Re: FW: Virus alert

2003-08-30 Thread Valdis . Kletnieks
On Fri, 29 Aug 2003 19:30:44 CDT, David Frascone [EMAIL PROTECTED]  said:

 'course, I probably get 25 e-mails a day telling me that I sent someone
 Sobig, which would be pretty impressive, since I run Suse :)

I should be so lucky.  I'm averaging almost that many AV-scanner alerts bouncing
to me an *hour*.  And inbound Sobig-F are above 1 per minute.

I still say we should have put this in the security considerations in RFC1341:

If you think you know how to secure active objects in e-mail, you are
probably very mistaken.  There be serious and nasty dragons here.

(with apologies to the authors of 'xterm').

On the other hand, maybe we didn't do THAT badly - I can only think of one
vendor that really didn't pay attention



pgp0.pgp
Description: PGP signature


Re: FW: Virus alert

2003-08-30 Thread shogunx
Can't we just hack the mailman configs to dump mails with X-sender value
of outlook or outlook express?  That would solve the problem, no;)

Scott



On Fri, 29 Aug 2003 [EMAIL PROTECTED] wrote:

 On Fri, 29 Aug 2003 19:30:44 CDT, David Frascone [EMAIL PROTECTED]  said:

  'course, I probably get 25 e-mails a day telling me that I sent someone
  Sobig, which would be pretty impressive, since I run Suse :)

 I should be so lucky.  I'm averaging almost that many AV-scanner alerts bouncing
 to me an *hour*.  And inbound Sobig-F are above 1 per minute.

 I still say we should have put this in the security considerations in RFC1341:

 If you think you know how to secure active objects in e-mail, you are
 probably very mistaken.  There be serious and nasty dragons here.

 (with apologies to the authors of 'xterm').

 On the other hand, maybe we didn't do THAT badly - I can only think of one
 vendor that really didn't pay attention



sleekfreak pirate broadcast
world tour 2002-3
live from the pirate hideout
http://sleekfreak.ath.cx:81/




Re: FW: Virus alert

2003-08-30 Thread Valdis . Kletnieks
On Thu, 28 Aug 2003 22:14:26 EDT, shogunx said:
 Can't we just hack the mailman configs to dump mails with X-sender value
 of outlook or outlook express?  That would solve the problem, no;)

Well, the only problem with that idea is that we explicitly do *NOT* have a
Your clue must be -THIS- tall to ride the IETF list policy... ;)



pgp0.pgp
Description: PGP signature


Re: FW: Virus alert

2003-08-30 Thread Keith Moore
 I still say we should have put this in the security considerations in RFC1341:

It's pretty difficult to miss the ones that are already there - which certainly
would have been sufficient to stop Sobig had they been heeded.



RE: FW: Virus alert

2003-08-30 Thread Christian Huitema
 Can't we just hack the mailman configs to dump mails with X-sender
value
 of outlook or outlook express?  That would solve the problem, no;)
 
 Well, the only problem with that idea is that we explicitly do *NOT*
have  a Your clue must be -THIS- tall to ride the IETF list
policy... ;)

The Sobig worm includes its own SMTP code, and places arbitrary values
in the header fields. The source address is forged, and so are various
other fields, including X-Mailer. The worm finds target source and
destination addresses by reading files on the user's disk, not by using
a specific Outlook or OE API. It propagates by social engineering,
when users open some executable attachments. User can do click on
attachments with many mailers, not just Outlook and OE. In fact, the
latest versions of Outlook automatically strip such attachments.

-- Christian Huitema





Criminals

2003-08-30 Thread Keith Moore
 User can do click on
 attachments with many mailers, not just Outlook and OE.

Note that any mailer that does this violates the MIME specifications,
which specifically warn against the presentation of content-types not
known to be safe, against a mail reader implementing the ability to present
arbitrary content via a content-type parameter (e.g. filename),
and recommends that the most that should be done with unknown content-types
is to offer to save the content to a file.

The working group that produced MIME went to a lot of effort to research the
hazards associated with transmission of arbitrary content by email, and to
craft a series of recommendations that would minimize the harm done.  One
vendor in particular deliberately ignored those recommendations.  It also 
produced mail readers that didn't properly label content on outgoing mail and
ignored the content-type parameter on incoming mail, instead looking at the
suffix of a nonstandard filename parameter (which was only intended for use
with application/octet-stream).  When I was on IESG, a program manager with
that company (in charge of an email product) assured me that this decision was
deliberate, as it was thought that it would maximize their company's
penetration in the market.  Obviously, it did serve that end, and other
vendors of mail readers for that platform were forced to emulate (to some
degree) the nonstandard and dangerous behavior of the market leader's
products.

