rights?  Why is paying what Full
Internet Connective costs evil and wrong, but it is ok to pay more
than the $300/year that people in some parts of the world live on for
a whole year?

The scaling argument is obvious nonsense.  If having $30/month
customers use SMTP servers provided by their ISPs did not "scale",
then it would not "scale" to have those same customers use the
routers provided by those same ISPs.

If your ISP is incompetent at configuring an SMTP server, then whose
fault is it that you continue to buy bad service?   Why don't you treat
your incompetent locl provider of "Client only, non-public address"
or "Client only, public address" as a provider of those services and
use them only to connect to a system where you get competent Full
Internet Connectivity?

If ISPs and their customers were willing to deal with spam, including
immediately and permanently terminating customers that send any spam,
regardless of whether they are paid for their efforts (e.g. operators
of trojan zombies), then there would be no spam problem.

Why should the rest of us subsidize your ISP and your connectivity by
accepting SMTP/TCP/IP SYNs from your neighbors that are more than 99%
likely to be spam from trojan zombies that your ISP cannot be bothered
to terminate?


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


RE: spoofing email addresses

2004-05-28 Thread Vernon Schryver
> From: "Christian Huitema" <[EMAIL PROTECTED]>

> >   1. block port 25 to external IP addresses for all of your customers
> > except those with what draft-klensin-ip-service-terms-01.txt calls
> > Full Internet Connectivity.
>
> ... and receive a flood of complaints because 10% of your users are
> using a mail service provided by someone else than you.

That's a significant problem, but so what?  Stopping spam is not without
costs. The spam problem exists only because service providers sell
other than Full Internet Connectivity and cannot charge enough for the
other flavors to squash abuse.

The reason spam is a problem is that ISPs are unwilling or unable to
pay the costs necessary to zap spamming customers.  If spam were a
certain path to termination with prejudice, there would be no significant
spam.  If ISPs would immediately and permanently terminate all spamming
customers and refuse to exchange STMP/TCP/IP with other ISPs that fail
to terminate spammers, there would be no spam problem and no need for
blocking port 25 and so forth.

If Microsoft would have been willing to pay the costs to ship secure
software for the last 10 years, than the spam distribution mechanism
currently favored by the worst spammers would not exist.


> >   2. Do not sell Full Internet Connectivity to anyone running Microsoft
> > software exposed to the Internet.
>
> Regardless of whether Microsoft's software can be secured (it can), 

As we all know, that is true in Microsoft marketing liturature and
plausible theories but false in practice.  As I said, practically all
desktop Windows XP and NT installations have users running browsers
and MUAs as "administrator."  Contrary to the knowingly misleading
statements from Microsoft appologists, that fact makes Windows a
hopelessly insecure system.

Then there are the versions of Windows not related to Windows NT
that cannot be secured even in theory.

> this
> is a big no-op as a PC behind a "home firewall" is still at risk from
> e-mail viruses and questionable web downloads.

A PC running Microsoft software behind a "home firewall" for most
meanings of that phrase including Microsoft's is not protected. 
It must not be exposed to the Internet.


> >   3. The effects of #1 and #2 include forcing all mail from the usual
> > suspects through your own mail systems so that you can do as the
> > credit card companies do.  Track SMTP envelope Mail_To values or
> > other characteristics for each customer.  When you see a change,
> > contact the customer by voice to check.
>
> So the solution to Spam has to be a massive surrender of privacy! 

This statement is disingenous.  No existing privacy is lost.  It is
just as false and dishonest to claim that the credit card companies
reduce someone's privacy with their anti-fraud mechanisms.  Exactly
the same mail information is already present in ISP SMTP server logs.
Privacy is not lost by people acting on your private information.  It
is lost when your private information is collected.  Changing how
computers manipulate your no-longer-private information does not reduce
your privacy.  Disclosing the fact that you do not have privacy
does not reduce your privacy.

If you want privacy, you must use cash instead of a credit card.
You must also buy full internet connectivity, run your own SMTP
client, and use at least SMTP-TLS, and of course, that's only a
start toward mail privacy.


> I am afraid that you are falling in the very trap that you often
> denounce, present you personal definitive solution to Spam...

My modest proposal would stop spam, but is not unique.  As I wrote in
words you did not quote, the spam problem results from service providers
such as UUNet, Comcast, and Yahoo and software vendors such as your
employer refusing to pay their shares of the costs to stop network abuse.


Vernon Schryver[EMAIL PROTECTED]


___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-28 Thread Vernon Schryver
> From: John Stracke <[EMAIL PROTECTED]>

> >> (I've yet to see a proposal that works if the spammers start
> >> utilizing zombie machines that snarf the already-stored credentials 
> >> of the user
> >> to send mail)
> >
> > The question is whether spammers can obtain new credentials (stolen or 
> > otherwise) faster than others can blacklist them.
>
> And, if you had actually read the message you replied to, you would have 
> realized that the answer is yes.  Send out a worm that makes N zombies, 
> have each zombie send one message under the local user's credentials, 
> and none of them will get blacklisted.

Here's a defense for that scenario:

  1. block port 25 to external IP addresses for all of your customers
except those with what draft-klensin-ip-service-terms-01.txt calls
Full Internet Connectivity.

  2. Do not sell Full Internet Connectivity to anyone running Microsoft
software exposed to the Internet.  Possibly relax this with a $2000
bond forfeited along with connectivity at the first propagation
of a worm or other spam.

  3. The effects of #1 and #2 include forcing all mail from the usual
suspects through your own mail systems so that you can do as the
credit card companies do.  Track SMTP envelope Mail_To values or
other characteristics for each customer.  When you see a change,
contact the customer by voice to check.

In practice, you could probably get by with detecting changes in mail
volumes, since a spam spew of 1 message/zombie is at least 10 and
probably 1000 times too low to be practical for high volume spammers.
As far as I can tell, the typical user sends only about a dozen
messages/day.

Of course, the fatal problem with this spam defense is that it is not
based on other people doing the work and paying the costs.  It is not
a coincidence that as far as I can tell Yahoo continues to be the most
important U.S. host for Nigerian 419 spammers or that Windows XP
practically requires or at least strongly encourages individual users
to run their browsers and MUAs as "administrator."  It is not a
coincidence that sender validating systems including those Yahoo and
Microsoft are based on the rest of the Internet doing most of the work.

The howls from the Special People who feel that they are entitled  to
Full Internet Connectivity at prices and terms they find comfortable
(and about the per capita income in large parts of the world) are also
related to the fundamental cause of all spam.  There would be no spam
problem including worms if every ISP would look after its own problems
by terminating all spammers including customers who let their machines
be "owned" or if all users were willing to pull their own weight instead
of expecting something for nothing.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-27 Thread Vernon Schryver
> From: [EMAIL PROTECTED]

> > "The people who claim that something can't be done shouldn't get in the 
> > way of the people doing it."
>
> I didn't say it *cant* be done.  I said there were known problems that any
> successful solution would have to address.

Another response is to point out that all of the sender validating
systems are today only proposals that can be seen as getting in the
way of effective tactics.  The talkers trying to get in the way of the
doers are, as usual, those who endless prescribe spam solutions that
they themselves have not thought out, not to mention documented, tested,
or deployed.

The vast majority of the spam that sender validating systems might
block after they have been installed in most SMTP clients 5 or 10 years
from now is rejected today at any organization that really cares about
spam using any of various tactics including DNS blacklists (e.g. the
CBL or the so called "dynamic IP" lists) and greylisting.
Essentially all of the spam that any sender validating system might
someday block after large outfits like Comcast have installed validating
code on their SMTP clients and servers would be blocked today at the
source if those same outfits would block port 25 for all types of IP
service except the one that draft-klensin-ip-service-terms-01.txt calls
"Full Internet Connectivity."  That is because current spam that
would be blocked by sender validating comes "trojan proxies."

The current state of the art in spam defenses reject more than 99%
of spam with less than 1% false positives (or variations of those
numbers such as 95% and 0.1%).  No one who is actually do anything
about spam is content with those numbers or confident that new
tactics will not be needed, but please don't tell the experts who
don't know the difference betwee an SMTP rejection and a bounce, lest
they be encouraged to tell us some more what we really should be doing.

As usual, the usual suspects who might someday get around to reading
an RFC, any RFC, tell us that The Final Ultimate Solution to the Spam
Problem is just around the corner.  Their Finual Ultimate Solution is
waiting for the obstructionists to get out of the way of those who
will realsoonnow write the FUSSP RFC.  Of course, the usual suspects
can't be bothered to come down from Mt. Olympus to write a I-D or
learn the relationship between I-Ds and RFCs.  They don't care about
the differences among documenting, testing, or deploying, or the chasm
between practice and sidewalk superintendent theory.


Probably the best response is to send people to the MADID mailing list.
I've often said that the IETF is well served by working groups that do
no more than absorb the energies of standards committee goers.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


out-of-office notifications

2004-05-26 Thread Vernon Schryver
How many years must this stuff continue?  If someone asked me, I'd
say that the people responsible for the enclosed meant to ask the
Secretariat to be unsubscribed with prejudice from all IETF mailing
lists.  Then there are people who send HTML out-of-office noise.

This stuff is a tad ironic given the recently expressed concerns about
bad guys checking the IETF attendance list.

How about a Modest Proposal:  no one be allowed to subscribe to any
IETF mailing list without submitting evidence that Microsoft MUAs or
MTAs are not in use.  Those with sufficient clues to contribute usefully
could doubtless arrange things so that even if they were using Microsoft
virus, worm, spam, and OFN distrubution malware, their mail headers
would lie.


Vernon Schryver[EMAIL PROTECTED]


> From: Eric Burger <[EMAIL PROTECTED]>
> To: Vernon Schryver <[EMAIL PROTECTED]>
> Subject: Out of Office AutoReply: spoofing email addresses
>
> Not reachable by e-mail or phone until 6/2, and then only by e-mail.


> From: Paul Georgiou <[EMAIL PROTECTED]>
> To: Vernon Schryver <[EMAIL PROTECTED]>
> Subject: Out of Office AutoReply: spoofing email addresses
>
> Please note I will be out of the office from Friday May 21st to Tuesday May
> 25th inclusive without access to email or Voicemail. For urgent matters
> please contact Rosemary Hagholm, [EMAIL PROTECTED], 416-410-6050, or
> David YoungPow, [EMAIL PROTECTED], 905-264-5785.


> From: WaterCove Email <[EMAIL PROTECTED]>
> To: Vernon Schryver <[EMAIL PROTECTED]>
> Subject: WaterCove Email
>
> Hello,
>
> The watercove.com email address you sent to is no longer active.  With the
> recent acquisition of WaterCove by Alcatel, please contact the intended
> recipient directly to get their updated email address.
>
> Thank you.


> From: Joerg Reichelt <[EMAIL PROTECTED]>
> To: Vernon Schryver <[EMAIL PROTECTED]>
> Subject: Out of Office AutoReply: spoofing email addresses
>
> This message is in MIME format. Since your mail reader does not understand
> this format, some or all of this message may not be legible.
>
> --_=_NextPart_001_01C4436B.0F91EDC0
> Content-Type: text/plain;
>   charset="windows-1252"
>
> I am currently out of the office and will be back on 6/14/2004. In case of
> urgent matters, please contact 
> Eric Yuan 
> (408) 944-4928
>[EMAIL PROTECTED]
>
> Thanks, 
> Joerg Reichelt
>
> --_=_NextPart_001_01C4436B.0F91EDC0
> Content-Type: text/html;
>   charset="windows-1252"
>
> 
> 
> 
> 
> 
> Out of Office AutoReply: spoofing email addresses
> 
> 
>
> I am currently out of the office and will be back on 6/14/2004. In 
> case of urgent matters, please contact 
>     Eric Yuan 
>     (408) 944-4928
>    [EMAIL PROTECTED]
> 
>
> Thanks, 
> Joerg Reichelt
> 
>
> 
> 
> --_=_NextPart_001_01C4436B.0F91EDC0--
>

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Request for comments on draft mail protocol

2004-05-26 Thread Vernon Schryver
> From: James Denness 

> I am currently involved in a project to create an internet-draft for a
> domain/key based system allowing mail domains to be validated using rsa
> keys, distributed using the DNS system, with minimal modification to
> existing infrastructure. Does a specification for such a system already
> exist? I have many ideas for extentions to the existing SMTP protocol, as
> well as plans for a derivative protocol incorporating this key-based
> system as a more secure and verifiable method of exchanging mail. If
> anyone is interested, I would appreciate being contacted off-list to
> discuss the possible formation of a working group to discuss such ideas.

what about http://ietf.org/html.charters/marid-charter.html ?

It might be interesting to contact the author of
draft-delany-domainkeys-base-00.txt
or the authors of the at least half a dozen other proposals to use
public keys or other mechanisms along with the domain name system to
authenticate mail senders.


My rather negative view of the area can be inferred from
http://www.rhyolite.com/anti-spam/you-might-be.html


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-26 Thread Vernon Schryver
> From: Andrew Newton <[EMAIL PROTECTED]>

> On May 24, 2004, at 1:49 PM, [EMAIL PROTECTED] wrote:
> >
> > In fact, there isn't any sane way to detect "inconsistent" header 
> > information
> > without external hints - this is the reason why there's the SPF 
> > proposal, the
> > Yahoo domain-keys proposal, and Microsoft's proposal.
>
> And MARID.

I don't see any of those proposals and their competitors as sane.
Some of them, such as SPF, do not even meet their own design goals
as stated informally by their advocates.  Others such as domain-keys
do not seem to do anything that is not already done by SMTP-TLS, despite
the goals in the I-D that seem to be closer to S/MIME.  None of them
have much to do with spam, but only with a currently popular mode of
attack used by spammers.  None have any hope of affecting even that
particular attack mode for years, because none can have any significant
effect until deployed on most SMTP clients.  Many seem to be based on
insufficient familiarity with the nature of SMTP (e.g. SPF's incredible
source-routing scheme) and the urge to Do Something Now regardless of
actual results.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Categorization of TCP/IP service provision types

2004-03-23 Thread Vernon Schryver
> From: John C Klensin 

> ...
> However, the above statement just isn't true unless the 
> collection of terms and conditions I've seen are a very odd 
> subset.   "You will not run a server" is typical.  "You are 
> required to use ours" is much less common, and is often 
> associated with a commercial motive, e.g., "you are required to 
> use ours, and our domain on your outgoing mail, unless you pay 
> us more money".

I agree my words are wrong.  I'd forgotten port 587.

When they say "you will not run a server" they are also implicitly
saying "you will use someone else's MTA instead of your own."  You're
right that they don't prohibit the use of SUBMIT, POP3, or perhaps
even port 25 SMTP to reach an allowed MTA.  However, when they say
"you will not run a server," they do not mean "you will not run an
SMTP server" in the sense I undestand "SMTP server."  Most people think
"mail server" is any MTA and not only a system that answers port 25
to receive mail.

As I think you've said elsewhere, it is best to ignore service providers'
motives.  That allowing customers to run "servers" increases provider
costs for bandwidth, technical support, and abuse handling is irrelevant.
The document should not spell out business models any more than it
should have a matrix of all possible combinations of offerings or
technical details of how the limitations of the various types of
services are implemented.


Vernon Schryver[EMAIL PROTECTED]



Re: Categorization of TCP/IP service provision types

2004-03-23 Thread Vernon Schryver
> From: John C Klensin 

> ...
> > What I see missing are hints why "dynamic addresses" are widely
> > blacklisted.  There need to be words about the first three
> > classes usually being priced so low that providers cannot

> ...
> Text would be welcome, but it seems to me that this addresses a 
> different theme.  One could say that quality of customer service 
> usually improves with categories, but that isn't universally 
> true until one starts making categories of customer service 
> efforts.  From my experience, I would even question your 
> description above, although we don't disagree about the 
> consequences: my impression is that a number of the "broadband" 
> operators offering low-end services actually have fairly good 
> logs.  What they don't have are abuse departments with the will 
> and resources to dig through those logs and identify specific 
> offenders.  Hand that same provider a subpoena associated with, 
> e.g., some clearly criminal behavior, and records seem to turn 
> up in a lot of cases.

