Re: Eliminating Virus Spam

2001-01-04 Thread Denis Mcmahon

On Wed, 03 Jan 2001 23:57:53 -0500 (EST), you wrote:

1. Should the IETF elist messages be scanned for viruses?

This would require that appropriate virus detection software exist in
the environment that the mail list is operated.

Are you aware of eg an Acorn Archimedes virus scanner that runs in a
vax/vms environment?

2. Should the IETF elist restrict the type of content that can be
   submitted?

I see no reason that the IETF list(s) should not be restrictd to
plaintext[1], with either a remove-the-attachment or even
drop-the-message approach (possibly with an automated unsubscribe) to
non text attachments / content.

Anyone who wants to distribute non plaintext can post it on a website
or ftp directory somewhere for collection by those who actually want
it.

Rgds
Denis

[1] Text based markup eg html is *NOT* plaintext in this context.
-- 
Denis McMahon  Usenet: Trim quotes
Mobile: +44 7802 468949Reply at the end
Email: [EMAIL PROTECTED]   Don't use html
I trim ng when posting! Email domain blocking in use




Re: Eliminating Virus Spam

2001-01-04 Thread Francis Dupont

Vernon, I fully agree with you: there is no reason to get multipart
messages in technical discussion mailing lists. Even if your solution
seems drastic this is the way we should go.

Thanks!

[EMAIL PROTECTED]




Re: Eliminating Virus Spam

2001-01-04 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Francis D
upont typed:

 Vernon, I fully agree with you: there is no reason to get multipart
 messages in technical discussion mailing lists. Even if your solution
 seems drastic this is the way we should go.
 
i'd prefer to see us develop a more 21st century solution 

first, we should register mime types that we DO allow on a list

second, if someone must send an executable attachment , then we have a
signing server that signs the attachment as trustworthy - most of the
stupid atachments come from places who wouldnt be part of my trust
chain.

 cheers

   jon




Re: Eliminating Virus Spam

2001-01-04 Thread Michael Richardson


 "James" == James M Galvin [EMAIL PROTECTED] writes:
James On the other hand, I think it's a feature to be able to send documents
James (even text-based documents) as attachments as opposed to inline and I
James further consider it a feature that Internet Draft announcements and RFC
James announcements are multipart with functional pointers to the
  
  Emphasis on *pointers*
  
  Sending of IDs to the WG lists is a terrible practice.

   :!mcr!:|  Solidum Systems Corporation, http://www.solidum.com
   Michael Richardson |For a better connected world,where data flows fastertm
 Personal: http://www.sandelman.ottawa.on.ca/People/Michael_Richardson/Bio.html
mailto:[EMAIL PROTECTED]   mailto:[EMAIL PROTECTED]





Re: Eliminating Virus Spam

2001-01-04 Thread Harald Alvestrand

fwiw, ietf+censored currently has the following set of filters in taboo_body:

/^Antigen for Exchange found/
/^Virus Notification: A virus has been detected/
/^Antivirus Utility for Exchange found .* infected/
/^Content-Type: application\/x-msdownload/i

the last one is ONLY included because I got so very tired of scanning the 
virus notifications trapped by the first 3 lines (23 caught at last count).

It is my arbitrariness, not a virus-scanning service.

--
Harald Tveit Alvestrand, [EMAIL PROTECTED]
+47 41 44 29 94
Personal email: [EMAIL PROTECTED]




Re: Eliminating Virus Spam

2001-01-04 Thread Matt Crawford

 Please point to an example of a useful multipart message seen in
 this list or that might someday be useful in this mailing list.

I have sent to wg lists a multipart containing a preamble and an
internet-draft or similar file.  This makes it easy for recipients to
save the draft as-is.  Sometimes I have made the file a
content/external-body to avoid stuffing O(100kB) into many mailboxes
where it wouldn't be wanted.

You said "this list", but the above scenario would apply if the
document were pertinent to a BOF or brand-new working group.




Re: Eliminating Virus Spam

2001-01-04 Thread James M Galvin

This distinction between filtering content and virus scanning is
confusing because they are not the same thing.

To choose to filter content (restrict it to text/plain or some other
limited set) would be changing the policy of this elist.  That is more
than an operational decision and probably deserves more debate, although
not here.

To choose to scan for viruses is an operational decision.  I never said
anything about safety.  You can not do virus scanning principally for
safety reasons.  To be sure that's a contributing factor but the truth
is you're only as safe as your last virus description update.  We're all
whining about vacation and virus notices and how we want them filtered
off the elist and I just don't see how filtering for viruses in the
first place is any different.

This is about being a "good net citizen".  Sending a virus to me (the
royal "me" because like Ted T'so viruses are irrelevant to me personally
since I use a UNIX box, a safe MUA, and my email system scans for
viruses) is only going to teach me that you know how to contribute to
the abuse of the Internet.

The source of the problem is not me for letting you send me a virus.
The source of the problem is the originator who sent the message and the
IETF elist is being used like an open email relay is used by spammers.
The IETF elist is irresponsibly contributing to the waste of resources
and abuse of the Internet.  Send the problem back to the originator, not
to me.  Unsubscribing them may make you feel better but it doesn't give
you the chance to chastise them, again and again if you're lucky.

And the argument about virus scanning being platform specific is
specious.  Your vulnerability to a virus is directly proportional to how
well you protect yourself.  Software developers/suppliers contribute to
this problem but if you were protecting yourself they wouldn't be in
business.  Microsoft Windows may be the predominant OS that supports
applications that contribute to the development and distribution of
viruses, but it is the application data that is the virus not the OS.
Microsoft Word macros can be run on UNIX and text/html with javascript
runs virtually anywhere.

A virus scanner scans content, a sequence of bytes.  It can do this on
any platform, regardless of the intended destination platform of the
content.  The virus may be platform specific but that is irrelevant.

Jim




Re: Eliminating Virus Spam

2001-01-04 Thread chris d koeberle

On Wed, 3 Jan 2001, James M Galvin wrote:
 I think this discussion needs to separate at least two distinct issues.
 
 1. Should the IETF elist messages be scanned for viruses?
 
 2. Should the IETF elist restrict the type of content that can be
submitted?

Bear this in mind when you say that - I am running (in the spirit of
inclusion) an operating system / mailservice that I wrote myself.  My
system is set up such that, upon receiving an e-mail which contains any
sort of attachment it does not recognize (and it doesn't recognize
anything but 7-bit ASCII text), it immediately replies to every address
mentioned in the e-mail, including every attachment, and throwing in a
virus for every other system for which one is known.  Please be certain to
include virus-scanning which respects the fact that to my system, all
attachments are viruses.

(Naturally, I have configured my system to APPEAR as though I'm just using
PINE, but trust me - it works the way I say it does.  Really.)

-= flail? http://flail.com/ =-
 -= the online comic strip =-





multipart/signed (was Re: Eliminating Virus Spam )

2001-01-04 Thread Donald E. Eastlake 3rd


The fact that very few can/do create/verify multipart/signed email is
mostly a statement on the extremely sad state of security on the
Internet; to which I guess I'm contributing by not signing my mail :-(

The use of authenticating tehcnology (even if it is just to
authenticate that two messages came from the same nym) should be
encouraged, not blocked.

Donald
===
 Donald E. Eastlake 3rd[EMAIL PROTECTED]
 155 Beaver Streeet [EMAIL PROTECTED]
 Milford, MA 01757 USA +1 508-634-2066(h)   +1 508-261-5434(w)

From:  Michael Richardson [EMAIL PROTECTED]
Message-Id:  [EMAIL PROTECTED]
In-Reply-To:  Your message of "Wed, 03 Jan 2001 17:03:16 PST."
  [EMAIL PROTECTED] 
Date:  Thu, 04 Jan 2001 07:55:56 -0500

 "hardie" == hardie  [EMAIL PROTECTED] writes:
hardie Example:

hardie A multipart/signed message containing a pgp signature known to
hardie some/all members of this list.  As, for example, the ietf registrar pgp
hardie signature (see http://www.ietf.org/ietf-registrar.asc).

  Of the subset that can process PGP, a very small number can actually
process multipart/signed.  I have never got mailcrypt.el to do it, 
the Euroda and Outlook PGP plug-ins don't do it. The only ones that I know do
it are PINE, ELM and EXMH. 
  So, such a message would be better done as a straight clear-signed message.

