Re: Blocking mail from bad places

2007-04-07 Thread Thomas Leavitt

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Here's what one of the messages my system produces:

Apr  7 12:02:26 tongs postfix/smtpd[15229]: NOQUEUE: reject: RCPT from
mail.middreut.com[208.61.243.195]: 454 Service unavailable; Client host
[208.61.243.195] blocked using dnsbl.cagreens.org; Whoops!  Please see
http://greens.org/delist and note your sending address is --
208.61.243.195 --.  Sorry.; from= to=[EMAIL PROTECTED] proto=ESMTP
helo=exchange.middreut.local

This provides a reasonable explanation... as long as you can read
English. If you want to talk about hard to understand: every time I post
to nanog, I get a bounce message from someone in Germany, in German.
About as much use as my bounce message is to someone who doesn't read
English.

... and why aren't bounce messages standardized in content and formatting?!?

Thomas

James R. Cutler wrote:
 At 4/5/2007 08:38 AM -0700, Thomas Leavitt wrote:
 
 One problem with the bounce solution is that snip/
 ==
 So, I (Cutler) add:
 
 And, even the best-intentioned bounce messages often give lots of data,
 but no information, thus increasing the noise to signal ratio.  For
 example, Paul most likely knows what the following means to him.  To me
 it just means I can't send mail to Paul.
 
 This message was created automatically by mail delivery software.

 A message that you sent could not be delivered to one or more of its
 recipients. This is a permanent error. The following address(es) failed:

   [EMAIL PROTECTED]
 SMTP error from remote mailer after RCPT TO:[EMAIL PROTECTED]:
 host sa.vix.com [204.152.187.1]: 553 5.7.1 Service unavailable;
 Client host [209.86.89.61] blocked using reject-all.vix.com; created /
 reason

 -- This is a copy of the message, including all the headers. --
 
 
 
 -
 James R. Cutler
 [EMAIL PROTECTED]
 

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Mandriva - http://enigmail.mozdev.org

iD8DBQFGF+WyNEK1jn5bsMsRAi1pAKDCXnIBmY7wTybhNyJIPAntAUBvMgCfSDBV
goClCVhxinIMW/yQ8gfR/Do=
=+pbd
-END PGP SIGNATURE-


Re: Blocking mail from bad places

2007-04-05 Thread Thomas Leavitt


One problem with the bounce solution is that for those of us with 
multiple domains (some of them wildcarded) mapped to our mailboxes, the 
volume of backscatter makes it a real hassle to sort out the valid 
bounces from the noise. Even users with a single email address can be 
victimized often enough to dismiss this stuff as a form of spam, and 
automatically delete it without looking; \every few months, I get pained 
complaints from one friend or family member or another about someone 
using their address to spam, and thousands of bounce messages winding up 
in their mailbox as a result... another major problem, in my opinion, 
caused by spam that is leading to email becoming more and more of an 
unreliable medium - even when everything works perfectly according to 
protocol and RFC, and a person gets a bounce message because an address 
is out of date or typoed or otherwise invalid, they'll never know.


Thomas



Steven Champeon wrote:

on Wed, Apr 04, 2007 at 06:25:18PM -0400, John L wrote:
  

This technique works great to keep spam out of your mailbox.


Inline rejection is a little dangerous for mailing lists
  

And for anyone else who doesn't feel like jumping through your hoops.



Providing a telephone number in the bounce is an effective way to deal
with false positives.
  
Only if you assume that everyone who writes to you is so desperate to send 
you mail that they are willing to make what may be an international call 
in the middle of the night.  I have not found that to be a very realistic 
assumption.



I have to agree with John here - I've been sending back 'email me at
[EMAIL PROTECTED] if this in an error' for all rejections here since 2003
or so, and can count the legit mail to postmaster I've received in that
time on one hand, maybe two; the stuff that gets rejected before the
accept postmaster default gets a different error, containing a phone
number. I've never had anyone call me there. 


Not that it bothers me much - I've done my part, I figure, and if they
aren't willing to email a postmaster or call, then shrug? What can I
do?

I'll add that even if everyone were willing to email/call with problems,
the hideous things that (e.g.) Exchange does to your carefully
handcrafted rejection errors are enough to cripple the least tech-savvy
of your likely audience, anyway.

  




Re: Blocking mail from bad places

2007-04-04 Thread Thomas Leavitt


That makes sense, and matches up with my experience... you also have 
amateur spammers just doing stuff manually (as well as spammers paying 
people pennies a page to input CAPTCHA responses).


Another issue is that the unsolicited contact paradigm blurs a bit, when 
you have musicians and promoters and organizations with causes, etc. all 
asking to be added as a friend... the situation becomes one of those 
I know spam when I see it. ones...


