Re: Active networks

2000-05-22 Thread Kumar Subramanian
You can get some information from the following links: -Kumar http://www.cc.gatech.edu/projects/canes/publications.html http://www.cis.upenn.edu/~switchware/ http://www.cis.upenn.edu/~boosters/p4home.html >>> <[EMAIL PROTECTED]> 05/22/00 11:05AM >>> Hi, I would like to get some info on A

Re: Active networks

2000-05-22 Thread R. Muralidharan
Hi Narayan, You may refer the IEEE publication : COMPUTER, April 1999 issue which is a special one on ACTIVE NETWORKS. Visit http://computer.org and navigate to see the abstract of the article issue. muralidharan - Original Message - From: <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Gordon Lennox
One current international position on "Crime in Cyberspace" can be found in the draft Council of Europe Convention. This was released for public comment towards the end of April. See: conventions.coe.int/treaty/en/projets/cybercrime.htm Information on the Council of Europe can be found at:

asynchronous audio conferencing at www.wimba.com

2000-05-22 Thread James Salsman
There is finally a cross-platform, quasi-web-based system for asynchronous audio conferencing: http://www.wimba.com This system is new and worth exploring. It uses Java applets for microphone input, and has a full range of features already. The great benefit is the enabling of asynchronou

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Scott Bradner
> Scott Bradner gave a presentation at the G8 hi-tech crime event in Paris last > week the presentation is at: http://golem.sobco.com/presentations/2000.05.17-g8/index.htm since the real work of the confreence was done in private it was hard to tell what was actually going on. But the presenta

RE: Active networks

2000-05-22 Thread nandyalam, rajesh
Hi, Could anybody send me some info on PAM ( Pluggable authentication modules) on Solaris 8. I would like to implement PAM in my application to make it work in Kerberos environment. Could anybody help me out in this issue. Thanks in advance, Rajesh. -Original Messa

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Steven M. Bellovin
In message , Jacob Palme writes: >Should IETF do anything to fight the increasing incidences >of net criminality? Can we do anything? Can the protocols, >which IETF manages, be modified so as to make it easier >to fight virus distribution, mail bombing, ping

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Bertrand . Ibrahim
Steve Bellovin <[EMAIL PROTECTED]> said: > I'm far from convinced, for example, that the LOVEBUG virus would > have been prevented were all mail digitally signed, because I > strongly suspect that the attack would have invoked a digital > signature API to generate digitally-signed copies of itse

New mailing list for data protection & privacy (cookies et al)

2000-05-22 Thread Eric Brunner
I've set up a mailing list for discussion of policy implications of http cookies, and other persistent session artifacts which may be used as identifiers. We've list(s) for discussion of the mechanism(s), e.g., Tom Limoncelli's http-state list, the W3C P3P interop list, the mozilla general list,

Re: HTML in e-mail (Was: VIRUS WARNING)

2000-05-22 Thread Salvador Vidal
Hello Jacob, At 19:51 12/05/00 +0200, Jacob Palme wrote: >At 13.59 -0400 0-05-11, Scot Mc Pherson wrote: >> I am not so sure I totally agree. Why exactly do we need HTML based >> e-mail...Is it really necessary? E-mail is a service for transmitting a >> written message, and written messages

Re: Financial Standards Work group?

2000-05-22 Thread Salvador Vidal
Hello Nyagudi, At 10:33 14/05/00 +0300, you wrote: >It may just be time for the IETF to develop a financial standards work group >seperate from the applications work group. I can even forsee a Simple Cash >Transfer Protocol? any objections? As a consumer I will like the posibility of doing anon

Re: Mobile Ad hoc

2000-05-22 Thread Salvador Vidal
Hello Zozo, At 17:57 10/05/99 +0300, you wrote: >What are the benefits from >"Integeration between Mobile IP and Ad hoc networks"? > > I like a Integration wich allow small entrepenurials to develop aplications for mobile, i.e. I think that will have a great future the games for w

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, [EMAIL PROTECTED] wri tes: >Steve Bellovin <[EMAIL PROTECTED]> said: >> I'm far from convinced, for example, that the LOVEBUG virus would >> have been prevented were all mail digitally signed, because I >> strongly suspect that the attack would have invoked a digi

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Kurt D. Zeilenga
We must be careful not to classify our efforts as preventing crime. Crime is matter of law and law is jurisdictional. As the Internet is crosses jurisdictional boundaries, there is not one clear definition of law and hence no clear definition of crime. And crime is not always bad. Some crime,