That's all true.  The details of the reasons and excuses for not
dealing with abuse except when coerced by lawyers or badges vary
and are not germane.


> What I've done in response to several comments is to add text to 
> the beginning of the terminology section that tries to make it 
> clear that these definitions are about what the provider intends 
> to offer.  Whether the restrictions are imposed by AUP (or 
> contractual terms and conditions) and whether technical means to 
> enforce particular restrictions are effective on a particular 
> day seems less important.

exactly.

> The "dynamic address" issue is, from that point of view, just a 
> "technical means" to enforce (or just consistent with) an AUP or 
> Ts and Cs.  I.e., if one believes that blacklisting dynamic 
> addresses is rational, then part of the reason for that isn't 
> "too cheap" or the addresses themselves, it is that these 
> dynamic addresses tend to show up only in "server prohibited" 
> environments.   Maybe it is equally rational to blacklist an 
> address range on the theory that anything coming from that range 
> is in violation of provider conditions of service and that one 
> bad deed (violating AUPs or Ts and Cs) is as bad as another 
> (demonstrated spamming).   But I don't see a reasonable way to 
> incorporate any of that reasoning (whether one agrees with it or 
> not) into the document without generally weakening it.  If you 
> do, please suggest text.

No, the rational reason to blacklist "dynamic" addresses is that
blocking them stops a lot of abuse while affecting very little legitimate
traffic.  Whether the high true positive and low false positive rates
are because providers choose to ignore complaints or some other reason
is, or needs to be irrelevant in this document.

Perhaps it would be enough to say just that, along the lines of

  ... mail directly from the IP addresses of customers of X instead of
  via MTAs run by service providers is rejected by much of the rest
  of the Internet because it is almost certainly "spam" or otherwise
  objectionable.  The terms of service of X usually require the use
  of MTAs operated by the service provider and prohibit the operation
  of MTAs at the customers' IP addresses.  Practically all legitimate
  mail from users of X use their service providers' MTAs.  Some service
  providers use technical mechanisms such as "port 25 filtering" to
  enforce their terms of service that require that their customers'
  mail use the providers' MTAs.

   ("X" because I'm not sure about factoring that text into each
   of the 1st three descriptions or having it one place.)


> Thanks.  I've started a discussion with some selected ADs about 
> what they want to do with this, if anything.  My intent is to 
> wait to see what they have to say.  If they aren't interested, 
> and interested in moving toward BCP, then the effort is, as far 
> as I'm concerned, dead.  If they want a WG, then the next real 
> task is "charter".  Otherwise... well, let's how they want to 
> proceed.

That sounds right to me.


Vernon Schryver[EMAIL PROTECTED]



Re: Categorization of TCP/IP service provision types

2004-03-19 Thread Vernon Schryver
> From: "Spencer Dawkins" 

> I like the idea, and your draft is more than a skeleton plus examples.

quite true.

> ...
> - The client/server orientation doesn't explicitly handle peer-to-peer
> connectivity (unless all the SIP clients have to be servers so they
> can receive incoming phone calls). Saying "I want incoming phone
> calls" is different from saying "I'm running my own mail server".

So you say now, but wait until the ROKSO spammers discover the bonaza
in VoIP.  Instead of "owned" proxies pumping email, they'll use the
same boxes to push pre-recorded voice messages.

For mail, the filtering at issue here has not been against incoming mail
to local SMTP servers but outgoing mail from local SMTP clients.

An ISP might want to filter against incoming port 80 so customers can't
use lots of the ISP's bandwidth on their HTTP servers, but against
outgoing port 25 to minimize the ISP's abuse handling costs.
The DUL DNS blacklist filtering that non-spammers whine about would
be that if it existed but currently is entirely at third party ISPs
and mail targets.  It is entirely orthogonal to and independent of the
filtering John wrote about.  It is a reaction to the lack of filtering
done by the low priced ISPs.

Of course, none of those words belong in John's document.

Of course, I'm not serious about VoIP spam.  To start, the bandwidth
needed for 10,000,000 5KByte spam is less than the bandwidth needed
for 10,000,000 60 second phone calls.


Vernon Schryver[EMAIL PROTECTED]



Re: Categorization of TCP/IP service provision types (was: Re: The right to refuse, was: Re: Principles of Spam-abatement) (FWD: I-D ACTION:draft-klensin-ip-service-terms-00.txt)

2004-03-19 Thread Vernon Schryver
> From: John C Klensin 

> Last week's version of the spam discussions, led to an 
> interesting (to me) side-discussion about what was, and was not, 
> an "Internet connection" service.  ...

> draft-klensin-ip-service-terms-00.txt.

http://www.ietf.org/internet-drafts/draft-klensin-ip-service-terms-00.txt

>
> This clearly isn't finished, indeed, it is not much more than a 
> skeleton with a few examples.  It needs more work, probably 
> additional categories, and more clarity about the categories 
> that are there. 

I think it is about as clear as it should be.  Much more clearity
would require sample contracts or risk getting bogged down in
nitpicking on whether it is practical to run an SMTP server on a
dynamic IP address, whether an IP address that changes once a year
is really dynamic, and so forth.

What I see missing are hints why "dynamic addresses" are widely
blacklisted.  There need to be words about the first three classes
usually being priced so low that providers cannot afford to keep records
of who was using a given address when it was used to send spam, denial
of service attacks, or other naughtiness, or cannot afford to have
abuse department to consult any records there might be.


>  If there is real interest in the subject, I'd 
> like to see someone else take over the writing and editing.   If 
> there isn't any real, perhaps we can stop spending time 
> discussing the subject.

The subject is not going to do away as long as people think they have
a fundamental human right to do the equivalent of moving to a cardboard
box under a bridge and then demanding banks and creditcard companies
to see them as creditworthy as their bourgeois neighbors.

If no one else will take the job and if there is any hope of getting it
past the IESG, I'll happily be your editor, elaborator, or whatever.  My
strengths don't include writing intelligible English, but it needs doing.


Vernon Schryver[EMAIL PROTECTED]



Re: "Principles" of "Spam-abatement"

2004-03-17 Thread Vernon Schryver
undamental human right will say
that ISPs can't stop spam unless everyone reports it.  That claim is
nonsense.  When it comes from ISPs, it is a bald faced lie; it is
possible even for a raw IP bandwidth ISP to detect spam.


> So I have to say again -- there may be IETF work that could be done
> here.  It shouldn't be this difficult, and there needs to be a whole
> structure erected to make mail administrators accountable at some level.
> And ultimately, we may all have to be willing to pull the plug on

No, simply forwarding completely and faithful copies is more than sufficient.


> 17.76.215.200.in-addr.arpa domain name pointer 
> BrT-S4-1-2-22-bnuce300.brasiltelecom.net.br.

I can't get a PTR RR for 17.76.215.200.in-addr.arpa.  Whether you use
reverse-DNS and whois or whois on the IP address is a minor, irrelevant
technical detail.  (Yes, I know Ralsky and others play games with PTR RRs.)


> and effectively cut them off from the Internet if they don't police
> their relays and e.g. refuse to accept mail from unregistered hosts.
> Only thus can we forge a chain of responsibility back to the SPs that
> they cannot easily evade.

We don't need any "chains of responsibility."  EIther Brasiltelecom
deals with its spam or it doesn't, just like the zillions of other
outfits that do not have the reputation of a Brasiltelecom, Comcast,
or UUnet.  How Brasiltelecom manages that trick is none of our business,
unless we are customers or employees.

> I just don't think that the idea has been fully tested yet.  To properly
> test it, a certain amount of infrastructure would have to be built --
> not a horrible lot, actually, but some.  And the process of complaining
> in a standardized way would need to be made "one click easy". ...

NO!  If Duke or AOL want to do that for its users, then fine.  If not,
that's also fine.  All that matters is that you accept responsibility
for your own incoming spam and deal with it by cutting off the sources.
You don't need any "infrastructure" to add to a sendmail access_db
or a router firewall.  (I've heard that AOL has a "this-is-spam" button.)


> > The first part is nonsense spread by spammers and dishonest, spam-friendly
> > ISP spokeslime.  ISPs have no problems terminating customers with less
> > than minimal evidence. 

> Yes, I don't quite understand why people keep talking about suits and
> such. 

We all know why people go on about suits and such.  It is because they
have something personal to lose if spammers are routinely terminated.
That is variously cheap services subsidized by the lack of an abuse
desk at their ISP, services subsidized by revenue from spammers, a
desire to get rich or at least famous by flogging a Final Ultimate
Solution to the Spam Problem (FUSSP), a job at a spam haus of an ISP,
or a job at a spammer.
I realize this observation is impolitic, but it's past time to be
honest about the motives for the persistent nosense about spam.


Vernon Schryver[EMAIL PROTECTED]



Re: "Principles" of "Spam-abatement"

2004-03-17 Thread Vernon Schryver
other organization.
|
|ISPs operate in a _very_ different business environment than, say,
| UNICEF.

Possibly true but certainly irrelevant.


| > - If you say that ISPs cannot check the reputation of new customers
| >   for a $30/month account, then you must say the same about any
| >   other organization.
|
|ISPs offering $30-per-month service are very likely losing money
| (and worrying who to lay off next). 

True and relevant, but only in the sense that any outfit that might
sell trust assurances might have trouble doing it for $30/month.

| Your bank, OTOH, is probably
| doing nicely on less than $30-per-month service charges. 

If that is true, then an ISP could do the same.  I think it is true
only in a facile and fundamentally false sense.  My banks makes money
on more than my explicit service fees, which are approximately $0/year.

|  Also, some
| ISPs have no reason to worry much about their reputation, because
| they have in effect a government-mandated near-monopoly.

No matter how often anyone says that, it remains false.  By now the
base motives for that old nonsense should be considered.  Outside some
totalitarian regimes, there are no monopolies of any sort on real real
Internet access.  There are monopolies on some imitation Internet
servcies at price points that some claim are related to basic human
rigts, while expecting us to ignore the fact that the $15-$35/month
point they claim necessary to protect their basic human right to send
mail is 10 or 100 times too high for the vast majority of humanity.


| > - If you trust some of those other outfits to revoke their virtual
| >   letters of introduction and recommendation, then you must be
| >   willing to trust some ISPs to do the same and terminate accounts.
|
|Ah, yes, but _which_ ISPs?

Currently the ISPs certified by your choice among your personal
blacklists, the SBL, CBL, XBL, SPEWS, MAPS, ORDB, etc.


| ...
|The second part (terminating) is not true, IMHO. There's a real
| danger of getting sued for that, not to mention the loss of revenue.

The second part of that is relevant.  An ISP that refuese to terminate
a spammer for fear of lost revenue does not have any IP addresses
that many of us want conencted to our SMTP servers,

The first part is nonsense spread by spammers and dishonest, spam-friendly
ISP spokeslime.  ISPs have no problems terminating customers with less
than minimal evidence.  Within the last 10 days, I watched a business
customer, not merely a home end-luser, get cut off by a major ISP with
telco connections for some time because it failed to respond to a report
of mine.  Of course an ISP must be careful to avoid breaking contracts
and so forth, but that does not prevent termination.  Why else is the
spam advertising "bulletproof hosting" common?


Vernon Schryver[EMAIL PROTECTED]



Re: "Principles" of "Spam-abatement"

2004-03-17 Thread Vernon Schryver
> From: Paul Vixie 

> ...
> identities without history will be a dime a dozen, or cheaper.  spammers
> with no history could trample your privacy all day long if you allowed it.
>
> accepting incoming communication from someone the world has no hooks into
> is off the table.  allowing the world to have its hooks in someone whose
> identity you don't know (and could never find out) has to continue to work,
> but anonymity and homelessness are not the same thing.

Stated that way, but perhaps with an unintended interpretation, I agree.
Every mail sender is "hooked" by an entity that the mail receiver knows
and that has its own reputation that can be checked today.  The ISPs
that own the IP addresses in every IP packet that Ralsky sends "have
their hooks" in Ralsky.   You can decide whether the implicit no-spam
guarantee from that "hooking" agency is sufficient by checking your own
blacklist or the blacklists of others via DNS or BGP.

All of the possible good and bad aspects of any possible "trust" or
"reputation" system are already present in the current system.  

  - If you say that you can't trust ISPs to check that a new customer
 is not Al Ralsky in disguise or one of his proxies, then you must
 say the same about any other organization.

  - If you say that ISPs cannot check the reputation of new customers
 for a $30/month account, then you must say the same about any other
 organization.

  - If you say that you cannot trust ISPs to terminate the accounts of
 spammers, then you must say that you cannot trust any other outfit
 to revoke the PKI cert or other assurance for spammers. 

  - If you trust some of those other outfits to revoke their virtual
 letters of introduction and recommendation, than you must be
 willing to trust some ISPs to do the same and terminate accounts.

  - If you say that third party organization could assure you that a
 mail sender is not a spammer, then you must agree that an ISP
 could check with that organization before adding a password to a
 RADIUS server or or turn on a DSLAM, and that an ISP could terminate
 an account when that third party revokes is assurance.

  - You can be anonymous on the Internet only if your ISP protects you.
 No one is homeless on the Internet.  The SYN-ACK for your SYN to
 port 25 must get back to your source IP address home at your ISP.

The connection between you, the spam or mail target, and the ISP that
has its hooks in the mail sender is better than any PKI or crypto
related system could possibly be.  It is not only much cheaper than
anything Microsoft/Yahoo/AOL/Verisign would sell, but technically more
reliable.  IP address spoofing was practically impossible for spam
even before RFC 1948 and related defenses, because it was too hard and
unreliable if you need to make 10,000,000 successfully spoofed ISN
predicted TCP connections per day.  On the other hand, we all knew
even before the bogus "Microsoft Corporation" certs or the discovery
that those bogus certs could not be revoked that commercial PKI is eyewash.

If you believe that "reputation" or "trust" systems might help the
spam problem, then the only room for improvement is in the trust query
protocol.  DNS is a screw driver being used as a hammer in DNS blacklists.
However, this is merely a matter of optimization or elegance.


Vernon Schryver[EMAIL PROTECTED]



Re: The right to refuse, was: Re: Principles of Spam-abatement

2004-03-14 Thread Vernon Schryver
> From: Yakov Shafranovich 

> > If the IETF would officially define "slum tenement Internet service"
> > (with better words, of course), then truth in advertising laws, the

> I am not sure if it's the IETF's role to define such definition. 

There are plenty of RFCs that consist of little more than definitions
of terms.  In a real sense, any standards track RFC is merely a list
of definitions of terms.

If the IETF has no business defining terms to name existing varieties
of Internet service, then it certainly has no business publishing BCPs
telling people how to provide Internet services, including how to run
blacklists.

>But in 
> any case, the problem is that given the current situtation that ISPs do 
> not have sufficient incentive to deal with the problem at the end 
> points, is there anything that the IETF can really do aside from 
> providing some standards and publishing BCPs?

A definition of what they're doing and the truth in labeling laws could
give them some incentives.  If ISPs offering slum Internet service
would admit that's what they're selling, they could preemptively block
port 25 and stop a large part of today's spam, worms, and viruses.
The majority of their customers would not notice any difference, except
fewer spam, worms, and viruses.  Contrary to claims from some ISPs,
filtered Internet service is not technically difficult or expensive
to provide.  In fact it is significantly cheaper, because it uses less
bandwidth and abuse desk labor.  That is why many ISPs offer it instead
of real Internet service.  (Some do try the cheaper and less honest
tactic of submitting their own IP addresses to so called "dynamic
blacklists" so that they don't need to hire help to configure their
routers to block outgoing TCP SYNs to port 25.)

Those users that did complain could be pointed at AUPs that often today
prohibit the use of "servers" and offered upgrades to accounts with
prices that allow ISPs to deal with the risk of abuse.  That higher
price might still be $30/month but with a $3000 bond.  Or perhaps
$300/month for the first 6 months and $30/month thereafter.

