Re: e2e

2007-08-15 Thread Lakshminath Dondeti
I guess I'll jump in as well. I was reading some of the related papers recently for a different reason including the ones on active networks (thank gods they are history) and whether that concept is in line with the e2e philosophy. In any event, exploring one of your examples with the

Re: e2e

2007-08-15 Thread Fred Baker
On Aug 14, 2007, at 10:59 PM, Lakshminath Dondeti wrote: In any event, exploring one of your examples with the concepts in the paper in mind (perhaps I am using a verbatim application of the concepts) that the network may filter some (and that being the keyword) malware or suspicious

Re: e2e

2007-08-15 Thread Keith Moore
this is not a way to make the network more robust. Robust for what? Spammers? The simple fact of the matter is that the alternative is to just shut down port 25 given the growth in both volume and complexity to filter. That ain't robust either. Dealing with false positives is the cost

Re: e2e

2007-08-15 Thread Michael Thomas
Keith Moore wrote: this is not a way to make the network more robust. Robust for what? Spammers? The simple fact of the matter is that the alternative is to just shut down port 25 given the growth in both volume and complexity to filter. That ain't robust either. Dealing with false

Re: e2e

2007-08-15 Thread Keith Moore
The communication system isn't being a filter, properly speaking - it is simply routing some traffic to black holes using standard routing technology. And it doesn't relieve the application of the burden of filtering. But it can help reduce the volume of crapola at the application. ...at

Re: e2e

2007-08-15 Thread Michael Thomas
Keith Moore wrote: The communication system isn't being a filter, properly speaking - it is simply routing some traffic to black holes using standard routing technology. And it doesn't relieve the application of the burden of filtering. But it can help reduce the volume of crapola at the

Re: e2e

2007-08-15 Thread Douglas Otis
On Aug 15, 2007, at 12:16 PM, Fred Baker wrote: in that context, here's one that one could use to dramatically reduce spam intake. That suggests a simple approach - in one's firewall, null route the addresses reported by the reputation service as spam spews. It's a network layer

Re: e2e

2007-08-15 Thread Keith Moore
people who cite reality generally do so because they lack justification for their statements. The thing is, Keith, I don't lack justification. I've seen the numbers with my own eyes in our own largish organization with an IT staff that's super paranoid about about false positives (free

Re: e2e

2007-08-15 Thread Douglas Otis
On Aug 15, 2007, at 2:06 PM, Keith Moore wrote: and I've had more than my share of legitimate mail fail to be delivered (in either direction) because of such measures. you may consider that legitimate for your or cisco's purposes. whether to throw away mail that can potentially be from

Re: e2e

2007-08-15 Thread Iljitsch van Beijnum
On 15-aug-2007, at 22:44, Michael Thomas wrote: Robust for what? Spammers? The simple fact of the matter is that the alternative is to just shut down port 25 given the growth in both volume and complexity to filter. That ain't robust either. Dealing with false positives is the cost of

Re: e2e

2007-08-15 Thread Tony Finch
On Wed, 15 Aug 2007, Keith Moore wrote: and I've had more than my share of legitimate mail fail to be delivered (in either direction) because of such measures. Of course, all reputation services are equally incompetent. Tony. -- f.a.n.finch [EMAIL PROTECTED] http://dotat.at/ IRISH SEA:

Re: e2e

2007-08-15 Thread Keith Moore
and I've had more than my share of legitimate mail fail to be delivered (in either direction) because of such measures. Of course, all reputation services are equally incompetent. without accountability, there's no good way to tell. that, and incompetence is not the only problem.

Re: e2e

2007-08-15 Thread Greg Skinner
On Wed, Aug 15, 2007 at 01:44:09PM -0700, Michael Thomas wrote: Keith Moore wrote: ...at the cost of dropping legitimate traffic. the thing is, the set of valid senders for you and the set of valid senders for everyone at cisco is very different, and the latter set is much fuzzier. and

RFC 4923 on Quality of Service (QoS) Signaling in a Nested Virtual Private Network

2007-08-15 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries. RFC 4923 Title: Quality of Service (QoS) Signaling in a Nested Virtual Private Network Author: F. Baker, P. Bose Status: Informational Date:

RFC 4948 on Report from the IAB workshop on Unwanted Traffic March 9-10, 2006

2007-08-15 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries. RFC 4948 Title: Report from the IAB workshop on Unwanted Traffic March 9-10, 2006 Author: L. Andersson, E. Davies, L. Zhang Status:

RFC 4919 on IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals

2007-08-15 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries. RFC 4919 Title: IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals Author: