} From: Christian Huitema <[EMAIL PROTECTED]>
}... Maps and pictures, songs and recordings come to
} mind. There was a rationale for creating MIME.
Certainly! there are cases where pictures are best or even necessary.
} Framing the debate as ASCII versus HTML is a bit
Christian;
> Do you intend to replace H.323 ?
> Definitely not. Just look at the picture above, which shows the relaying of
> a call
> between an SGCP controlled gateway and an H.323 agent. The combination of
> gateways plus call agent forms a distributed H.323 system, which is
> perfectl
Jim,
Thanks for your question:
> How can [EMAIL PROTECTED] know if the attached executible
> file is safe or not?
If I knew that, I wouldn't be trying to stop complacency
about the promiscous exchange of self-extracting archives.
The best attempts to address the issues so far involve
"certi
Harald,
Thank you for your reply to my message:
>> These sorts of things are less common on the more heterogeneous
>> Unix world, but Unix mailers are just as culpable. If I wanted to
>> be consistent, I would demand that anything I run on Unix (without
>> a special permitted shell) which conne
> All of that can be done in pure ASCII.
... that is, if you speak english. You can definitely write the way of
Shakespeare, but you have a tiny problem writing the way of Molière, let
alone Confucius. Then, there are things that are hard to do in writing,
however able is your prose. Maps and p
>From the SGCP FAQ (http://www.argreenhouse.com/sgcp/sgcp-faq.shtml) written
two years ago:
Do you intend to replace H.323 ?
Definitely not. Just look at the picture above, which shows the relaying of
a call
between an SGCP controlled gateway and an H.323 agent. The combination of
gatew
this is a good idea !! maybe the security wg could look
into this. Jeff, Marcus , any comments ??
/pd
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Friday, May 12, 2000 2:05 PM
To: [EMAIL PROTECTED]
Subject: Re: VIRUS WARNING
On Fri, 12 May 2000 13:38:43 E
Salavat R. Magazov wrote:
>I think you just should not open an attachments unless you are absolutely
>sure it is safe. I mean you know what is in the attachment and it doesn't
>sound odd like subject ILOVEYOU from IETF mailing list.
Now THAT would sound really odd! LOL
Lillian Komlossy
> From: Leonid Yegoshin <[EMAIL PROTECTED]>
> >From: Markku Savela <[EMAIL PROTECTED]>
> >In case of mail attachment containing an executable, we could quite
> >safely try to run it, and the system would just inform that it tries
> >to open this or that file (do you want to allow it?), trying to
>From: Markku Savela <[EMAIL PROTECTED]>
>
>I think we should "turn around the view" (maybe you were saying this
>in another way).
>
>That is, instead of ACL type protection, where a resource is
>associated with a list of allowed users and uses, we should have a
>list of allowed resources and uses
>From: Jon Crowcroft <[EMAIL PROTECTED]>
>
>the problem with sandboxes is that they are monolithic as is this
>discussion of mail - if i have a notion of a compartmentalized system
>with users, and access rights (like almost all operating systems from the
>late 60s onwards, but not like
>simple de
Title: remove
At 13.59 -0400 0-05-11, Scot Mc Pherson wrote:
> I am not so sure I totally agree. Why exactly do we need HTML based
> e-mail...Is it really necessary? E-mail is a service for transmitting a
> written message, and written messages certainly don't require background
> graphics or a full blown
Since you don't know the environment, I won't bother to respond to
vunerability.
Ok. How can [EMAIL PROTECTED] know if the attached executible file is
safe or not? I can understand in my own context. I don't have a hope to
understand in someone else's context.
Jim
-Original Message-
Betsy Brennan wrote:
>I was wondering, does it sound like a good idea to take [EMAIL PROTECTED]
>out of our address books. This would prevent email virus's from
>spreading through this forum. Betsy Brennan
I think you just should not open an attachments unless you are absolutely
sure it is safe
Heres your threads name change =)
Scot
> From: Jim Busse <[EMAIL PROTECTED]>
> Date: Fri, 12 May 2000 10:11:36 -0700
>
> I get 240 emails/day.
>
> about 15% have executable attachments, because that's the way developers use
> mail, we attach self-expanding zip files.
>
> My organization has about 100 people that fall into this catego
On Fri, 12 May 2000 13:38:43 EDT, Jeremy said:
> Can you plase pleaes stop this Virus Thread.
Actually, there *ARE* important issues here.