As someone said privately, the slumlord ISPs are not only skipping on
abuse desks.  They also don't have valid SWIPEs, reverse DNS names,
NTP or NNTP servers, monitoring to meet the SLAs they almost claim to
offer and other services that come with real Internet service.


> Given that most ISPs do not make that much profit, what anything change 
> in the long run about their ignorance of abuse reports?

The Internet is being separated into two parts.  One part is of spam
filled slums that cannot send mail directly to the other part.  That
is the common purpose of DNS blacklists and port 25 filters.  Whether
you admit that fact and whether you say "slum tenements" and "real
Internet" or "spiritual heir to UUCP" and "transitive closure of direct
SMTP connectivity" doesn't change anything but the politics.

What is needed is for the IETF to try to prevent politicians, government
bureaucrats, and slumlord ISPs from colluding to regulate the whole
Internet down into the tenement slums.  There are interests that would
love to see laws funnel all mail sent through Microsoft/AOL/Verisign
servers (probably using a form of PKI cert).  Spooks, spies, and police
state officials would find those servers as convenient as monopolists
would find them profitable.


Vernon Schryver[EMAIL PROTECTED]



Re: The right to refuse, was: Re: Principles of Spam-abatement

2004-03-14 Thread Vernon Schryver
> From: Yakov Shafranovich <[EMAIL PROTECTED]>

> ...
> This is a human problem, not a technical one - the ISPs are unwilling in 
> many cases to handle abuse reports seriously, or are unwilling to invest 
> in any kind of infrastructure to detect abuse. For example, one of the 
> ideas floating around the ASRG has been a BCP for handling hijacked 
> machines. A detection mechanism would be in place that counts outbound 
> email from a given machine or subscriber, and if that usage spikes the 
> mail would be queied and the subscriber notified. 

The ISP can't queue mail that doesn't go through its smarthosts. 
It can only block port 25.  That generally causes mail to be lost,
whether from legitimate MTAs to distant MUAs or from spamware.

>   How many ISPs actually 
> willing to do that (although ComCast begun shutting down accounts of 
> hijacked machines)?  What monetary incentive would the ISPs have to do 
> that? And even if the IETF publishes the BCP, there is no way to enforce it.

At $30/month, an ISP can't afford to do much watching for spikes.  It
certainly can't hold the hands of users who couldn't be bothered to
install virus defenses or not open attachments.  About all that a
"consumer grade" ISP can afford to do is preemptively block outgoing
port 25, 135, etc. for all customers.  I've been complaining for years
that is slum tenement Internet service, but it seems to all that must
users are willing to pay for, in money and in acquiring and using
technical expertise (e.g. virus filters and not opening attechments).

If the IETF would officially define "slum tenement Internet service"
(with better words, of course), then truth in advertising laws, the
value of product differentiation to ISPs, and savvy users might make
port 25 filtering universal where it is needed and absent elsewhere.
That would stop lunacy like blacklisting any IP address whose reverse
DNS name contains the substring "dsl."


> I do not see how the IETF can do anything to force ISPs to handle abuse 
> complaints more seriously. This is why people tend to to block ISPs and 
> IP blocks unilaterally in order to force ISPs to take action (not to say 
> that I necessarily agree with it). The only two things that I see here 
> that can be done by the IETF is either to facilitate easier abuse 
> handling by ISPs via standard formats for abuse reports;

ISPs don't need to exchange abuse reports, but to deal with their own.
There's no value in standardizing the unidirectional stream of abuse
reports from the spam-hostile part of the Internet to the spam friendly
part that largely ignores reports of abuse.

>  or provide some 
> kind of standards for exchanging reputation data among receivers. Both 
> still rely on the human decisions made by both ISPs and receivers on how 
> this data is used.

Exchanging reputation about receivers makes as little sense as announcing
consent to receive mail or solving spam with authentication.  You can't
trust people to announce their own reputations or to obey your announced
refusal to receive spam.   Reputation exchanges are either systems
like TrustE's that in practice certify untrustworthiness and functional
equivalents of the current DNS blacklists.

Wise blacklist operators, and I think all major blacklist operators
do not, could not, and would not have any reputations to exchange.
You can add to your backlist only based on evidence that you can defend
in court.  Reports from outsiders, including users of your blacklist,
are almost useless.


Vernon Schryver[EMAIL PROTECTED]



Re: The right to refuse, was: Re: Principles of Spam-abatement

2004-03-14 Thread Vernon Schryver
> From: "Dr. Jeffrey Race" <[EMAIL PROTECTED]>

> On Sun, 14 Mar 2004 11:12:12 +0100, Iljitsch van Beijnum wrote:
> >What we need here is a fundamentally different approach: one where 
> >desired communication is tagged as such explicitly.
>
> You are right a different approach is needed, but not this one
> because it does not admit communication from strangers.

That is true in both theory and practice.

> The only solution is one which removes from connectivity those
> who dump their trash on the commons.   This is easy to do.  

That is true in theory.  In practice it has been difficult.  I'm not
referring to the lies and whines of spammers and address block hijackers.
There are big problems getting slumlords to evict tenents that throw
their garbage and slops out their tenement windows onto the commons.
UUnet is the classic case, with its years of claiming to be unable to
act because it is unable to know from which window of which tenement
any given stinking mess came (i.e. check RADIUS logs or count SYNs to
outside port 25 and decide which of its resellers resold bandwidth to
the spammer).  When respectable people unilaterally shun all residents
of a tenement with many spammers, we are greeted with demands for
government and IETF intervention to stop our vigilante terrorism and
redress our violation of the fundamental right to a free lunch.

It has been suggested that something the IETF could do is define terms.
It would help a lot if there were an official term describing the
"consumer level" service intended for little more than web browsing,
with often AUPs that prohibit "servers," and often with blocks on port
25.  People who want real Internet connectivity wouldn't howl when
they don't get it after not paying for it.  "Consumer level" doesn't
quite work for me, since the a "consumer" might want the real thing
and a business might not.  "No servers" isn't quite right because it's
SMTP clients that port 25 filters disable.

The IETF needs to admit to itself and the world that the IP addresses
assigned to many cable modem and DSL providers are beyond the edges
of the Internet where the End to End Principle applies.  Whether anyone
likes it or not, they are not connected to the Internet.  They might
answer ICMP echo requests and they're better connected than hosts on
the UUCP network were, but hosts on the UUCP network is what they are
like.  There is a pressing need to admit and publish this fact to
forestall governments "saving" the situation.  Contrary to the cries
of the free lunch crowd, government regulation would try to reduce
everyone's connectivity to their pale imitation than to give them the
real connectivity they demand.


Vernon Schryver[EMAIL PROTECTED]



Re: Apologies for the irony (was Re: Principles of Spam-abatement)

2004-03-12 Thread Vernon Schryver
> From: Nathaniel Borenstein 

>...you  
> can't afford an expensive connection ...

> ...   it's not  
> primarily about property rights, it's about our right to choose to  
> communicate with each other.

If the second were true, the first would be irrelevant.  That the first
is relevant shows the "right to choose to communicate" is nonsense,
except in the same sense as the costs of gasoline and real estate
limit your right to travel, live, and work where you want.


> PS -- Are you really rejecting all mail from comcast.net?  Just  
> curious, that's a lot of people.  And if it's guppylake.com, it would  
> have been nice if someone had told me when I was blacklisted, seeing as  
> how I'm the administrator.  

I suspect it is Comcast, but in the same hypothetical, contrary to
facts spirit as your other questions, let's assume that it is
guppylake.com.  How would you be entitled to or even just expect
notification?  If I set my (non-existent) caller-ID filters to reject
phone calls from you, would you be entitled to or expect a notice?
Even if you were a telemarketer, why would you care?  What if Qwest
did the rejecting for me?  I suspect your answers for the two media
differ and that you have not considered your position on Internet
access except from an emotional sense of entitlement and of hurt
and outrage at being snubbed by various blacklists.


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-12 Thread Vernon Schryver
> From: Yakov Shafranovich <[EMAIL PROTECTED]>

> Since the IETF is a standards organization, can both you and vsj tell us 
>   in your opinion, if there is anything the IETF should or should not be 
> doing in the spam arena (changing existing standards, making new 
> standards, etc.)?

draft-crocker-spam-techconsider-02.txt listed some opportunities for
IETF documents.  I vaguely recall they included:
  - codifying common sense for blacklist operators
  I thought ASRG time working on such a BCP, but it seems to have
  gone underground.
   - improved forms and formats for DSNs.
   - improved mechanisms, forms, and formats for logging mail rejections.
   - mechanisms for sharing white- and blacklists among MX servers
  for a domain.

On the other hand, it would be distructive to let the IETF seriously
consider supporting claims of the unfettered right to send mail
regardless of the desires of mail targets and their duly appointed
agents including ISPs or of entitlements to real Internet access
at less than $50/month.  That would further the ambitions of many
to convert the Internet into what PTTs and governments said we might
be allowed 20 years ago.

That the spam problem involves TCP/IP does not necessarily imply that
the IETF has a major role in dealing with the problem, any more than
the fact that guns contain metal implies that the American Society for
Testing and Materials (ASTM) has a major role in the search for world
peace.  Regardless of the ambitions of individuals to "make a difference"
or become famous, the IETF should strive first and foremost to do no
harm outside its charter in primarily non-technical arenas such as the
fight against spam.


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-12 Thread Vernon Schryver
> From: Nathaniel Borenstein <[EMAIL PROTECTED]>

> > That would be relevant to your situation if you had any contract
> > with those intermediaries, or if you had deigned to buy real Internet
> > access instead of some sort of data service that happens to use
> > TCP/IP and parts of the Internet.
>
> I don't care to argue over terminology, but when I say "Internet" I am 
> explicitly including the consumer-level services that are what 99.99% 
> of human beings think of as the Internet.

I think you're numbers are wrong, but that's irrelevant.  The label
used by 500,000,000 users don't change the nature things.  That
400,000,000 point point to a monitor and talk about "the computer"
doesn't change difference between a CRT and a CPU.  What you are calling
Internet access is not.  It differs from the real thing by both price
and features.


> > That is a straw man.  Other than some governments, no third parties
> > are interferring with your mail.  There are ISPs acting in accordance
> > with contracts with their customers to block your mail.  You are
> > demanding that ISPs violate their agreements with their customers
> > and pass your mail.
>
> And *that* is disingenious.  A take-it-or-leave it contract from a near 
> monopoly is not a meaningful contract.

You are equating $30/month whatever-you-call-it with Internet access.
Then you claim that since the real Internet access available to you
costs more than $30/month, it is not available.  I think that is not
just disingenious but dishonest.


> > from telephone companies.  Qwest sells various kinds of call blocking.
> > By your reasoning, it is ok for Qwest to block telemarketing calls
> > with inevitiably grossly inaccurate CID filters but not for Qwest to
> > block email with much more accurate mechanisms.
>
> If they sell it to me and I *choose* to buy it, that's one thing.  If 
> I'm given no alternative it's something else.  -- Nathaniel

You are misrepresenting your situation when claim that you have no
alternative.  You do have a choice, but it it is not only between
nothing and $30/month not-Internet-access.  You could buy real Internet
access, although it would cost as much as $400/month.

You compound your misrepresentations by implicitly claiming that the
same outfits that sell you $30/month not-Internet-access won't sell
you real Internet access.   Some of them won't, but many will.  If you
can get DSL, then you can get real Internet access.  That 200 kbit/sec
or more of Internet access generally costs more than $100/month does
not justify your complaints about whatever you get for $30/month.

I don't owe you the subsidies for your Internet access that are
demanding.  You want me to subsidize your access with my money and in
my spam loads.  If you were willing to pay what broadband Internet
access reall costs, your ISP could afford real abuse instead of just
letting the spam flow from your fellow $30/month lusers, and it could
afford to give you spam filtering than the worst DNS blacklists.


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-12 Thread Vernon Schryver
 duopoly, and while that's better than a 
> monopoly, it just doesn't leave enough options for a fully 
> laissez-faire position to be realistic.

You are misrepresenting the services you from your local providers
as Internet access.  It is not.
You are also misrepresenting DSL services.  You can often buy DSL based
Internet access from distant providers, thanks to the wonders of ATM
clouds and other mechanisms.  It often costs more than the service you
can buy locally, but that local service is often not Internet access.
It is often (in my view) a strangely crippled imitation that is to
Internet access as straw is to wheat.


> You have that right, and also the right not to answer the phone when my 
> name comes up on caller-id.  But your phone company doesn't have the 
> right to make the decision, on  your behalf and without your consent, 
> to not cause your phone to ring.  And no, acceptable use policies 
> aren't an adequate answer because the decreasing number of 
> consumer-level alternatives means I'm likely to be stuck with a AUP 
> that I find unacceptable.

You are not stuck with bad AUPs for Internet access.  You could always
buy real Internet access elsewhere and use the data services of your
local providers to reach your real ISP.  That you would have to pay
more than $30/month is just too bad.  That I can't get $30/month
imitation non-Internet/cable modem service because I live in the woods
is also just too bad.

> I don't see any difference between this situation and the situation 
> where, say, China uses its governmental/monopolistic powers to block 
> all email from Taiwan.  It's an abridgement of a fundamental human 
> right to communicate, which I think trumps the rights of monopolistic 
> ISP's to cut their spam-related expenses.  -- Nathaniel

That is offensive nonsense. The only right yours that is being abridged
is your supposed right to buy Internet access for $30/month.


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-12 Thread Vernon Schryver
> From: John C Klensin <[EMAIL PROTECTED]>

>   * But, when the victim^H^H^H^H^H^H consumer is
>   essentially faced with a monopoly --buy the ISP's
>   service with whatever conditions it comes with or be
>   stuck with dialup-- and is not permitted to run mail
>   servers, has no real control over whatever filters the
>   ISP decides to install, etc., the situation is a lot
>   closer to the classic "middlebox with no control by
>   either endpoint" one (and produces variations on the
>   same arguments). ...

The major error with potentially catastrophic consequences in that
that thinking is the notion of ISPs as monopolies.  No ISP in the world
has a monopoly on real Internet service, with the exception the bad
situation in totalitarin states.


>   servers of any sort, etc., without "upgrading" to much
>   more costly "business services".  Few, if any, will

That many so called ISPs are not selling Internet access is as irrelevant
as the fact that many grocery stores don't sell alcohol.  The lies
customers of those services providers are told and tell themselves
about what they are buying and using are also irrelevant.  The services
those providers offer are some kind of limited data services that
happens to use TCP/IP and portions of the Internet.  I'd like to see
those providers forced to label their services honestly, but that has
nothing to do with monopolies, "natural" or otherwise, except that
monopolies seem more likely to violate truth in labelling.

That there are parts of the world where you cannot buy Internet access
from local providers may disappoint you and me, but it implies nothing
about monopolies on Internet access.  There may be monopolies on those
limited data services, but that is as irrelevant as monopolies on plain
old telephone service.  People whose only available data services are
those non-Internet access services or POTS can always use those data
services or telephones to reach a real Internet service provider.  Whether
or not they could afford real Internet service is also irrelevant here.


> Where the disagreement you and Nathaniel are having leads, I 
> think inevitably except for timing, is into the state that you 
> assume Nathaniel is assuming: sufficient governmental 
> intervention to turn anyone who operates a mail relay into a 
> common carrier, without the "right" to filter mail except in 
> response to government-approved rituals.  For many reasons, I 
> hope we never get there, regardless of its potential advantages 
> for controlling spam and various other sorts of bad behavior. 
> But we don't have a free market here, with consumer choice 
> options among ISPs who filter and ISPs who don't, at least with 
> reasonable price differentials.

NO!  In fact we do have a fairly free market.  That many service
providers choose to not provide Internet service is evidence that the
market is free and that no monopolies for Internet Access prevail.
That those service providers charge less than providers that do provide
real Internet service is interesting is more evidence that monopolies
do not exist.

Perhaps governments should crack down the dishonesty of providers that
mislabel their non-Internet access services, but that has nothing to
do with monopolies.

