k who experience such a pattern in a mailing list do not ever
see it change until the actors or the topic changes, and usually it
takes both...
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
.)
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
On 6/22/2015 6:01 PM, Lyndon Nerenberg wrote:
> SSH client/server authors would do well to learn the lessons of telnet line
> mode.
Too bad the RCTE Telnet option never got popular...
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
ties which, equally invariably, get interpreted
differently by different, reasonable implementers.
Hence the stricture to meant to guide the sending of what an implementer
should consider to be the most conservative interpretations, and accept
the most liberal (different) interpretations.
d/
--
Dave
vement...)
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
in effect, identifying traffic that is likely to be
/more/ interesting for those wishing to inspect the data.
In other words, anything that explicitly identifies traffic as
attempting greater privacy is likely to be a greater target for attack.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
out some dopey thing they just read or saw on the internet.
Might be time to revise the RFC...
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
On 7/14/2014 9:09 AM, David Farber wrote:
> Three years
>
> On Jul 12, 2014, at 9:28 PM, Dave Crocker wrote:
...
> Also, although CSNet started with NSF money, it was required to become
> self-funded within 5 years.
Hmmm...
I believe the point of confusion is the differe
machine attached to the internet in, say, 1986 you didn't think you
> were "on the internet"?
An question with more nuance than most folk tend to realize:
To Be "On" the Internet
March, 1995
http://tools.ietf.org/html/rfc1775
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
Garden, operated as a direct
consortium, rather than having third-party operations, as CSNet did.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
On 4/4/2014 11:32 PM, Andrew D Kirch wrote:
> So, if there's more than 4 billion ants... what are they going to do?
get larger ants.
(and the responses have now covered both pro forma responses.)
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
On 4/9/2014 8:00 PM, Andrew Sullivan wrote:
On Wed, Apr 09, 2014 at 12:27:55PM -0500, Dave Crocker wrote:
>But it's the result of an informed
>corporate choice rather than software or operations error.
Why do you think (it seems to me you've said it more than once) that
th
basic different between a
specification and the choices actors make in applying it.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
n
(or at least very poorly designed).
Unfortunately, that has no relationship to do with the current
situation. Again: Yahoo was fully aware of the implications of its choice.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
http://craphound.com/spamsolutions.txt
As far as I know, he meant it strictly for humor.
However he did such a good job, it is common to point folk to it (or, as
we've seen here, even fill it out) when the they declare that they have
the FUSSP.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
atter; only satisfying
someone's list of requirements does?
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
On 4/9/2014 7:25 PM, Miles Fidelman wrote:
Dave Crocker wrote:
Everything they are doing is "legal".
Your (possibly entirely valid) assessment that their action is
ill-advised or unpleasant does not equal broken.
Well, sort of - given that DMARC is still an Internet draft, n
sooo much better than his, but that seems to
have hurt it's adoption...
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
gun is not broken.
Management decisions that are subject to criticism does not represent
erroneous performance by the folks tasked with doing the task mandated.
Everything they are doing is "legal".
Your (possibly entirely valid) assessment that their action is
ill-advised or unple
rticipation in the development of
DMARC, I believe they fully understood the technical and operations
effects of the decision.
Whether it is the 'right' choice is primarily a political debate, and
I'm not commenting on that.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
arios are fine, but so are the
variants. The variants often blow apart the simplifying assumption that
one can incorrectly believe from the common scenarios.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
cial issue, like any other crime.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
A application on the protocol stack,
now is also a good time to look at the overall service as a whole.
Sure, but not 'also'. Rather 'only', except for relatively trivial layer
convergence gluing.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
interaction issues. IBM and Bell Labs were the two places best
positioned with researchers for this.
Anyhow, my main point was that economic charging models that are
entirely rational, with respect to consumption and cost, don't always
work for user preference.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
by Sackman) that showed user preference for a /worse/ average
response time that was more predictable (narrower range of variance)
than a better average time that was more erratic.
So, stability over throughput, sort of.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
until you are really sure you understand the statistics you're
getting.
+1
The 'reporting' function in DMARC appears to have wide applicability and
substantial benefit. The handling (rejection, etc.) function has very
narrow benefit.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
o me that Andrew's note is an example of that potential benefit.