Would the IESG support the creation of a WG to discuss these, with the
charter of producing a BCP documenting what *should* be done to minimize
these risks i
On Fri, 12 May 2000, Vernon Schryver wrote:
> As as been pointed out repeatedly and as demonstrated with a concrete
> example Saturday morning, attached HTML can be a significant security
> problem. I doubt that (probably porn) HTML spam was much of a security
> threat, but if you think about it
No offence here people, but whilst we are on the subject of Virus's can we
change the Subject Title. I don't know who you all are and I'm getting
paranoid :-)
Thanks
Jon 'Scared Little Puppy'
-Original Message-
From: Dick St.Peters [mailto:[EMAIL PROTECTED]]
Sent: Friday, May 12, 2000 5
Can you plase pleaes stop this Virus Thread.
-jeremy
On Fri, 12 May 2000, Vernon Schryver wrote:
> > From: chris d koeberle <[EMAIL PROTECTED]>
>
> > ...
> > Indeed, I don't think any of the people who are complaining about the
> > "HTML in e-mail" issues would complain about someone sending
On Fri, May 12, 2000 at 12:04:08PM -0400, chris d koeberle wrote:
> On Fri, 12 May 2000 [EMAIL PROTECTED] wrote:
> > Incidentally, this is exactly the same issue as "attach a file to an e-mail"
> > versus "send the recipient a note, copy the file to a ftp/web server, wait
> > for him to retrieve i
> From: chris d koeberle <[EMAIL PROTECTED]>
> ...
> Indeed, I don't think any of the people who are complaining about the
> "HTML in e-mail" issues would complain about someone sending an e-mail
> with an HTML file as an attachment. At least, not as I understand their
> arguments against it.
J
Castro, Edison M. (PCA) writes:
> WE HAVE TO TAKE RESPONSIBILITY FOR OUR OWN ACTIONS
Yeah, right ... when it comes to shouting, all this "blame the victim"
has gone too far.
I have users who are *illiterate*. They can click, but they can't
read. They can click on little pictures an
The National Indian Telecommunications Institute (NITI) run Digital Council
Fires (DCF) mailing list carries the following URGENT request for 10-15
Network & Systems volunteers to assist in the Los Alamos fire response.
The originator of the request is the New Mexico Information Technology and
S
On Fri, 12 May 2000 [EMAIL PROTECTED] wrote:
> Incidentally, this is exactly the same issue as "attach a file to an e-mail"
> versus "send the recipient a note, copy the file to a ftp/web server, wait
> for him to retrieve it, and then remember to clean it up afterwards".
Only if the e-mail clien
On Thu, May 11, 2000 at 08:36:52PM +0200, Jacob Palme wrote:
> At 10.11 -0600 0-05-11, Vernon Schryver wrote:
> > Once you restrict
> > HTML based email enough to be safe, why bother with anything more than
> > text and perhaps simple pictures?
> What is wrong with that. I use HTML-based e-mail m
On Fri, 12 May 2000 09:33:02 CDT, John Kristoff <[EMAIL PROTECTED]> said:
> John Stracke wrote:
> > Well, there's basic formatting:
> [...]
> > And even simple links (never mind forms, applets, etc.) are great for,
> > say, workflow applications. When I worked for Netscape, HR made great
> > use
John Stracke wrote:
> Well, there's basic formatting:
[...]
> And even simple links (never mind forms, applets, etc.) are great for,
> say, workflow applications. When I worked for Netscape, HR made great
> use of HTML mail in the internal network. When I wanted to take some
Email is not the we
Oh, I agree that we have to take responsibility for our own actions. I am absolutely
responsible for allowing the macro to run.
After I mistakenly ran the macro, my first thought was to neutralize it -- to stop it
from spreading further -- by disabling the automatic running of macros.
Unfort
Let's see if this reasoning holds water. Imagine your favorite OS, suppose
that I send you
a .pl file (Perl Script). You then make the "mistake" of saving it to the
file system and then
proceed to running the script. What do you think that script can do?. What
will you have to do
to fix your probl
Hi,
Does someone has any information about the Spatial IP bof. Is it going
to become a WG?
The minute is not available on the IETF web site:
http://www2.ietf.org/proceedings/00mar/unedit/spatial-bof-00mar.txt is
the minute for SIP323 bof !
Where can I get this minute?
Thanks,
Christophe.
begi
> under the rights of "audio/video/mouse/itneraction with user",
> "network i/o to such and such an address (list)", etc for
> conveneicnce and expressiveness in the ACL system (other management
> tools like user, other, groups etc help scale the task) and then i
> can design a set of sensible se
the problem with sandboxes is that they are monolithic as is this
discussion of mail - if i have a notion of a compartmentalized system
with users, and access rights (like almost all operating systems from the
late 60s onwards, but not like
simple desk top single user executives as found on many
34 matches
Mail list logo