This decision has cost the network billions of dollars, including significant
costs to people who do not use that company's software products (and who
therefore aren't bound by its EULAs).

Words that come to mind to describe this include: Willful, Criminal, and
Negligence.  Another word that comes to mind:  Prison.  As in some people need
to spend a lot of time there.




RE: FW: Virus alert

2003-08-30 Thread shogunx
On Fri, 29 Aug 2003, Christian Huitema wrote:

  Can't we just hack the mailman configs to dump mails with X-sender
 value
  of outlook or outlook express?  That would solve the problem, no;)
 
  Well, the only problem with that idea is that we explicitly do *NOT*
 have  a Your clue must be -THIS- tall to ride the IETF list
 policy... ;)

 The Sobig worm includes its own SMTP code, and places arbitrary values
 in the header fields.

You mean to say that there is a full MTA tucked away in there?


 The source address is forged, and so are various
 other fields, including X-Mailer.

Perhaps you misunderstood my intentions.  My intentions accociated with
this post had nothing to do with the worm.


 The worm finds target source and
 destination addresses by reading files on the user's disk, not by using
 a specific Outlook or OE API. It propagates by social engineering,
 when users open some executable attachments.

Since when is social engineering a desktop activity.  The last time I
checked, social engineering was along the lines of thank you for the shiny
new job, now i'm going to hide a rouge server on your network.

 User can do click on
 attachments with many mailers, not just Outlook and OE. In fact, the
 latest versions of Outlook automatically strip such attachments.


I'm glad I don't have to click on my mail.


 -- Christian Huitema




sleekfreak pirate broadcast
world tour 2002-3
live from the pirate hideout
http://sleekfreak.ath.cx:81/




Re: Criminals

2003-08-30 Thread Masataka Ohta
Keith;

MIME developers are.

MIME is too much e-mail centric.

Whether one use content-type or file name is irrelevant to mail
security, just as whether one use uuencode or base64 is
irrelevant, on both of which MIME developers wasted a lot of time.

 It also 
 produced mail readers that didn't properly label content on outgoing mail and
 ignored the content-type parameter on incoming mail, instead looking at the
 suffix of a nonstandard filename parameter (which was only intended for use
 with application/octet-stream).

On most OSes, including but not limited to UNIX, that's the way to
designate content types of files.

MIME should have followed the practice and IANA could be the central
authority to register filename extensions with their possible security
holes.

Instead, MIME developers arrogantly claimed that OSes should be
modified to support MIME content-type (and even that text files
on OSes should use MIME format to support other tags such as
charset).

Rest of us righteously ignored it.

 Words that come to mind to describe this include: Willful, Criminal, and
 Negligence.

Exactly. But, see above.

Masataka Ohta



Re: where the indirection layer belongs

2003-08-30 Thread Iljitsch van Beijnum
On vrijdag, aug 29, 2003, at 23:06 Europe/Amsterdam, Keith Moore wrote:

It's not uncommon to see a FQDN point to several IP addresses so that
the service identified by the FQDN can be provided either by

(a) multiple hosts, or
(b) a host with multiple addresses.

No.  A client can't tell whether multiple addresses associated with an
DNS name indicate multiple hosts or multiple addresses for the same
host.
Right. And a session can't jump from one address to another either. So 
when we implement the latter, we also address the former.

As a member of the multi6 design team that works on a (b) solution I'm
convinced that such a solution will provide many benefits and should
be developed and implemented.

And I'm equally convinced that a solution that assumes (b) is a
nonstarter.  There is already too much practice that conflicts with
it.
To be more precise: the idea is to have transport sessions move from 
one address to another when there is a rehoming event. Obviously there 
will be changes to the process of publishing additional addresses.

It would make sense to
create something new that sits between the transport(s) and the
application, and delegate some tasks that are done by applications
today, most notably name resolution. This allows us to implement new
namespaces or new address formats without any pain

No it doesn't.  What it allows us to do is impose subtle changes in
the behavior of lower layers, and introduce new failure modes, without
giving applications any way to deal with them.
Well if we make a new API that allows applications to set up sessions 
based on FQDNs, and then later we decide that the next version of IP 
really needs variable length addresses where the address length in bits 
is a prime number, existing applications _should_ continue to work. 
Experience shows there are always cases where things aren't as simple 
as all this in practice, but I don't see how this can be worse than 
being 100% positive that the applications won't work and must be 
changed to support the new address format.

But the real question here is: does this new thing have to be a
layer?

It depends on which thing you are talking about.
New API and/or mechanisms to distribute operations over multiple hosts.

For the L3-L4 thing, it's either a new layer or a change to an 
existing layer.
Agree: both ends must cooperate, so a layer (new or modifications to an 
existing one) makes sense.

If you have both the L4-L7 thing and the L3-L4 thing, the former is 
either a new layer or (my personal opinion) a new API that 
knowledgable apps
call explicitly.
Right, and API != layer.




Re: Virus alert

2003-08-30 Thread Tim Chown
On Fri, Aug 29, 2003 at 07:23:29PM -0400, [EMAIL PROTECTED] wrote:
 On Sat, 30 Aug 2003 00:10:50 +0200, A. Kremer [EMAIL PROTECTED]  said:
 
  ---
  Incoming mail is certified Virus Free.
  Checked by AVG anti-virus system (http://www.grisoft.com).
  Version: 6.0.512 / Virus Database: 309 - Release Date: 19-8-2003
  ---
  Outgoing mail is certified Virus Free.
  Checked by AVG anti-virus system (http://www.grisoft.com).
  Version: 6.0.512 / Virus Database: 309 - Release Date: 19-8-2003
 
 And every single copy of Sobig-F goes out with the header:
 
 X-MailScanner: Found to be clean
 
 What's wrong with this picture?

Well, as the group that made MailScanner, we take the presence of that line 
as a great compliment by the virus writer :)

Aside:  MailScanner (which is open source and free) is one of few gateway
spam/virus detectors that can cater for those virii that forge email From:
headers so that warnings do not erroneously go back to the forged sender.   

See www.mailscanner.info if you're interested.

Tim



Re: where the indirection layer belongs

2003-08-30 Thread Keith Moore
 To be more precise: the idea is to have transport sessions move from 
 one address to another when there is a rehoming event. Obviously there 
 will be changes to the process of publishing additional addresses.

I'm also interested in ways of doing this.  I just don't think it's 
appropriate to use FQDNs as the identifiers.

Keith



Re: Criminals

2003-08-30 Thread Valdis . Kletnieks
On Sat, 30 Aug 2003 15:26:38 +0859, Masataka Ohta said:
 MIME is too much e-mail centric.

For an E-mail centric protocol, it's worked pretty well on port 80

 On most OSes, including but not limited to UNIX, that's the way to
 designate content types of files.

But it's not *universally* true, so you have to come up with some sideband
way of conveying information.  And in fact, even if two systems both
support extensions as a *mandatory* flagging, you can still run into
trouble - what if the two systems don't use the *same* extension for
a filetype that should be portable?  Should a postscript file end in .PS,
.ps, .PST?  Should a VisualBasic script be .VB or .VBS?  Is a image/jpeg
file a .JPG or .JPEG?

And if extensions are non-mandatory, it's just a mess.  Think about the
security implications of Here's an executable called foo.JPG (Microsoft
didn't - that's the basic cause of MS03-032).

 Instead, MIME developers arrogantly claimed that OSes should be
 modified to support MIME content-type (and even that text files
 on OSes should use MIME format to support other tags such as
 charset).

No.

This claim is right up there with SMTP developers arrogantly claimed
that OSs should be modified to support network-standard EOL.

And of course they didn't.  They merely insisted that the user agent at
either end convert to/from the local format.


pgp0.pgp
Description: PGP signature


RE: FW: Virus alert

2003-08-30 Thread Christian Huitema

  Can't we just hack the mailman configs to dump mails with X-sender
 value
  of outlook or outlook express?  That would solve the problem, no;)
 
  Well, the only problem with that idea is that we explicitly do
*NOT*
 have  a Your clue must be -THIS- tall to ride the IETF list
 policy... ;)

 The Sobig worm includes its own SMTP code, and places arbitrary
values
 in the header fields.

 You mean to say that there is a full MTA tucked away in there?

Yes. Maybe not a full MTA, but definitely enough to format messages and
execute SMTP. The common assumption is that Sobig was written by one or
several criminals, with the purpose of installing a network of mail
relays zombies, and then to sell the services of this network of
zombies to spammers. The same SMTP agent is probably also used to send
spam from the zombies. If you compare the headers of mail generated by
the worm and those of random spam, you will find that they are very
similar. 

There is another link between Sobig and spam. It appears that these
networks of zombies are used in denial of service attacks against
anti-spam services. 

By the way, the worm does not only include its own SMTP service. It
seems to also include its own DNS code, probably in order to get the MX
records of its targets. This DNS agent is parameterized to start any
look-up at the A-root, with the side effect of overloading this root
server.

-- Christian Huitema




Re: FW: Virus alert

2003-08-30 Thread Zefram
Christian Huitema wrote:
By the way, the worm does not only include its own SMTP service. It
seems to also include its own DNS code, probably in order to get the MX
records of its targets. This DNS agent is parameterized to start any
look-up at the A-root, with the side effect of overloading this root
server.

Does this mean we can stop the virus and associated spam just by switching
off the A root?

-zefram



RE: FW: Virus alert

2003-08-30 Thread Christian Huitema
 By the way, the worm does not only include its own SMTP service. It
 seems to also include its own DNS code, probably in order to get the
MX
 records of its targets. This DNS agent is parameterized to start any
 look-up at the A-root, with the side effect of overloading this root
 server.

 Does this mean we can stop the virus and associated spam just by
switching
 off the A root?

I would suggest that you engage in serious testing before trying
anything like that! 

-- Christian Huitema




RE: FW: Virus alert

2003-08-30 Thread Vernon Schryver
 From: Christian Huitema [EMAIL PROTECTED]

 ...
 Yes. Maybe not a full MTA, but definitely enough to format messages and
 execute SMTP. ...

What do you mean by execute SMTP?  Does it interpret and respond to
SMTP response codes to its SMTP commands or just open a TCP connection
and send a largely constant handful of lines of text before the first
header line?  The samples I've captured have pretty rudimentary SMTP
envelopes.

 ...
 By the way, the worm does not only include its own SMTP service. It
 seems to also include its own DNS code, probably in order to get the MX
 records of its targets. ...

That would be far more impresssive, although given the many resolver
libraries available, nothing to write home about.


Vernon Schryver[EMAIL PROTECTED]



Testing Root A going away

2003-08-30 Thread bill
Didn't J Postel run a test similar to that once G...

On a side note, how would you go about testing something like this ?

What would be considered pass/fail metrics - well written applications
vs. people doing silly and stupid things (ie. Would it be consisdered a
failrue that sobig fails because it was incorrectly written ?)

Bill

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Christian Huitema
Sent: Saturday, August 30, 2003 11:13 AM
To: Zefram; [EMAIL PROTECTED]
Subject: RE: FW: Virus alert


 By the way, the worm does not only include its own SMTP service. It 
 seems to also include its own DNS code, probably in order to get the
MX
 records of its targets. This DNS agent is parameterized to start any 
 look-up at the A-root, with the side effect of overloading this root 
 server.

 Does this mean we can stop the virus and associated spam just by
switching
 off the A root?

I would suggest that you engage in serious testing before trying
anything like that! 

-- Christian Huitema






RE: Testing Root A going away

2003-08-30 Thread Christian Huitema

 Didn't J Postel run a test similar to that once G...
 
 On a side note, how would you go about testing something like this ?

Obviously, cutting of the A root would have some pretty drastic
consequences. On the other hand, there are many computers that have no
business contacting directly the root servers. For example, in many
enterprises and campuses, computers are suppose to send their DNS
traffic to a configured relay. 

 What would be considered pass/fail metrics - well written applications
 vs. people doing silly and stupid things (ie. Would it be consisdered
a
 failrue that sobig fails because it was incorrectly written ?)

Looking at bugs in worms and using these bugs to squash the worms is
fair game. Another known bug is the SMTP Hello line always contains a
single token host name, instead of an FQDN. However, it is very likely
that such bugs will be corrected in a next release -- say, Sobig.G. 

The better question for the IETF is whether we should do something to
SMTP to make it less easy to send spoofed mail.

-- Christian Huitema




RE: Testing Root A going away

2003-08-30 Thread shogunx

 The better question for the IETF is whether we should do something to
 SMTP to make it less easy to send spoofed mail.

what, so one couldn't telnet in and send arbitrary mail?  include a
reversedns lookup in SMTP?  good luck on widespread implementation.



 -- Christian Huitema




sleekfreak pirate broadcast
world tour 2002-3
live from the pirate hideout
http://sleekfreak.ath.cx:81/




Re: Testing Root A going away

2003-08-30 Thread Iljitsch van Beijnum
On zaterdag, aug 30, 2003, at 21:28 Europe/Amsterdam, Christian Huitema 
wrote:

Obviously, cutting of the A root would have some pretty drastic
consequences.
If that is the case then some people have been reading the relevant 
RFCs with their eyes closed. The only consequence should some sporadic 
short delays when a resolver asks the A but there is no answer so there 
is a timeout and one of the other root servers must be consulted.

On the other hand, there are many computers that have no
business contacting directly the root servers. For example, in many
enterprises and campuses, computers are suppose to send their DNS
traffic to a configured relay.
How would that make a difference, other than that a central resolver 
can cache more efficiently? If a host needs a domain in a 
not-yet-cached TLD resolved, then someone somewhere has to ask one of 
the root servers for the information about this TLD, whether this is 
the host that needs the information or some other system working on 
behalf of this host.

The better question for the IETF is whether we should do something to
SMTP to make it less easy to send spoofed mail.
Well, draft-fecyk-dsprotocol-04.txt is in the RFC editor queue and this 
seems like a fair step in the good direction, without heaving read it 
in detail. So unless this is no good it should be shipped as and RFC 
and then the ball is in the vendors' court.




RE: Testing Root A going away

2003-08-30 Thread Rick Wesson
On Sat, 30 Aug 2003, Christian Huitema wrote:

[snip]

 Obviously, cutting of the A root would have some pretty drastic
 consequences. On the other hand, there are many computers that have no
 business contacting directly the root servers. For example, in many
 enterprises and campuses, computers are suppose to send their DNS
 traffic to a configured relay.

not realy. If 'A' stops answering you'll just ask questions of the others.
The issue is not if 'A' goes off the air, there are always other servers
to talk to.

-rick





Re: FW: Virus alert

2003-08-30 Thread Dean Anderson


On Fri, 29 Aug 2003, David Frascone wrote:

 With the current virii usually forging the from field with random
 addresses from its victim's address book, I turned off my virus
 scanner's warning to the senders . . I only send a polite note to the
 intended recipient.

Don't do that. That is quite likely what the Virus writer wants you to do:
Stop notifying people about infections.  The worst that happens is that
people get notifications, and update their anti-virus, which finds
nothing.  The best that happens is that the headers included in such a
notification reveal the IP address of an infected zombie.

Also, in the current cases, I don't think the addresses aren't taken from
address books.  I'm getting responses to addresses that haven't been used
for email and addresses that haven't been used in years. Certainly, these
aren't in anyone's address book.  In one case, the address is on a little
used web site (but even spammers rarely spam it, and in another, its in a
reasonably public area, but not used)

The Virus writer obviously went to some trouble to pick valid addresses.
It stands to reason that they expect that someone is getting mail to these
addresses.  It also stands to reason that the abuser expects those persons
to get Virus notifications.

Most probably, virus notifications tend to frustrate the purposes of
the Virus operator, since the infected will not stay infected. It seems
possible that the virus operators are trying to manipulate people to stop
sending or responding to virus notifications.

In past cases, the forged from address was the target of the abuse: the
abuser hoped to have people block mail with the common from address, thus
getting some measure of revenge on that person.  Most people have
filtering on From: addresses for this reason.

The best thing to do in response to such an attack is to do things that
frustrate purposes the abuser, catch the abuser, or nothing at all.
Never succumb to what might be a desired manipulation--That only
encourages more abuse.


--Dean





Re: FW: Virus alert

2003-08-30 Thread shogunx
On Sat, 30 Aug 2003, Dean Anderson wrote:

How beautiful to be immune behind an open-source kernel;)  The rest of the
world worries.  I eat a sandwich.

Scott




 On Fri, 29 Aug 2003, David Frascone wrote:

  With the current virii usually forging the from field with random
  addresses from its victim's address book, I turned off my virus
  scanner's warning to the senders . . I only send a polite note to the
  intended recipient.

 Don't do that. That is quite likely what the Virus writer wants you to do:
 Stop notifying people about infections.  The worst that happens is that
 people get notifications, and update their anti-virus, which finds
 nothing.  The best that happens is that the headers included in such a
 notification reveal the IP address of an infected zombie.

