Re: Acceptability of in-kind donations [was RE: Last Call Comments on draft-iasa-bcp-04.txt]

2005-01-17 Thread Vernon Schryver
 From: Wijnen, Bert (Bert) [EMAIL PROTECTED]
 To: Carl Malamud [EMAIL PROTECTED], Scott Bradner [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED], ietf@ietf.org
 Subject: Re: Acceptability of in-kind donations [was RE: Last Call Comments 
 on draft-iasa-bcp-04.txt]

 Seems we forgot to send issues as ONE ISSUE per EMAIL PLEASE
 and use a proper SUBJECT line, so that we can easily check
 all mail/postings related to one single issue.

That's fine for you people who are continuing to do what you promised
weeks ago to stop doing.  What about those of us who are growing weary
of dozens of such messages per day?  Shouldn't the dozen or so of you
have already retired to a special purpose mailing list as you promised?

It's bad enough that many of your messages consist of thousands of
bytes saying no more than Me too or I agree.  Now you would multiply
them several fold?


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: The process/WG/BCP/langtags mess...

2005-01-11 Thread Vernon Schryver
 From: Addison Phillips [wM] [EMAIL PROTECTED]

    In fact we feel that we've been very considerate
 and open in the development of this draft in the language tagging
 community and continue to be open to comments and criticism, no
 matter the source.

Based on what I have seen in this mailing list, I disagree.  


 I would like the community at large to consider this specific
 I-D--both the requirements for it and the technical merits of our
 solution--attempt to understand our choices and provide (objective)
 feedback that will allow us to achieve consensus for or against it
 (or a slight revision thereof). We are trying to work within the
 confines of the IETF's process to achieve what we see as the necessary
 progress on this issue.

If the advocates for this I-D were really trying to follow the IETF's
processes, they would have taken one of the suggestions for the next
step and temporarily (or permanently) retired from the field.  It is
clear that there is no consensus to advance this document.  Even its
authors have admitted that by talking about a new version.

As has been said repeatedly, a new version would require a new Last
Call.  Last Calls are on documents, not promises to produce a new
document that might address objections to the current document.  Long
time spent in IETF processes is not a reason to ignore the clear answer
from the IETF processes of No Consensus, even when the long time
actually is spent in the IETF processes.  The IETF process involves
official IETF Working Groups and official IETF WG mailing lists.  Time
spent in an unrelated mailing list is not part of IETF standards process
any more then the time spent by an Informational RFC author thinking
about things is part of the IETF standards process.

Besides, isn't the Last Call officially over?  Isn't the topic of the
language tags BCP closed, dead, kaput, finished, and done until the
IESG and the individual submitters of the document choose the next step?

I can't see any significance for Mr. Phillips comment except as yet
more evidence that the default answer for individual submissions
must be ABSOLUTE NO!  He is basically saying You must publish our
BCP because we followed all of the steps as we understood them and the
default result of that is surely to publish.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: individual submission Last Call -- default yes/no.

2005-01-10 Thread Vernon Schryver
 From: Ted Hardie [EMAIL PROTECTED]

 And the point I'm trying to make is that there are multiple records. 
 When we have
a mailing list like ietf-types or ietf-languages where there is a long term
 community of interest around a specific issue, should a discussion there
 be taken into account when assessing an individual submission?  I think
the answer is it depends and certainly may be yes.  It should not over-ride
 ...

I'm bothered by the talk of community of interest and support as if
they were fungible, as if every community of interest is the same as the
IETF.  That is a potentially catastrophic slippery slope.  There are
very good reasons for IEEE PARs.  Turf is the most fought over commodity
of standards organizations.  Turf is more highly valued than any single
document.  Letting random groups of people call themselves communities
and so automagically give themselves the IETF imprimatur is a very bad
thing.  Whether the random group has a mailing list that includes the
string ietf in its private part should be obviously irrelevant, but
judging from recent cases, isn't.  Whether the group's mailing list
happens to use an ietf.org domain name is close to irrelevant.  Whether
the supposed community includes leaders of other standards organizations
should also obviously be irrelevant, but evidently isn't.

Instead of a default no for BCPs or standards track RFC from individual
submissions, it would be better to make it a simple no.  If the IETF
does not feel like investing the substantial effort and delays to form
a WG and the rest of the tiresome, formal IETF dance, then that in
itself is proof that the issue is unworthy of the IETF's official seal.

Previous efforts to borrow the IETF's printing press and official
seal have involved Informational.  Evidently the many forces that
want to borrow the IETF's seal have figured out that Informational
is not valuable enough and are trying a new tactic.

Giving BCP or standards track to individual submissions is evil on
more than one front.  It's not just that it risks blessing non-standards
and deluting the value of BCP and the standards track.  It is evidence
that the IETF as an organization is getting lazy about its real work.
If every I-D were worth publishing, there would never have been a need
for WGs, Last Calls, and the rest.  The whole community consensus
thing is absolutely required for anything that deserves the word
standard.  You can't have a worthwhile standards publisher without
the work of editing.  Other standards bodies use voting.  Book publishers
use editors.  The IETF uses consensus.  Letting the editors off the
hook for jobs will have results as bad in their own way as results we
saw from letting the directors of Enron and MCI sleep on their jobs.

The IESG, IAB, and ADs are not the IETF and do not define the IETF
consensus.  They might gauge it, but if it does not exist outside
them, then it does not exist.

It is definitely not good that the IETF is spending so much time
writing a job description and paying so little attention to ostensibly
important Internet standards like language tags.

It's not only true that A [standards committee's] gotta know [its]
limitations, but it must also know what it doesn't care about enough
to work on.  If the IETF doesn't want to work on language tags by
having a WG and the rest of those delays and work, then so be it.  Let
the standards body that evidently does care do it...unless the incredible
I'm gona tell the Liason on you threat was the vacuous, standards
committee politicing as usual that it sounded like.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: individual submission Last Call -- default yes/no.

2005-01-10 Thread Vernon Schryver
 From: Juergen Schoenwaelder [EMAIL PROTECTED]


 [I do understand what people are concerned about here but I also find 
  it important to remind myself from time to time how we are all working
  towards raising the bar, and once raised, someone will speak up to
  raise it even further. Why are we not trusting the system that has 
  worked remarkable well most of the time so far? Perhaps thats human
  nature - if I look what it takes to release a new Linux kernel these
  days or how difficult it is to make the next Debian release, I may
  conclude that raising the bar is a normal part of such societies.]

That is seriously wrong.  The issue does not involve rising bars, but
falling bars that need to be caught or at least seen to be falling.
The IETF is, as it has been for 10 or 15 years, under attack from those
who use it for ends not consciously chosen by the IETF.

15 years ago there would have been blank looks of incredulity to
the suggestion that an outside, sometimes ostensibly ad hoc and
other times supposedly offical standards organization should push
through a document with as official a designation as BCP without
the let, leave, or hindrance of IETF consensus.  However, that is
the case today.

10 years ago no one would have considered the notion that individual
submissions should become official standards (of course I include
Proposed as an offical IETF standard) of the IETF with a yes vote
assumed from everyone outside the IESG.

Of course, 20 years or 25 years ago, things were nominally different.
In practical terms, the bar was higher still.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: individual submission Last Call -- default yes/no.

2005-01-10 Thread Vernon Schryver
 From: Misha Wolf [EMAIL PROTECTED]

 vs unless the incredible I'm gona tell the Liason on you 
 vs threat was the vacuous, standards committee politicing 
 vs as usual that it sounded like.

 That appears to be a rather paranoid reading of my:

 mw Now the IETF is, of course, free to do whatever it likes, 
 mw but I would urge that any course of action which would 
 mw cause a parting of the ways between the IETF and the W3C 
 mw (and other Industry Consortia) should be avoided.  I 
 mw suggest that it may be time to escalate this matter to 
 mw the IETF/W3C Liaison group.

 Where is the threat?  I was suggesting that as the IETF and 
 the W3C have a liaison group and as there appear to be 
 disagreements as to how to move forward, the matter be raised 
 at the liaison group.  Is that not what such groups are for?

Please credit some of us with understanding the meaning of escalate
in the intended sense of evoke to an authority that will issue a writ
of mandamus.  Other words in Mr. Wolf's message including any course
of action which would cause a parting of the ways were not lacking
in forcefulness.  Then there was the awesome list of authorities that
the IETF list members is ignoring at its peril.
See http://www1.ietf.org/mail-archive/web/ietf/current/msg33563.html

When I read Mr. Wolf's message the first time, I was reminded of an
IETF slogan about rejecting kings and presidents as well as ancient
friction between the DDN protocol designers and users and the ISO.


I suspect that the language tag saga is not as bad as it seems and
that some good new IETF documents might come of it.  It should also
serve as a red flag for another instance of the general problem of the
quality of IETF documents.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Excellent choice for summer meeting location!

2005-01-01 Thread Vernon Schryver
 From: Jari Arkko [EMAIL PROTECTED]

 First, I tend to find tourists and MFLD rather harmless.
 In fact, I think they are good for our financing. Some
 might say necessary. And they usually stay out of the mike,
 don't disturb presentations, and don't comment on the mailing
 list where the real consensus is verified. But if some of
 them do, that's even better - then we have attracted new
 contributors. And we DO need new contributors.

From my perspective as someone with a decades long perfect
non-attendance record at the IETF parties, I think that is wrong
on all counts.  There are WGs that exist only because it is the
go-ers who feel the greatest need to prove to the folks back at the
factory or to the readers of their trade rag inter-ad filler that
their contributions to the Standards Process are vital to peace,
prosperity, and the continued existence of the Internet.

But then I have the archaic and obsolete notion that the IETF needs
good and useful standards more than it needs contributors.


 In short, I wouldn't worry too much about the touristy nature
 of a location. 

Judging purely from good and bad results in the WG mailing lists, I think
that is right and wrong.  Venues that are too hard to reach are attended
by only the most dedicated and so produce agreements that do not reflect
the consensus of the WG mailing list; recall the agreement to pick the
ISO OSI Protocol Suite as IPng.  Venues that are extremely popular also
produce bogus agreements by not drawing a representative sample of the
WG as defined by the mailing list, albeit not quite as bad.

If had been asked years ago, I'd have said the IETF WG meetings should
be abolished in favor of the WG mailing lists supplemented by ad hoc
telephone calls among at most 2-4 people to hammer out the relatively
few issues that need high bandwidth.  I've no doubt that administrative
groups such as the IAB and IESG need real meetings, but in decades of
watching WGs, I cannot think of single case where an IETF WG meeting
was necessary.  Judging from the effects on documents I've watched but
often not contributed to, WG meetings have only neutral or negative
effects.  Good specifications require thinking and understanding.  The
heat of battle in a conference room or any meeting of more than 3 or
4 essentially always precludes anything that might honestly be called
deliberation.  This is true even when you have 3 or 4 people playing
to a silent audience.

Abolishing the WG meetings would also end the silly political
correctness games in the choice of venues.

Of course, I don't expect anything of the sort to happen.  The opposite
of ever more emphasis on meetings and the form of the IETF and less
on useful protocol specifications will continue.  The IETF of 10 years
ago would not have spent a fraction as much time writing RFCs about
accounting and job descriptions as it has in recent months.  Such stuff
would have been flatly inconceivable for the IETF of the 1980s.  However,
it's best to acknowledge and deal with such irresistible changes.
They're the stuff of life and death.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: List of Old Standards to be retired

2004-12-16 Thread Vernon Schryver
 From: Eric Rosen [EMAIL PROTECTED]

 I see this exercise has already reached the point of absurdity. 