No one should have any sympathy for savvy technicians who choose
to pay for a service that is not Internet access, don't get Internet
access, and then complain about terrorist and vigilantes who keep
them from getting services they've not paid for.

That Internet service no longer costs several $1000/month is great
but irrelevant.  That it costs more than $30/month is also irrelevant.

I think it's too bad that Internet access is not cheaper than it is,
but just now I'd rather worry about the costs of food and water for
most people on Earth.


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-12 Thread Vernon Schryver
> From: Nathaniel Borenstein <[EMAIL PROTECTED]>

> ...
>   When each ISP makes its own rules and metes out its own 
> vigilante-style punishment, that's not civilization, it's anarchy.  And 
> I find it considerably scarier than the underlying offense of spam 
> itself.  -- Nathaniel

Your repeated misrepresentation of the use of blacklists by one party
in a prospective SMTP transaction as vigilantism is as offensive as
it it is a familiar complaint of senders of unwanted mail, including
spammers and kooks.

Regardless of what governments or anyone else might do about spam, and
regardless of whether you and anyone else other than the targets of
your mail consider it spam, your implicit claim to a right to send is
wrong and scarier than any sort of Internet vigilante-style punishment.
Some of us are bothered a lot more by the notion that you might be
able to appeal to any third party to force the target of a prospective
communication to "shut up and eat your [mail]."

Your right to send mail stops at the border routers of your ISP.
Whether your mail gets any farther depends entirely on the sufferance,
whim, and caprice of others.  If prospective targets of your mail
reject it because your IP address is divisible by 91, that is entirely
fair, appropriate, and not for anyone but the owners of your targeted
mailboxes to judge.  Customers of ISPs that want to receive your mail
but can't for any reason, whether the use blacklists, the prime factors
of your IP address, or standard incompetence, have and should have
only one recourse, changing mail providers.

If the targets of your mail reject it because you have chosen a spam
friendly ISP or an ISP with the wrong number of letters in its domain
name, your only recourse is and should be to change mail service
providers.  The consequences of your choice in hiring an ISP that
subsidizes its rates by serving spammers are no one's concern but yours.

The incredible notion you have repeatedly, albeit indirectly advanced,
that you have a right to have your mail delivered that should be enforced
by governments or at least the IETF, would surely apply to backhoe fade,
power problems, misconfiguration, and all of other things that cause
mail to be lost or bounced.  Having governments or the IETF dictate
rights of mail senders to be be heard by their targets would be BAD!

Next you'll be telling me that if you telephone me, I can't hang up on
you.  not that I would, but I reserve the right.


Vernon Schryver[EMAIL PROTECTED]



Re: paralysis

2004-03-07 Thread Vernon Schryver
> From: Dave Crocker 

> Serious discussions about spam control acknowledge the fact of
> limited, incremental benefit, significant deployment costs, potential
> impact on basic modes of legitimate email, and the like.
>
> Unfortunately, serious discussion is rather rare. What is missing from
> most proposals is any interest in such careful consideration about
> ramifications.

No, let's be honest no matter how impolitic.  What's out of order
from most anti-spam discussions is anything that might squelch the
urgent, exciting, and positive talk.  That certainly includes
consideration of inconvenient ramifications and obvious technical
issues.  The taboos also cover any sentiment like "Ok, I'll implement
this and report back soon with results."

(Recent example technical issues:
  SMTP-TLS does not imply commericial PKI, except in the sense that
   commercial PKI is the only working(?) model of large scale key
   distribution.
 No law, standard, or anything else prohibits an SMTP relay from using
   the same authenticator on output that it used on input for a message.)


> Instead, efforts to explore real costs and real efficacy are met with
> the usual plea that this is an emergency and we have to do _something_.

That's true only in the sense of urgent pleas that _other_ people to
do something.  Every month or so, I check the ASRG archives.  If there
has been a change in the last year, I can't see it.  It's all urgent,
and devoid of anything like reports of actions.  Even survey and BCP
documents start and then fade into the mist.  I just now checked
https://www1.ietf.org/mail-archive/working-groups/asrg/current/maillist.html
to see if I'm being unfair.

Of course this problem is endemic to the Standards Process.  It's worse
with spam because the problem hard verging on unsolvable and few if
any of the participants are trying to ship a product before market
window closes, graduate students trying to complete a thesis, others
trying to publish papers before the grant runs out, or mail system
operators trying to avoid drowning.

There are vendors and so forth, but they see that it might make sense
to ship, install, or test a white box with Linux and SA but it is silly
to spend any salaries or time on "proposals" that can't have any effects
before the spam problem is finished by other effects.


> ...
> The IETF MARID BOF showed that serious discussion is, in fact, possible.
> One simply needs to insist on it and encourage it when it happens.

If http://www.imc.org/ietf-mxcomp/mail-archive/msg00067.html is
reasonably accurate, then I beg to differ.  As far as I can see, it
could be a summary of the most useful content of ASRG mailing list
from March and April, 2003.


  =


] From: Paul Hoffman / IMC 

] ...
] The majority of the "anti-spam" proposals being actively discussed
] are variants on the "prove the sender is who he says he is". None of
] these are perfect, yet:

Given the shift of many major spammers from forging domain names to 
using their own throw-aways like xxcdfm1.com, pointlesstomovehere.com,
and attractiveinternetnews.com, "not perfect" is an understatement.


] - they are being actively discussed in the ASRG

Somehow "actively discussed" is doesn't quite convey "continually
discussed round and round without any change."


Vernon Schryver[EMAIL PROTECTED]



Re: paralysis

2004-03-06 Thread Vernon Schryver
> From: Michael Thomas <[EMAIL PROTECTED]>

> ...
> So... instead of pointing out the obvious that
> there is no silver bullet, wouldn't it be a lot
> more productive to frame this debate in terms of
> what incremental steps could be taken to at least
> try to change the overall climate? To perhaps move
> things in a direction that might be in our favor?
> To perhaps be open to making some mistakes and/or
> no-ops?

Am I interfering with incremental debate framing, climate changing, or
designing, implementing, testing, and deploying possible solutions that
might be mistakes and no-ops?  I hope not and I don't think so.  In about
1997 Paul Vixie mentioned the notion of spam checksum clearinghouses.
I pointed out the obvious problems, but 6 or 9 months later hacked a
form of the idea into sendmail.  The DCC is now resisting about
350,000,000 spam/week.  When I heard about greylisting, I pointed out
some obvious problems, but worked hard to add it to the DCC client code.

That a problem seriously wants a solution does not imply that it has
one.  That personal immortality, matter transmission, and communicating
consent to receive mail sound nice does not imply that they are possible
or that they would solve more problems than they would create.  Either
way, lists of problems from wet bankets like me should not stop anyone
from designing, implementing, testing and deploying, unless they need
to sell a lot of stock beforehand.


> We know spammers are smart and adaptable. The
> problem is that in our paralysis, we are not.

Whose paralysis do you mean, Kemo Sabe?  Outside the mass media, mailing
lists, and usenet, plenty is being done about spam.  Some efforts have
been more effective than others.  Others such as laws have more future
hope than past performance.  Filter effectiveness above 95% is common.
Reasonably spam free mailboxes that are open to mail from perfect strangers
are more readily available today then they were 3 years ago.  Nothing
so far have been or will be a silver bullet.  Unless you believe vague
handwaving or swallow any of several brands of patent medicine, there is
no prospect of a FUSSP (Final Ultimate Solution to the Spam Problem).

By itself, framing debates is not productive unless you're only
interested in debates.  Few of those who do more talking and writing
about spam than administrating anti-spam mechanisms, designing, writing
or deploying code, enforcing laws, or anything else that directly
affects spam in more than their personal mailboxes are contributing
to solutions.


Vernon Schryver[EMAIL PROTECTED]



Re: Proposal For Token-Based Authentication In Mail Submission As Anti-Forgery Effort

2004-03-06 Thread Vernon Schryver
> From: "Sabahattin Gucukoglu" 

> ...
> and important catch in this proposal, that being a modification to all 
> MUAs and MTAs to allow the acceptance and carrying of a password token 
> which should persist throughout the entire mail delivery, ...

> My proposal is a scheme for anti-forgery, which makes use of a non-blank 
> token, or password, which can be verified by a recipient system ...

How does your scheme prevent forgery better than SMTP-AUTH, SMTP-TLS,
S/MIME, or PGP?  Most MTAs support SMTP-AUTH and SMTP-TLS.

The difficulties in preventing spam sender forgery are not in defining
token protocols but in

 - defining forgery in a way that excludes common, legitimate practices.
Why isn't sending mail with your Hotmail account as sender while
sitting at your desk at work or with your work sender address while
in a customer site, hotel room, or airplane "forgery" that would be
prevented by the proposed sender-verifying mechanism?

 - key distribution.
Verisign/Microsoft would be happy become the toll collecter for
all Internet mail using the current or a variation of the current
commercial PKI.  Some of us are not keen on that idea.  All other
key distribution mechansims have their own substantial problems,
including those that would use the DNS.

 - preventing spammers from buying as many tokens as they need.
The major spammer that currently calls itself Zhang Jun and Qing
Zhang has been burning several new domain names per day for the
last 2 or 3 months.  Why won't it be able to make or buy tokens
to go with each of its domain names?  Why won't domain2004.com,
managernic.com, namelite.com, nicsimple.com, sitesadmin.com, and
the rest of its DNS servers serve its SPF RRs or your password
tokens as readily as they serve NS, MX, and A RRs?  Why can't it
replace those DNS servers as they become recognized with new DNS
servers, as it has been doing for years?


> 1.  Sender MUA submits message through some host X, indicating token to X 
> using the stok extension to be defined in SMTP as an extention to its 
> "mail from:" command:
> mail from:<[EMAIL PROTECTED]> stok=blorb 

> ...
> 4.  MX begins a password query.  It must connect to some kind of password 
> query resource.  The MX may connect to a designated MTA for a domain and 
> use the stok keyword to query for a password (>>"stok blorb" <<"250 Token 
> is tasty!") or some other simplified database query.  ...

> 5.  Authenticated submitters are welcome, unauthenticated submitters 
> aren't, policy-dependent.   ...

Have you looked at SMTP-AUTH?
What about SMTP-TLS with verified certs required?

I hope you won't be too offended if someone points out 
http://www.rhyolite.com/anti-spam/you-might-be.html
I wrote it during the first months of the ASRG mailing list.


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-03 Thread Vernon Schryver
> From: David Morris <[EMAIL PROTECTED]>

> ...
> Well, I don't read such mail if I can avoid it ... I have never received
> email of value where there was no pre-existing 'connection'. People with
> business opportunities with mutual value continue to take the time to use
> the telephone even though email would be a viable alternative.
> ...

Your experience differs from mine and I think other people's.

I'm talking about entirely non-bulk, purely private, I think
unsolicited mail business proposals from strangers.  If anything
comes of the contact, telephone and face to face meetings often
occur, but email is often the cheapest (not just in money or time)
way for an initial contact.


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-02 Thread Vernon Schryver
> From: Paul Vixie 

> ...
> unsolicited, uncoordinated communication is wonderful, and i miss it.  let's
> build a universal electronic trust hairball so that we can get it back again.
> right now my choice is "deal with yahoo's endless unconfirmed spew" or "not
> be able to join any of the mailing lists my neighbors have set up there" and
> i would like a finer grained selection than that.

What does a transitive/secondary/whatever trust protocol have to do
with that?  Yahoo! is already the outfit bonding/hooking/whatever all
of that mail with its IP addresses.  Changing the label on what they
do to "transitive trust" will not by itself affect their policies and
practices.  As long as Yahoo! chooses to run mailing lists and domain
names the way they do, no matter how many tokens of trust or crypto
certs they slather on, their mail will remain what it is.

If Yahoo! would impose real penalities for abuse of its current
certificates of trust, the IP addresses of its mail systems, or do
anything else that really ensures that those who sign up for new domains
or new mailing lists are trustworthy, then there would also be no need
for newfangled tokens or certificates.  If Yahoo! would not always
respond to reports of spam involving its domains with "It didn't come
from us so it's not our problem" even with it did come from one of its
IP addresses, then Yahoo!'s IP addresses could be certificates saying
"This is not spam" as trustworthy as sa.vix.com [204.152.187.1].

I'm not arguing for IP addresses as security tokens.  I'm only pointing
out that issuing new identity cards to the usual suspects won't change
anything.  No IETF protocol can synthesize trust for organizations
that are not trustworthy.  Service providers that host spammers and
expect spam targets to deal with abuse will never be trustworthy.  Most
of the TBytes/day of spam comes from such providers, whether cable
modem outfits that turn blind eyes on "owned" boxes, free providers
whose penalty for abuse consists of making the spammer sign up for a
new drop box, or tier 1 providers that lie about the impossibility of
determining which of their resellers is hosting a spammer.


Vernon Schryver[EMAIL PROTECTED]



Re: "Principles" of "Spam-abatement"

2004-03-01 Thread Vernon Schryver
> From: Paul Vixie <[EMAIL PROTECTED]>

> ...
> that's not an unreasonable question.  and yet, the meatspace world copes.

The real world copes only by having laws against enforced violations
of trust.  Until the first spammer goes to jail for breaking the laws
that have long made most current spam illegal, all talk of trust fixing
spam is academic.  If the activities of the ROKSO 200 really get them
real penalties, then talk of trust vs. spam becomes relevant, but only
for as one among many fixes for what is currently a trivial part of
the spam problem, the spam from people who are not criminals.

> the thing cybertrust hasn't done is to take advantage of existing meatspace
> relationships.  ...
>... meatspace world and its millenia
> of traditions and mechanisms, trust clearly can scale.

It is not trust that scales but police.  There is no transitive trust
in the real world.  There are only bi- and sometimes trilateral contracts
and lots of people with guns ready to punish those who break trust.  If
transitive trust were even in the real world, buying a house would not
be such a big expensive ritual with escrow, title insurance, and so
forth.  If trust "scaled" in the real world, it would be a lot easier
to get the title for your car converted from one state to another.

Some might offer title insurance as a model for stopping spam, but
only if they've never paid for it.

> if your bond is only $30/year then i probably wouldn't trust you no matter
> what my bank told me about your insurance company or what your insurance
> company said about you.  remember, i don't want to know who you are, i only
> want to know who you know.  if the world has no hooks into you then i would
> withhold my consent.  presumably there are others who would only give consent
> if your religion was the same as theirs or if your identity was known -- but
> that all fits under the "all communications by mutual consent" banner.

There are problems there.  First is that you are not talking about
anything that might be called "transitive" trust.  The word "transitive"
is wrong and misleading.  Please use something like "secondary trust"
or "bonding" or "letter of recommendation."  Second, as Dave Crooker
wrote, your "hooks" are too nebulous.

There's a cool and relevant article in the March-April 2004 issue
"American Scientist."  It concerns how religious groups manage to trust
their members.  The problem/analogy with your trust model is that mail
is not worth $30/year to anyone, not to mention self-mutilation.  How
much does a "check guarantee card" or real estate title insurance or
a jail bail bond cost?


> ...
> unpleasant distinction between the transport and mailbox, and it *will* get
> replaced with something that can carry trust indicators and deal with
> multilevel agency.  but the real and larger work is the meatspace-sized trust
> web, without which smtp is probably as good as e-messaging can ever get.

I do not agree, but mostly because I doubt that vastly larger goal
of "a meatspace-sized trust web."  Whether SMTP disappears doesn't
matter to me.  I was using email long before it appeared.

And I say again: every time you, with your standing, even whisper about
replacing SMTP with a protocol that carries trust tokens, you give aid
and comfort to spammers and the parasites using the spam problem.
Regardless of what you mean, they translate your words as "Paul Vixie
agrees that TOES/SPF/RMX/SMTP-AUTH/CalleriD/HashCash/E-postage/...
is the Final Ultimate Solution to the Spam Problem."