 Also, in the current cases, I don't think the addresses aren't taken from
 address books.  I'm getting responses to addresses that haven't been used
 for email and addresses that haven't been used in years. Certainly, these
 aren't in anyone's address book.  In one case, the address is on a little
 used web site (but even spammers rarely spam it, and in another, its in a
 reasonably public area, but not used)

 The Virus writer obviously went to some trouble to pick valid addresses.
 It stands to reason that they expect that someone is getting mail to these
 addresses.  It also stands to reason that the abuser expects those persons
 to get Virus notifications.

 Most probably, virus notifications tend to frustrate the purposes of
 the Virus operator, since the infected will not stay infected. It seems
 possible that the virus operators are trying to manipulate people to stop
 sending or responding to virus notifications.

 In past cases, the forged from address was the target of the abuse: the
 abuser hoped to have people block mail with the common from address, thus
 getting some measure of revenge on that person.  Most people have
 filtering on From: addresses for this reason.

 The best thing to do in response to such an attack is to do things that
 frustrate purposes the abuser, catch the abuser, or nothing at all.
 Never succumb to what might be a desired manipulation--That only
 encourages more abuse.


   --Dean





sleekfreak pirate broadcast
world tour 2002-3
live from the pirate hideout
http://sleekfreak.ath.cx:81/




RE: Testing Root A going away

2003-08-30 Thread Dean Anderson
On Fri, 29 Aug 2003, shogunx wrote:
  The better question for the IETF is whether we should do something to
  SMTP to make it less easy to send spoofed mail.

 what, so one couldn't telnet in and send arbitrary mail?  include a
 reversedns lookup in SMTP?  good luck on widespread implementation.

Reverse DNS lookups tell one nothing about the legitimacy of the email
being sent.  This has been hashed over on both namedroppers and DNSOP.

I also recently hashed out the Information Theoretic problems with
suppressing spam with a group of PhDs from one of my old companies.
After a great deal of arguing about the definition of Covert Channel (in
particular whether cooperation was required or not), it was determined (to
a high degree of confidence--but not to a formal proof) that spam is
indeed a covert channel, and therefore subject to the axiom that one
cannot prove there are no covert channels. I should note that during the
course of research I made to on the topic, which included reading a number
of original papers on the subject of Covert Channels, Side Channels, and
like concepts, I could find no written proof of this axiom, but neither
was it challenged as being untrue.

This confirms the intuition that digital signature schemes, and cost
schemes and other such suppression schemes cannot succeed.  Spam is
essentially dependent on the will of the sender, and given viruses, that
will can be subverted for many senders no matter what suppression scheme
is used. Spam can be detected, and stopped after detection, but it cannot
be made impossible to send.

The question is really whether SMTP has sufficient identification
information to track down an abuser, or infected user. The answer to this
question is yes.  Even with an open proxy, the SMTP information will
identify the open proxy. The anonymity offered by the open proxy is
completely independent of SMTP.  However, to identify the abuser, one may
need law enforcement authority, or be willing to undertake a civil action
at some expense.  This is consistent with the PSTN, in which the identify
of a user can't generally be determined by another end user, but can
usually be determined using law enforcement authority.  Indeed, as with
the PSTN, some anonymity is appropriate.  One would probably not want to
allow end users to be able to identify another end user against their will
without a court order of some sort or some evidence of a criminal act.

--Dean








Re: FW: Virus alert

2003-08-30 Thread Dean Anderson
Open source kernels aren't immune. They just aren't at focus this time.

Have fun with the sandwich. ;-)

--Dean

On Fri, 29 Aug 2003, shogunx wrote:

 On Sat, 30 Aug 2003, Dean Anderson wrote:

 How beautiful to be immune behind an open-source kernel;)  The rest of the
 world worries.  I eat a sandwich.

 Scott




Re: Solving the right problems ...

2003-08-30 Thread S Woodside
On Wednesday, August 27, 2003, at 01:25 PM, Iljitsch van Beijnum wrote:

On woensdag, aug 27, 2003, at 18:48 Europe/Amsterdam, Tony Hain wrote:

but if that only applied to apps using a new stabilization layer, 
there wouldn't be as much complaint because those would see a clear 
benefit.
So when will vendors recompile their apps for multihoming? Right after 
they're done recompiling them for IPv6?

It might be useful to start thinking about what we can do in the long 
term if we don't care about supporting existing applications, but this 
won't solve any of today's or tomorrow's problems.
Well since a lot of people are still looking for a good reason to move 
to IPv6, and this might be one of them ...

simon

--
simonwoodside.com -- openict.net -- 99% Devil, 1% Angel