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Jacob Palme
Does there exist a mailinglist specially oriented towards cybercrime and its prevention? If not, should we start such a list? -- Jacob Palme <[EMAIL PROTECTED]> (Stockholm University and KTH) for more info see URL: http://www.dsv.su.se/jpalme/

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Jacob Palme
At 11.21 -0400 0-05-22, Steven M. Bellovin wrote: > In short -- yes, there are problems, but the best approach for the IETF > is to design, build, and deploy stronger systems. But would not better logg production in routers be an aid in finding the villain behind computer crimes? -- Jacob Palme

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Jacob Palme
At 22.52 +0200 0-05-21, Harald Tveit Alvestrand wrote: > They're making cooperation, whether we want it or not. > Not an IETF problem. Maybe not an IETF problem, but the way we act when the police come should be discussed either in IETF or in ISOC. A well-known example from some years ago. A ver

Re: asynchronous audio conferencing at www.wimba.com

2000-05-22 Thread Matt Crawford
As a linguistic exercise, you might reconcile this message, which you get when you refuse to grant their applets read/write/delete/execute access to all your files: In order to run the Wimba forums application, you will need to grant our applet a certain number of privileges. Our applet is

Re: [HTTP-State] New mailing list for data protection & privacy (cookies et al)

2000-05-22 Thread Tom Limoncelli
Just a small correction. The http-state mailing list is David Kristol's, not mine. I'm simply his humble sysadmin that hosts the list. --tal Eric Brunner wrote: > > I've set up a mailing list for discussion of policy implications of http > cookies, and other persistent session artifacts which

Re: asynchronous audio conferencing at www.wimba.com

2000-05-22 Thread James P. Salsman
Matt, Thanks for your message: > As a linguistic exercise, you might reconcile this message, which you > get when you refuse to grant their applets read/write/delete/execute > access to all your files: > > In order to run the Wimba forums application, you will need to > grant our applet a c

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Steven M. Bellovin
In message , Jacob Palme writes: >Does there exist a mailinglist specially oriented towards >cybercrime and its prevention? If not, should we start such >a list? I don't know of any such list. But -- as we've learned in the IETF about working group chart

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Keith Moore
> I would hope that any software I use, that is able to put my digital > signature on some data, would ask me for my pass-phrase every time > my private key is used. and I would hope that any software I used would not offer to execute content that could have harmful side effects, without first

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Theodore Y. Ts'o
Date: Mon, 22 May 2000 20:14:55 +0200 From: Jacob Palme <[EMAIL PROTECTED]> They went to the police (in the USA) saying that this person had infringed on their copyright by publishing their secret documents on Usenet. The police in the USA contacted the police in Finland. The po

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Vernon Schryver
> From: [EMAIL PROTECTED] > > in the Holy Name of Convenience, many (most?) mailers permit a > > passphrase to be cached for some amount of time. A virus could > > exploit that. > > Ok. So, you're reasoning on the assumption that the user and her system > enginer are both incompetent, that th

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Jacob Palme
At 18.28 +0200 0-05-22, [EMAIL PROTECTED] wrote: >I would hope that any software I use, that is able to put >my digital signature on some data, would ask me for my >pass-phrase every time my private key is used. I would >even hope that such software wouldn't be able to use my >private key without

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Jacob Palme
At 15.17 -0400 0-05-22, Keith Moore wrote: >> I would hope that any software I use, that is able to put my digital >> signature on some data, would ask me for my pass-phrase every time >> my private key is used. > > and I would hope that any software I used would not offer to execute > content tha

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Valdis . Kletnieks
On Tue, 23 May 2000 03:13:33 +0200, Jacob Palme <[EMAIL PROTECTED]> said: > That would mean that every time you execute any program, you would > have to get an analysis of its possible harmful effects and decide > whether to accept it. Possibly, the system could be designed so > that a checksum i

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Chet Uber
At 03:09 AM 5/23/00 +0200, you wrote: >At 18.28 +0200 0-05-22, [EMAIL PROTECTED] wrote: > >I would hope that any software I use, that is able to put > >my digital signature on some data, would ask me for my > >pass-phrase every time my private key is used. I would > >even hope that such software w

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Bertrand . Ibrahim
"Steven M. Bellovin" <[EMAIL PROTECTED]> said: > in the Holy Name of Convenience, many (most?) mailers permit a > passphrase to be cached for some amount of time. A virus could > exploit that. Ok. So, you're reasoning on the assumption that the user and her system enginer are both incompetent