Vernon Schryver[EMAIL PROTECTED]



Re: "Principles" of "Spam-abatement"

2004-03-01 Thread Vernon Schryver
> From: Paul Vixie <[EMAIL PROTECTED]>

> ...
> we are eventually going to be able to tell whether a message was generated
> by someone who was present and gave consent, or whether it's just wormware;
> and whether the owner of an ip-using device intends to act as a mail server;
> and whether a bond has been posted by this present/consenting sender and if
> so how much; and whether there exists or not a trust path from the sender,
> through their bank or school or employer or insurance company to the
> recipient.  the internet doesn't care what your meatspace identity is and
> anonymity is a necessary way of life -- but we do care very much whether
> transitive trust exists.  "who you are" matters less than "who you know",
> and this is true not just for messaging but also for web service accounts and
> passwords, for trading and payments, and for so-called "social networking."

The trouble with that is that trust is not and cannot be made transitive.

There is a finite chain of people that connects you with anyone you
care to name, with each person asserting any sort of trust you want
for the next person in the chain.  The chain that connects you with
Al Ralsky for the trust operator "the next person to corrently identifies
people" is probably shorter than 6 people.  The chain that connects
you with Ralsky for "next person to does not spam" is probably longer
than 6, but shorter than a couple dozen.  Even worse, the chain the
connects you to Al Ralsky for "the next person is not Al Ralsky" is
probably shorter than the first, short chain.

The notion of transitive trust makes as much sense as assuming that
all of the keys on the key rings of the people who will be signing PGP
keys at the IETF this week are of people who you can trust to not send
you mail you'd not want.

In the real world, there is nothing like transitive trust.  That's why
it is so hard to cash third-party checks.  The closest you can get to
transitive trust is something like the check clearing system, which
has only about 5 parties, with three (the two banks and the Federal
Reserve) so entangled that they can be considered a single outfit.
And check forgery remains a major problem.

If transitive trust could be made to work, then government security
clearances would be easy.  If it could work, we would have more than
3 credit reporting agencies, and we would not have so much machinery
to deal with their errors.  If transitive trust cannot be made to work
for those cases where there are major penalties for cheating, how can
you expect to make it work for mail, which no one values at more than
$30/year/seat?

You might say that you don't want fully transitive trust but only
to trust the people who know people you know.  If you want that
kind of mail system that does not carry message between strangers, 
you've already got it with any of the many kinds of whitelisting.

These problems with trust have nothing to do with the network protocols
involved.  They are fundamentally non-technical.  Talking about replacing
SMTP to implement transitive trust is at best a distraction.


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-01 Thread Vernon Schryver
> From: Paul Vixie <[EMAIL PROTECTED]>

> ...
> > And everyone else needs to move from the generic reference to
> > "consent" on to something that is more concrete, as well as being
> > integrated into a full range of human uses for email.
>
> i'm pretty comfortable with www.dictionary.com's definition of "consent".

That is the fatal flaw in the calls for technical mechanisms
"communicating consent" to fix spam.  Webster's definition of consent
also applies to keeping solicitors from knocking on your door and
bandits from mugging you on the streets.  What keeps enough of them
from lying about having your consent are the non-technical protocols
of the justice system.

No matter what additional token of consent that you require spammers
to present to demonstrate that you have agreed to their mail, either
spammers will be able to forge it or legitimate strangers won't be
able to obtain it without contacting you or your agents and ceasing
to be strangers.

The usual response to that (and one which I think you've suggested)
is to have a third party act as your agent.  But that is exactly
equivalent to the Microsoft/Verisign crypto authentication FUSSP.
Whether SMTP is involved is irrelevant; the fatal flaw of such agencies
applies to any messaging scheme.  It is that unless a mail identity
is practically unforgeable thanks to $10,000 costs or enforced legal
penalties, spammers will sign up for new identities as each is executed
for spamming.  If an identity costs less than $50/year and there are
no enforced laws against having as many identites as the recent spurt
of "Zhang Jung" and "Media Dreamland" domain names, it will be impossible
for your consent/identity/reputation agency to ensure that 1000 of the
next 1,000,000 applications are really Al Ralsky in disguise.

There are other problems with the "consent" or "identity" or "reputation
agencies" that are often talked about.  One is that giving Microsoft/AOL
a franchise to levy a $0.001 toll on or append an ad to every message
in the Internet is a Bad Thing unless you are stockholder.

These problems have nothing to do with SMTP.   You give aid and comfort
to the spammers and parasites on the spam problem by suggesting that
a replacement to SMTP might solve these non-technical problems with
"communicating consent."   You are implicitly supporting the worse
than snake oil being flogged as spam solutions by big outfits.


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-02-27 Thread Vernon Schryver
> From: John Leslie <[EMAIL PROTECTED]>

> ...
>But I, at least, am thinking in terms of an implementation where we
> notify the SMTP-sending-server during the SMTP session, with a message
> including a URL for more information. IMHO, this would tend to converge
> to a situation where end-users understood the issue -- and learned to
> route around it. ;^)

Where is the business of the main IETF mailing list in that suggestion?
It is already a de facto standard.  Many and probably most well run
SMTP servers include an appropriate message in their 5yz rejection
messages when spam detection is the issue.  Today an appropriate
message is often a URL.

There are details that could be officially standardized such as formats
that MUAs could more easily recognize and present to end users.  The
bounces generated by the near-end MTA after a failed SMTP session are
incomprehensible to many people.  Some MTAs (e.g. Hotmail's when I last
checked) include random text in their session transcripts apparently
drawn from random SMTP sessions during that last several hours.  However,
this sort of standardization seems more appropriate for some SMTP WG
or the ASRG than here.


Vernon Schryver[EMAIL PROTECTED]



RE: digital signature request

2004-02-26 Thread Vernon Schryver
> From: "Robert G. Brown" <[EMAIL PROTECTED]>

> ...
> It has been pointed out several times now that unless you are willing to
> receive mail only from a small, closed group of individuals that all
> agree to use digital signatures and whose mail you whitelist while
> blacklisting EVERYTHING ELSE you are right back where you are right now.
> ...

If you are interested in that model, then you do not need any fancy
cryptography, certs, pretty good encryption, S/MIME, or anything else
not already present in all SMTP mail.  You can whitelist using bits
that are already associated with every SMTP mail message and in
the body delivered to your MUA if your MTA is not broken junk.

Ever mail message carries a practically unforgeable (for spammers)
token identifying its source.  That token is the IP address of the
SMTP client.  If your MTA is reasonable, it is included in the Received
header it adds.  You only need fancy extra stuff if you cannot arrange
for your community to use only trustworthy MTAs or if your traffic is
worth the thousands of dollars (or equivalent labor) that breaking
security based on IP addresses requires.

Yes, I've heard of Bellovin, Mitnick, RFC 1948, etc. so forth and so
on and on.   TCP ISN faking is harder now than it used to be.  It was
always incompatible with the "bulk" in "unsolicited bulk mail."


The spam problem starts with accepting mail from strangers.  Give
up that design goal, and spam disappears.  So does much of the
justification for mail.


Vernon Schryver[EMAIL PROTECTED]



Re: digital signature request

2004-02-26 Thread Vernon Schryver
> From: Ed Gerck 

> ...
> If we force strangers to jump some hoops before their email can reach 
> our mailboxes, it seems clear to me that we can still keep receiving 
> email from strangers. 

That is the e-postage and other...I'm sorry but the best phrase is
"snake oil."  There is no and can never be a hoop that is low enough
to pass enough human strangers but exclude spammers' computers.  If
your hoop passes mail from
  - the deaf
  - the blind
  - those who don't understand the spoken form of your native tongue
  as well as a computer
  - those who don't use graphics (e.g. lynx)
  - whose whose computers don't play audio files (mine doesn't)
  - those who don't have computers made within the last 5 years
  - the tired, confused, or intoxicated
  - the lazy or disinterested
  - the mentally challenged or just plain stupid
then it will also pass mail from spammer's computers.

The idea of forcing your correspondents to jump through hoops that
spammers' computers can't is fundamentally wrong and crazy.  If there
is one good characterization of the difference between human and
mechanical minds it is that machines are far better at jumping through
hoops than we are.  Computers are happy to try a bazillion times until
they get it right.  We get bored.  A spammer's computer will happily
continue trying to guess the answer to your puzzle as long as you let
it, or look for it in a crib sheet of 1,000,000,000 clues.  We not
only won't; we can't.

Only the meta-hoop of fear of prosecution might work.  419 spam
demonstrates its severe limitations.


Vernon Schryver[EMAIL PROTECTED]



RE: digital signature request

2004-02-25 Thread Vernon Schryver
> From: [EMAIL PROTECTED]

> ...
> false positives.  even *one* false positive is 
> unacceptable.  even if my filter accuracy was 99.99% i 
> would still need to trawl my spam folder to check for 
> false positives.  and as the spam volume continues to 
> grow trawling the spam folder takes more and more 
> time.  i need to stop false positives and digital 
> signatures are one possible solution.

Digital signatures cannot stop false positives.  Even if all mail were
digitally signed, there would still be cases where the wrong key was
used, the right key did not reach the mail recipient before the mail
message, a cert expires, or something else hiccups.  The underlying
error rate for SMTP before spam appeared was worse than 0.01%.  Do you
think that 99.99% of HTTPS (HTTP over TLS or SSL) transactions work?
If so, look again.  If not, why would email be better?

If you cannot afford even one false positive, then you had better give
up on email.  My spam load is more than 300 messages/day, counting
only unsolicited bulk advertising.  I receive 50-150 legitimate messages
per day.  It would be impossible for me manually filter that stream
to 99.99% accuracy and so overlook fewer than 1 legitimate message per
10,000 or fewer than one per month.  No one can look at 10,000 messages
per month, never misclassify any as spam or not, and do any other work.
Talk about not losing even one message makes sense only if you receive
almost no spam.

People who talk about 99.99% accurate spam filters as if they were
possible
  - don't know how computers work in the real world (e.g. have no idea
  why the phrase "key distribution" makes some people cringe or
  assume the tooth fairy handles key revocation)
  - don't receive much spam
  - are innumerate
  - are charlatans.
  - are two or more of the above.

At least weekly I'm told of yet another final ultimate solution to the
spam problem with 100% accuracy.  They are all frauds, like weight loss
diets without hunger or any other inconveniences.  Sometimes they have
creative definitions of "spam" and "false positive."  Usually they are
merely obvious wishful thinking and nonsense, like the hoary old claim
that authentication (including digital signatures) will stop spam.


Vernon Schryver[EMAIL PROTECTED]



Re: digital signature request

2004-02-25 Thread Vernon Schryver
> From: [EMAIL PROTECTED]

> ...
> > Having the latest tools means nothing, unless they are used right.  Are 
>
> i'm using them correctly

I, for one, am unconvinced.  I have had no trouble filtering unwanted
mail from this list, thanks to procmail.  My various filters have no
trouble dealing with more than 99.9% of the unsolicited bulk mail
including viruses and worms directed at my mailbox.  For my mail, my
filters have a total false positive rate (legitimate rejected divided
by total legitimate) of less than 0.1%.  Whether your filters are doing
as well as you want them to does not seem like a concern of the IETF.

> ...
> the value in having the list processor sign all posts 
> is simple.  guaranteed identification of the list 
> traffic for any recipient who decides to verify 
> signatures.  

I think it would be simpler for all concerned and in this case just
as effective if the IETF list processor would offer to do SMTP-TLS and
for an appropriate cert to be published on http://ietf.org/

However, I would not suggesting that for any practical or operational
reason.  It would merely set a good example. 


Vernon Schryver[EMAIL PROTECTED]



Re: How Not To Filter Spam

2004-02-19 Thread Vernon Schryver
> From: Ed Gerck <[EMAIL PROTECTED]>

> > If a complete stranger is the sender of an incoming message, then
> > crypto keys are irrelevant to determining the message is unsolicited
> > bulk.  
>
> No. In PGP, for example, I accept a key based on who signed it and
> when. If I can trust the signer(s), I may use a key from a stranger.

That sounds like the old "authentication solves spam" hope.  It was
wrong before SMTP-AUTH and it is still wrong.  If the sender is a
stranger, then by the definition of "stranger" you can know nothing
more than that the key works.  You cannot know whether the stranger
is one of Alan Ralsky's myriad of aliases delivering spam.


> > The PGP mantra that a good key does not imply that the sender or the
> > message is good applies here.
>
> Define "good key" and you'll define what the key is good for.

The ancient PGP mantra refers to keys that "work," as in the results
of decoding using the indicated public keys yield a valid messages.
The key can be good, but a good key tells you nothing more than that
the sender of the message knows the corresponding private key. 

Would you trust every PGP key from the IETF key signings to guarantee
that a message is not spam?  Some IETF participants have been unashamed
senders of unsolicited bulk commercial advertisements.  The person I'm
thinking of objected to his entry in my blacklist by insisting that
although he had sent the triggering message, it was not spam because
he had not sent more than one copy per mailbox.  He might have since
changed his definition and stopped sending unsolicited bulk mail, but
it would be silly to think everyone who gets a PGP key signed at an
IETF key signing party is someone from whom you want to receive mail.

Given who will pay certifiers, the IETF key signings are far less
bad guarantors of non-spam than commercial certifiers.  Consider
privacy policy certifiers and see one of the several versions of
http://enterprise-security-today.newsfactor.com/story.xhtml?story_title=Online_Privacy_Policies_Misleading

] An analysis of Web sites carrying those seals found that the
] companies running them ask for more personal information -- and
] protect it less -- than sites that have no seals.


Vernon Schryver[EMAIL PROTECTED]



Re: How Not To Filter Spam

2004-02-19 Thread Vernon Schryver
> From: Ed Gerck <[EMAIL PROTECTED]>

> Yes. However, if your mailbox could automatically handle confirmation
> requests based on messages that were actually sent by you (in much
> the same way that NAT boxes work -- you only get a reply to a request 
> you send), then you would not be bothered by the C-R traffic at all. 

As long as you are wishing for things with no prospect of reality
in the foreseeable future, why not wish for long jail terms for the
ROKSO 200?

Automatic C-R handling in MUAs would solve the spam problem much
as NAT boxes have solved the address shortage and routing table
size problems, by creating other problems that are worse in the
long run.  For example, C-R handling in MUAs would do nothing for
the problems C-R systems have with mail that is not simplistic
messages between individuals.

Someone recently wrote that challenge/response systems would be practical
if there were a way for C-R systems to identify and not challenge
mailing list traffic.  That made me choke, because all spam is mailing
list traffic.  Perhaps what was intended was making C-R systems recognize
solicited mailing list traffic.  If your C-R system could do that,
there would be no need for any challenging or responding.  You would
challenge neither non-bulk nor solicited bulk mail, and would simply
reject all unsolicited bulk or spam mailing list traffic.


> Messages among complete strangers is a necessary feature, IMO, but  
> shouldn't it behave in cyberspace as we learned to do it in the 
> social space? Trust is earned. When a complete stranger calls me, 
> I usually ask who or what introduced me to him before I start any 
> conversation. If the complete stranger has no satisfactory answer, 
> I ask him to take me off his database and not call again.

If that's good enough for you, then you already have it.  The start
of a phone call from a stranger corresponds to the initial mail
message.  The asking to be added to a DNC list corresponds to adding
an entry to your email blacklist.

You probably want PKI magic that will tell your MTA or MUA whether
substantially identical copies of an incoming message from a complete
stranger will soon be sent to 30,000,000 of your intitmate friends.
That magic would happen before you do the equivalent of answering
a phone call from a stranger.

If you are among those who configure their telephones to reject calls
with caller-ID values not in whitelist, then you can configure your
email system to do the same with IP addresses.  That will eliminate
essentially all spam.  It also eliminates messages from strangers.


> > People who know each other's crypto keys are not strangers.
>
> It is possible for my MUA to automatically provide a complete stranger 
> with my PK if I receive an email from him. The barrier to have my 
> crypto keys does not have to be any higher than the barrier to have 
> my email address.