   :!mcr!:|  Solidum Systems Corporation, http://www.solidum.com
   Michael Richardson |For a better connected world,where data flows fastertm
 Personal: http://www.sandelman.ottawa.on.ca/People/Michael_Richardson/Bio.html
   mailto:[EMAIL PROTECTED]   mailto:[EMAIL PROTECTED]




Re: Eliminating Virus Spam

2001-01-04 Thread Keith Moore

 second, if someone must send an executable attachment , then we have a
 signing server that signs the attachment as trustworthy

and how, and using what criteria, would the signing server evaluate 
the trustworthiness of the attachment?

e.g. I might consider an attachment that installed NetBSD on top
of an existing Windows system to be absolutely trustworthy 
(so long as it did it's job well) and performing a valuable community 
service, but others might not agree...  
(they might insist that Linux be installed instead.)

Keith




Technical Internet Advancements for White House Internet Strategies

2001-01-04 Thread Steven Clift

I am looking for a few leading Internet technical experts to contribute 
their ideas for an online conference on the *use* of the Internet by the 
next White House.  What advancing Internet standards and tools should be 
considered?  What would you do if you were in charge?  What could the White 
House do to filter and respond to the millions of e-mails it receives in a 
more effective manner?  How might syndication and XML strategies be employed?

If you'd like to contribute a short essay to the event as described below, 
please drop me a note [EMAIL PROTECTED] with your suggested topic area.  - 
Steven Clift

-
  Democracies Online - White House 2001 Online Conference
   Envisioning the Next White House Web Site
-

Opens with 100 Participants

An online event through January 18, 2001 to generate ideas and exchange 
information on the next White House web site.  What should the next White 
House Web site do?  What should it look like?  How should the White House 
use online communications strategically to connect with citizens and govern?

How this facilitated and moderated online exchange will work:

1. Idea Bullets - Each participant is encouraged to share one short idea 
for the next White House web site.

2. Strategic Essays - Internet leaders and netizens are asked to contribute 
short 400-500 word essays covering a specific Internet *use* strategy the 
White House should consider. Big ideas and solid advice wanted! These 
essays should be submitted to the online event facilitator, Steven Clift 
[EMAIL PROTECTED] for review.

3. General Comments - All participants are encouraged to comment and add to 
the ideas sent to the forum. All posts will be moderated with a general 
limit of one or two posts per day per person. To keep message volume in 
check, some messages may be held one or two days.

To JOIN the online conference, simply send an e-mail to:
  [EMAIL PROTECTED]

To messages via the web or choose digest options visit:
  http://www.egroups.com/group/do-whitehouse

To join the 1600 member Democracies Online Newswire moderated announcement 
e-mail list, get the full details at: http://www.e-democracy.org/do

This is a strictly unofficial activity. Content from the online event will 
be made available to White House officials and the public.

Hosted by Steven Clift http://publicus.net with the Democracies Online 
Newswire
http://e-democracy.org/do. If your organization would like to Co-Sponsor 
this event, all you need to do is bring 20 verified participants to the 
forum or send information about the forum to at least 1000 people on an 
e-mail list run by your  organization. Contact [EMAIL PROTECTED] to 
co-sponsor this event.




Re: Eliminating Virus Spam

2001-01-04 Thread Vernon Schryver

 From: Jon Crowcroft [EMAIL PROTECTED]

 i'd prefer to see us develop a more 21st century solution 

 first, we should register mime types that we DO allow on a list

 second, if someone must send an executable attachment , then we have a
 signing server that signs the attachment as trustworthy - most of the
 stupid atachments come from places who wouldnt be part of my trust
 chain.

It would be more of a 21st century something to have the IETF join
Microsoft in equating authentication (e.g. signing) with authorization
(e.g. who gets to run programs on your computers).  However, "solution"
is not the best word for what it would be.

In other words, please consider how little you would need to adapt
http://www.cert.org/reports/activeX_report.pdf if you did such a thing.

In still other words, do you really think that I should automatically
be part of your trust chain?


Vernon Schryver[EMAIL PROTECTED]




Re: Technical Internet Advancements for White House Internet Strategies

2001-01-04 Thread Jon Crowcroft


some of the folks on this list aren't american or US citezens and
might think that this is a bit presumptious.but here goes:-

the first thing the white house should do is educate its customers and
organise voting properly

the next thing it should do is apply for membership of the European
Union

following that, the use of other languages might be a considerably
benefit - e.g. spanish, chinese and hopi spring to mind

finally, what fee is being paid for this, and in what (stable)
currency, and under which tax treaty?


:-)

In message [EMAIL PROTECTED], Steven Clift typed
:

 I am looking for a few leading Internet technical experts to contribute 
 their ideas for an online conference on the *use* of the Internet by the 
 next White House.  What advancing Internet standards and tools should be 
 considered?  What would you do if you were in charge?  What could the White 
 House do to filter and respond to the millions of e-mails it receives in a 
 more effective manner?  How might syndication and XML strategies be employed?
 
 If you'd like to contribute a short essay to the event as described below, 
 please drop me a note [EMAIL PROTECTED] with your suggested topic area.  - 
 Steven Clift
 
 -
   Democracies Online - White House 2001 Online Conference
Envisioning the Next White House Web Site
 -
 
 Opens with 100 Participants
 
 An online event through January 18, 2001 to generate ideas and exchange 
 information on the next White House web site.  What should the next White 
 House Web site do?  What should it look like?  How should the White House 
 use online communications strategically to connect with citizens and govern?
 
 How this facilitated and moderated online exchange will work:
 
 1. Idea Bullets - Each participant is encouraged to share one short idea 
 for the next White House web site.
 
 2. Strategic Essays - Internet leaders and netizens are asked to contribute 
 short 400-500 word essays covering a specific Internet *use* strategy the 
 White House should consider. Big ideas and solid advice wanted! These 
 essays should be submitted to the online event facilitator, Steven Clift 
 [EMAIL PROTECTED] for review.
 
 3. General Comments - All participants are encouraged to comment and add to 
 the ideas sent to the forum. All posts will be moderated with a general 
 limit of one or two posts per day per person. To keep message volume in 
 check, some messages may be held one or two days.
 
 To JOIN the online conference, simply send an e-mail to:
   [EMAIL PROTECTED]
 
 To messages via the web or choose digest options visit:
   http://www.egroups.com/group/do-whitehouse
 
 To join the 1600 member Democracies Online Newswire moderated announcement 
 e-mail list, get the full details at: http://www.e-democracy.org/do
 
 This is a strictly unofficial activity. Content from the online event will 
 be made available to White House officials and the public.
 
 Hosted by Steven Clift http://publicus.net with the Democracies Online 
 Newswire
 http://e-democracy.org/do. If your organization would like to Co-Sponsor 
 this event, all you need to do is bring 20 verified participants to the 
 forum or send information about the forum to at least 1000 people on an 
 e-mail list run by your  organization. Contact [EMAIL PROTECTED] to 
 co-sponsor this event.
 

 cheers

   jon




Re: Eliminating Virus Spam

2001-01-04 Thread Vernon Schryver

 From: "Matt Crawford" [EMAIL PROTECTED]

  Please point to an example of a useful multipart message seen in
  this list or that might someday be useful in this mailing list.

 I have sent to wg lists a multipart containing a preamble and an
 internet-draft or similar file.  This makes it easy for recipients to
 save the draft as-is.  Sometimes I have made the file a
 content/external-body to avoid stuffing O(100kB) into many mailboxes
 where it wouldn't be wanted.

 You said "this list", but the above scenario would apply if the
 document were pertinent to a BOF or brand-new working group.

I'm having trouble parsing that.  
I agree that depending on the I-D and the WG, sending I-D's to working
group lists is sometimes a good thing.  I don't think MIME is required
for that and wouldn't choose it myself, but I agree a working group could
agree to tolerate or prefer it.  However, sending I-D's to this list is
not only not kosher, but an anathema.

Sending content/external-body instead of the 100KB thing itself anywhere
could be swell, except that the state of word puts it somewhere between
irrelevant and a bad idea:
  1. many MUA's automatically dereference all pointers they find anywhere,
 whether in separate MIME attachments or in-line
  2. many slimey outfits use that fact with "web bugs" for violating privacy,
 and have convinced other outfits to help them do that (e.g. my
 soon-to-be-ex on-line stock broker)
  3. so anyone with any sense turns off all automatic dereferencing and
 uses the manual hooks to #1, and that makes content/external-body
 irrelevant.

In other words, who has the least trouble dereferencing a URL in a 7-bit
ASCII message without a single MIME header?

   ...


] From: James M Galvin [EMAIL PROTECTED]

] ...
] To choose to filter content (restrict it to text/plain or some other
] limited set) would be changing the policy of this elist.  That is more
] than an operational decision and probably deserves more debate, although
] not here.

Someone should tell Mr. Galvin that this is not a "general elist," although
it has been identified by some as a haunt of "elitist legacy programmers."

] ...
] viruses, but it is the application data that is the virus not the OS.
] Microsoft Word macros can be run on UNIX and text/html with javascript
] runs virtually anywhere.