Ken Simpson wrote:
Some of it is quite sophisticated: full blown instant profiles with 
fake comments ... the smarter spammers actually make the profile look 
real (often lifting material from legit user profiles), and then

just ...



At the MIT Spam Conference, I was talking to MySpace's anti spam
researcher. He said that they see many profiles that look totally
legit and which have been carefully nurtured for more than six months
-- and then the formally legit profile suddenly becomes the drop site
for a Phishing campaign or other spam repository.

Captchas apparently help quite a bit to stem this kind of problem
because they install a technical barrier that, while not impossible to
break through programatically, at least delays things a bit and
reduces the ROI for the spammer.

Regards,
Ken

  




Re: Blocking mail from bad places

2007-04-03 Thread Thomas Leavitt


The only practical way to handle the volume of spam email that was 
hitting my servers was to implement very very aggressive filtering at 
the server accept level (requiring valid HELO commands that match to an 
existing host, among other things - amazing how many servers from major 
sites that initiate a HELO using a non-existent hostname)... and a 
friend of mine who manages a whole series of servers, has taken it to 
the next level: he implements his spam blocking via firewall (the 
disadvantage is that the logging is much more sparse, and the error 
messages much less descriptive).


The alternative is the absurdity that a local ISP has: a 14 way cluster 
for mail acceptance, and another 20 way cluster for mail storage and 
retrieval with terabytes of storage space, 90% of the resources (or 
more) of which are taken up accepting and storing as much spam as 
possible... and this is an ISP with a few thousand dial up and DSL 
customers, and a small datacenter with three rows of racks. ... and none 
of these resource usages are billed back to the customers... they're 
just overhead.


The current situation with email is flat out insane. There is no other 
way to describe it.


Email quaint? You betcha - my kids and their friends do email all the 
time: via MySpace and the equivalents, no SMTP required. They wouldn't 
know what an email client was if you hit them over the head with it.


Thomas

[EMAIL PROTECTED] wrote:
 
  

You cannot mandate how hard somebody must work. It doesn't work.  Make


it
  

'expensive enough' to be wrong, and *then*  they will make the


necessary effort
  

to be 'right'.



Some people block mail from bad places in an attempt to hurt the bad
place, i.e. in an etempt to make it expensive for them to be bad. But
nowadays there are so many bad places, so much SPAM that leaks through
filters, and so many missing emails, that it becomes harder and harder
to hurt the bad places by blocking email. Nowadays it is normal for
email to mysteriously bounce, to go missing, to get delivered days or
months late. Soon Internet email will be like IRC, a quaint service for
Internet enthusiasts and oldtimers, but not a useful tool for businesses
or ordinary individuals.

--Michael Dillon
  




Re: Blocking mail from bad places

2007-04-03 Thread Thomas Leavitt


I think there is definitely an adaptive factor... initially, vast 
quantities of spam disappeared (we have greylisting in as well), and my 
personal mailbox went from 100:1 spam to legit to 1:3 spam to legit... 
but over time, it has moved up to about a 1:1 spam to legit factor (and 
I get about 200-250 non-spam messages a day).


Of course, we also have dozens of wildcarded domains and other legacy 
stuff that I wouldn't set up a site with today...


Thomas

Chris Owen wrote:


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Apr 3, 2007, at 12:19 PM, Thomas Leavitt wrote:

The current situation with email is flat out insane. There is no 
other way to describe it.


I'd agree that the situation is bad but certainly not uncontrollable.  
We've had very good success keeping spam in check with a number of 
technologies while not really having too many problem with false 
positives.  The last 6 months have been particularly nice.  About that 
time we expanded our greylisting policy and that alone has made a 
dramatic difference.  At one point before doing any greylisting we 
were accepting about 500,000 messages a day and delivering about 
30,000.  Now we accept about 80,000 and deliver about 25,000.  That's 
a much, much more reasonable ratio.


Really I don't think we are being very aggressive with our greylisting 
either.  We currently greylist IP addresses on a handful of RBLs and 
ones that lack valid reverse DNS.  The greylist only applies for 5 
minutes and then we allow the mail through.  That 5 minutes though 
makes all the difference in the world.  We've had 2-3 senders complain 
(mostly about invalid reverse DNS) but really I'm fine with fix your 
shit for an answer to those people.  If they can't then they can just 
wait the 5 minutes with all the other unwashed.


Will spammers adapt?  Sure.  We've already seen stock spammers who are 
retrying at 5 minutes to the second.  However, this is one of those 
issues where the cost of adapting may just be to high most of the 
time.  Probably easier to just go after the weaker targets.


My other theory on this is that if spammers really do adapt to 
greylisting, then they will have no choice but to actually start 
caring about bounces and clean their mailing lists.  If they don't 
then they just won't be able to keep up with all the queued mail.  
Getting them to clean up their lists in itself would be a more than 
minor victory.