If a complete stranger is the sender of an incoming message, then
crypto keys are irrelevant to determining the message is unsolicited
bulk.  If the sender of spam is not a stranger, then you made a mistake
in handling keys.

The PGP mantra that a good key does not imply that the sender or the
message is good applies here.


Vernon Schryver[EMAIL PROTECTED]



RE: How Not To Filter Spam

2004-02-18 Thread Vernon Schryver
> From: "Robert G. Brown" <[EMAIL PROTECTED]>

> ...
> If a message comes in incorrectly addressed, yes, it will bounce.  It
> should, shouldn't it?  This has nothing to do with whether or not it is
> spam or a virus or any other kind of message.  If it is a bad thing, it
> is a very fundamental bad thing...
> ...

If the envelope sender was forged as is common in spam, universal in
worms, and practically nonexistent in legitimate mail, then your bounce
will afflict third party's mailbox.  My mailbox receives enough worm
bounces to make me say it is an awfully bad thing.

The only fix is to have your external MX servers know all valid
addresses and so reject junk before it can be accepted and later
need to be bounced.  That fix is often impractical or impolitic.

No, SPF, RMX, TOES, etc. etc. etc. cannot fix this problem unless you
assume frictions (deployment resistence and delays) do not exist
or you discard SMTP design goals including transporting messages among
complete strangers.

People who know each other's crypto keys are not strangers.  

If you could someday trust organizations to vouch for strangers and
not sell spam-for-a-day certs to Ralsky/Ricther/&co, then today you
could trust the same outfits to not sell spam-for-a-day/week/years IP
bandwidth accounts.


Vernon Schryver[EMAIL PROTECTED]



RE: How Not To Filter Spam

2004-02-18 Thread Vernon Schryver
> From: "Tony Hain" 
> To: "'Vernon Schryver'" <[EMAIL PROTECTED]>, <[EMAIL PROTECTED]>

> So if you had received the mail sent here yesterday claiming to be from
> Alain Durand would you block Sun or IBM?  ...

I should not have responded specifically (if at all) to the other
gentleman's complaint about my blacklists.  Whatever I do to mail
directed at stuff I control is irrelevant here, provided I do not
affect any third parties.  My freedom to filter access to port 25 (SMTP)
and port 23 (telnet) is equally and completely unfettered.

Two groups oppose that principle.  Some people demand SPEWS and other
filters with what they consider too many false positives be outlawed,
because those filters might affect their outgoing mail.  They are
unmoved by users knowingly choosing their own filters.  They feel their
right to be heard by whomever they choose overrides the rights of their
targets to be left alone.

Other people see nothing wrong in spewing junk at third parties if it
might reduce their own spam loads.  These people include users of
systems based on challenge/responses, bounces after the initial SMTP
transaction (sometimes from within MUAs), "bitch lists" that send
complaints to dozens of third parties.  These people feel their right
to consent to whatever appears in their mailbox overrides the similar
right of others.

As I see it, both groups suffer the same pathology as spammers.


 .

] From: "Robert G. Brown" <[EMAIL PROTECTED]>

] ...
] In the department, where we do USE spam assassin, no bounce messages are
] generated except when mail fails for one of the standard reasons
] unrelated to filtering of any sort.  ...

On today's Internet, innocents are almost certainly receiving bounced
spam and viruses from your system that could not be delivered for
reasons unrelated to filtering, such as bogus target addresses.

] ...
] If that rejection occurred during the original transaction and generated
] a bounce -- well, that's the kind of thing we see above, a cure that can
] easily be worse than the disease, ...

The idiotic messages from that stupid challenge/response system are
not generated during the original SMTP transaction.  It is possible
to do challenge/responses that do not involve separate messages, but
they suffer from MUAs and MTAs that do not handle SMTP rejections
properly and users who cannot understand them.

Somehow making SMTP rejections understandable to users is something
that the IETF might attempt.  I think that is something the ASRG is
considering.  I also think that is nearly impossible.  such is life.


] If I understand what you are saying, perhaps there is a way to "do it
] correctly" -- reject the spam at the original smtp transaction but with
] a message that goes back to the original sender (only) in spite of the
] fact that both the From and Return Path header entries might well be
] forged and the message relayed through one or more open relays.  ...

Headers and the SMTP envelope, forged or not, are irrelevant to SMTP
5yz and 4yz rejections, as far as the rejecting SMTP server is concerned.
If the spam came through an open relay, then a proper SMTP rejection
might cause the relay to send a bounce to an innocent mailbox, but
SMTP relays are out of favor among spammers compared to open proxies.


Vernon Schryver[EMAIL PROTECTED]



Re: How Not To Filter Spam

2004-02-17 Thread Vernon Schryver
> From: "william(at)elan.net" 

> > It is also a classic example of what is wrong with the MUA filtering
>
> You certain dont assume that there is nothing wrong with the filtering
> system you use and others may try duplicate as well. Otherwise how would 
> you explain that you have Elan and completewhois.com listed as filtered
> on your site. Do you honestly believe we ever sent you any SPAM? Or maybe 
> you're making certain assumptions about envelope from or normal "From:" 
> headers and complaining when others are making the similar assumptions?

Mail from Elan and completewhois.com is unwelcome at rhyolite.com in
patt because of a message that said:

] Elan.Net Internet
] T.1 T.3 Frame Relay
] If you need more information about us or are interested in network services 
] (managed hosting, collocation, dedicated servers, t1, t3), please send email to 
[EMAIL PROTECTED] 
] 
] For More info 
] http://www.elan.net
] [EMAIL PROTECTED]

There are additional, independent, sufficient reasons for that listing
that we do not need to explore.  If you will read my web pages, you'll
see that my list of unwelcome domains is not only about senders of
unsolicited bulk email.

An advantage of a vanity or other tiny domain is that it can use
blacklists that would have intolerable false positive rates at other
or larger outfits but that have 0.000% local false positive rates.


Vernon Schryver[EMAIL PROTECTED]



How Not To Filter Spam

2004-02-17 Thread Vernon Schryver
Thn enclosed example of how not to filter spam is offered for those
who might want to preemptively add accuspam.com or downloadfast.com
to their blacklists.

It is also a classic example of what is wrong with the MUA filtering
tactics Robert Brown advocates.


I certainly did not try to contact anyone at 3dize.com.  A few readers
of this mailing list might recall that Shelby H. Moore III and I don't
see eye to eye.
I do not know what the From: header of [EMAIL PROTECTED] is about.
Perhaps it was forged.  Or perhaps someone at that address wired a
subscription to this mailing list through an unusually braindea)
challenge/response spam filter at DownloadFAST.com.  If so, the
Secretariat should blacklist accuspam.com and/or downloadfast.com from
subscriptions to IETF mailing lists.  (It would need to be unusually
braindead to send me the challenge instead of the envelope sender.)


Vernon Schryver[EMAIL PROTECTED]


> From [EMAIL PROTECTED]  Tue Feb 17 19:26:14 2004
> Received: from www.DownloadFAST.com (www.downloadfast.com [65.61.155.11])
>   by calcite.rhyolite.com (8.12.11/8.12.11) with ESMTP id i1I2QDiM048994
>   for <[EMAIL PROTECTED]> env-from <[EMAIL PROTECTED]>;
>   Tue, 17 Feb 2004 19:26:13 -0700 (MST)
> Received: from www.downloadfast.com (localhost.downloadfast.com [127.0.0.1])
>   by www.DownloadFAST.com (8.12.10/8.12.10) with ESMTP id i1I1hIQf002492
>   for <[EMAIL PROTECTED]>; Tue, 17 Feb 2004 19:43:18 -0600 (CST)
> Received: (from [EMAIL PROTECTED])
>   by www.downloadfast.com (8.12.10/8.12.6/Submit) id i1I1hITA002491;
>   Tue, 17 Feb 2004 19:43:18 -0600 (CST)
> Date: Tue, 17 Feb 2004 19:43:18 -0600 (CST)
> Message-Id: <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
> Subject: Re: Re: covert channel and noise -- was Re: proposal ...
> From: [EMAIL PROTECTED]
> Reply-To: [EMAIL PROTECTED]

> You attempted to contact us via email, and our anti-spam system is returning your 
> email below.
>
> Please kindly resend your email below, using our Contact Form on our web page:
>
> http://accuspam.com?kM,vbrJT
>
> After using our Contact Form only once, your future emails will not be returned.
>
> If you do not use our Contact Form to re-send your email below, then we can not read 
> it.
>
> __
> Powered by http://AccuSpam.com. Signup instantly for FREE!
>
>
> Your Returned Message:
> From: "Robert G. Brown" 
>
> > ...
> > Or, mark for later accept/reject decisioning AFTER the SMTP server per
> > se, in the filter pipeline between the server and the mail spool of the
> > addressee.  Spam assassin does the right thing already (and this is
> > exactly what it does).
>
> ***NO***!  Except when run as a milter or otherwise during the SMTP
> ...



Re: covert channel and noise -- was Re: proposal ...

2004-02-17 Thread Vernon Schryver
; messages that are not correctly classified when they are rejected.
> Important messages can be lost.  Bad things can result.  Who is
> responsible when this occurs?  Who do I get to sue?

You don't get too sue anyone, because a reasonably designed system
lets you choose to do all of your spam filtering manually or in
your personal MUA.  The only caveat is that your account should be
terminated for network abuse if whatever mechanisms you choose
bounce very much spam to innocents.

That many filtering systems are junk including not allowing per-user
preferences is as illuminating as the fact that spam flogging spam
filters is common.  All I can see from either is that hard problems
attract charletans and would be gurus.


> ...
> It is perfectly reasonable for you to add content filters that YOU
> control ABOVE this transport layer.  If you want to hire a secretary to
> open all of your mail for you and sort it and reject all the
> advertisements, you can.  

You are welcome to require manual filtering for your mail, but you
have no standing to dictate to others at other institutions.

"Transport layer" seems like a misuse of the term.  It certainly
conveys nothing to me.


> With that all said, there are tools that ALREADY provide the kind of
> content level filtering mentioned above.  The better ones do not
> themselves discard or bounce any mail to any user.  

People with experience in this field never say never.

> They simply SCORE
> THE CONTENT with regard to its likelihood of being spam (or a virus) on
> the basis of a whole battery of tests.  Scores that exceed a given
> threshold can easily and automatically be rejected or binned for a
> ...

All of that can be done during the SMTP transaction just as effectively
as after.  Rejecting spam after the SMTP transaction should be and in
many quarters already is seen as network abuse requiring at least a
stern warning.


Vernon Schryver[EMAIL PROTECTED]



Re: covert channel and noise -- was Re: proposal ...

2004-02-17 Thread Vernon Schryver
> From: John Leslie 

> ...
> >   - local administrative choices that keep bastion SMTP servers ignorant
> >   of per-user filter preferences
>
>This is a feature, not a problem. If the end user wants a filtering
> process individualized that much, s/he should choose to use a SMTP
> server which agrees to do so.

That is a feature only if the user accepts the consequences of discarding
mail without generating bounces, including not informing senders of false
positives.  Bounces from internal spam filters (either in MUAs or MTAs
inside organizations) are a major source of unsolicited bulk mail or spam.


> >   - filtering at the DATA command requires either (1) rejecting for
> >  all or no targets or (2) accepting for all targets and siliently
> >  discarding the message for those targets that want it filtered.
>
>Alternatively, the receiving SMTP server could reject any multiply-
> addressed email.

People running SMTP servers that handle 100K or more msgs/day have
been uniformly horrified when I've suggested that.  I don't really
understand why, but I have given up on the idea.



>(Silently discarding _is_ a bad idea, when done by the SMTP server
> itself. IMHO, it's better to mark for later discard -- which actually
> could be done in such a way as to mark only for those recipients who
> requested the more restrictive filtering.)

A better positition is that everything should be logged, particularly
including discarded mail, and in that case, enough of bodies to allow
targets to identify senders and the nature of the discarded messages.
Of course, one should assume users won't normally look at those logs.
Spam you read is not filtered, but at most categorized and stigmatized.


Vernon Schryver[EMAIL PROTECTED]



Re: covert channel and noise -- was Re: proposal ...

2004-02-16 Thread Vernon Schryver
> From: "Robert G. Brown" <[EMAIL PROTECTED]>

> ...
> I agree.  However, all of the observations made so far regarding
> spam/virus filtering in general still apply to filtering at the SMTP
> level. I would say that NO keyword filtering could take place.  The
> best that one could do at the protocol level would be to reject messages
> that fail to meet a tighter criterion than is currently required.

What is "the SMTP level"?  Is that during SMTP transactions between MTAs? 
Is "the protocol level" the same or something else?

If both of those "levels" refer to SMTP transactions between MTAs, then
the conclusion is wrong.  Except for local administrative hassles, all
spam and virus filtering that can be done later can instead be done
during SMTP transactions between MTAs.  Your SMTP server may need to
wait to until the end of the DATA command to object to messages
containing viruses, missing or bad SMTP headers or other objectionable
content, but that works fine.  I know of many millions of spam that
are filtred during the DATA command every day, and I don't claim to
know about any really big sites.

The only problems are:
  - local administrative choices that keep bastion SMTP servers ignorant
  of per-user filter preferences
  - filtering at the DATA command requires either (1) rejecting for
 all or no targets or (2) accepting for all targets and siliently
 discarding the message for those targets that want it filtered.

In theory the second problem could be fixed if the DATA command could
accept a vector of 250-OK/4yz-try-later/5yz-fatal responses, one for
each target named with a Rcpt_To command.  In practice the spam problem
will be solved one way or another long before such a protocol change
would be sufficiently widely deployed to matter.


Vernon Schryver[EMAIL PROTECTED]



Re: The IETF Mission

2004-01-19 Thread Vernon Schryver
> From: grenville armitage <[EMAIL PROTECTED]>

> ...
> then that's a problem we can fix without creating an indestructable I-Ds.
> ...

IETF rules to the contrary, I-Ds are indestructable for anyone who
cares to look for them.  Every several months I'm moved to point to
classic I-Ds that should have been destroyed as proof that almost
anyone can submit an I-D that says almost anything, no matter
how...ah...controversial.  I have never failed to find copies somewhere
on the net.  Today the only aspect of an I-D that expires after 6 months 
is the endorsement implicit in a copy at venera.isi.edu or www.ietf.org.

Today an endorsement of some sort is the only difference between having
your ideas heard by self-publishing and having them officially published.
The web is taking us a major step forward to 400 or 500 years ago when
good ideas were self-published and readers didn't need the moderation
of a Rupert Murdoch or the IETF.  I don't know what the academic
publish-or-perish, RIAA, and other commercial and mass media worlds
will do to replace their citation indecies, royalties, and advertising
revenues, and I don't much care.

I'm not saying anything against WGs producing Informational RFCs. 
I'm only pointing out that calls to have the IETF Mission Statement
"broaden the scope and quantity of documents to be published" suggest
ignorance of search engines or needs to have things endorsed by the IETF.


] From: Fred Baker <[EMAIL PROTECTED]>

] I don't know that we're changing anything in what the IETF does. What is 
] happening is that the IETF is growing up and taking control of its own 
] destiny in a variety of ways, and trying to clean up its own processes. In 
] all the *other* problems it tries to solve, the IETF tries to say what 
] problem it is solving sometime before finishing solving it, if for no other 
] reason so that it can decide whether it did in fact solve it. Same here.

The facilitators hired by H-R departments to run mission statement
"off-sites" always say all of that.  They are always perfectly sincere
and well meaning.  Those good intentions do not change the fact that
trying to write a mission statement changes the organization.  If an
organization lacks an unstated consensus purpose, then writing a mission
statement is unlikely to create one.  On the other hand, trying to
write one exposes any lack of consensus and turns into a race to the
Dilbert Standard of advocating all virtues, condemning all vices, and
creating new mandates such as "ad hoc WGs" and "archived I-Ds."

You could be right and I might be wrong if much this thread were not
filled with talk about turning the IETF an unfunded Reed Elsevier.

