What the IETF should do: Amend RFC 2822 (was: Re: spam)

2003-05-29 Thread Doug Sauder
 for aliases is work
the IETF should take on.
--
Doug Sauder
Hunny Software, Inc





Re: spam

2003-05-29 Thread Doug Sauder
Do we have to solve *the* spam problem?  How about a much simpler, solvable 
problem that perhaps a large majority of email users struggle with?

The hard problem is how to allow people to be generally accessible by email, 
but not so accessible that they get tons of spam.  In other words, how they 
can participate in a public forum -- say a newsgroup or mailing list -- 
allowing other individuals to contact them with non-spam, while keeping the 
spam out.

The easy problem is how to allow two consenting parties to communicate via 
email without interference from spam.  Not everyone feels it's necessary 
that they participate in a public forum.  Many would be happy if just the 
easy problem were solved.

The easy problem has not been solved satisfactorily.  Some options:

1. Get multiple email accounts.  Some are throw-away accounts.  Some are 
closely guarded, but eventually end up compromised.

2. Change email addresses from time to time.  For many users, that, to them, 
means changing ISPs.

3. Just learn to live with spam.

4. Try a filter and live with false positives.

Those are the options available to average email users.  For more capable 
users, there is another option:

5. Some clever ad hoc solution.  Like putting a special string in the 
subject line.

As this easy problem is a truly solvable problem, and one that many people 
care about, why not solve it in a standard way?

See my further comments below...

Anthony Atkielski wrote:
[snip]
I think, though, that a more effective method would be to find something
that one can require on each message and that is not trivially easy for a
computer to do automatically.
For example, the various admininstrations passing through the White House
have long had a policy of establishing a secret number or similar text
that must be placed on any incoming letter that is to be forwarded directly
to the President or his family with minimal screening.  The President and
family then give this number to a select few people.  Any correspondence
without the number goes through all the usual screening.
This works because the number is an out-of-band datum that the average
sender is not likely to have.  It is communicated from human being to human
being, and isn't to be found anywhere in public.  So it cannot be
automatically added by a machine, nor can unauthorized people add it.
A simple e-mail implementation of this would be to place a random string in
the subject line of a message intended for a specific recipient that serves
the same purpose as this secret number.  The string would be different for
each recipient, and the only way to obtain it would be through some
out-of-band process (such as contacting the recipient by phone, or
something).  Since there would be no record of this anywhere that spammers
could harvest, it would be impossible for spammers to include these numbers
on outgoing mail.  Very simple, and very effective.  It would, however, be
nice to have e-mail clients that automated this, by allow for a secret
number field in address books that would make it possible to insert them
automatically on outgoing mail (most clients already provide a way to filter
for such numbers on incoming mail).
As Anthony's suggestion implies, the solution is simple.  It works like 
this: You can get into my email imbox because I authorized you to get in. 
You prove that you are authorized by presenting the secret that I provided 
to you.

While some would prefer to re-engineer the entire Internet mail system, I 
just see that average users would be happy if email from their relatives, 
friends, co-workers, and acquaintances went into one folder, while 
everything else went into another folder, automatically.  Why is that so 
hard to do?  Why isn't it done?

Personally, I think that plus aliases (also called subaddresses) are the 
best way to solve the easy problem.  But I would be thrilled to see the 
problem solved for the sake of Joe Average User by whatever technique: plus 
aliases, secret number in the subject line, new mail header field, or any 
other good idea.  Once that problem is solved sufficiently, we can go back 
to our research problems.

BTW, some commercial enterprises are on to this idea in a big way.  Just as 
one example, there is ZoEmail (www.zoemail.com).

Digital signatures and similar authentication would work but are overkill.
All you need is some bit of information that spammers cannot harvest, and
the above random string fits that purpose.  Spammers might pick up your
address on a newsgroup or Web site, but they'd have no way of discovering
your secret number.

That simply provides message integrity ...


Hash it and sign it with the public key of the recipient.  That would work,
because spammers would not have the public key, whereas legitimate senders
would.
However, I think the secret-number concept described above would be much
similar and would be just as effective.





--
Doug Sauder
Hunny Software, Inc



What the IETF should do: Amend RFC 2822 (was: Re: spam)

2003-05-27 Thread Doug Sauder
 for aliases is work
the IETF should take on.
--
Doug Sauder
Hunny Software, Inc




RE: HTML better for small PDAs

2001-02-23 Thread Doug Sauder

 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
 
 On Thu, 22 Feb 2001 21:01:23 EST, you said:
 
  I am not sure I agree with the statement that in 10 years XML will
  be history.  One of XML's greatest values is in the fact that it is a
  good format for long-term archiving of written material.  Some very
  old material (several millenia old) is available in XML format --
  that's more than the 32 years for RFC1.  ;-)  The reason old text has
  been converted to XML is not so that people can read it on a GameBoy,
  but so that it can be archived, indexed, converted to other 
 formats, etc.
 
 1) Was your millenia-old data *written in XML*, or was it 
 *converted to* XML
 within the past 5 years?

Duh!?  ;-)  Obviously, this is a rhetorical question.

 2) Will you be able to find the DTD you need in 2035?

Well-formed XML documents still have value even without a DTD.  It's usually pretty 
easy to guess at what the elements mean.  If the documents are of value to a lot of 
people at the time, then yes, you probably will be able to find the DTD and one or 
more style sheets.  If it's just a historical document, then maybe or maybe not.  I'll 
bet that you'd be able to find a plain text rendering of the document, though.

  An alternative point of view is that in 10 years XML will have 
 achieved a
  critical mass, so that it becomes as entrenched as many other standards:
  ASCII, TCP/IP, C, etc.
 