Chris


Chris Owen ~ Garden City (620) 275-1900 ~  Lottery (noun):
President  ~ Wichita (316) 858-3000 ~A stupidity tax
Hubris Communications Inc  www.hubris.net





-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (Darwin)

iD8DBQFGEpLRElUlCLUT2d0RAtDVAKCilqRm5LlGOu0z19Z+5PyWLA2QSgCfas+A
bCbab8uLdYtPG9XT7FgbPBM=
=U9Nw
-END PGP SIGNATURE-




Re: Blocking mail from bad places

2007-04-03 Thread Thomas Leavitt


I can personally testify that, as a proportion of the mail I get 
through it, there's quite a bit of spam on MySpace - phishing scams 
(Adult MySpace Viewer), fake profiles designed to draw you to adult 
dating / webcam / porn sites, etc. Lots of attractive women claiming to 
want you to be their friend for some mysterious reason.


Some of it is quite sophisticated: full blown instant profiles with 
fake comments ... the smarter spammers actually make the profile look 
real (often lifting material from legit user profiles), and then just 
stick their spam in the comments (and of course, comment spam is quite 
prevalent too, as is spam that invites you to join groups that are 
front ends to other sites, etc.) or wait a few days and then spam you 
via bulletins. Sometimes, it is pretty hard to tell what is spam, and 
what is not... I have an acquaintance who specializes in documenting 
these scams and tracking down the sponsors of the affiliate programs 
funding some of them and getting affiliate accounts canceled (I've done 
this once in a while myself).


Sometimes there's a strange mixture of sophistication and stupidity - 
plausible profiles, very credible on their face... all batched together, 
five or six friend requests at a time, coming within two or three 
minutes of each other at 4 a.m. Or two requests, from users with 
slightly different names, and an identical photo.


MySpace does a fairly good job of responding to complaints and 
terminating accounts (sometimes within hours of their creation).


I'm not a dedicated YouTube user, but I've seen plenty of spam in 
comments on YouTube as well... this is a generic problem, with levels of 
vulnerability dependent on the architecture of the communications 
system, and the scale within which it operates (how attractive it is).




[EMAIL PROTECTED] wrote:

On Tue, 03 Apr 2007 15:18:36 PDT, Scott Weeks said:
  

What I meant was: when only a few folks use email, the spammers will go away.



They won't go away, they'll just go infest whatever the people are using.
We're already seeing significant amounts of blog-comment spam, and as soon
as the spammers find a good methodology, they'll be Myspace and YouTube
spam (if they aren't already)
  




Re: For anyone who hasn't yet asked Ren for an explanation...

2007-01-19 Thread Thomas Leavitt


... and he doesn't even mention that SBC also acquired Pacific Telesis 
(PacBell, Nevada Bell) and SNET (in addition to Ameritech) before it 
merged with ATT and Bell South.


Thomas

Majdi S. Abbas wrote:

On Fri, Jan 19, 2007 at 10:55:53AM -0800, Bill Woodcock wrote:
  
...of how this whole ATT rebranding thing works, Stephen Colbert summs it 
up:


http://www.youtube.com/watch?v=Bj1Mtv9cD0Ieurl=



Much along the lines of seeing how fast you can name the
states, or their capitals alphabetically, how fast can *YOU* name the
22 operating companies?

No cheating!

(The converse game is principally played by Bell executives;
how fast can you {rename|acquire} the operating companies?) 


--msa
  



--
Thomas Leavitt - [EMAIL PROTECTED] - 831-295-3917 (cell)

*** Independent Systems and Network Consultant, Santa Cruz, CA ***



Comment spammers chewing blogger bandwidth like crazy

2007-01-13 Thread Thomas Leavitt


A friend of mine operates a blog at seeingtheforest.com, and he pays for 
traffic over a (fairly  minimal) cap. He posted this comment recently:


http://www.seeingtheforest.com/archives/2007/01/eating_bandwidt.htm


 Eating Bandwidth

Last month something ate up a tremendous amount of bandwidth at Seeing 
the Forest, costing me a lot of money. So now I regularly check 
bandwidth use.


Why has 209.160.72.10, HopOne in DC, been eating a HUGE amount of 
bandwidth? Gigabytes! What are they doing? (I banned them.)


Why has 220.226.63.254, an IP in India, been eating a tremendous amount 
of bandwidth? What are they doing?


Why has 195.225.177.46, an IP in Ukraine, been eating a tremendous 
amount of bandwidth? What are they doing?


Why has 62.194.1.235 AND 83.170.82.35 AND 89.136.115.220 AND 
62.163.39.183 AND 212.241.204.145, all from the /same company/ in 
Amsterdam, been eating a TREMENDOUS amount of bandwidth? What are they 
doing?