] ...
] Once we have decided that we did in fact solve the problem before us, I 
] don't know that the bumper sticker gets us all that much further. But the 
] bumper sticker can be helpful when we are asking the questions "what are we 
] trying to accomplish?" and "are we accomplishing it?".

It's one thing to consider those questions and something else to write
a "mission statement."  Mission statement facilitators always say the
only purpose is to consider those to questions, but the results are
what they always are.  Those results are related to the fact that they're
officiously titled "Mission Statements" instead of "ad hoc comments
about what we're trying to do and how well we're doing it."

I know many of you must have been through Mission Statement charades.
Have you ever seen one that with 12 months hindsight was not a waste
of time or worse?  My personal experience suggests that "write a mission
statement" means the same as "jump the shark."  See
http://www.google.com/search?q=%22jump+the+shark%22


Vernon Schryver[EMAIL PROTECTED]



Re: The IETF Mission

2004-01-19 Thread Vernon Schryver
> > Not all important ideas enter the working group process and emerge
> > as standards, and the fact that some working group chooses not to
> > "capture" an document does not make it necessarily unworthy of
> > preservation.  ...

> Another approach here is to allow for the creation of ad-hoc WGs. That
> would provide a cleaner path for tangential documents that don't fit
> ... 

Let's see if I've got all of this straight:

 - The IETF is working on a Dilbert Standard compliant Mission Statement.
  The Dilbert Mission Statement Standard requires foursquare support
  of all virtues and opposition to all vices, without unnecessary
  (read "any") limitations.

 - There are many wonderful ideas that are so awesome that if they were
  self-published, their publishers cannot be slashdotted and would
  never be indexed by Google.  To remedy this unfair lack of publishers
  and de facto censorship, the IETF will go into competition with the
  ACM, IEEE, etc. in both the refereed academic publish-or-perish
  business (e.g. CACM or *Transactions) and the random research notes
  business (SIGCOMM).

 - Salescritters, marketoons, and trade rag espurts find it inconvenient
  to utilize the IETF imprimatur by submitting I-Ds (possibly pushed
  to Informational) and then advertising compliance.  To fix this
  terrible shortcoming of the IETF Standards Process that hinders
  innovatation by Microsoft and other leading edge organizations, the
  new IETF Mission Statement will require that anyone who wants a WG
  can have one.

I think those are excellent proposals, although perhaps not for the
same reasons as other adovcates.  I've been complaining about nonsense
I-Ds and write-only RFCs for many years.  The most effective way to
relive the pressure for junk RFCs and nonsense IDs is to make IETF's
stamp of approval meaningless by giving it to anything and everything
that comes along.  Within a matter of at most a year or two, RFCs might
go back to what they were 20 years ago.

To solve any funding problems or overwork of the IESG,
http://www.ietf.org/html.charters/wg-dir.html will become an automated
index of links much like http://reshmeat.net/ and we'll do away with
Last Calls. 

Let's hurry up and advance or at least archive these IDs before they expire:

  draft-terrell-internet-protocol-t1-t2-ad-sp-06.pdf
  draft-terrell-iptx-dhcp-req-iptx-ip-add-spec-00.pdf
  draft-terrell-iptx-dns-req-iptx-ip-add-spec-03.pdf
  draft-terrell-iptx-spec-def-cidr-ach-net-descrip-01.pdf


Vernon  Schryver[EMAIL PROTECTED]



RE: Death of the Internet - details at 11

2004-01-13 Thread Vernon Schryver
> From: John C Klensin <[EMAIL PROTECTED]>

> ...
> (1) As others have pointed out, the knowledge/skill level of a 
> typical ISP seems to be on a rapid downslope with no end in 
> sight. ...

> ...
>   * The difference between those "business rates" and
>   whatever you are paying are mostly determined by a "what
>   they can get away with" mentality -- we know what the
>   marginal operational costs are.   If those prices stay
>   high, it is either because there is no alternate
>   provider, or because there is (illegal) price-fixing
>   going on, or because no one sees a business opportunity
>   by operating a business service at a lower margin.  

The second segment seems to ignore the implications of the first segment.
The marginal cost difference between "business" and "residental" is
zilch only if you have the same people running things and interacting
with customers.  Front line tech-support droids that are dumber than
the Windows boxes of residential customer cost a lot less than humans.
If your front line support people know have a clue about the LSRR IP
option, then either your rates are higher than $30/month or you have
customers like us who do most of our own support (and cost our employers
or ourselves a lot more than $30/month for that support).

>   Many
>   of us can remember when the solution to "no viable
>   Internet dialup service" was "go form a consortium with
>   a few friends"... 

There are some surviving ISPs that were started and still run that way
least in geographical areas I know about.  Their prices seem to be
higher than the organizations in that race to maximum stupidity.

It is not a coincidence that they have very few internal spam problems.
They are never blacklisted, not even by the second tier spam blacklists,
even when they rent straight modem dial-up ports.  (Third tier DNS
blacklists are kooky 32-bit random number generators.)


> perhaps it is time to do something
>   similar with DSL.  

I know people who have done that sort of thing with DSL and 802.11.
However, I fear that idea is generally killed for now by the fact
that IP bandwidth pricing is set by those outfits racing for ultimate
stupidity.  They see IP bandwidth as a loss-leader.

>  Or maybe we would rather whine than
>   do something, perhaps because what we have been fed is "good 
>   enough".

Until people like the individual complaining here that his cable-modem
is listed as a dynamic address are willing to pay for the costs of
real IP service, including the costs of doing more against your spamming
customers than asking blacklists to list your own addresses, there's
not much hope.

We could accept the fact that people who are not willing pay more than
$10-30/month are not interested in the Internet and stop listen to
their whining.  Detroit laughs as people who expect to get Mercedes
for Chevrolet prices.  Why can't we laugh at people who expect to get
real IP service for $10-30/month, or least stop taking their demands
literally?

If cable-modem IP is good enough for you, then you're not interested
in multihoming or even running your own VoIP system.  You might be
happy to have your phones connected to the email and web browser
demark/appliance maintained by your telco/cableco, but you're not really
interested in the Internet.  You lack the interest to be allowed to
run your own servers for anything.


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-13 Thread Vernon Schryver
> From: Nathaniel Borenstein <[EMAIL PROTECTED]>

> > You might be ignorant instead of dishonest.
>
> How very kind of you to consider two possibilities, thank  you.

My original words that you felt labelled you dishonest explicitly
included that possibility.  Most people have strong opinions about
spam, but have not really looked at it, and are quite wrong about it.


> ...
>  (And, by the way, I consider *any* false positives unacceptable if 
> there's no suitable mechanism for detecting and correcting them.)

That wisdom applies to a lot more than spam defenses.

However, it is worth noting that many and perhaps most email users
value avoiding false negatives more than avoiding false positives in
their spam defenses.  That is one reason why the blunt, high false
positive blacklists are popular.  One also must not try to reduce false
positives from spam filters much below the error rate of SMTP in the
real world (e.g. not just bounces but blackholes).


> This discussion is going nowhere, so I'm going back to more serious 
> work on comprehensive spam control.  

That's fine, but it would be wise to recognize the overall situation
while developing those comprehensive controls.  Railing against the
evil conspiracy of big monopolistic ISPs using blacklists against
themselves isn't productive.  Except for organizations that run their
own private blacklists, public anti-spam blacklists will remain quite
popular.  MAPS used to claim 45% of the Internet used the RBL.  I
suspect that at least that much uses the RBL+, CRL, XBL, SBL, and/or
SPEWS.  Public blacklists are here to stay, because they work.

The only likely tactic for reducing the use of blunt blacklists such
as those listing dynamic IP addresses is to convince ISPs to take network
abuse seriously.  As long as big ISPs make listing their own IP adddresses
"dynamic" lists their main response to their own bad customers, those
blunt, high false positive blacklists will remain popular.

Talk about transition plans to IPv6, comprehensive spam controls,
the evils of NAT, the evils of blacklists, media conglomerate ISPs
distributing NAT boxes to break VoIP, and monopolisitic ISPs using
blacklists is one thing.  Actually doing something is something else.


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-13 Thread Vernon Schryver
> From: Nathaniel Borenstein <[EMAIL PROTECTED]>

> ...
> > Mr. Sauve could rent an IP address that is not on dial-up or dynamic
> > blacklists and run his systems there.
>
> In other words, because some ISP with whom he has NO relationship has 
> deemed his own ISP spam-friendly, he should abandon his ISP, whether 
> *he* thinks they are spam-friendly or not. The words that come to mind 
> to describe this sort of arrangement are "cartel," "blackmail," and 
> "extortion."  It is also a perfect example of an assertion I made 
> before, which is that blacklists are being used by the large ISP's as a 
> tool for consolidation in the ISP market.  When RoadRunner blocked my 
> ISP, the *only* thing they were helpful about was offering to help me 
> get "better" Internet service by changing ISPs.

Exactly the same charges can be made about taxis, pizza delivery
services, and so forth that refuse to deliver to "bad" parts of the
real world.  Perhaps in some cases you are right, but in the vast
majority you are wrong.  Is a simple, undeniable fact that the sources
of spam are concentrated in a small fraction of the IPv4 address space.
For example, the last numbers I saw about SPEWS had it listing a tiny
fraction of 1% of the IPv4 address space.

There are other problems with your theory.  The biggest is the link
between the big ISPs and the blacklisters.  Besides the undeniable
spammers (e.g. the ROKSO members), it is the big ISPs that are most
likely to be blacklisted, particularly in "dialup" or "dynamic"
blacklists.  According to your theory, Charter Communications is part
of a conspiracy of big outfits to drive away their own customers by
blacklisting their own IP addresses.  How sane and honest is that?

If you are saying that blacklists and boycotts are dangerous weapons,
then you're certainly right.  That's why contrary to my naive reading
of the U.S. Constitution, there are federal laws that limit or outlaw
boycotts in some circumstances that I don't understand.  
See http://www.google.com/search?q=%22secondary+boycott%22

Exactly what do you want? 
  - a U.S. Federal law against IP address blacklists?
  - a test for social responsibility and good sense given prospective
  IP address blacklist opererators administrated by the IESG?
  - a U.N. regulation prohibiting stupidity and foolishness by users
  and ISPs while choosing blacklists?

Pardon me, but it seems you want the IETF to declare that all blacklisting
and spam rejecting by IP address wrong and nasty.  As far as I can
tell, you would require me to accept mail from 69.6.0.0/18 because you
fear I might refuse mail from you.  Or perhaps you would allow me to
reject Wholesalebandwidth spam provided I not tell anyone.


> >> Blacklists also, quite clearly, don't work to eliminate spam.
> >
> > No honest person who actually looks at spam agrees with that.
>
> As I've made clear, *I* agree with that.  Given the exchanges that 
> preceded this, it sounds like you are asserting that I -- and all the 
> other people who have argued against you in good faith on this list -- 
> are dishonest.  Is everyone who disagrees with your conclusions 
> necessarily dishonest?  If so, why are you wasting time talking with 
> us?

You might be ignorant instead of dishonest.  If you have not looked
any blacklists except those that have affected your mail, then you
have not, in my words, really looked at spam.

Are you calling me and those who point out that some blacklists 
detect 70-90% of spam with false positive rates below 1% liers?
It your words could be read that way.


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-12 Thread Vernon Schryver
> From: [EMAIL PROTECTED] (Mike S)

> ...
> >Instead of paying the extra cost to hire an ISP that cares
> >enough to not have spamming customers, people complain about the evils
> >of blacklists. 

> ...
> I can't do so because my IP address is on a blacklist. I have
> cable modem, but the world thinks I'm a dial-up. For that reason
> alone, having nothing whatsoever to do with spam, I'm forced to
> give up privacy and control of my communications.

Mr. Sauve could rent an IP address that is not on dial-up or dynamic
blacklists and run his systems there.  A remote co-lo or hosting service
would cost more than the $30/month or whatever slum rate he is paying
for cable modem service.  Or he could convince his correspondents to
whitelist his IP address or stop using the relevant blacklists.  Either
he has not tried that, his correspondents also pay slum rates for slum
service, or they don't want enough to hear from him to increase their
spam loads.

Perhaps I should ask if Mr. Sauve is violating the terms of service
of his ISP.  What does Charter say about "servers"?  Did Charter
give Mr. Sauve's IP address to the blacklists that bother him?

Or perhaps he has already rented an IP address that is not dynamic.
But if he has done that, where is his complaint?  Is it just
Interveloce/GO International's rates?


> "Anti-spam" initiatives that are based on such blacklists are
> quite simply the failed results of irrational, fascist thought.

In that he is calling his correspondents irrational fascists, because
it is they who have chosen to reject his mail.

Never mind that facism has something to do with "centralized autocratic
government headed by a dictatorial leader, severe economic and social
regimentation, and forcible suppression of opposition" and that seems
like the opposite of the anarchy of blacklists.
Also ignore the fact that a taxi or pizza delivery service refusing
to go to dangerous parts of town is no more irrational than refusing
mail from the IP address neighborhoods that are major sources of spam.
Any individual is unlikely to be a spammer or mugger, but the statistical
risk/reward ratio is too high.  By all accounts, the odds that the the
next SYN to your port 25 from a "dynamic" IP address involve spam are
very high.


> Regardless of your exact definition of spam, all reasonable ones
> I've heard have one thing in common - it's based on CONTENT, not
> IP address. Blacklists couldn't care less about content 

That's nonsense.  Blacklists do care about content in a statistical
sense.  If blacklists don't care about content, then neither do so
called Bayseian filters.  I've often said that lists like the DUL bug
me, but not because they are useless.  Lists like the DUL catch a
lot of spam and little legitimate mail.


>  - legitimate
> email or spam, out it goes, to the detriment of communications,
> which is the Internet's raison d'etre. I take that back, it used
> to be that way. Now the Internet is meant to make big corporations
> lots of money.

I've been around for a few years (TIP-25 (DOCB) in 1972), but I don't
recall that Communication in the sense Mr. Sauve means was ever the
Internet's raison d'etre.  15 years ago, would be communalists were
bemoaning the commercialization of the net and interference with
capital-C-Communication, by which they meant they deserved free
bandwidth.  Their successors complain about the free ride they never
got.  Back in Mr. Sauve's golden era, his perfect unfiltered IP bandwdith
was either not available to small or commercial outfits like Alientech
LLC or it would have cost 2000% more (>$5000/year) for 10% as many
bits/sec (56K).


> Blacklists also, quite clearly, don't work to eliminate spam. 

No honest person who actually looks at spam agrees with that.
Good blacklists (e.g. CRL) are better than 70% effective with 
false negative rates that large, very conservative corportations
can tolerate.


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-12 Thread Vernon Schryver
> From: Bill Sommerfeld <[EMAIL PROTECTED]>

> ...
> One problem with dropping suspected spam into a spam cesspool as
> opposed to rejecting it outright in the SMTP session is that many
> people (myself included) have neither the time nor the inclination to
> wade through our spam cesspools on a regular basis looking for
> misclassified messages.

That's too true.  Since the spam collected/rejected by my real mailbox
and personal spam traps exceeded 1000 spam/day, I can only skim envelopes.
If I count duplicates, my average for the last 40 days is 3516/day.

> An SMTP-level reject at least gives the sender a real-time indication
> that the recipient will not be seeing the message any time soon..

There may be a false dichotomy there.  You can reject a message during
the SMTP transaction and so give the sender a real-time indication while
also capturing the entire message in a spam cesspool.  All 787 MBytes
now in my 40-day rolling cesspoll were rejected with a 5yz or 4yz SMTP
response.  That many systems don't capture what they reject implies
nothing about anything except those SMTP servers.

I'm flummoxed by criticism of external DNS blacklists based on the
lack logging by SMTP servers.  That's predictable among the general
public, but not here.