 How can it possibly be worth anyone's time to look at each telnet option and
 determine whether it  is deployed?  What possible purpose  could be achieved
 by  changing the  standards status  of some  telnet option?   Is  there some
 chance that someone is going to implement one of these by mistake somehow? 

 A similar comment applies to the FDDI  MIB.  Are we trying to make sure that
 no one  implements that MIB by mistake?   Or that no one  implements FDDI by
 mistake, just because he thinks there's an IETF standard about it? 

 Let me echo Bob Braden's if it's not broken, why break it? query. 

Spending time revising old RFCs of living protocols is unlikely to do
much good and has potential for plenty of harm.  It's hard to avoid
the temptation to fix things (parts of RFC 1668 and RFC 1661 tempt
me), but such fix-it efforts usually produce incompatible protocols.
The IETF definition or RIPv1 was compatible only because it was a
strict subset of the real protocol.  The IETF version of the printer
protocol was just plain broken.

Other targets of this exercise describe protocols that were never
implemented and should never have been allowed on the standards track.
Why not scale back the exercise to attack only obvioulsy dead or
stillborn protocols?  


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: New Last Call: 'Tags for Identifying Languages' to BCP

2004-12-14 Thread Vernon Schryver
 From: John Cowan

 ... 
  For example, I'm
  unhappy about an apparent sentiment that would put ABNF on a lower
  footing that the English text.  I think I'm like most implementors and
  perhaps unlike non-engineers in reversing that precedence.  Whenever
  I read an RFC, I rely first and foremost on the ABNF.  I use the English
  only for hints, and follow the ABNF instead of the English whenever
  there is a conflict.
 
 Then you would be incapable of implementing any programming language compiler,
 or an XML parser, for the specs for these things include literally hundreds
 of constraints that are specified only in technical English and not in the
 BNF.  As far as the BNF is concerned, this is good sound C:
 
   main(argv, argc) {
   float Argv;
   int* Argc;
   print(32);
   }

In contexts other than UNIX applications with modern compilers,
that fragment is perfectly sound, if not something I'd write.  An
example context is before typing of formal args and in what ANSI/ISO
9899-1990 calls a freestanding environment where main() is not
special.  I've suppressed most of the memories, but I seem to recall
that what Microsoft calls threaded WIN32 applications are such
things, or were before the POSIX additions.

Besides, I didn't say that one should ignore the English, but that
implementors give precedence to the ABNF.  When you are writing an RFC
that you hope will be implemented, you MUST remember that programmers
are lazy.  We transliterate the ABNF to build the parser and so implement
the syntax and read the English to figure out and so build the semantics.
As I said, if you must have contradictions between your ABNF and your
English, you must accept the fact that most technical people will
assume your ABNF is right and your English is wrong.  That fact seemed
to me to conflict with statements in this thread, and that suggests a
problem in your working group and your RFC.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: New Last Call: 'Tags for Identifying Languages' to BCP

2004-12-13 Thread Vernon Schryver
 From: Peter Constable [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED]

 This is a multi-part message in MIME format.

 --===1521567419==
 Content-class: urn:content-classes:message
 Content-Type: multipart/alternative;
   boundary=_=_NextPart_001_01C4E16C.40BF0707

 This is a multi-part message in MIME format.

 --_=_NextPart_001_01C4E16C.40BF0707
 Content-Type: text/plain;
   charset=us-ascii
 Content-Transfer-Encoding: quoted-printable

 Bruce Lilly has posted comments on the IETF list in response to the
 last-call announcement for a proposed revision to RFC 3066. His comments
 were generally negative, raising a number of concerns. I and others
 involved in preparation of the revision have discussed Bruce's concerns
 with him, but they were not made available on the IETF list since those
 of us other than Bruce were not subscribed to this list. I wish to
 briefly summarize the outcome of that discussion for the benefit of
 people here.

 =20
 ...

 In conclusion, I think that some of Bruce's concerns were valid, and
 suggestions for changes have been presented to the authors accordingly.
 I believe all of these changes can be considered to be for clarification
 purposes, rather than technical changes. (No changes affecting the set
 of valid tags have been made.)
 ...


 --_=_NextPart_001_01C4E16C.40BF0707
 Content-Type: text/html;
   charset=us-ascii
 Content-Transfer-Encoding: quoted-printable

 html

 head
 meta http-equiv=3DContent-Type content=3Dtext/html; =
 charset=3Dus-ascii
 meta name=3DGenerator content=3DMicrosoft Word 11 (filtered)
 style
 !--
  /* Font Definitions */
  @font-face
   {font-family:Wingdings;
   panose-1:5 0 0 0 0 0 0 0 0 0;}
 @font-face
   {font-family:SimSun;
   panose-1:2 1 6 0 3 1 1 1 1 1;}
 @font-face


On the contrary, what the authors of a standard intend is not normative.
As much as possible, every standard must say what it means, because
what a standard says *is* its technical content.  For example, I'm
unhappy about an apparent sentiment that would put ABNF on a lower
footing that the English text.  I think I'm like most implementors and
perhaps unlike non-engineers in reversing that precedence.  Whenever
I read an RFC, I rely first and foremost on the ABNF.  I use the English
only for hints, and follow the ABNF instead of the English whenever
there is a conflict.


There are a couple other issues that ought to be addressed.

I think Bruce Lilly started by charging that a potentially disruptive
document had reached last-call without any review by those concerned
with related, affected IETF standards.  That sounds like a process
problem that needs at least 1% as many words as have been spent in
this mailing list in lawyerly talk such as whether accounts is more
appropriate than account.

The other issue is that some of us consider the completely unnecessary
and gratuitous use of duplicate-copy/quoted-printable/HTML email
somewhere among aggressive, offensive, and a security attack.  In
purely text contexts like this mailing list QP/HTML never contributes
to an impression of technical accuracy and relevance of whatever
message it enciphers.  Then there is the use of Microsoft's XML
flavor of HTML mail ...


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Sunshine Law

2004-10-25 Thread Vernon Schryver
 From: Brian E Carpenter 

   Private discussions
  are sometimes a necessity, as is the ability to float what might
  be stupid ideas without having them quoted for years as one's
  firm position. 
  
  I have trouble imagining such tender feelings in anyone who should be
  allowed to participate.  

 That's not quite the point. Both in an ad hoc group like Adminrest,
 and in the IAB and IESG, it is entirely possible that in a discussion
 of the real issues, something like the following would be said:

 A: The real problem here is X, who simply can't do his/her job.
 ...

That misses what I tried to say as well as the objections that have
been raised.  All of the various state sunshine laws have exceptions
for personnell, legal, and other matters that truly must be discussed
in private.


 I won't reply in more detail to Margaret's note, except to say
 that if the confidentiality clauses she quotes are used *except*
 for the above sort of discussion, they're being misused IMHO.

As I wrote, since the Colorado Sunshine Law was enacted decades ago,
there have been many mini-scandals in which government officials have
been accuser of lying, often justly, about what they're talking about
behind closed doors.  People who want political power often also want
to be gatekeepers of any and all information that they happen to find,
as well as needing to avoid having their decisions examined.

If you are saying that deliberations involving the administrative
reorganization should as secret as people seem to be saying they were,
because they included statements like real problem here is X, who
simply can't do his/her job, then it sounds like one of those
mini-scandals.  As far as I can tell, X in those discussions would
have been agencies instead of people.  Besides, even if some Xs were
people, one of the uncomfortable parts of jobs serving public committees
is that performance reviews and so forth do not get nearly as private
as jobs elsewhere, even governments with sunshine laws.


 Truth in advertising: I drafted the confidentality clause
 in the IAB charter, which was of course last-called as a BCP.
 Harald borrowed it for the IESG charter.

RFC 2850 says 

   The IAB publishes minutes of all its meetings on the Internet, and
   conducts an open meeting at every IETF meeting. It publishes all its
   findings as RFCs, Internet Drafts or messages to the IETF mailing
   list. However, discussion of personnel matters and possibly legal and
   financial matters may sometimes be required to be kept confidential,
   and the chair may, with the consent of the full members, exclude
   liaison and ex officio members from such discussions.

Those words in RFC 2850 giving the power of participants to close doors
are wrong, if only because they are not specific enough.  You cannot
rely on committees to keep themselves open; that's why there are
sunshine laws and why you put that paragraph in RFC 2850.  That those
words passed a last call does not mean that they are not subject to
reconsideration.  Perhaps the NonCom should examine each claimed need
for confidentiality.

Feel free to call me stupid, but I cannot relate this reorganizaing
to personnel matters.  You don't re-organize because an employee is
sluffing off.  There are evidently financial matters, but those
particular financial matters also seem inappropriate for confidentiality.

I don't care about bureaucratic organizing and almost certainly would
not read published minutes of whatever.  I don't see any issues that
aren't better handled by people other than me.  Or until the supposed
need to keep stuff secret was invoked, I assumed there were no such
issues.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Sunshine Law

2004-10-25 Thread Vernon Schryver
 From: John C Klensin 

 Two additions to Brian's comment, with which I agree...

 (1) The type of discussions he describes are especially
 important in situations in which an alternative is to try to
 make large structural or procedural changes in order to solve
 problems with personalities.  Such changes almost never succeed
 if the relevant personalities are still in place, and they can
 add serious additional friction to the process while solving
 problems that don't exist and not solving those that do.

Gordian Knots are hard unless you are a mythic hero.  It sounds better
deal first with the personality problem and then fix the structural
problem.  I think conflating the two even in private is bound to lead
to serious errors and distortions in the procedural repairs.  But
sometimes that's impossible and you can't cut the knot.

I trust this is not directly relevant to the reorganization stuff.



 Perhaps I'm just getting too old, but while I think IETF
 benefits from clear discussions in frank language, I don't think
 the nit-picking, out of context, abuse, especially that which is
 based on long-ago comments, benefits anyone.

Yes, but much of that comes from letting everyone have a say as
opoosed to letting everyone see what is said.

I have big problems mustering any interest in whether the IETF is
incorporated in Elbonia or whatever the reorganization is really about,
but doing things in secret is always expensive.  Sometimes the costs
of secrecy are less than the alternatives, but they always exist.  In
this case, I'm now convinced that the reorganization stuff is less
boring than I assumed.  I still prefer to let you and others deal with
it in private than to read those minutes.  But please see those costs.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Sunshine Law

2004-10-23 Thread Vernon Schryver
 From: John C Klensin 

 Now, the reasons the discussions and mailing list archives were
 not made public.  I don't think we really discussed it, but all
 of us who are familiar with the IETF process, yourself included,
 have noticed how rapidly the S/N ratio can deteriorate in
 public discussion of things for which the public doesn't
 take the time to understand the details.

Discussions that are made public can differ from discussions by the
public.  Publishing a mailing list archive is not the same as letting
the peanut gallery contribute to it.  If knowing that the archive for
a mailing list is public would make contributors as noisy as professional
politicians, then you need different contributors.

   Private discussions
 are sometimes a necessity, as is the ability to float what might
 be stupid ideas without having them quoted for years as one's
 firm position. 

I have trouble imagining such tender feelings in anyone who should be
allowed to participate.  Besides, that reasoning would justify keeping
everything private except the final conclusions, and often even those.
The fear of looking foolish seems to be a major reason why governments
try to keep everything secret including their firm positions.  Anyone
who fears looking foolish should stay out of the kitchen, or learn to
phrase ideas tentatively until they've become firm positions.

Or follow the old advice to never write anything that would seriously
embarrass you if reported by CNN or read in court.


 When issues that either involve people's jobs,
 that can get highly emotional, or that may involve legal claims
 are at issue, the importance of holding private discussions
 becomes even greater (and we have seen all of those things in
 various pieces of the Admin restructuring/reorg process).I'd
 actually favor changing the rules to make that more explicit.