Why is 206.225.90.30 and 69.64.74.56 and Abacus America Inc.eating a 
TREMENDOUS amount of my bandwidth,


***

One of the comments said:

Yeah, I've seen a huge bump in my blog's traffic, I haven't figured out 
what they're doing, but it ate like 4Gb of bandwidth last month. Now 
that you mention it, I checked last month's stats and yep, there's 
209.160.72.10 producing 62% of my blog traffic. I did a little checking 
around the web and they're an obvious spam host. Banned.


***

They also chew up a lot of CPU (comment filter code). At few times, 
myself, I've had to simply take code offline that was getting hit too 
heavily... seems like the IPs (and their ilk) listed above are good 
prospects for a bad behavior blacklist, at a level below that of 
collaborative spam filter (which doesn't prevent traffic or CPU cycles 
from being consumed). Given the volume of traffic mentioned, this must 
be a real problem for some hosts and networks... although, on the other 
hand, if their marginal use rates are high enough, they might actually 
be making money off this.


Regards,
Thomas Leavitt

--
Thomas Leavitt - [EMAIL PROTECTED] - 831-295-3917 (cell)

*** Independent Systems and Network Consultant, Santa Cruz, CA ***



Re: Network end users to pull down 2 gigabytes a day, continuously?

2007-01-10 Thread Thomas Leavitt
It seems to me that multi-cast is a technical solution for the bandwidth 
consumption problems precipitated by real-time Internet video broadcast, 
but it doesn't seem to me that the bulk of current (or even future) 
Internet video traffic is going to be amenable to distribution via 
multi-cast - or, at least, separate and apart from whatever happens with 
multi-cast, a huge and growing volume of video traffic will be flowing 
over the 'net...


I don't think consumers are going to accept having to wait for a 
scheduled broadcast of whatever piece of video content they want to 
view - at least if the alternative is being able to download and watch 
it nearly immediately. That said, for the most popular content with the 
widest audience, scheduled multi-cast makes sense... especially when the 
alternative is waiting for a large download to finish - contrawise, it 
doesn't seem reasonable to be constantly multi-casting *every* piece of 
video content anyone might ever want to watch (that in itself would 
consume an insane amount of bandwidth). How many pieces of video content 
are there on YouTube? How many more can we expect to emerge over the 
next decade, given the ever decreasing cost of entry for reasonably 
decent video production?


All of which, to me, leaves the fundamental issue of how the upsurge in 
traffic is going to be handled left unresolved.


Thomas

Simon Lockhart wrote:

On Tue Jan 09, 2007 at 07:52:02AM +, [EMAIL PROTECTED] wrote:
  

Given that the broadcast model for streaming content
is so successful, why would you want to use the
Internet for it? What is the benefit?



How many channels can you get on your (terrestrial) broadcast receiver?

If you want more, your choices are satellite or cable. To get cable, you 
need to be in a cable area. To get satellite, you need to stick a dish on 
the side of your house, which you may not want to do, or may not be allowed

to do.

With IPTV, you just need a phoneline (and be close enough to the exchange/CO
to get decent xDSL rate). In the UK, I'm already delivering 40+ channels over
IPTV (over inter-provider multicast, to any UK ISP that wants it).

Simon
  



--
Thomas Leavitt - [EMAIL PROTECTED] - 831-295-3917 (cell)

*** Independent Systems and Network Consultant, Santa Cruz, CA ***

begin:vcard
fn:Thomas Leavitt
n:Leavitt;Thomas
org:Godmoma's Forge, LLC
adr:Suite B;;916 Soquel Ave.;Santa Cruz;CA;95062;United States
email;internet:[EMAIL PROTECTED]
title:Systems and Network Consultant
tel;fax:831-469-3382
tel;cell:831-295-3917
url:http://www.godmomasforge.com/
version:2.1
end:vcard



Re: Network end users to pull down 2 gigabytes a day, continuously?

2007-01-08 Thread Thomas Leavitt
 back to NANOG content, I think video (not streamed but multi-path
distributed video) is going to bring the networks down not by sheer
bandwidth alone but by challenging the assumptions behind the
engineering of the network. I don't think you need huge SANs per se to
store the content either, since it is multi-source/multi-sink, the
reliability is built-in.

The SPs like Verizon  ATT moving fiber to the home hoping to get in on
the value add action are in for an awakening IMHO.

Regards

Bora
ps. I apologize for the tone of my previous email. That sounded grumpier
than I usually am.