Rather than having to have someone remember this stuff, anyone could
point to the 'failure' document.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
gical fragility was/is largely
inherent.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
On 4/19/2013 7:58 PM, Jimmy Hess wrote:
On 4/19/13, Dave Crocker wrote:
On 4/19/2013 4:33 PM, Jimmy Hess wrote:
[snip]
Absent a view that somehow says all metadata is a security function, I
don't see how the marking of administrative boundaries qualifies as a
security function.
The s
ative boundaries qualifies as a
security function.
It's easy to imagine security functions that are 'in support of' the
enforcement of the boundaries, but that's quite different from having an
annotation mechanism to assert the boundaries.
Let's be careful not to overloa
it easy to miss
the facts that a) that's not their job, and b) the correlation isn't
perfect. And the imperfections matter.
That is why there is the current interest in developing a cheap,
accurate method that /is/ intended to define organizational boundaries.
d/
--
Dave
here, is a classic 'natural monopoly' concern/argument.
I don't know the right answer, here, but I think the frame for
discussing it has a long history.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
ion to the thread, could you
provide a brief summary of its job and benefits (with any concerns that
are broadly held)?
I'm not asking you to defend your views but to provide a most basic
tutorial on -D. The more objective the better.
Thanks.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
ETF budget?
Purely for accuracy:
Current IETF expenditures are around US$ 5M - 5.5M.
The ISOC "Direct Contribution Excluding Development" is just over
US$ 2M:
http://iaoc.ietf.org/documents/YEF-2012-2015.pdf
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
e.
folks who rely on their credentials for credibility tend to lose it with
me. anyone who makes a point by clearly providing a solid basis for it
tends to gain it.
but i agree that clarity about the purpose of this thread would be
helpful...
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
new address spaces have 4
times as many bits as the previous generation.
We have three data points to establish this for the Internet, and that's
the minimum needed to run a correlation: Arpanet, IPv4, IPv6...
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
take down the root servers within
the past 5 or 6 years and only took out around 20 or 25.
Some discussions about that I recall guessed that it was an experimental probe,
for learning how to do a better attack. (Remember that 9/11 was a revision of a
prior attack on the towers.)
d/
--
the details of means and
symptoms and entirely miss the underlying, strategic issues.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
wouldn't it be acceptable to have
filtering done at the source end of that SMTP connection?
As soon as we step upstream this way, stepping up earlier still is merely a
question of efficacy and efficiency.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
f -- it
breaks, mail becomes unusable. That will be a common suffering.
The one-to-one cost or damage is probably also a reasonable perspective, but
it's /incremental/ to the shared cost.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
s a commons.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
Requirements
<http://www.ietf.org/rfc/rfc5068.txt> IETF BCP
It does not explicitly support blocking outbound port 25, since that's
controversial, but it /does/ require permitting outbound port 587.
d/
Regards,
Bill Herrin
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
but one still avoids bad neighborhoods.
Which incorrectly presumes that the average user can distinguish among Internet
neighborhoods.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
t all that remarkable, given recent reports of Internet addiction --
what's especially tasty is the idea of having an Internet connection that works
without electricity...
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
On 4/28/2011 10:31 AM, Joe Abley wrote:
KSK CEREMONY 5
Are 13 ceremonies planned for root signing? Absent anycast for them, that seems
like the maximum.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
sessment process targeting signers you
trust, rather more than for targeting those you don't. If you don't care about
the trust side of the filtering equation, I suspect DKIM will not be all that
helpful for you.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
On 4/17/2011 8:19 AM, Jay Ashworth wrote:
- Original Message -
From: "Dave CROCKER"
There were 3-5 of us covering things for that added time. But, then,
the major operations were purely daytime, during the week. Graveyard shift was
quiet enough that we surreptitiously bo
operations were purely daytime, during the week. Graveyard shift was quiet
enough that we surreptitiously bought a cot...
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
_r=1&src=busln>
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
/ being peer to
peer. It is typically massively mediated by lots of different email servers.
One could configure two MUAs to talk with each other 'directly' using SMTP, but
that's never done.
Instant message services similarly are not peer-to-peer technical terms.
d
/ being peer to
peer. It is typically massively mediated by lots of different email servers.
One could configure two MUAs to talk with each other 'directly' using SMTP, but
that's never done.