I think Colorado's old Sunshine Law allows private personnel discussions.
There are periodic mini-scandals about abuses of exceptions to the
law, but it generally seems to work.  Judging from
http://www.google.com/search?q=sunshine+law
other states' sunshine laws are similar.

However, that old advice about not saying dumb things even in private
holds, as demonstrated by Microsoft and SAVVIS.  See
http://www.google.com/search?q=savvis+spam+memo

 I think there is a huge
 difference between We are going to discuss X with Y. Those
 discussions need to be private because they touch on sensitive
 issues, but a summary of conclusions and justifications will be
 made available as soon as that is possible consistent with that
 level of sensitivity and the community isn't entitled to know
 that the discussions are being held. 

True.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Shuffle those deck chairs!

2004-10-22 Thread Vernon Schryver
 From: [EMAIL PROTECTED] (scott bradner)

 see http://www.wordiq.com/definition/Prior_art

 prior art is still useful

but not necessarily in naive, open compilations that do patent
holders the most good.  I was told by participants in the XOR-cursor
court battle that it was lost because the opposition learned of the
killer prior art in time to weave a defense. 
Recall the results of the re-examination of the LZW patent.
Prior art is not nearly as effective as it is supposed to be according
to people who've never spent time and money with patent lawyers.

The notion that the IETF can do anything about bogus patents is at
best the obverse of the bad coin that let Motorola-Codex mess up CCP
and try to attack Van Jacobson Compression in the PPPEXT WG for years
starting about 10 years ago.  The IETF administration professed to
take those patents seriously.

A list of relevant patents without pretensions of prior art lets people
use their own judgement.  If you are competent to implement a protocol,
then you probably have a fair idea of the readily available prior art.
The important data are the names of the patent holders.  When you look
at patents, you should not be trying to decide whether your lawyers
can use prior art to break them in court, even in the unlikely case
that you are competent to have legal opinions.  You should be deciding
whether the patent holders would want to block the sale or use of your
implementation.  If the patents are only defensive or if you are writing
open source, then you might choose to go ahead no matter what you think
of the validity of the patents.  If by virtue of their owners, the
patents seem likely to be used for extortion or to enforce a monopoly,
then the bogosity of the patents and prior art are also irrelevant,
since a successful court battle would cost years and zillions of
dollars.  You also have noticed that court attacks on patents are
rarely successful.

At worst the notion that the IETF can do more than say these IPR
claims are known is a mechanism for people who claim to be spokesmen
for large communities to inflate themselves.  If the Open Source
Community were much more real than Jeff William's INEGroup LLA. -
(Over 134k members/stakeholders strong!) and able to work with the
IETF to fix the patent mess, then it could fix the patent mess without
help from the debating society that is the IETF.  The power and the
glory of the IETF is that it is literally just a debating society.

In that supposedly monolitic Open Source Community, users, particularly
redistributors and packagers, have far more compelling reasons than
authors of open source to care about patents.  The calls for the IETF
and open source authors to get involved in patent fights can be seen
as efforts by politicians and redistributors of our work to shift even
more of the burden of making their profits and reputations to us.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Shuffle those deck chairs!

2004-10-21 Thread Vernon Schryver
 From: Eric S. Raymond [EMAIL PROTECTED]

 Let's put an end to these far-reaching interpretations of
 representation, which are a product of Mr. Schryer's fevered brain
 overinterpreting my original statement.

 Originally, somebody asked that the open-source community get its act together
 about what acceptable patent-license terms would be.

 I said this: if IETF wants to know what form of patent license will be
 acceptable to the open-source community, the people to ask are Richard
 Stallman (representing FSF) and myself (representing OSI).

 Between us (and especially if we agree), I believe we can speak *with
 regard to this question* for 95% of the open-source community.  This
 does not make either of us power-mad dictators intent on domination,
 just most peoples' recognized experts on what constitutes an
 acceptable open-source license.

 If either Mr. Schryer or yourself chooses not to be considered part
 of that most people, fine -- the fact remains there are an awful damn lot
 of developers expecting RMS and myself to *do* *this* *job* so they don't
 have to.

If it existed, that job would conflict with the way the IETF works.
No contributor to an IETF WG or mailing list is supposed be presenting
anything but personal opinions.  When Mr. Raymond writes here about
acceptable patent-license terms, his views get careful reading, but
not because he represents anyone but himself.

If the IETF were to make an exception and count votes on this issue,
then it should weight votes based on relevant open source, since
concerns about patents on parsing C matter less to the IETF than patents
on address prefix lookups and compression.  However, any kind of voting
would be bad.  More and larger (including commercial) organizations
would declare themselves champions of open source and demand votes in
proportion to their programmers, customers, or market shares.


 Cripes.  It'd be easier trying to serve a gang of baboons, sometimes...

Many people besides baboons and refuseniks consider it unseemly to
demand gratitude for unwanted gifts, and not only because some political
activites are painfully obvious and familiar.  Being recognized as the
official spokesman for the open source community by the IETF would
help Mr. Raymond's efforts to get the world to believe the phrase open
source community is not silly nonsense like netizen, that it has
spokesmen, and that he is one.


Vernon Schryver[EMAIL PROTECTED]


P.S. I don't entirely agree with Mr. Vixie's patent suggestion.
Requiring that WG participants make such disclosures would be very
nice in theory, but seems as realistic as the IETF simply declaring that
it has opted-out of the patent extortion game.  However, that's all
been said before more than once.


P.P.S. I think this started with concerns about quoting parts of RFCs.
Is there more fire than smoke there?

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Shuffle those deck chairs!

2004-10-19 Thread Vernon Schryver
Someone wrote me privately:

] For an open source guy he 
] has some pretty funny legal language:
] 
] http://www.catb.org/~esr/copying.html

That page includes this restriction:

}  You may not make or redistribute static copies (whether print or
}  online) without my express permission.

HTML and English are not C, C++, asm86, perl, or even php and I
don't expect anyone who writes some open source to write only open
source.  I would also like a way to stop my perpetual problems with
people using and redistributing ancient or distorted and preverted
versions of my epistles in C.  Still, someone who claims to represent
refuseniks like me in negotiations concerning open source with an
organization in which I've been particpating for decades ...


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Shuffle those deck chairs!

2004-10-18 Thread Vernon Schryver
 source, you
would not be doing as you are and have been doing.  What you are doing
is the political realm's equivalent to the theft that some corporations
commit or attempt with open source.  (e.g. ATT and the BSD TCP/IP
code, except I think ATT made an almost innocent mistake in that
case).  You are trying to leverage the reputations and work of open
source programmers for your personal gain and political power without
even deigning to give us credit.


And save the stuff and nonsense about being trustworthy and not having
power over me.  Don't insult my intelligence.  Your efforts here to
be named co-negotiator for open source authors are intended to exercise
power over me.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Shuffle those deck chairs!

2004-10-15 Thread Vernon Schryver
 From: Eric S. Raymond [EMAIL PROTECTED]

 Your two people to go to on this would be RMS (representing the FSF)
 or me (representing the OSI); between us I believe we can speak for
 over 95% of the community.

I hate it when elected politicans presume to speak for me.  I will not
sit quietly and let self-appointed individuals try the same.  *DO NOT*
tell me to my face that you are negotiating on my behalf or even just
for 95% of the other people who write or have written software that
might be called open by virtue of being freely redistributable and
in use by lots of people until you can can point to the results of a
real plebiscite.  Even then, you won't be speaking for me until I
personally and explicitly say so.

If you and Mr. Stallman want to speak for your respective organizations,
then peachy.  If you want to speak based on what you consider your own
great experience and deep thoughts on the issues, then that's also
good.  If you want to pretend that you speak for me out of my earshot,
then I'll do my best to not hear.  Just don't stand in front of me
telling me that you have my best interests at heart and that I must
trust you.

It's been many years since I came to expect such behavior from the
FSF.  I had a better image of/delusions about the OSI.  I guess I
should know better.  Just as the self-named Internet Society attracts
people far more interested in politics and telling me how I should
view the Internet than designing, implementing, deploying, and maintaining
what I think of as network stuff, any self-described open software
organization will be run by people telling me whether I'm really writing
free code and where my best interests really lie.


The appareance of such stuff in proximity to the IETF administrative
reoganization...uh...negotiations is not really irony.  Such things
tend to attract each other.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Shuffle those deck chairs!

2004-10-05 Thread Vernon Schryver
 From: Harald Tveit Alvestrand 

 the MARID WG was shut down because it was unable to reach consensus.

 That is, indeed, a failure of the IETF. But not the one you argue.

On the contrary, recognizing the hopeless lack of consensus and
refusing to continue dancing to the tune of various interests was
an outstanding success of the IETF.

The failure by the MARID WG to reach consensus can be viewed as a
failure or a success.  Neither the IETF nor any other voluntary standards
organization can force standards on the world, as the ISO and governments
demonstrated with the OSI protocols.  When consensus cannot be reached,
it is wrong to continue, as the ISO also demonstrated with the OSI
protocols.  One of the worst things that committees (not just standards
committees) can do in such binds is to produce kitchen sink non-designs.
The essence of designing consists of making choices, and that consists
of saying yes to one or maybe few things and no to almost everything.
When consensus is impossible for making choices, the right response
is to stop spinning.

As has long been true, a bigger danger to the IETF than patents are
the special interests that try to use the IETF for ends unrelated
to ensuring the interoperability of network protocols.  The baloney
started by some SPF advocates and widely repeated by others about
the reasons the MARID WG was shut down are more harmful to the IETF
than embrace-extend-and-patent games, even if such games were in
play, which is not at clear.
 

Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: WG Review: Behavior Engineering for Hindrance Avoidance

2004-09-25 Thread Vernon Schryver
 From: [EMAIL PROTECTED] (Noel Chiappa)

 It's not at all clear to me that this was the wrong engineering choice on
 their part. If they didn't GC dead connections after some sort of timeout (and
 would it make any significant different whether it was 5 minutes, or 1 hour)
 it would consume resources and perhaps lead to problems. 

 Although I suppose they could impose an LRU algorithm on state blocks,
 instead. I'd have to think about it for a while, to see if there were other
 problems caused by not GC'ing inactive mappings.

Problems in doing it right?  hph.  More recent boxes from some of
the same vendors that have killed my ssh sessions do not kill my ssh
sessions despite days of inactivity.

That's not to say the newer boxes don't still have problems that can
only be solved--er--attacked by power cycling when they stop responding
every week or so.  My current tactic involves solid state relays that
driven by taking less than 5 ma from an RS-232 pin 20 and simple code
that looks for signs of illness in the junk.  (Yes, I know of far better,
UL certified implementations.  They cost more than the NAT junk.)

Besides, if GC refers to garbage collection, my prejudice is that
you don't garbage collect active data.  I've had the junk kill active
ssh sessions.  Whether they run a timer or just have bugs that appear
after an hour or two, only someone with access to source could say.


 Furthermore, it's relatively easy to avoid the SSH session problem - my
 default login on Unix boxes has for many years now included starting this
 shell script in the backgound:

 while 1
 echo  
 sleep 600
 end

 precisely to avoid having them shut down due to NAT timeouts (no matter how
 long I go without typing on them).

I try to avoid building failures into anything, especially if the
failures are obscure and intermittent.  That might keep an ssh session
alive despite boorken NAT junk, but depending on imponderables including
tty driver output buffering vs. application context switching on the
ssh server side, it will also occassionally break curses programs
including `top`, `sysstat`, `vi`, and `emacs`.