--
Thomas Leavitt - [EMAIL PROTECTED] - 831-295-3917 (cell)

*** Independent Systems and Network Consultant, Santa Cruz, CA ***

begin:vcard
fn:Thomas Leavitt
n:Leavitt;Thomas
org:Godmoma's Forge, LLC
adr:Suite B;;916 Soquel Ave.;Santa Cruz;CA;95062;United States
email;internet:[EMAIL PROTECTED]
title:Systems and Network Consultant
tel;fax:831-469-3382
tel;cell:831-295-3917
url:http://www.godmomasforge.com/
version:2.1
end:vcard



Network end users to pull down 2 gigabytes a day, continuously?

2007-01-05 Thread Thomas Leavitt
If this application takes off, I have to presume that everyone's 
baseline network usage metrics can be tossed out the window...


Thomas



From: David Farber [EMAIL PROTECTED]
Subject: Using Venice Project? Better get yourself a non-capping ISP...
Date: Fri, 5 Jan 2007 11:11:46 -0500



Begin forwarded message:

From: D.H. van der Woude [EMAIL PROTECTED]
Date: January 5, 2007 11:06:31 AM EST
To: [EMAIL PROTECTED]
Subject: Using Venice Project? Better get yourself a non-capping ISP...


I am one of Venice' beta testers. Works like a charm,
admittedly with a 20/1 Mbs ADSL2+ connection and
a unlimited use ISP.

Even at sub-DVD quality the data use is staggering...

Venice Project would break many users' ISP conditions
http://www.out-law.com/page-7604
OUT-LAW News, 03/01/2007

Internet television system The Venice Project could break users' 
monthly internet bandwith limits in hours, according to the team 
behind it.


It downloads 320 megabytes (MB) per hour from users' computers, 
meaning that users could reach their monthly download limits in hours 
and that it could be unusable for bandwidth-capped users.


The Venice Project is the new system being developed by Janus Friis 
and Niklas Zennström, the Scandinavian entrepreneurs behind the 
revolutionary services Kazaa and Skype. It is currently being used by 
6,000 beta testers and is due to be launched next year.


The data transfer rate is revealed in the documentation sent to beta 
testers and the instructions make it very clear what the bandwidth 
requirements are so that users are not caught out.


Under a banner saying 'Important notice for users with limits on 
their internet usage', the document says: The Venice Project is a 
streaming video application, and so uses a relatively high amount of 
bandwidth per hour. One hour of viewing is 320MB downloaded and 105 
Megabytes uploaded, which means that it will exhaust a 1 Gigabyte cap 
in 10 hours. Also, the application continues to run in the background 
after you close the main window.


For this reason, if you pay for your bandwidth usage per megabyte or 
have your usage capped by your ISP, you should be careful to always 
exit the Venice Project client completely when you are finished 
watching it, says the document


Many ISPs offer broadband connections which are unlimited to use by 
time, but have limits on the amount of data that can be transferred 
over the connection each month. Though limits are 'advisory' and not 
strict, users who regularly far exceed the limits break the terms of 
their deals.


BT's most basic broadband package BT Total Broadband Package 1, for 
example, has a 2GB monthly 'usage guideline'. This would be reached 
after 20 hours of viewing.


The software is also likely to transfer data even when not being 
used. The Venice system is going to run on a peer-to-peer (P2P) 
network, which means that users host and send the programmes to other 
users in an automated system.


OUT-LAW has seen screenshots from the system and talked to one of the 
testers of it, who reports very favourably on its use. This is going 
to be the one. I've used some of the other software out there and 
it's fine, but my dad could use this, they've just got it right, he 
said. It looks great, you fire it up and in two minutes you're live, 
you're watching television.


The source said that claims being made for the system being near 
high definition in terms of picture quality are wide of the mark. 
It's not high definition. It's the same as normal television, he said.





-- Private where private belongs, public where it's needed, and an 
admission that circumstances alter cases. Robert A. Heinlein, 1969


--
Thomas Leavitt - [EMAIL PROTECTED] - 831-295-3917 (cell)

*** Independent Systems and Network Consultant, Santa Cruz, CA ***

begin:vcard
fn:Thomas Leavitt
n:Leavitt;Thomas
org:Godmoma's Forge, LLC
adr:Suite B;;916 Soquel Ave.;Santa Cruz;CA;95062;United States
email;internet:[EMAIL PROTECTED]
title:Systems and Network Consultant
tel;fax:831-469-3382
tel;cell:831-295-3917
url:http://www.godmomasforge.com/
version:2.1
end:vcard



Re: Home media servers, AUPs, and upstream bandwidth utilization.

2006-12-25 Thread Thomas Leavitt
Check the AUP and TOS for that EVDO connection - my guess is that by 
viewing stuff from your Slingbox, you're risking termination of service. 
I don't have an EVDO connection myself (still toodling along with my 
Sidekick's GPRS), and part of the reason why is that they have a lot of 
what I think are unreasonable restrictions on how these services can be 
used -- this is based on what I've read on the various mailing lists I'm 
on (Dave Farber's IP, Declan McCullagh's Politech, and Dewayne 
Hendrick's Dewayne-Net).