This thread is related to the nearby thread about the end of life
announcement for SpeakFreely.  The problem in both cases is less with
evil media conglomerates converting the Internet into TV than with people
who won't feed themselves.  Instead of getting their code and networks
running IPv6, they install NAT boxes and complain about the RIAA.
Contrary to the whines from ISPs with major spam problem, those that
have real (including enforced) anti-spam policies don't have spamming
customers.  Instead of paying the extra cost to hire an ISP that cares
enough to not have spamming customers, people complain about the evils
of blacklists.  Instead of taking the extra trouble to use an operating
system or at least an MTA that is not a worm delivery and spam
facilitation system, they send mail to random, spam-obsessed strangers
like me asking how to add spam filtering to Outlook.


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-12 Thread Vernon Schryver
> From: Nathaniel Borenstein <[EMAIL PROTECTED]>

> ...
> I also have to say that I fear your approach would help the larger ISPs 
> use spam as an excuse to kill off smaller ISP's...  

How so?  Exactly what is my approach?  Please note what I've said too
many times:
  - I don't currently use a public blacklist and have never used one
  for non-trivial mail.
  - I'm flogging spam defenses that compete with blacklists.

>  and I question the 
> fundamental legitimacy of blocking all of an ISP's customers before 
> there's a fair due process to establish the ISP's culpability. 

"Fair due process" and "free speech" and even "legitimacy" are none
of your concern unless you own the mailbox that would *RECEIVE* the
blocked mail.  No one has any right to send anyone any mail.  We have
only privileges granted by targets of our mail.  If our targets are
foolish and hire ISPs with long histories of both permitting a lot of
outgoing spam and blocking a lot of incoming legitimate mail (see
recent complaints about RR's false positives), then that's just tough
and perhaps we should convince our correspondents to switch ISPs or
find new correspondents.

Good or bad spam filtering is merely a part of the rest of good or bad
SMTP or any other ISP service.  It makes no more sense to condemn the
HTTP protocol because many web pages are junk than it does to condemn
blacklists because some blacklists are junk or used badly.

If you think blacklists are bad because they can be run by fools, then
you also must hate any network authentication and authorization
mechanism.  What's the difference between Kerberos and a mail blacklist?
Both are responsible for summary denial of services.

I fear there are bad reasons for the disdain for blacklists:
 - they are effective against spam from spam friendly ISPs.
 - some of us work for spam friendly ISPs and let the interests of
our employers color our thinking.
 - some of us are lazy and hire ISPs have been spam friendly.
 - some of us feel we have a devine right to send any mail to anyone
and are deeply offended by any contrary suggestion, not to mention
an effective mechanism.


> "Caring 
> enough about spam" is an awfully slippery concept on which to base a 
> blacklist.

I am offended by your implication that I suggested any such thing. 
I only pointed out that using spam-friendly ISPs has consequences.
(You evidently know about XO's reputation, which I think has improved
lately.)  The only major blacklist that does anything remotely like
your implication is SPEWS, which "escalates" in order to get the
attention of ISPs.  If I did use a blacklist, it wouldn't be SPEWS but
that would be only one reason among serveral.


> ...
> > that is not blacklist, then why can't a blacklist be run properly?
>
> Good point.  That's why I favor giving users access to their spam pool 
> when they suspect problems, and using challenge/response in certain 
> (carefully defined) situations.  A good filtering mechanism is not 
> nearly as black and white as a blacklist.

The last part of that is simply wrong.  Every filtering mechanism is
exactly as black and white as a blacklist.  Whether or not an SMTP
server keeps good logs has nothing to do with whether it decides to
reject messages using blacklists of IP addresses or domain names or
anything else.  If your correspondents use software that consults any
blacklist but doesn't keep good logs, then the fault lies first with
your correspondents for using bad software, second with you for having
foolish correspondents, and not at all with the blacklist.

Yes, I realize that I'm implying that to keep good logs you need to
act on a blacklist (if you use one) at the end of the DATA command
instead of before the HELO.


> > Any fool
> > can set up a blacklist.  That many fools have and other fools have
> > used them does not show that blacklists are bad any more than the ease
> > of setting up an IP network shows TCP is the spawn of the devil.
>
> I will confess that my personal experience makes it very hard for me to 
> be rational on the subject of blacklists, as I fear that any concession 
> to them will only encourage the creation of destructive blacklists by 
> "fools".  In general I prefer a solution that any fool can implement, 
> because one surely will.  

Then you'd better give up on the Internet.  As with much of the net,
the information in and functioning of any spam system is at least
somewhat "administrative" and subject to the whims of any fools
administrating it.  The buyer must beware, not only of hiring a spam
friendly ISP, but contracting with a foolish spam filter.  The greater
fool is often the buyer of services offered by lesser fools.


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-12 Thread Vernon Schryver
> From: Nathaniel Borenstein <[EMAIL PROTECTED]>

> FWIW, I believe Keith is probably right.  Blacklisting has been a major 
> impediment to my own email usage.  I don't know about any *particular* 
> blacklisting service because when your ISP gets blacklisted by mistake 
> and you're simply collateral damage, it's very hard for you to get an 
> explanation of what's going on, because your email has been blocked -- 
> this has happened to me several times. 

Several times?  As far as I know, most people I know have never been
collateral or other kinds of blacklist damage.  Do you use what might
be called marginal ISPs?  Some large outfits such as UUNet have long
refused to care enough about spam.  (See the current Spamhaus listings
for UUNet at http://www.spamhaus.org/sbl/listings.lasso?isp=uu.net and
particularly the orange boxes.)


> My own theory is that 
> blacklists are fundamentally flawed because they are inevitably NOT 
> accompanied by sufficient administrative staff to deal with the 
> inevitable mistakes and exceptions in the blacklist.  Moreover they 
> aren't necessary, given the number of other ways to block spam.  -- 
> Nathaniel

I have interests in other ways to block spam, but I don't like that
reasoning.  Many bad implementations don't prove the idea is hopeless.
The design and implementation flaws in practically all installations
of desktop software do not show that desk top computers are bad ideas.
All of us, including those who have never used a Microsoft product,
have been collateral damage of Microsoft's design philosophies,
implementation processes, and business plans, but that implies nothing
about personal computers in general or software from the Seattle area.

Before mail-abuse.org existed and I think before the RBL was called
the "RBL," it was pointed out to me.  I said that I couldn't imagine
a Fortune 500 company having an outsider decide which IP addresses
could send mail.  No matter how forcefully I would have said "Paul's
a good guy," if I'd been one of my bosses, I would have been unmoved.

But maybe that's just me.  All other (usable) ways to block spam
are being purchased as out-sourced services.  If you can trust
outsiders to have "sufficient administrative staff to deal with the
inevitable mistakes and exceptions" in a spam blocking mechanism
that is not blacklist, then why can't a blacklist be run properly?

The only thing that distinguishes blacklists from other third party
spam filters is that setting up a DNS blacklist is easiest.  Any fool
can set up a blacklist.  That many fools have and other fools have
used them does not show that blacklists are bad any more than the ease
of setting up an IP network shows TCP is the spawn of the devil.


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-11 Thread Vernon Schryver
> Cc: Keith Moore <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
> From: Keith Moore <[EMAIL PROTECTED]>
> To: Vernon Schryver <[EMAIL PROTECTED]>

> >>> If that is an issue, it ought to be raised by those who are being
> >>> misled, the targets of mail, instead of senders and other third
> >>> parties.
> >>
> >> it IS being raised by them, for those who are actually able to figure
> >> out what's going on.  of course, when the recipient doesn't receive 
> >> the
> >> mail he's expecting, he has no idea where to look - so he tends to
> >> blame the sender.
> >
> > Keith Moore is not complaining about mail he has not received because
> > of the dasterdly misinformation from the RBL.  He is either a third
> > party sender of reject mail that he is certain was wanted by its 
> > targets
> > despite being rejected or he is a fourth party presuming to speak for
> > the first parties (spam targets) against the second parties (blacklist
> > providers).
>
> You are a barefaced liar.

How so in that assertion of mine?  Unless I missed something that seems
unlikely, Keith Moore is not complaining about mail he has failed to
receive.  He surely would not have been misled by blacklist operators
into configuring his SMTP servers to use one of their evil nasty
cheating lying dishonest fraudulent unhealthy fattening cancer-causing
end-to-end principle breaking RBLs.  The remaining possibilities are
that he writing is on behalf of himself as a sender of rejected mail
or he is a fourth party presuming to speak for the people actually
involved, senders, receivers, and blacklist operators.

I admit that I would not be surprised if his opinion of anti-spam
blacklists was informed long ago when some of his more or less innocent
mail was rejected with a reference to MAPS's RBL.  I've no evidence
of that except his use of archaic jargon and what his "courtesy copies"
and statements about how I've configured my SMTP server show of his
views of those who would be happier with fewer of his words.

Concerning how I've configured my SMTP server--Juging from the headers
of the IETF list messages, today it has rejected 2 copies of "and the
horse you rode in on" and one copy of "You are a barefaced liar."  That
seems like a Good Thing(tm), but perhaps not enough.


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-11 Thread Vernon Schryver
> Cc: Keith Moore <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
> From: Keith Moore <[EMAIL PROTECTED]>
> To: Vernon Schryver <[EMAIL PROTECTED]>

> ...
> > If that is an issue, it ought to be raised by those who are being
> > misled, the targets of mail, instead of senders and other third 
> > parties.
>
> it IS being raised by them, for those who are actually able to figure 
> out what's going on.  of course, when the recipient doesn't receive the 
> mail he's expecting, he has no idea where to look - so he tends to 
> blame the sender.

Keith Moore is not complaining about mail he has not received because
of the dasterdly misinformation from the RBL.  He is either a third
party sender of reject mail that he is certain was wanted by its targets
despite being rejected or he is a fourth party presuming to speak for
the first parties (spam targets) against the second parties (blacklist
providers).

An odd thing about users of DNS blacklists and other filters is that
many users avoid confronting senders of rejected mail.  Many users are
happy to let senders assume what the senders want to believe, that the
evil nasty rbl consipracy used lies, bribery, and extortion to force
an ISPs to use a blacklist.  Never mind that after being informed of
that evil nexus by senders, most users do nothing but demand even more
filtering.  Ignore the fact that blacklists are free or cost money and
are now generally selling points.

Of course popularity in the market is not proof of virtue, but it does
poke holes in the claims of senders of rejected mail about blacklists.


> ...
> whatever.  your mail server claims it's forwarding my mail to DCC, and 
> it's not bulk mail.

The first phrase is true but only of mail sent directly from Keith
Moore to my SMTP server.  His second statement is false.  Bulk mail
includes any message which has a "a bunch" of copies sent to one or
more mailboxes.  All mail sent through non-trivial mailing list
reflectors is bulk.  Spam is bulk mail that is unsolicited.  "A bunch"
varies depending on whom you ask and when.

Keith Moore has long known that his "courtesy copies" to my mailbox
are unsolicited and unwelcome.  They are identical except in headers
to hundreds of copies of the same messages, and so are "bulk."  I
tolerate (and sometimes find interesting) the copies of his messages
that arrive through the IETF reflector, but I object to duplicate
copies of flames and insults.  If your "a bunch" threshold for "bulk"
is 2, then Keith Moore's attempts to put 2 copies of his messages in
my mailbox are "spam" regardless of the hundreds of copies sent
elsewhere.  (Some people say 2 is the right threshold for "bulk", but
I run my DCC client with a threshold of 5.  5 is a common choice for
vanity domains.  Choices for real domains range from 20 to 200 as well
as the overflow value of "many.")


> > Consider "courtesy" copies of mailing list messages and the people who
> > send them.  Many courtesy copies are sent unthinkingly by using a
> > "reply all" function, but others are intentional.  The intentional
> > copies amount to "microphone queue jumping."
>
> "and the horse you rode in on."
>
> you are misleading people, and you know it. 

Notice that he does not specify whom is being misled or the falsehood.

Sheesh!--what would a reasonable person do who knows that one of his
targets doesn't want his "courtesy" copies?


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-11 Thread Vernon Schryver
> From: Keith Moore <[EMAIL PROTECTED]>

> ...
> > In any case, what standing do you have to comment on what mail is
> > rejected by other peoples SMTP servers?
>
> Sites can reject mail to their own servers if they want to.  the issue 
> is whether they're being misled about the criteria used by a blacklist.

If that is an issue, it ought to be raised by those who are being
misled, the targets of mail, instead of senders and other third parties.


> >  I think that as long as
> > those using blacklists get what they ask for, no outsiders have any
> > business commenting, and particularly not would be senders of
> > unsolicited bulk mail.
>
> Apparently you also think that it's acceptable to forward mail from 
> people you don't like to DCC, misrepresenting it as spam.  The only 
> reasonable response to people with this kind of attitude ends with "and 
> the horse you rode in on".  Actually, that's being far too polite.

First, contrary to Keith Moore's the baloney, DCC clients detect bulk
mail.  It is impossible to (mis)represent mail as unsolicited bulk
mail or spam by forwarding it to a DCC server.  Doing so only reports
it as "bulk."  Are the "courtesy" copies mailing list contributions
that Keith Moore insists on sending "bulk"?  If they are private, then
forwarding them to the DCC instead of my mailbox can have no effect
because no one else will see them.  If they are bulk, then some extra
reporting also has no effect; if DCC clients haven't marked them solicited
bulk by whitelisting the IETF list, they should be rejected as unsolicited
bulk mail.  That's how the DCC works.  So why is Keith Moore so exercised?

Consider "courtesy" copies of mailing list messages and the people who
send them.  Many courtesy copies are sent unthinkingly by using a
"reply all" function, but others are intentional.  The intentional
copies amount to "microphone queue jumping."  Their senders they feel
their targets should see and respond to their words first.  When the
IETF reflector took literally days to finish sending copies to people
at the end of alphabet like me, there might have been other reasons,
but today it finishes within several dozen minutes.

I didn't realize that "courtesy" copies are often intentional queue
jumping until I noticed that senders of "courtesy copies" tend to foam
at the mouth about the evils of MAPS, the RBL, blacklists, and spam
filtering in general.  I did not notice that common thread until I
tired of "courtesy" copies of foaming flaming nonsense and started
dropping senders into my personal, non-published blacklist.

If you want to see apoplectic fits, use a sendmail access_DB instead
of procmail to for your filtering.  That will spare your system a few
cycles, but it also lets senders know they're not being heard.  People
who hate the RBL and DUL for impersonally filtering their earthshaking
words really hate being being personally shunned.


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-10 Thread Vernon Schryver
> From: [EMAIL PROTECTED] (Mike S)

> ...
> The RBL and DUL are quite clearly (and openly) designed and
> intended to be used to implement denial of service. Doing so with
> the explicit authorization of the email recipient would be legal.

> ...
> The MAPS system does not, and cannot, distinguish between spam
> email and legitimate, addressee desired email. It is a brute force
> system which throws the baby out with the bathwater.

Who but someone incapable of understanding the concept of one person
never wanting to receive any mail or other communications from another
could say something like that?  For the rest of us, it makes perfect
sense to say "I never want to receive any mail from any IP address
owned by Stanford Wallace.  I also never want to receive mail from any
SMTP client using an IP address that has been declared 'dynamic' by
its owner, because that declaration says that its owner cannot figure
out who is using the address at any given time."

I suspect that Mike Sauve (msauve at alientech.net) is upset with the
RBL and DUL because some of his mail was rejected.  I cannot find any
evidence that he has sent unsolicited bulk commecial email, although
some of his public statements about the definition of "spam" have been
a little unusual.  Perhaps he tried to run a commercial site on
"residential" IP addresses and blames MAPS instead of the ISP that
labelled those addresses.


Note:
  - The DUL was largely populated with declarations by the owners of
   the IP addresses in question.

  - The IP address owners are ISPs, not the end users renting them,
   at least if they're not SWIPed.

  - I've always considered "dynamic" declarations by ISPs as implying
   that the ISP is a slumlord uninterested in tracking abuse by its
   users.  Contrary to years of knowingly false statements from such
   as UUNET, anyone with standing to contribute to this list knows
   that figuring out which modem, DSL port, or cable modem port was
   using a block of "dynamic" IP addresses at any given instant requires
   only the will to maintain and consult RADIUS or other logs.


Vernon Schryver[EMAIL PROTECTED]



  1   2   3   4   >