Having a standards committee write more documents that say DON'T BE
STUPID! sounds unlikely to solve many problems in NAT boxes, even if
committee solutions weren't the hallmark of the design and implementation
of garbage, probably including the junk NAT boxes at issue.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: WG Review: Behavior Engineering for Hindrance Avoidance (behave) (fwd)

2004-09-23 Thread Vernon Schryver
 From: Pekka Savola [EMAIL PROTECTED]
 To: Harald Tveit Alvestrand [EMAIL PROTECTED]

  Well my house was behind 2 levels of NAT until last week.
  Once i got rid of one level (the one I don't control), some of my 
  operational problems with keeping SSH sessions up simply went away.
  And SSH is a client-server protocol.
  
  Don't underestimate the capability of badly implemented and/or configured 
  NATs to make things go boom in the night.

 FWIW, I don't think this is something that can be fixed whatever
 guidance the IETF would give.  NATs will always need to keep some
 state for all the protocols, including TCP, and that state must be
 removed after a timeout.

Who said anything about necessary state and reasonable timeouts?  I've
seen more than one brand of consumer-grade box with NAT features that
could not be turned off, and that even in their most permissive settings
kill ssh sessions after an hour or two whether the ssh sessions had
been active or not.

Then there are notions of DMZs, game playing mode, and VPN
support. What you might guess from feature-list bullet items
probably sound reasonable, but you'd probably guess wrong about
what the bullet items really mean in products delivered to users.

Harald misstated his injunction.  You should never underestimate the
capabilities of people to build things that make you say no one would
do that! and then defend their braindamage as valuable features.

Perhaps more NAT RFCs would help; they couldn't hurt much.  They'd be
a lot of work and would certainly be ignored by many people who consider
themselves designers.  I can't personally get enthused about telling
people things that are obvious and that will be ignored, like much of
what would go in new NAT RFCs.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: How IETF treats contributors

2004-08-31 Thread Vernon Schryver
 From: Olaf M. Kolkman 

 I'd like to expand on what Dean said: Credit and attribution is about
 intellectual honesty [ and _courtesy_ ] not about copyright law.

Ok, but in the case at hand, 

  - None of the versions of Mr. Danish's proposal that I've seen
 credited Mr. Vixie's document or some others than preceded Mr.
 Danish's work.  I think that was due to ignornance and disinterest
 instead of malice, but it does reduce Mr. Danish's standing to 
 more credit than he already receives.

  - Mr. Danish's proposal was always an obvious non-starter for various
 reasons, including the requirement for defining new DNS RR types
 before it could be deployed or even tested.

  - Mr. Vixie's proposal is a lot closer to what I understand of the
 current MARID mechanisms than Mr. Danish's proposal.

  - It is ironic or something that few people who are openly concerned
 about credit for their work have enviable reputations.  They tend
 to be inventors of such as IPv8.

  - As far as solving the spam problem is concerned, RMX, SPF, the
 commercial proposals, the MARID proposals, and all other sender
 authentication mechanisms are more like IPv8 than IPv6.  Squashing
 the current modes of spam forgery will have just as much effect
 as the squashing years ago of the forgery of 8-digit user names
 @aol.com.  The new anti-forgery mechanisms are more general than
 the old regular expressions, but sender forgery is not a required
 aspect of spam.  Some large spammers have long been using domain
 names that they register, use for literally a few days, and
 discard.  For example, some time ago I grew bored with accumulating
 the domain names of one such operation in
 http://www.rhyolite.com/anti-spam/bin/group.cgi?group=151
 Some of the domain names of smaller (in counts of names) operations
 are in http://www.rhyolite.com/anti-spam/bin/group.cgi?group=197
 http://www.rhyolite.com/anti-spam/bin/group.cgi?group=30
 http://www.rhyolite.com/anti-spam/bin/group.cgi?group=140 and
 http://www.rhyolite.com/anti-spam/bin/group.cgi?group=165
 Spammers can deploy sender authentication mechanisms far faster
 than their victims.

  - This thread has the wrong subject.  It should be more like
How some would-be contributors treat the IETF.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: 'The APPLICATION/MBOX Media-Type' to Proposed Standard

2004-08-12 Thread Vernon Schryver
 From: Eric A. Hall [EMAIL PROTECTED]
 To: Tony Hansen [EMAIL PROTECTED]

  The information about the mbox format being anecdotally defined is 
  incorrect. The mbox format has traditionally been documented in the 
  binmail(1) or mail.local(8) man pages (BSD UNIX derivatives) or mail(1)
   man page (UNIX System 3/5/III/V derivatives).

 I checked each of those and none of them seem to adequately describe the
 message or database format.


 Do you have a specific URL to a specific man page that you think would be
 appropriate and authoritative?

There are plenty of man pages and documentation for UNIX mbox formats.
Outfits such as Netscape have figured the stuff out (painfully simple
as it is) to make libraries to deal with local mailboxes.

However, that seems irrelevant unless an auuthority ceeds change control
for the UNIX mbox format to the IETF.  Never mind that the notion of
an authority that could exercise any authority over any UNIX mbox
format other than in its own source trees would be crazy.  There's no
law that says Dragonfly, NetBSD, FreeBSD, OpenBSD, Linux, IRIX, HP/UX,
AIX, etc. and so forth and so on must have a common mbox format or
that they cannot switch to something better, not withstanding things
like that Netscape library.  The old mbox formats are fine for a VAX-750
or 3B2, but are very bad ideas for more than a few hundred messages.

The most you could do is define your own interchange mbox format that
would by coincidence be extremely similar to one format such as the
System V or 4.3 BSD (I think I recall small differences between those
two), and tell implementors of your MIME type to convert into and out
of your format.

There is an overriding question.  Where is the market demand for
an IETF standards track RFC defining a UNIX mbox interchange type?
Who would use it?  
I can imagine importing and exporting mboxes, but not via SMTP.
Is anyone thinking about new code to convert among Netscape, Exchange,
and UNIX mbox mailboxes?  Doesn't enough of that code already exist,
and doesn't all of it use transport mechanisms other than SMTP?

Isn't the IETF supposed to be about on-the-wire bits and keep its
noses out of host data structures?


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: 'The APPLICATION/MBOX Media-Type' to Proposed Standard

2004-08-11 Thread Vernon Schryver
 From: Eric A. Hall [EMAIL PROTECTED]

  If there are no defined semantics for the content of an application/mbox
  part, how does the type differ from application/octect-stream?

 It provides an identifier for the content, so that transfer agents can
 perform specific tasks against the data (such as importing or searching a
 remote mailstore, or handing the data to an agent that knows what to do
 with it). The agent still needs to deal with content-specific issues like
 determining the EOL markers, applying default domains to relative
 addresses, and so forth. That's a pretty common separation of powers;
 application/postscript doesn't relieve the system from needing a
 postscript interpreter, and we leave things like ~version tags for the
 content agent to worry about instead of the transfer agent.

  [regarding creating a spec for a mailbox file format]
  
 I'd like to see one, and I'd like to see whatever *NIX consortium is
 responsible for such things get together and define one.
  
  At that point, would application/mbox be updated to refer to said spec,
  rendering non-compliant some chunk of the previous uses, or would a new
  content-type be specified?

 Given that the current proposal specifies minimal formatting (essentially
 being limited to the likely presence of some kind of From_ line), I'd
 think that a reasonably authoritative spec could be referenced in an
 update to this proposal. It would depend in large part on the depth and
 comprehensiveness of the specification, I'd imagine.

I cannot understand that except as saying that this document explicitly
and intentionally does not provide enough information for the recipient
of a message defined by the document to decode the message.  I understand
that statement as saying that the data is essentially opaque.

Isn't the point of any RFC on the standards track to promote
interoperability?  What good is an RFC that says consult as yet
unwritten specifications from undetermined sources to handle the data
standardized by this RFC?   Isn't the first sanity test of a standard
whether one can determine if an implementation is compliant?  As far
as I can see, Eric Hall is saying that compliance of senders and
receivers of such messages could not be determined until some.

Aren't there already enough opague application data MIME types?


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


RE: Email account utilization warning. (Final)

2004-07-07 Thread Vernon Schryver
 From: Jasen Strutt 

 Would you give it a rest already? Take your issue(s) up with the appropriate
 person(s) in a separate, mutually exclusive thread, and stop blasting the
 IETF list.  

I would rather not offend you, but please consider that good advice.
Please do not respond to those whose only interest is provoking a
response, any response from anyone and so being reassured they exist
and that people care about them, even if those concerns are negative.
Many of us know of their messages only when people respond to them,
and would rather not have that particular clipping service.

The differences among trolling, trollbaiting, countering trolls, and
everything else related to trolling are almost entirely in the minds
of the players.  To the rest of the world it is all useless, costly noise.


As for the Internet experts who still don't recognize phishing or
Microsoft worm noise when it hits their mailboxes, the Secretariat
should interpret complaints sent to the thousands of readers of this
list as requests to be unsubscribed with prejudice from all IETF mailing
lists, particularly when their complaints are double-encrypted in
base64 and HTML.  Such people are better served reading IETF mailing
lists through archives such as http://www1.ietf.org/mail-archive/web/ietf/

I promise to try to apply that policy to the minor, non-IETF lists
that I run.

I don't intend any criticism of those who choose on their own to use
archives instead of subscribing.  That's how I follow some mailing
lists that for various reasons I choose to not give my address.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: non-solution

2004-06-24 Thread Vernon Schryver
 From: Bill Sommerfeld 

 Substantially similar capabilities are present in all of the SMTP
 MTA's I'm familiar with.  If a message delivery attempt is rejected
 early, only envelope information is logged, but if the message was
 rejected in error, that's generally sufficient to identify what needs
 to be whitelisted.

Yes, but after you've had them, you find that facilities that log the
fewest few dozen KBytes of SMTP bodies are very valuable.  SMTP envelope
logs are unitelligible to most users, not only because they are terse
but because the SMTP envelope is a mystery to the fewer users that
know about it.  Delaying filter rejections until the SMTP DATA command
and so capturing the message body resolves a lot of complaints of the
form Why did your idiotic spam filter reject that perfectly good mail
message?  That can significantly reduce whitelisting requirements.

Logging bodies involve some obvious privacy hassles.  You must keep the
logs private.  The logs can have only censored copies of the envelope
so that recipients can't know who else was sent the same message.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: What exactly is an internet (service) provider?

2004-06-22 Thread Vernon Schryver
 From: Markus Stumpf [EMAIL PROTECTED]


 If you want to buy a car and ask if it has air bags and nobody can
 give you a definite answer, would you buy the car if it is important to
 you to have an air bag?

Buging a car with a feature with well defined characteristics is quite
different from buying Internet services which don't even have common
names.  Air bags, at least in the U.S., must do exactly what they do
even if that is known to kill people who are short.  Your private
use Internet service is basically whatever you feel like selling.
That you apparently call it private use instead of one of the more
common names is yet another symptom of the problem.


 If the ISP can't answer the question about improtant product details,
 why do you sign a contract with that provider? Because he is cheaper
 than others? Now what would most probably be the reason?

I'm in the insignificant minority that can ask the right questions
about IP service and recognize when I'm not getting answers, but I can
neither ask good questions about air bags, nor recognize nonsense
answers.  I don't know much about air bags except that they are bombs
in bags, which is as much as most sales people.  Still, I can buy a
car with an air bag and know I'm getting something that might do some
good (unless I'm short or sit too far forward) and meets a standard.
Without the standardization of air bag, I could not.

We have a classic standardization problem that is affecting
interoperability.  The market has gotten ahead of the IETF and is
buying and selling a many quite different things all called Internet
service.   It is more the job of the IETF to define standards
including a taxomony in this area than to define yet another MIB.