I don't know how significant restrictions like this are from a 
competitive perspective, but my broadband ISP also has a very liberal 
TOS... and that's one of the reasons I use them. I suspect that as items 
like the Slingbox become more common, folks will start paying more 
attention to what they're permitted to do with their upstream bandwidth.


Thomas

Roland Dobbins wrote:



I recently purchased a Slingbox Pro, and have set it up so that I can 
remotely access/control my home HDTV DVR and stream video remotely.  
My broadband access SP specifically allow home users to run servers, 
as long as said servers don't cause a problem for the SP 
infrastructure nor for other users or doing anything illegal; as long 
as I'm not breaking the law or making problems for others, they don't 
care.


The Slingbox is pretty cool; when I access it, both the video and 
audio quality are more than acceptable.  It even works well when I 
access it via EVDO; on average, I'm pulling down about 450kb/sec up to 
about 580kb/sec over TCP (my home upstream link is a theoretical 
768kb/sec, minus overhead; I generally get something pretty close to 
that).


What I'm wondering is, do broadband SPs believe that this kind of 
system will become common enough to make a signficant difference in 
traffic paterns, and if so, how do they believe it will affect their 
access infrastructures in terms of capacity, given the typical 
asymmetries seen in upstream vs. downstream capacity in many broadband 
access networks?  If a user isn't doing something like breaking the 
law by illegally redistributing copyrighted content, is this sort of 
activity permitted by your AUPs?  If so, would you change your AUPs if 
you saw a significant shift towards non-infringing upstream content 
streaming by your broadband access customers?  If not, would you 
consider changing your AUPs in order to allow this sort of upstream 
content streaming of non-infringing content, with the caveat that 
users can't caused problems for your infrastructure or for other 
users, and perhaps with a bandwidth cap?


Would you police down this traffic if you could readily classify it, 
as many SPs do with P2P applications?  Would the fact that this type 
of traffic doesn't appear to be illegal or infringing in any way lead 
you to treat it differently than P2P traffic (even though there are 
many legitimate uses for P2P file-sharing systems, the presumption 
always seems to be that the majority of P2P traffic is in 
illegally-redistributed copyrighted content, and thus P2P technologies 
seem to've acquired a taint of distaste from many quarters, rightly or 
wrongly).


Also, have you considered running a service like this yourselves, a la 
VoIP/IPTV?


Vidoeconferencing is somewhat analogous, but in most cases, 
videoconference calls (things like iChat, Skype videoconferencing, 
etc.) generally seem to use a less bandwidth than the Slingox, and it 
seems to me that they will in most cases be of shorter duration than, 
say, a business traveler who wants to keep up with Lost or 24 and so 
sits down to stream video from his home A/V system for 45 minutes to 
an hour at a stretch.


Sorry to ramble, this neat little toy just sparked a few questions, 
and I figured that some of you are dealing with these kinds of issues 
already, or are anticipating doing so in the not-so-distant future.  
Any insight or informed speculation greatly appreciated!



---
Roland Dobbins [EMAIL PROTECTED] // 408.527.6376 voice

All battles are perpetual.

   -- Milton Friedman






--
Thomas Leavitt - [EMAIL PROTECTED] - 831-295-3917 (cell)

*** Independent Systems and Network Consultant, Santa Cruz, CA ***

begin:vcard
fn:Thomas Leavitt
n:Leavitt;Thomas
org:Godmoma's Forge, LLC
adr:Suite B;;916 Soquel Ave.;Santa Cruz;CA;95062;United States
email;internet:[EMAIL PROTECTED]
title:Systems and Network Consultant
tel;fax:831-469-3382
tel;cell:831-295-3917
url:http://www.godmomasforge.com/
version:2.1
end:vcard



Re: Home media servers, AUPs, and upstream bandwidth utilization.

2006-12-25 Thread Thomas Leavitt
Interesting suite of services and features at a price that makes our 
domestic wireless broadband look sick... however, look at their AUP:


http://www.three.co.uk/xseries/fair_use_policy.omp

* Mobile access to Orb or Slingbox does not include using your mobile as 
a modem. -- so this isn't true wireless broadband


* When using the internet, you can’t use some websites (including adult 
websites) and some websites aren’t compatible with all mobiles. -- so 
big brother company gets to decide what you can and cannot view


* Fair Use Limit: 1 GB each month -- it says this right under 
Unlimited Data ... and they'll cut off your access to data till the 
following month if you don't voluntarily do so yourself, once that's 
been exceeded


* for some screwy reason (maybe just so they don't have to figure out 
who is a spammer and not) they limit you to 10,000 Windows Live 
Messenger messages (like these are going to suck bandwidth), which 
amounts to 300 a day... reasonable, unless you're a heavy user: that's a 
message a minute for five hours


* 5,000 minutes of Skype to Skype calls

* Slingbox and Orb usage is limited to 80 hours a month...

... all of these are listed under Unlimited usage headers. All of them 
are subject to being cut off for the month if you exceed them. Did 
someone change the definition of Unlimited in the dictionary?


I'm not saying these are unreasonable limits, but it is rather deceptive 
to advertise services as Unlimited while applying limits that a 
reasonable person, using them in the fashion intended, could easily 
exceed (my kids, mobile television, more than eighty hours if I let 
them, no sweat... yap on IM from 8 a.m. to 10 p.m. 7 days a week? you 
betcha.)


These limitations, applied to services here in the U.S., make wireless 
broadband access very unattractive to me... even at $60/mo., it'd be 
doable, except for the restrictions... I spend well over $200/mo. 
between my company cell, landline/DSL, and the supplementary services 
associated with each. I'd be totally willing to go out on the bleeding 
edge, kill my wireline Internet access and my cell services, and go with 
a pure wireless data/VOIP solution... but not with the restrictions 
typically placed on them. I want to be able to have my wireless data 
connection backended to my office and home networks... I want to be able 
to download ISOs for Linux distributions, and upload AVIs and WMVs to my 
in house server... I want to be able to run the home media server of my 
own choice and access it from anywhere. Etc.


I wish someone in the marketplace would emerge to serve folks like me.

Thomas



Alexander Harrowell wrote:
UK UMTS operator 3 (a Hutchison division) is advertising its so-called 
X-Series service, which provides unlimited data service (plus 
various lumps of steam telephony) for £25 rising to £40 a month. Skype 
is being bundled with the devices involved, and here's the kicker - 3 
is offering Slingboxen thrown in for £99 extra.


3 has just begun HSDPA Class 5 upgrades in metro areas (claimed 
maximum 3.6 Mbits/s) and plans to launch HSUPA in the uplink next 
spring, with a claimed max of 1.4Mbits/s.


On 12/25/06, *Thomas Leavitt* [EMAIL PROTECTED] 
mailto:[EMAIL PROTECTED] wrote:


Check the AUP and TOS for that EVDO connection - my guess is that by
viewing stuff from your Slingbox, you're risking termination of
service.
I don't have an EVDO connection myself (still toodling along with my
Sidekick's GPRS), and part of the reason why is that they have a
lot of
what I think are unreasonable restrictions on how these services
can be
used -- this is based on what I've read on the various mailing
lists I'm
on (Dave Farber's IP, Declan McCullagh's Politech, and Dewayne
Hendrick's Dewayne-Net).

I don't know how significant restrictions like this are from a
competitive perspective, but my broadband ISP also has a very liberal
TOS... and that's one of the reasons I use them. I suspect that as
items
like the Slingbox become more common, folks will start paying more
attention to what they're permitted to do with their upstream
bandwidth.

Thomas

Roland Dobbins wrote:


 I recently purchased a Slingbox Pro, and have set it up so that
I can
 remotely access/control my home HDTV DVR and stream video remotely.
 My broadband access SP specifically allow home users to run
servers,
 as long as said servers don't cause a problem for the SP
 infrastructure nor for other users or doing anything illegal; as
long
 as I'm not breaking the law or making problems for others, they
don't
 care.

 The Slingbox is pretty cool; when I access it, both the video and
 audio quality are more than acceptable. It even works well when I
 access it via EVDO; on average, I'm pulling down about 450kb/sec
up to
 about 580kb/sec over TCP (my home upstream link is a theoretical

Re: today's Wash Post Business section

2006-12-23 Thread Thomas Leavitt


Jeff Shultz wrote:


Google and Yahoo (and their toolbars) have replaced the address line. 
Which can lead to some confusion when you think the customer has just 
gone to your homepage, but instead has gone to the Google search page 
for the URL... and then you just hope your homepage is the first hit 
on it.


What blows my mind is that from what I've seen the default install of 
IE7 doesn't include the Menu Bar displayed. :(


Yes, and I anticipate many very annoying support issues with my clients 
as a result... Microsoft is apparently determined to eliminate the Menu 
Bar as an interface characteristic (I've heard that the latest version 
of Office also eliminates it)... one very annoying example of what 
disappears as a result is the Find in page feature (Cntl-F). The first 
thing I do when I upgrade someone to IE7 is turn on the Menu Bar... and 
I've noticed that almost every other computer I've touched with IE7 has 
it turned back on...