Instant message services similarly are not peer-to-peer technical terms.
d
with him.
[2] That does not automatically indicate a system failure, given the switch to
an emergency mode for the phone system that restricts access during major events
like these.
[3] Van created traceroute. <http://en.wikipedia.org/wiki/Traceroute>
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
, repeating the claim.
Back in the '70s, I always heard "survive hostile battlefield conditions" and
never heard anyone talk about comms survival of a nuclear event, but I wasn't in
any interesting conversations, such as in front of funding agencies...
d/
--
Dave Crocke
On 12/18/2010 9:52 PM, Joseph Prasad wrote:
http://www.itnews.com.au/News/242051,un-mulls-internet-regulation-options.aspx
Given the season, their efforts appear to be a form of mulled whine.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
ty traffic, this might qualify as service non-neutrality (assuming
there is a plausible meaning to "charging itself"...
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
. Current fragmentation is constrained; this
could plausibly motivate more people to pursue other paths and thereby blow
things up.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
ing a IPv4 sunset date is
localized pockets of such control.
One could, of course, imagine a federation of such pockets...
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
stel.org/remembrances/>
Speak softly and carry a big registry.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
about TR than I would have wanted. One of the interesting metricts
for TR is delay-time per node. The Irvine Ring introduced one bit-time delay.
Scaled great. The IBM TR introduced one full packet-time. Didn't scale well.
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
On 8/23/2010 3:38 PM, John Kristoff wrote:
many of the other instructors they come into contact with
are focusing only on class A, B, C addressing
wow.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
erent tectonics plates (and sources of
power, of course.)
Conflating the "liberal in what you accept" advise, it might be wise to accept
tectonic as covering tectonic shifts in politics, as well as land masses.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
On 4/21/2010 8:16 PM, Suresh Ramasubramanian wrote:
The MAAWG BCPs have far more available than one of the worst
maintained blacklists that has ever been in existence.
For example:
<http://www.maawg.org/sites/maawg/files/news/MAAWG_Port25rec0511.pdf>
d/
--
Dave C
ommon. The fact that 587 default to authenticated is the win.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
ny and all interaction, no matter how distasteful and dissuading
a 'normal' person might find it.
The only response that works -- and even this is not guaranteed -- is shunning.
Drop the message. Do not respond. Ever.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
261- x 511
Cell: (559) 917-6480
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
On 4/4/2010 6:46 AM, Stefan Fouant wrote:
Sounds like this guy could benefit from some carpeting and a few Roombas in his
Data Center ;)
trolls rarely benefit from anything but being ignored.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
gt;
...anti-v6 religious diatribe elided... mis-directed attack, in spite of having
such an easy target.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
for title tell them something that they will find helpful
to know?
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
On 2/23/2010 8:44 AM, Scott Brim wrote:
Simple: you separate 'mail' addresses from 'fire' addresses. Mail
addresses are identifiers. Fire addresses are locators.
wrong approach.
simply get fire engines to have heat sensors and set their gps accordingly.
d/
cost structures and
operational skills.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
tanding is also a convenient refuge." -- dcrocker
On 2/22/2010 12:24 PM, R.A. Hettinga wrote:
On Feb 22, 2010, at 2:53 PM, Dave CROCKER wrote:
On 2/22/2010 9:35 AM, Larry Sheldon wrote:
I have been wondering about that too--the Internet may be the only
artifact of human existence that
On 2/22/2010 9:35 AM, Larry Sheldon wrote:
I have been wondering about that too--the Internet may be the only
artifact of human existence that is generally border insensitive (with
exceptions we don't need to enumerate).
Pollution.
Global warming.
Nuclear fallout.
...
d/
--
od of
eliminating all blowback are problematic.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
effective. Worthy using.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
read willing to conform to the
model specified in this draft?
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
ices, to establish a rock solid reputation both of you and of
your clients.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
dding entries for /all/ software and services (packages,
ISPs, DNS providers, etc.) that can perform the necessary DNS functions needed
by DKIM.
For those wishing to, please complete the template for an entry, per:
<http://dkim.org/deploy/report-template.html>
and send it to me.
Tha
alternate sources of products and services.
Which is to say, anything that alters the incentives of companies to provide
better products at better prices.
We ought to stop saying 'free' and instead say 'competitive'.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
78 matches
Mail list logo