It is not the job of the IETF to try to stop anyone from selling
services that differ from what we used to get via NSF any more than
it is the job of the IETF to prevent the sales of NAT boxes and PPPoE,
no matter how nasty and evil NAT, PPPoE, and slum IP services are.  It
is right, proper, and necessary that the IETF has NAT and PPPoE
standards.  We should also have standards for your private use Internet
service as distinct from the services I bought 20 years ago, even if
you agree with me that slum IP service sold by virtual slumlords to
fools is as accurate and more clear than client only, private address.



  Since there are always providers, you can't sue simply because you
  bought an account with limits you failed to clarify.

 This is the important part: you failed to clarify.

Unless you are among the insignificant minority who knows the difference
between an ICMP Port-Unreachable and an ICMP Administrative-Prohibited,
you are incapable of clarifying.  Worse, unless you know more than all
available employees at many Internet services providers, you are
incapable of knowing whether you're being told nonsense.

Standards for the various flavors of Internet service would solve
those problems for both users and service providers.


- which of the classes in 
  http://www.ietf.org/internet-drafts/draft-klensin-ip-service-terms-02.txt
  is closest to a DSL Surf Accounts?

 It is probably something like Web connectivity or Client connectivity
 only, but I find the terms in the draft *very* fuzzy and overlapping.
 And no I haven't yet thought about it long enough to make suggestions ;-)

What about adding explicit lists of the packets that are (not) filtered,
frequency of DHCP reassignment, DSL PPP disconnections, and whatever?

The draft currently gives the equivalents of driver's side, passenger,
side impact air bags, for consumers but does not include the technical
stuff equivalent to the rules for air bags.  Something like the Client
connectivity only now in the draft is needed by consumers and front
line technical support people, but it is not sufficent for a provider
(or a government) to determine compliance.

Maybe this needs a WG.


 In general I support all what you said to some extent.

In that case it would be nice if you would not write as if you vehimently
opposed the notion of standardizing terms for classes or kinds of
Internet service.  Except for that single sentence, I have the impression
that you agree with the individual from Japan that the whole idea of
the draft is entirely wrong and destructive.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: What exactly is an internet (service) provider?

2004-06-21 Thread Vernon Schryver
 From: Markus Stumpf 

 You have a contract. This should be listed in the contract and you
 can read it before signing it. If the contract doesn't talk about
 limits and they do limit you, sue them.

Sue on what grounds?  Who says that Internet service has no limits?
All reputable service providers have terms of service that include
limits, starting with something about network abuse.  (Never mind 
how well those limits are enforced.)  Many service providers limit
their users to not running servers, but good luck finding someone
who knows what they mean by server. 
Since there are always providers, you can't sue simply because you
bought an account with limits you failed to clarify.


Trying to find first line technical support people (never mind sales)
at a consumer grade ISP who knows has any idea what sort of filtering
their employer does is hopeless.  It's generally foolish to expect to
find someone who even understands the question.


  (And, btw, some of the statements are incorrect.
  - Some providers intentionally cut their customers
off after 24 hours in order to force them to have
a new IP address.

(Some DSL modems including the Actiontec 1524 kill TCP connections
after an hour or two all by themselves)


 You have to look at what they sell. They sell DSL Surf Accounts.
 Surfers usually aren't online for 24 hours without interuption and
 they don't have problems with the interupt in normal use. If you get a
 business access you will not have the problem in most of the cases.

I've not seen anyone selling DSL Surf Accounts, but I've never looked,
and certainly not in Germany.

In any case, 
  - which of the classes in 
http://www.ietf.org/internet-drafts/draft-klensin-ip-service-terms-02.txt
is closest to a DSL Surf Accounts?

 - Should one of those four categories be renamed DSL Surf Accounts?

 - Should a new class named be DSL Surf Accounts be added?

 - exactly what filtering is imposed on a DSL Surf Account?  Is
 port 25 filtered?   22?  135 and 138?  Some or all UDP?  ICMP?

 - and the same questions for business access.

Telling people to read contracts ISP today is disingenuous.  If the
IETF would define DSL Surf Accounts and business access, then you
could hope to ask for one or the other.  You might then sue if you
didn't get whichever you wanted.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: What exactly is an internet (service) provider?

2004-06-20 Thread Vernon Schryver
 From: Masataka Ohta [EMAIL PROTECTED]

 As you introduce Web connectivity, such people (including
 mobile operators in Japan) claim that they are ISPs, because
 they are offering web connectivity over X.25 without IP. 

WebTV is functionally the same as web connectivity over X.25 without
IP.  Most of the world thinks that part of Microsoft is an ISP.
Nothing the IETF or even governments could do would change that.

  That
 is, The definitions proposed here are clearly of little value
 if service providers and vendors are not willing to adopt them.

Those involved call the services of WebTV either WebTV or Internet
service.  Professionals (including salespeople) who are not employed
by Microsoft in the WebTV operation, especially competitors, would be
happy to call it Web Connectivity instead of WebTV.  Even Microsoft
might like Web Connectivity to limit dilution of its WebTV trademark.

Thus such concerns are irrelevant to Web Connectivity.
You'd do better attacking one of the other categories.


 A major mistake is that you are forcing people within IETF
 use your terminology even though you are fully aware that
 some members of the IETF community that some of these
 connectively models are simply broken or not really an
 Internet service.

No, the major mistake is thinking the various classes of IP service
do not exist or that you can keep people from naming them with short
English words or phrases.  As the various classes become more popular
and widely recognized, the world will invent and use terms for them.
No one but pedants and marketers will care which words or phrases are
ultimately chosen.  The IETF can speed up and slightly steer the choice,
but no one can prevent it.  We got to choose the word Internet but
did not entirely control the definition (recall small 'i' internet).
We lost on intranet catnet and many other terms.

The useful things that this draft might accomplish are:

 - make the choice of terms happen within or a year instead of the
years that the current definition Internet needed.

 - make the people who have more control than the IETF over the choice
of terms for the emerging clases Internet service think about the
words they want.  They are in marketing organizations.

Consumer ISPs are not offering the kinds or classes of IP service that
I would want.  It is insane to ignore that reality.  It would be little
better to insist that governments will not eventually get involved or
that there will be no common terms for the various common classes of
IP services and ISPs.



]  From: Masataka Ohta [EMAIL PROTECTED]

]   But if we had a precise definition and a taxonomy of the 
]   different classes of ISPs,
] 
]  Then, all the IP and non-IP providers can now leagaly (some
]  illegaly a little beyond the scope of so generous RFC) say
]  they are ISPs and most end users have no chance to know the
]  differences of the taxonomy.

No, 
  - Whatever happens with this draft, it will not have anything like
 the force of law.  The IETF does not have powers over terms
 equivalent to the groups that name species, chemical compounds,
 and astronomical bodies.

  - all the IP and non-IP providers in most of the world can now
 legally call themselves ISPs.  The IETF could not change that.

  - The terms the world eventually uses for the various classes of IP
 service and types of ISPs will differ from the consensus of the
 IETF.  This draft can only crystalize the choices.  Seed crystals
 influence the shape of a solid, but do not control it.

  - the main reason end users have no chance to know the differences
 delineated by the taxonomy is that the taxonomy does not yet
 exist.  When it exists, users will know as much of it as they
 care to, just as they now know or don't know the differences among
 web, Internet, and telephone. 

 Users who do not distinguish between web and Internet also
 think WebTV is Internet service.  IETF cannot change that.  That
 VoIP, text messaging, and cell phones are changing the definitions
 of telephone and telephone company is part of my point.

Much of the good this draft might do will be done simply by discussing
in public differences among IP service classes and choices of terms.
After the taxonomy is crystalized, it will be out of the IETF's control.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: What exactly is an internet (service) provider?

2004-06-20 Thread Vernon Schryver
 From: Ole Jacobsen 

 assigned something that looked like a real routable IP address, but
 as a consumer of paid-for Internet service (that works) is there any
 reason (apart from religion) that I should care??

If you have no reason to care, then you shouldn't, except that Full
Internet connectivity is significantly more expensive to provide.  It's
not the bits that are more expensive, but the people who deal with the
naughty bits that come with Full Internet Connectivity.

If you have a technical reason to care, perhaps because you need to
run an application not understood by the NAT systems of your hotel,
then you ought to be able to distinguish what you need from what you
are getting while talking to people who have never heard of the IETF.
Perhaps you would like to run applications that talk to systems back
at the factory and that use protocols that don't always play with NAT.
Maybe you are a system admninistrator who needs to check your DCC servers
(anti-spam system), despite your hotel's filters against UDP port 6277.
Perhaps you need to check your DNS servers despite your hotel's filters
and redirection of port 53 or all UDP.  Maybe you just need SSH and
didn't remember to set an sshd listening to port 443 before you left.
Maybe you need to talk to port 25 on your SMTP server to see if it is
sick.  Talk about ALGs, UDP, TCP, and even NAT is cybercrud noise to
a hotel desk clerk.  However, you might someday be able to say please
upgrade the Internet service for room 1234 from Web Connectivity to
Full Internet Connectivity.

You don't expect airline ticket agents to understand or care what
you're talking about if you go on about stall speeds, rates of sink
or climb, and so forth, but asking for a ticket on a communter airline
instead of a wide body can be useful.

There is absolutely no chance of less filtering in hotels, 802.11 hot
spots, etc.  There will be terms that distinguish those kind of
Internet service from what many of us consider the real thing.  The
issue is whether we must wait for the market to provide equivalents
to ham radio, CB radio, satellite radio, AM, FM, TV, and
cell phone.  Arguing against the idea of draft is like saying
the term 'electormagnetic radiation' is good enough.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: What exactly is an internet (service) provider?

2004-06-19 Thread Vernon Schryver
 From: Mark Smith [EMAIL PROTECTED]

  So it would be good to have some kind of 
  standard or definition, what exactly an 
  internet provider has to do and what to refrain 

 I tend to come up with the answer to your question the following way :

 (Q) What is the Internet ?

I prefer the definitions of various kinds of Internet service in
http://www.ietf.org/internet-drafts/draft-klensin-ip-service-terms-02.txt

Today, providers that sell sevices to users of Microsoft systems and
do not pay exquisite attention to which of them are infected with the
latest worms and viruses must block and redirect port 25 to their own
SMTP servers and so not provide what that draft calls Full Internet
Connectivity.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Response to complaint from Dean Anderson (fwd)

2004-06-18 Thread Vernon Schryver
 From: Stephen Sprunk 

 While I disagree with Dean in general and also with most of his current
 argument, I think it is a reasonable request that IETF officials be given
 an @ietf.org email alias and that those aliases be published for use in
 situations such as this.

Exactly what is this situation?  Why can't Mr. Anderson say whatever
he needs to say to Mr. Austein here or via a relevant working group
mailing list?


 It's probably going too far to require sending mail from those aliases;
 despite Dean's faults, he's smart enough to use the published alias if he
 gets a bounce from someone's personal or work address.

How would Mr. Anderson use a private IETF alias belonging to Mr. Austein?
If sending a polite, IETF-relevant private message from one IETF
participant were important to Mr. Anderson, he would have long since
sent his message in public via an IETF mailing list.  Any complaints
or other thoughts Mr. Anderson has about a working group, an AD, other
IETF participants, or whatever would have long since been forwarded
via a friend, sent to this mailing list, the IAB, or via the official
appeals process.