Thomas


Re: today's Wash Post Business section

2006-12-20 Thread Thomas Leavitt


Many people don't understand anything about how they access the 
Internet, they have a vague idea that they need to type a domain name 
into a box somewhere... so they type www.myspace.com into the Google 
search box, the result set pops up, and then they click on the first 
result to get to the web site in question... I've seen it more than once.


Thomas


Robert E. Seastrom wrote:

Edward Lewis [EMAIL PROTECTED] writes:

  

The #10 google search in the Who Is category (leading off with
Borat, Hezbollah, EU, hot, ...) is IP Who Is.

I'm not sure what to make of that.  Has google replaced the whois client?



Well, the article talks about people using myspace as a search term,
when their goal is apparently to get to a web site.  This seems to be
a case of the same thing.

I just tried a few variants of search to get whois data for a block
that's assigned but not been used publicly (so as to avoid mail header
hits etc) out of Google - no dice.

If you search (literally) for ip who is, though, the top hit is for
the ARIN web-based whois, the second is for someone I'm not familiar
with, the third for RIPE, the 7th for APNIC, etc.

ARIN employee lurkers on the list would be better suited to giving us
the stats, but my impression has been that the great unwashed masses
have used the web forms in preference to the command line client for
years now.

---Rob


  




Re: dns - golog

2006-10-19 Thread Thomas Leavitt

What would a query result for a non-functioning domain look like? Or
would this only apply to unregistered domains? Would a common user be
able to distinguish between a domain that was registered, but for which
DNS was not functioning, and one that was unregistered? If I were a
user, and forgot to renew a domain, would it immediately go into this
pool when it expired - thus presenting all of the potential viewers not
with an DNS error message, but someone else's advertising?

If I ran utilities and services which expected to obtain a different
response, depending on whether a DNS query was successfully resolved,
what would happen to them?

How would, say, SMTP servers which rejected hosts for which no valid DNS
could be determined, behave as a result of this set up - would mail no
longer be rejected if it came from
[EMAIL PROTECTED] How about programs designed to
time out when DNS lookups failed... etc. etc. There are a whole host of
issues that emerge when you deliberately and consciously break DNS
this way...

if golog has answers to these questions, it might be interesting to hear
them...

... finally, why go through all this hassle for what has to be an
utterly trivial amount of money resulting from people being presented
with something totally unexpected and clicking on a link therein... how
valuable are these people as customers? I can't imagine much...

Thomas

Martin Hannigan wrote:



 * From: Luke Besson
 * Date: Thu Oct 19 08:54:47 2006
 I work for a big French ISP and I manage the DNS architecture (based
 on Linux+Bind); Golog proposed to our society the DNS redirect
 service (redirect all the not existant domains according to marketing
 criteria).
 Even if our marketing team would like to join this solution, our
 technical team opposes hardly to such a not-standard implementation
 of the DNS.
 Can you suggest me any objective reason in order to invalidate this
 proposal?


 This is a network autonomy issue. What occurs inside the provider
 edge related to routing and applications is the responsibility of
 the provider and they have the right to modify answers or routes
 in their networks, even if they are not theirs.

 There is some holy grail you should consider, like making sure that
 etrade.com is etrade.com, the legitimate IP/trademark holder.

 The questions to ask yourself as an organization are something
 like this:

 a) is there enough revenue here to consider?

 b) is someone else going to capture revenue between my customer
and myself if I don't?

 c) will this break my network or the networks of others?

 If you can answer the first two yes, the third is worth
 trying to make no.


 -M







 -- 
 Martin Hannigan(c) 617-388-2663
 Renesys Corporation(w) 617-395-8574
 Member of Technical Staff  Network Operations
[EMAIL PROTECTED] 



Re: ICANN ordered by Illinois court to suspend spamhaus.org

2006-10-07 Thread Thomas Leavitt

Here's an excerpt from the blog entry:

Instead of badmouthing the judge, what I would imagine is far more
productive are letters from ISPs around the world attesting to the
importance of Spamhaus as an organization and emphasizing how it is
the individual ISP, not Spamhaus, making the affirmative choice to
stop e360s messages from entering your servers and your property.

The author also says:

Maybe counsel for one of the larger ISPs would be willing to act as a
clearinghouse and file the letters, en masse, with the court.

I hope folks take these comments to heart.

I posted my own experience to the blog.

I encourage others to do so.

Thomas

Gadi Evron wrote:
 This is a really good perspective on the subject, from an Illinois bar
 lawyer:
 http://blogs.securiteam.com/index.php/archives/664

 On Fri, 6 Oct 2006, Gadi Evron wrote:

   
 Information about this court ruling can be found on Spamhaus.s web site,
 here:
 http://www.spamhaus.org/archive/legal/e360/kocoras_order_6_10.pdf

 Apparently, at this stage, it is only a proposed ruling. But I am no
 lawyer.

  Gadi.