That seems to be based on a non-standard definition of "virus."  Neither
MS Word macros nor text/html javascript are likely to be infectious on
reasonable or even most UNIX boxes.  Just running MS Word macros on most
UNIX boxes is between difficult and impossible.  (Yes, I've heard about
StarOffice.)

] ...
] A virus scanner scans content, a sequence of bytes.  It can do this on
] any platform, regardless of the intended destination platform of the
] content.

If wishes were horses then beggars would ride.
Or what MIME attachment virus scanners are there for NetBSD?

]   The virus may be platform specific but that is irrelevant.

That sounds reasonable only to members of the Church of Redmond.


Vernon Schryver[EMAIL PROTECTED]




Re: Technical Internet Advancements for White House Internet Strategies

2001-01-04 Thread Steven M. Bellovin

In message [EMAIL PROTECTED], Jon Crowcroft writes:

some of the folks on this list aren't american or US citezens and
might think that this is a bit presumptious.but here goes:-

I think you're over-assuming -- from looking at the Web site, I did not 
get the impression that this was in any way organized by the White 
House.  It looks like something that Clift is organizing on his own.  
(Steven Clift, am I wrong on that point?  Is this being done by request 
of the incoming administration?)

the first thing the white house should do is educate its customers and
organise voting properly

Sigh.

the next thing it should do is apply for membership of the European
Union

I doubt they'd want us, though if they did it would end the problem of 
the Euro dropping with respect to the dollar...


--Steve Bellovin





Re: Technical Internet Advancements for White House Internet Strategies

2001-01-04 Thread Robert G. Ferrell

the next thing it should do is apply for membership of the European
Union

I'm unclear on this concept.  Wouldn't it rather make a mockery 
of the EU (or at least of the name) if countries from outside Europe start 
joining up?  

Sort of like admitting Japan into NATO. 

RGF 

Robert G. Ferrell, CISSP
Information Systems Security Officer
National Business Center
U. S. Dept. of the Interior
[EMAIL PROTECTED]

 Who goeth without humor goeth unarmed.





Re: Technical Internet Advancements for White House Internet Strategies

2001-01-04 Thread Eric Brunner

 following that, the use of other languages might be a considerably
 benefit - e.g. spanish, chinese and hopi spring to mind

Add Dineh (Navaho), don't want to inflame the Joint-Use Area conflict
any further, though Hopi do go Republican (those who "vote"), unlike
the majority of Dinetah and away-Dineh voters. Bear in mind that the
core of claims by Indigenous Peoples in the current and former British
North America and their successor states, apply to the English Crown
(in Right of Canada, and unsevered by the Treaty of Paris), and do not
make reference to theories of (immigrant) civil rights or equity.

We'd still like a recount, thanks awfully, even if conducted in English.

Kitakitamatsinopowaw, (see you again, probably someplace cold),
Eric




Re: Eliminating Virus Spam

2001-01-04 Thread Russ Allbery

Michael Richardson [EMAIL PROTECTED] writes:

   Sending of IDs to the WG lists is a terrible practice.

Sending short IDs to WG lists or longer IDs in parts as the WG goes over
them results, in my experience, in more detailed and easier to follow
comments than pointers.  YMMV.  It's not appropriate for every version of
the ID, but it's not a bad idea at several points in the process.

-- 
Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/




Re: Eliminating Virus Spam

2001-01-04 Thread Valdis . Kletnieks

On Thu, 04 Jan 2001 09:40:41 MST, Vernon Schryver [EMAIL PROTECTED]  said:
 It would be more of a 21st century something to have the IETF join
 Microsoft in equating authentication (e.g. signing) with authorization
 (e.g. who gets to run programs on your computers).  However, "solution"
 is not the best word for what it would be.

Authentication: "Yes, your driver's license, fingerprint, retina, and
voice scans all agree you are the *real* Jeffrey Dahmer."

Authorization: "Would you like to borrow a steak knife, Mr Dahmer?"

Amazingly enough, we tolerate that same exact logical disconnect from
a major vendor of system software.  Unfortunately, between the even-worse
than current shrink-wrap licensing included in UCITA, and the incoming
presidential administration, it may take a really creative lawyer making
a case of it being a "crime against humanity" and trying the case at
The Hague to fix it... ;(

Valdis Kletnieks
Operating Systems Analyst
Virginia Tech