There is an important issue here separate from Mr. Anderson's concerns.
Why hasn't Mr. Anderson been told to say whatever he wants to say in
an IETF mailing lists or to the relevant IETF role accounts?  Why has
the notion that individuals have rights enforced by IETF rules to send
private mail to other IETF participants been consistently supported
or at least never refuted?  Mr. Alvestrand's recent message only
disavows the IETF's interest private filters.  What RFC imposes an
obligation to receive private (not to mention unfriendly) mail on ADs,
WG chairs, or any IETF participants? 

Private IETF aliases for IETF officials would be invitations for
harassment and abuse, and it is important that IETF participation not
be contingent on tolerating harassment or abuse.  Harassment and abuse
must be defined by the targets of mail for deciding whether to accept
future private messages.  IETF participants must be allowed their own
definitions of acceptable private mail, no matter how wrong they seem
to mail senders or third parties.  Filtering messages to IETF mailing
lists is justifiably controversial, but private mailboxes are none of
the IETF's business, and not merely because of scaling problems.

I care about this issue because other individual IETF and ASRG
participants have threatened or started attacks on me similar to Mr.
Anderson's attack on Mr. Austein, because my mail systems are configured
to reject their private (not sent via IETF reflectors) mail.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Problem of blocking ICMP packets

2004-06-16 Thread Vernon Schryver
 From: [EMAIL PROTECTED] (Mike S)


 So the fact is, by blocking ICMP, such ISPs have broken IP connectivity, 
 and can no longer claim to be providing Internet (IP) service.

I agree, but which flavor of other than Full Internet Connectivity
would it be?  Does
http://www.ietf.org/internet-drafts/draft-klensin-ip-service-terms-02.txt
need a category of Public address, stupid filtering?
Or is Client only, public address close enough?

Many people who install or defend such stupid filters are offended by
the observation that they are not doing real IP.  Labelling such
filtered access as what it is or at least something other than Full
Internet Connectivity would reduce its popularity.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-06-02 Thread Vernon Schryver
 From: Andrew Newton [EMAIL PROTECTED]
 To: Paul Vixie [EMAIL PROTECTED]

  If there's a more blatant example of rubber stamping in the history of
  IETF, then I hope a better historian than I can share the archives with
  me.

 If there's a more blatant example of mischaracterization in the history 
 of IETF

Whether it is an example of rubber stamping can't be determined until
we see the I-D.

Besides, the implication that rubber stamping by the IETF is a bad
thing is wrong.  When the IETF has worked well, it has applied its
stamp of approval to things developed, tested, and initially deployed
outside the IETF.  IETF working groups that try to design things
never do better than can be expected of standards committees, and
that's a step below the sad results of ordinary committees.  The
IETF is often competent to determine and publish the choice of the
market; it is incompetent at inventing.

MARID will provide good service.  For years, the unthinking and snake
vapor oil vendors insisted that redesigning SMPTP with authentication
would solve the spam problem.  Now that we have SMTP-TLS, SMTP-AUTH,
S/MIME, and PGP, they have changed their songs to praise sender
authorization.  Sender authorization cannot fix the spam problem, but
MARID will soak up a lot of their noise for months (or years).
When an official sender authorization protocol fails to end spam by
the Sept. 2004 (see http://ietf.org/html.charters/marid-charter.html),
maybe we'll get to hear a new chorus.  Maybe a few will stop praying
for the salvation of business models that depend on abusing the commons
and switch business models.  (e.g. actually deal with abusive users)


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
 From: =?ISO-8859-1?Q?M=E5ns_Nilsson?= [EMAIL PROTECTED]


  block port 25 for all types of IP
  service except the one that draft-klensin-ip-service-terms-01.txt calls
  Full Internet Connectivity. 

 I have a *very* hard time seeing an IETF document (or discussion on the
 list) coming even close to endorsing this blocking malpractice. It does not
 scale (forcing people to use central, probably misconfigured, relays, and
 it is IMNSHO thorougly bad engineering to try solving L8 problems on L3/4.

So say each of you who feel you have a right to pay less than what
providing full internet connectivity costs.   Full connectivity is
priced at about $100-$250/month, and plausibly and apparently costs
less to provide.  The $20-$30/month services provided by the providers
that cannot afford real abuse desks or local technical support are not
really Internet service, no matter that you might wish.

What I find really strange thing is the price point chosen for this
divinely ordained right.  Why is $300-$400/year ok but $200/month is
a violation of your fundamental human rights?  Why is paying what Full
Internet Connective costs evil and wrong, but it is ok to pay more
than the $300/year that people in some parts of the world live on for
a whole year?

The scaling argument is obvious nonsense.  If having $30/month
customers use SMTP servers provided by their ISPs did not scale,
then it would not scale to have those same customers use the
routers provided by those same ISPs.

If your ISP is incompetent at configuring an SMTP server, then whose
fault is it that you continue to buy bad service?   Why don't you treat
your incompetent locl provider of Client only, non-public address
or Client only, public address as a provider of those services and
use them only to connect to a system where you get competent Full
Internet Connectivity?

If ISPs and their customers were willing to deal with spam, including
immediately and permanently terminating customers that send any spam,
regardless of whether they are paid for their efforts (e.g. operators
of trojan zombies), then there would be no spam problem.

Why should the rest of us subsidize your ISP and your connectivity by
accepting SMTP/TCP/IP SYNs from your neighbors that are more than 99%
likely to be spam from trojan zombies that your ISP cannot be bothered
to terminate?


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
 From: Nathaniel Borenstein [EMAIL PROTECTED]

 This would be a very interesting philosophical argument if in fact what 
 we were discussing was something that could take a significant bite out 
 of spam.  In the absence of such an ability, however, the real question 
 is whether user accounts should be crippled in the name of spam 
 fighting when the crippling *isn't* going to help significantly with 
 the spam problem.  And that's not a philosophical debate, just a matter 
 of common sense.Grocery stores probably have the right to require 
 their customers to wear formal attire, but if they don't have a good 
 reason to do it, they're going to drive away customers no matter what 
 the outcome of any philosophical debates.

Grocery stores frequently requires shirts and shoes.  A better analogy
is that grocery stores that sell alcohol or other regulated drugs are
required to pay substantial extra costs.  Complaints about monopolies
in the beer and wine trade are laughed at, as are demands that pharmacies
in grocery stores not charge prices high enough to pay their pharmacists.

As Mr. Borenstein knows, a substantial fraction and probably most spam
is current sent using $30/month consumer accounts.  The spam that is
not sent using such accounts is very easily blocked.  As he knows, if
providers of those services would either filter port 25 or terminate
customers running trojan zombies, that spam would stop.  Providers of
those $30/month accounts have made clear that they cannot afford to
hire the people to monitor and deal with their abusive customers.  That
is why many of the providers of those $30/month accounts submit their
own IP address blocks to various dynamic backlists or block port 25
themselves.

Stopping trojan zombies would not end the spam problem, but it would
be a major improvement.  You can see the truth of that in the results
of UUNet's imposition of port 25 filtering on its dial-up resellers.
It would also significantly improve security problems caused by Microsoft
systems, because viruses and worms could be filtered by ISP SMTP servers
from outgoing mail.


My expectation is that ISP's 
 who implement anti-spam measures that are both intrusive and 
 ineffective are going to drive away customers as long as there's a 
 better alternative out there, and I'd be inclined to simply let them do 
 it unless they're in near-monopolistic market positions.  The latter 
 exception is important, however; I'd certainly be upset if my cable 
 provider did it, because I don't have any good alternatives.  -- 

It is dishonest to imply that cable TV providers have near-monopolistic
market positions in providing Internet service.  They often have near
or true monopolies in providing cable TV service.  However, in no U.S.
market do cable TV providers have anything like monopolies in providing
Internet service.  They may have monopolies in providing some of
services at $30/month, including Web connectivity, Client only,
non-public address, and Client only, public address.  Mr. Borenstein
can buy Full Internet Connectivity from many service providers, although
not at $30/month.

Mr. Borenstein and others like him expect the rest of us to subsidize
their $30/month connectivity by dealing with the network abuse of his
fellow customers, because they find $30/month comfortable.  That position
would be less despicable if they would demand free Internet connectivity,
since that is the only price that billions of other people can afford.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
Received: from mail.optistreams.net (206-169-2-196.gen.twtelecom.net [206.169.2.196])
by calcite.rhyolite.com (8.12.11/8.12.11) with ESMTP id i4UG8bio077225
for [EMAIL PROTECTED] env-from [EMAIL PROTECTED];
Sun, 30 May 2004 10:08:38 -0600 (MDT)

 From: Nathaniel Borenstein [EMAIL PROTECTED]

  Mr. Borenstein and others like him expect the rest of us to subsidize
  their $30/month connectivity by dealing with the network abuse of his
  fellow customers, because they find $30/month comfortable.

 Just for the record, I spend plenty more than $30 per month on Internet 
 connectivity, as does my employer.  My views on this have nothing to do 
 with the cost of my Internet service, which is why I said nothing about 
 such costs. Since your message seems to be based entirely on a 
 misguided assessment of my motives, there's not much else in it that 
 needs to be answered.  (We could argue forever about what constitutes a 
 monopoly, but I doubt any minds would be changed.)

 Port 25 blocking may be sometimes necessary simply to preserve the 
 integrity of a network under heavy spam attack. 

Perhaps I am mistaken, but I believe that Mr. Borenstein has mentioned
his costs in the past.  His recent talk about the supposed near
monopolies of cable providers makes absolutely no sense except
in the context of $30/month services.

The copy of his message appears to have been sent to my SMTP server
from one of those $30/month accounts.  Mr. Borenstein certainly has
complained about some sort of blocking of his mail.  I think that
blocking involved a cable provider account.  However, if the blocking
that bothered him was not from his TimeWarner acocunt, then perhaps
this is relevant:

traceroute to guppylake.com (64.71.173.70), 64 hops max, 44 byte packets
11  ix-8-0.core1.SanJose.teleglobe.net (66.198.97.18)  59.309 ms
12  pos2-3.gsr12416.pao.he.net (66.220.13.42)  119.297 ms
13  pos2-0.gsr12012.fmt.he.net (64.62.249.121)  61.106 ms
14  64.71.173.70 (64.71.173.70)  62.479 ms

traceroute to thehideout.net (64.71.176.110), 64 hops max, 44 byte packets
13  pos2-0.gsr12012.fmt.he.net (64.62.249.121)  60.953 ms
14  64.71.176.110 (64.71.176.110)  61.028 ms


Hurricane Electric has earned a reputation as a provider that avoids
dealing with reports of spam sent by its customers except by
forwarding them reports to its customers.  See
http://groups.google.com/groups?scoring=dq=+%22he.net%22+group%3A*email
http://groups.google.com/groups?scoring=das_epq=Hurricane%20Electric 
http://groups.google.com/groups?scoring=dq=+%22he.net%22+group%3A*abuse*

Juging from http://spews.org/html/S2100.html 64.71.173.70 is currently
listed by SPEWS at level 2.  (I do not use or advocate SPEWS' list;
I'm pointing out SPEWS' data only to support my point about the supposed
unfairness of the blocking of Mr. Borenstein's mail.)

  But I believe that a 
 long-term solution is possible that will be both more effective and 
 less restrictive.  My own focus is on that long-term planning, and I 
 just can't see port 25 blocking as anything more than a rather 
 problematic stopgap measure in advance of a more spam-resistant 
 infrastructure for SMTP message submission.

People have been talking about such ideas since Cyberpromo's day.  The
closest thing that has ever been implemented and proven effective is
blocking port 25 SYNs from blocks of IP address that have a better
than 99.9% probability of sending only spam and worms, namely the IP
addresses of spammers and of dynamic address.  In practice the latter
is synonmous with block port 25 for $30/month accounts.