 OK.. Wake me up in 2011 and I'll be MORE than happy to reconsider. ;)

I don't have a crystal ball, and I have been around long enough to have seen fads come 
and go.  XML seems to me to strike the right balance between simplicity and value-add, 
so that I would consider it a pretty safe bet for the long-term as a document format.  
Anyway, I don't expect that the IETF will be moving from plain text to any other 
format for years, if ever.  For the most part, this discussion is academic.

Here's a proposal though:  how about multipart/alternative!  ;-)  Seriously, storage 
is incredibly cheap.  Why not store documents in several formats?  If the plain text 
rendering is the normative document, I don't think anyone would have a problem with 
that.  Perhaps the RFC editor could accept documents using the DTD from M Rose as well 
as the normative plain text format.  I'm not suggesting that the editor take on a lot 
of new work, just that XML documents, when submitted by authors, be made available 
from the Web.

BTW, I have always liked the layout of the RFCs -- namely, that they are nicely 
paginated with page numbers and headers.  On the other hand, HTML often doesn't print 
very well.

--
Doug Sauder




RE: HTML better for small PDAs

2001-02-23 Thread Doug Sauder

Just a few final observations, then I'll bug out of the discussion.

1. Some folks scoff at the idea of reading I-Ds and RFCs on a PDA, yet they think it's 
necessary to accommodate those who would read them on 1950s-style teletypes or other 
old, outdated equipment.  We say that lines should be, what, 76 characters long?  Why? 
  What about 40 characters per line?  Then I could read the RFCs on my old Commodore 
64  in addition to my PDA.  ;-)  What *is* the lowest common denominator, anyway?

2. RFCs have a limited lifetime.  RFC 1 might be 32 years old, but it's probably only 
relevant to historians.  Historians will probably find the tools they need to view old 
documents.  So, if RFCs are maintained in a format that outlives the technology 
documented in the RFCs, then there's no problem, right?  (Speaking from the aspect of 
archives.)  Anyone know how long ASCII will be around?

--
Doug Sauder




RE: VIRUS WARNING

2000-05-12 Thread Doug Sauder

Oh, I agree that we have to take responsibility for our own actions.  I am absolutely 
responsible for allowing the macro to run.

After I mistakenly ran the macro, my first thought was to neutralize it -- to stop it 
from spreading further -- by disabling the automatic running of macros.  
Unfortunately, Word paid more attention to what the macro wanted, than what *I* the 
user wanted.  I said "DON'T RUN MACROS!!".  The macro said "run macros."  Guess who 
Word listened to?  Do you see the catch?  It's not a matter of not being responsible.  
I take the blame.  But MS made it much easier for the virus to get the upper hand.  
The don't-run-macros option is only halfway useful if you can only turn it off, but 
can never turn it on again.

At that time I knew very little about macros.  The VBA editor seemed non-intuitive to 
use.  I tried to remove the virus by deleting the VBA script, and that took several 
hours of research in MS Word How-To books.  I finally ended up going out to a store 
and buying the virus clean-up software.

--
Doug Sauder
Software Engineer
Broadsoft, Inc

 -Original Message-
 From: Castro, Edison M. (PCA) [mailto:[EMAIL PROTECTED]]
 Sent: Friday, May 12, 2000 08:45
 To: 'Doug Sauder'; Castro, Edison M. (PCA); [EMAIL PROTECTED]
 Subject: RE: VIRUS WARNING
 
 
 Let's see if this reasoning holds water. Imagine your favorite OS, suppose
 that I send you
 a .pl file (Perl Script). You then make the "mistake" of saving it to the
 file system and then
 proceed to running the script. What do you think that script can do?. What
 will you have to do
 to fix your problem?. This is completely analogous to changing the default
 selection on the
 "Do you want to run this document's macros" dialog from "NO" to "YES".
 
 We have become a society of excuses people, nothing is our fault. It is
 always somebody
 else's fault. 
 
 WE HAVE TO TAKE RESPONSIBILITY FOR OUR OWN ACTIONS
 
 
 ps: if I made this stupid mistake, I will immediately check what 
 macros are
 included in the
 forsaken document and delete them.
 
 
 -Original Message-
 From: Doug Sauder [mailto:[EMAIL PROTECTED]]
 Sent: Thursday, May 11, 2000 5:55 PM
 To: Castro, Edison M. (PCA); [EMAIL PROTECTED]
 Subject: RE: VIRUS WARNING
 
 
 
 
  -Original Message-
  From: Castro, Edison M. (PCA) [mailto:[EMAIL PROTECTED]]
  That is exactly the same way that all Windows virus work. As a Windows 
  user (as well as other OSes), I can say that people have to be 
  responsible 
  for their actions.  Whenever you receive any Email attachment, 
  the only way
  that attachment can produce any damage is if you run it.
  
  At least in my copy of MS Word anytime I open a word document and it
  contains
  any macros, Word readily ask me if I want to allow the macro to 
 execute. 
  Not only that, this version of Word (2000) is configured to only 
  ask me when
  a signed (with a certificate of a trusted party) macro is included.
 
 Suppose you made the mistake of opening a Word document with a VBA (Visual
 Basic for Applications) script virus.  (I did this once and I am sharing a
 real-life experience.)  The VBA script turns off the option that disables
 automatically running scripts.  I kid you not!  Next time you open a Word
 document that contains a script, you won't be asked whether you 
 want to run
 it.  If you go into the options settings and set the option to disable
 running scripts, you have done nothing, because the virus script runs when
 you close the document and turns the option back off again.
 
 At least not allowing macros to disable the don't-run-macros option seems
 reasonable to me, but it seemed to have escaped the engineers who created
 Microsoft Word.
 
 Doug Sauder
 Software Engineer
 Broadsoft, Inc