Blocking port 25 from $30/month accounts does not affect SMTP-SUBMIT,
which is the IETF standardized spam-resistant infrastructure for SMTP
message submission.   One must wonder how Mr.  Borenstein's mail could
be blocked by the sort of blocking he has repeatedly complained about
if he used SMTP-SUBMIT to reach reputable MTAs.

Note also the disconnect between the reverse-DNS of Mr. Borenstein's
SMTP client and his envelope Mail_From and header From: values,
and the lack of DNS RRs supporting any of the proposals for DNS-based
sender authentication.  According to the advocates of those mechanisms,
Mr. Borenstein's is forging his messages.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
 From: Mark Smith [EMAIL PROTECTED]

  people to monitor and deal with their abusive customers.  That
  is why many of the providers of those $30/month accounts submit
  their own IP address blocks to various dynamic backlists or
  block port 25 themselves.

 Do you have more information or references regarding your
 statements above? I'm interested in any studies etc.

The easiest study is to look at your own spam load.

The most recent public study or reliable comment I'm aware of 
was the statement from Comcast about how much spam they send in
http://news.com.com/Attack+of+Comcast%27s+Internet+zombies/2010-1034_3-5218178.html

See also http://www.senderbase.org/?searchString=comcast.netsearchBy=domain
and http://www.senderbase.org/

(I do not believe SenderBase's numbers are accurate to better than
several percent of total Internet mail or tens of millions of
msgs/day.  I know that their numbers for the domain names and IP
addresses I control are nonsense, but my domains and addresses are
directly involved with 5 or 6 orders of magnitude less mail than
those listed in http://www.senderbase.org/ )



 I would find TCP port 25  being blocked by my ISP to be
 unacceptable. It isn't the Internet anymore. The Internet's job
 is to shunt around IP packets, irrespective of what is in them.

That is inaccurate.  From ancient days it has also been the job
of people running things to prevent traffic that would violate
various agreements, AUPs, TOS, and so forth.


 My anti-spam measures are so effective that I can't remember the
 last spam I received. 

Yes, spam filtering can be quite effective.  I say this based in part
on the results of the DCC, which handled about 136,000,000 mail messages
on May 26.  However, the effectiveness of input filtering is irrelevant
to the need to deal with spam at its sources.

   I would find not be able to run my own MTA,
 unfortunately on a dynamically assigned IP ADSL service, as that
 is all I can afford, to be far more costly than the very
 negligable reduction in spam I would receive if TCP port 25 was
 blocked by ISPs.

I cannot understand that as other than a demand that I subsidize your
Internet service.

If you think that everyone has the right to run their own MTAs, why
don't you insist that Full Internet Connectivity be free?


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
 From: Nathaniel Borenstein [EMAIL PROTECTED]

 Please stop this random speculating.  The ISP that was blocked is not  
 my current ISP (I moved last fall), so none of this is relevant. 

So what ISP was blocked?  Why do I suspect you are being disingenuous
and that it was a $30/month account?

   And  
 if I'm dealing with Hurricane now, well, that's the first I'd heard of  
 it, since I'm downstream on a hosted service and never bothered to  
 check who all my upstream providers are. 

As always, the buyer must beware.  Adopting the terminology in
draft-klensin-ip-service-terms-01.txt or similar would help.  Hurricane
Electric could say that its IP addresses may not be optimal for SMTP
clients but are useful for SMTP, HTTP, and other servers.


   Are you seriously asserting  
 that I deserve to be blocked if I don't confirm that all my upstream  
 ISP's are complying with J. Random Blacklist?

That is a obviously an intentional distortion of my point.  However,
now that you ask, then yes, you do deserve to have your mail
blocked if you buy service from a provider with a reputation for
being friendly to spammers.  Your failure to exercise due diligence
does not impose an obligation to accept more spam on others.  You
deserve to be blocked more than the rest of us deserve to receive
the spam that helps support Hurricane Electric.


 However, you are right that my current laptop configuration is one of  
 many that won't work when Caller-ID or SPF records come into use for  
 the domain guppylake.com.  At that point, obviously, I will change my  
 laptop's configuration.  My sincere hope is that by the time that  
 happens, I will have a better option for smtp submission.  Blocking  
 port 25 will most assuredly *not* help that problem.  

On the contrary, Caller-ID and SPF would not stop as much spam without
collateral damage as blocking port 25 from TimeWarner, Comcast, and
other $30/month service providers.  Caller-ID and SPF cannot have
significant effects against spam for at least the 5-10 years before
most domains support them.  Caller-ID, SPF, and the rest would in
effect block port 25 about the same IP addresses as simple port 25
blocking of $30/month accounts, in the unlikely event that Caller-ID
etc. ever have any effects.  If you would switch to SUBMIT, you would
not care if your TimeWarner account is port 25 blocked, except that
you might expect TimeWarner's prices to drop for needing even less
abuse-desk staff.  On the other hand, port 25 blocking can be done
today and has immediate good effects against spam, as well as worms
and viruses.

Of course, port 25 is not a panacea for spam, worms, or viruses.
Of course, some viruses and spammers would adopt the obvious
countermeasure of using the ISP's servers, but many would not.
Besides, the ISP is could filter or at least rate limit, and there
are no easy countermeasures for spammers against that.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
 From: Nathaniel Borenstein [EMAIL PROTECTED]


 On May 30, 2004, at 2:27 PM, Vernon Schryver wrote:

  So what ISP was blocked?

 What are you, the ISP police?  Not that it's any of your business, it 
 was X0 DSL 

Your repeated, unprovoked public complaints about the blocking that
affected you made XO's identity not the business of everyone who cares
about such issues.  Then there were your comments about near monopolies.

and I paid just under $100/month and hosted my server at 
 home; it was blacklisted as part of a larger block of IP addresses 
 beyond my control.  When I moved physically, I took the opportunity to 
 move my server to a hosted service for guppylake.com, and NOW am on a 
 normal cable modem at home.  I've been associated with the domain 
 guppylake.com for almost twenty years, however, and I rather like to 
 continue sending mail from that address even though I now obtain my 
 bitstream from Comcast.

 But I imagine that X0 is also on your list of ISP's-that-are-evil, so 
 it was my fault for using them in the first place.

That reference that any list of mine of evil ISPs is disingenuous.
Besides, I bet you know as well as I do that RoadRunner probably
blocked that larger block of addresses because of lots of spam.
For a while XO was having difficulty acting against its spamming
customers.  I've not noticed such complaints for a while.

It does sounds as if you have made a habit of hiring ISPs without
exercising due diligence.  If that is true, you might blame your
parents but not me.   I don't blame you for the fact that until
recently I've always paid much more than $100/month to host my
vanity domain, but then it has not been blacklisted.  I have moved
it more than once when I lost confidence in an ISP.


  Why do I suspect you are being disingenuous
  and that it was a $30/month account?

 I don't know, perhaps because you have a suspicious nature and are 
 quick to assume the worst about people? 

Instead of using ad hominem, you might recall your own words such as

]  ... near-monopolistic market positions. The latter exception
] is important, however; I'd certainly be upset if my cable provider
] did it, because I don't have any good alternatives

Then there is your coyness about XO's identity.  Why didn't you come
out and name it at the start?


  I am not really the sort of 
 person who tells lies on an IETF list just to make a point.

Where have I lied?  For your part, you have repeatedly intentionally
misrepresented my words and generally been disingenuous.  For example,
your words above imply that I had no business asking which ISP was
involved in the blocking you have repeatedly complained about.  You
made the identity of the ISP a relevant point by your demands that I
stop random speculating as well as by your repeated complaints about
RoadRunner's blocking.


 For my part, I am sufficiently paranoid to fear that ISP's might 
 advocate port 25 blocking because they hope it will lock people into 
 email addresses that are less portable (e.g. [EMAIL PROTECTED]).  But 
 when they give other reasons, no matter how irrational I may think they 
 sound, I try at least to give their sincerity the benefit of the doubt. 

That is also disingenuous.  While I share concerns about locking
people into addresses, you know that blocking port 25 is unrelated
if people use some flavors of what you called a more spam-resistant
infrastructure for SMTP message submission, such as SMTP-SUBMIT,
or simple web mail.

Why don't you give RoadRunner's sincerity the benefit of the doubt
about the blocking of your XO address?  Did you check any of the well
know resources such as news.admin.net-abuse.sightings for evidence of
spam from your neighbors or did you just start complaining about evil
near-monopolies?

Do you have any substantive responses to my counters against your
claims that port 25 blocking is useless and harmful?  I claim 

 - port 25 blocking by $30/month providers would block little more
  than the spam that might someday be blocked by Caller-ID, SPF, etc.  

 - the legitimate mail blocked or false positives caused by port 25
  blocking is similar or less than that for Caller-ID, SPF, etc.

 - port 25 blocking can be implemented today piecemeal by individual
  providers on the sending side in routers and on the receiving side
  using blacklists, while Caller-ID, SPF, etc. must wait at least 5
  or 10 years until most of the Internet implements them.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
 From: Nathaniel Borenstein [EMAIL PROTECTED]

 This is a remarkably reasonable proposal, and I would have no objection 
 to it (just a fear that ISPs might make it unnecessarily hard to get it 
 opened, but they tend to make everything hard).  Heck, I might not even 
 mind paying an extra dollar or two per month to have it open.  As long 
 as consumers have an option, I'm fine with this as a default.  Good 
 idea.  -- Nathaniel

  I think the easy solution is just to block port 25 unless someone asks
  for it to be opened. Average users have no idea what
  port 25 does or even what TCP is, so they won't care.

and how does that proposal differ from what I wrote Thursday?:

]block port 25 for all types of IP
] service except the one that draft-klensin-ip-service-terms-01.txt calls
] Full Internet Connectivity. 

Mr. Borenstein recently wrote the following apparently about that:

} ... Grocery stores probably have the right to require their
} customers to wear formal attire, but if they don't have a good
} reason to do it, they're going to drive away customers no matter
} what the outcome of any philosophical debates.  My expectation is
} that ISP's who implement anti-spam measures that are both intrusive
} and ineffective are going to drive away customers as long as there's
} a better alternative out there, and I'd be inclined to simply let them
} do it unless they're in near-monopolistic market positions. The latter
} exception is important, however; I'd certainly be upset if my cable
} provider did it, because I don't have any good alternatives.

I don't mind in the least if Mr. Borenstein has changed his mind but
does not wish to say so.  I also don't care if he prefers the ancient
statement of the old idea offered by Perry Metzger.

I will mind if Mr. Borenstein resumes his campaign against the
supposed evils of blocking port 25.  Such unfounded complaints give
aid and comfort spammers and to marketing departments resisting
blocking port 25 for customers who aren't competent to use it.

Until consumer grade services providers such as Comcast do something
to stem the floods of spam they are sending, other organizations will
stem their incoming floods with bad tactics such as rejecting mail
from IP addresses with reverse DNS names containing dsl.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-28 Thread Vernon Schryver
 From: John Stracke [EMAIL PROTECTED]

  (I've yet to see a proposal that works if the spammers start
  utilizing zombie machines that snarf the already-stored credentials 
  of the user
  to send mail)
 
  The question is whether spammers can obtain new credentials (stolen or 
  otherwise) faster than others can blacklist them.

 And, if you had actually read the message you replied to, you would have 
 realized that the answer is yes.  Send out a worm that makes N zombies, 
 have each zombie send one message under the local user's credentials, 
 and none of them will get blacklisted.

Here's a defense for that scenario:

  1. block port 25 to external IP addresses for all of your customers
except those with what draft-klensin-ip-service-terms-01.txt calls
Full Internet Connectivity.

  2. Do not sell Full Internet Connectivity to anyone running Microsoft
software exposed to the Internet.  Possibly relax this with a $2000
bond forfeited along with connectivity at the first propagation
of a worm or other spam.

  3. The effects of #1 and #2 include forcing all mail from the usual
suspects through your own mail systems so that you can do as the
credit card companies do.  Track SMTP envelope Mail_To values or
other characteristics for each customer.  When you see a change,
contact the customer by voice to check.

In practice, you could probably get by with detecting changes in mail
volumes, since a spam spew of 1 message/zombie is at least 10 and
probably 1000 times too low to be practical for high volume spammers.
As far as I can tell, the typical user sends only about a dozen
messages/day.

Of course, the fatal problem with this spam defense is that it is not
based on other people doing the work and paying the costs.  It is not
a coincidence that as far as I can tell Yahoo continues to be the most
important U.S. host for Nigerian 419 spammers or that Windows XP
practically requires or at least strongly encourages individual users
to run their browsers and MUAs as administrator.  It is not a
coincidence that sender validating systems including those Yahoo and
Microsoft are based on the rest of the Internet doing most of the work.

The howls from the Special People who feel that they are entitled  to
Full Internet Connectivity at prices and terms they find comfortable
(and about the per capita income in large parts of the world) are also
related to the fundamental cause of all spam.  There would be no spam
problem including worms if every ISP would look after its own problems
by terminating all spammers including customers who let their machines
be owned or if all users were willing to pull their own weight instead
of expecting something for nothing.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


RE: spoofing email addresses

2004-05-28 Thread Vernon Schryver
 From: Christian Huitema [EMAIL PROTECTED]

1. block port 25 to external IP addresses for all of your customers
  except those with what draft-klensin-ip-service-terms-01.txt calls
  Full Internet Connectivity.

 ... and receive a flood of complaints because 10% of your users are
 using a mail service provided by someone else than you.

That's a significant problem, but so what?  Stopping spam is not without
costs. The spam problem exists only because service providers sell
other than Full Internet Connectivity and cannot charge enough for the
other flavors to squash abuse.

The reason spam is a problem is that ISPs are unwilling or unable to
pay the costs necessary to zap spamming customers.  If spam were a
certain path to termination with prejudice, there would be no significant
spam.  If ISPs would immediately and permanently terminate all spamming
customers and refuse to exchange STMP/TCP/IP with other ISPs that fail
to terminate spammers, there would be no spam problem and no need for
blocking port 25 and so forth.

If Microsoft would have been willing to pay the costs to ship secure
software for the last 10 years, than the spam distribution mechanism
currently favored by the worst spammers would not exist.


2. Do not sell Full Internet Connectivity to anyone running Microsoft
  software exposed to the Internet.

 Regardless of whether Microsoft's software can be secured (it can), 

As we all know, that is true in Microsoft marketing liturature and
plausible theories but false in practice.  As I said, practically all
desktop Windows XP and NT installations have users running browsers
and MUAs as administrator.  Contrary to the knowingly misleading
statements from Microsoft appologists, that fact makes Windows a
hopelessly insecure system.

Then there are the versions of Windows not related to Windows NT
that cannot be secured even in theory.

 this
 is a big no-op as a PC behind a home firewall is still at risk from
 e-mail viruses and questionable web downloads.

A PC running Microsoft software behind a home firewall for most
meanings of that phrase including Microsoft's is not protected. 
It must not be exposed to the Internet.


3. The effects of #1 and #2 include forcing all mail from the usual
  suspects through your own mail systems so that you can do as the
  credit card companies do.  Track SMTP envelope Mail_To values or
  other characteristics for each customer.  When you see a change,
  contact the customer by voice to check.

 So the solution to Spam has to be a massive surrender of privacy! 

This statement is disingenous.  No existing privacy is lost.  It is
just as false and dishonest to claim that the credit card companies
reduce someone's privacy with their anti-fraud mechanisms.  Exactly
the same mail information is already present in ISP SMTP server logs.
Privacy is not lost by people acting on your private information.  It
is lost when your private information is collected.  Changing how
computers manipulate your no-longer-private information does not reduce
your privacy.  Disclosing the fact that you do not have privacy
does not reduce your privacy.

If you want privacy, you must use cash instead of a credit card.
You must also buy full internet connectivity, run your own SMTP
client, and use at least SMTP-TLS, and of course, that's only a
start toward mail privacy.


 I am afraid that you are falling in the very trap that you often
 denounce, present you personal definitive solution to Spam...

My modest proposal would stop spam, but is not unique.  As I wrote in
words you did not quote, the spam problem results from service providers
such as UUNet, Comcast, and Yahoo and software vendors such as your
employer refusing to pay their shares of the costs to stop network abuse.


Vernon Schryver[EMAIL PROTECTED]


___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-27 Thread Vernon Schryver
 From: [EMAIL PROTECTED]

  The people who claim that something can't be done shouldn't get in the 
  way of the people doing it.

 I didn't say it *cant* be done.  I said there were known problems that any
 successful solution would have to address.

Another response is to point out that all of the sender validating
systems are today only proposals that can be seen as getting in the
way of effective tactics.  The talkers trying to get in the way of the
doers are, as usual, those who endless prescribe spam solutions that
they themselves have not thought out, not to mention documented, tested,
or deployed.

The vast majority of the spam that sender validating systems might
block after they have been installed in most SMTP clients 5 or 10 years
from now is rejected today at any organization that really cares about
spam using any of various tactics including DNS blacklists (e.g. the
CBL or the so called dynamic IP lists) and greylisting.
Essentially all of the spam that any sender validating system might
someday block after large outfits like Comcast have installed validating
code on their SMTP clients and servers would be blocked today at the
source if those same outfits would block port 25 for all types of IP
service except the one that draft-klensin-ip-service-terms-01.txt calls
Full Internet Connectivity.  That is because current spam that
would be blocked by sender validating comes trojan proxies.

The current state of the art in spam defenses reject more than 99%
of spam with less than 1% false positives (or variations of those
numbers such as 95% and 0.1%).  No one who is actually do anything
about spam is content with those numbers or confident that new
tactics will not be needed, but please don't tell the experts who
don't know the difference betwee an SMTP rejection and a bounce, lest
they be encouraged to tell us some more what we really should be doing.

As usual, the usual suspects who might someday get around to reading
an RFC, any RFC, tell us that The Final Ultimate Solution to the Spam
Problem is just around the corner.  Their Finual Ultimate Solution is
waiting for the obstructionists to get out of the way of those who
will realsoonnow write the FUSSP RFC.  Of course, the usual suspects
can't be bothered to come down from Mt. Olympus to write a I-D or
learn the relationship between I-Ds and RFCs.  They don't care about
the differences among documenting, testing, or deploying, or the chasm
between practice and sidewalk superintendent theory.


Probably the best response is to send people to the MADID mailing list.
I've often said that the IETF is well served by working groups that do
no more than absorb the energies of standards committee goers.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-26 Thread Vernon Schryver
 From: Andrew Newton [EMAIL PROTECTED]

 On May 24, 2004, at 1:49 PM, [EMAIL PROTECTED] wrote:
 
  In fact, there isn't any sane way to detect inconsistent header 
  information
  without external hints - this is the reason why there's the SPF 
  proposal, the
  Yahoo domain-keys proposal, and Microsoft's proposal.

 And MARID.

I don't see any of those proposals and their competitors as sane.
Some of them, such as SPF, do not even meet their own design goals
as stated informally by their advocates.  Others such as domain-keys
do not seem to do anything that is not already done by SMTP-TLS, despite
the goals in the I-D that seem to be closer to S/MIME.  None of them
have much to do with spam, but only with a currently popular mode of
attack used by spammers.  None have any hope of affecting even that
particular attack mode for years, because none can have any significant
effect until deployed on most SMTP clients.  Many seem to be based on
insufficient familiarity with the nature of SMTP (e.g. SPF's incredible
source-routing scheme) and the urge to Do Something Now regardless of
actual results.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Request for comments on draft mail protocol

2004-05-26 Thread Vernon Schryver
 From: James Denness 

 I am currently involved in a project to create an internet-draft for a
 domain/key based system allowing mail domains to be validated using rsa
 keys, distributed using the DNS system, with minimal modification to
 existing infrastructure. Does a specification for such a system already
 exist? I have many ideas for extentions to the existing SMTP protocol, as
 well as plans for a derivative protocol incorporating this key-based
 system as a more secure and verifiable method of exchanging mail. If
 anyone is interested, I would appreciate being contacted off-list to
 discuss the possible formation of a working group to discuss such ideas.

what about http://ietf.org/html.charters/marid-charter.html ?

It might be interesting to contact the author of
draft-delany-domainkeys-base-00.txt
or the authors of the at least half a dozen other proposals to use
public keys or other mechanisms along with the domain name system to
authenticate mail senders.


My rather negative view of the area can be inferred from
http://www.rhyolite.com/anti-spam/you-might-be.html


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


out-of-office notifications

2004-05-26 Thread Vernon Schryver
How many years must this stuff continue?  If someone asked me, I'd
say that the people responsible for the enclosed meant to ask the
Secretariat to be unsubscribed with prejudice from all IETF mailing
lists.  Then there are people who send HTML out-of-office noise.

This stuff is a tad ironic given the recently expressed concerns about
bad guys checking the IETF attendance list.

How about a Modest Proposal:  no one be allowed to subscribe to any
IETF mailing list without submitting evidence that Microsoft MUAs or
MTAs are not in use.  Those with sufficient clues to contribute usefully
could doubtless arrange things so that even if they were using Microsoft
virus, worm, spam, and OFN distrubution malware, their mail headers
would lie.


Vernon Schryver[EMAIL PROTECTED]


 From: Eric Burger [EMAIL PROTECTED]
 To: Vernon Schryver [EMAIL PROTECTED]
 Subject: Out of Office AutoReply: spoofing email addresses

 Not reachable by e-mail or phone until 6/2, and then only by e-mail.


 From: Paul Georgiou [EMAIL PROTECTED]
 To: Vernon Schryver [EMAIL PROTECTED]
 Subject: Out of Office AutoReply: spoofing email addresses

 Please note I will be out of the office from Friday May 21st to Tuesday May
 25th inclusive without access to email or Voicemail. For urgent matters
 please contact Rosemary Hagholm, [EMAIL PROTECTED], 416-410-6050, or
 David YoungPow, [EMAIL PROTECTED], 905-264-5785.


 From: WaterCove Email [EMAIL PROTECTED]
 To: Vernon Schryver [EMAIL PROTECTED]
 Subject: WaterCove Email

 Hello,

 The watercove.com email address you sent to is no longer active.  With the
 recent acquisition of WaterCove by Alcatel, please contact the intended
 recipient directly to get their updated email address.

 Thank you.


 From: Joerg Reichelt [EMAIL PROTECTED]
 To: Vernon Schryver [EMAIL PROTECTED]
 Subject: Out of Office AutoReply: spoofing email addresses

 This message is in MIME format. Since your mail reader does not understand
 this format, some or all of this message may not be legible.

 --_=_NextPart_001_01C4436B.0F91EDC0
 Content-Type: text/plain;
   charset=windows-1252

 I am currently out of the office and will be back on 6/14/2004. In case of
 urgent matters, please contact 
 Eric Yuan 
 (408) 944-4928
[EMAIL PROTECTED]

 Thanks, 
 Joerg Reichelt

 --_=_NextPart_001_01C4436B.0F91EDC0
 Content-Type: text/html;
   charset=windows-1252

 !DOCTYPE HTML PUBLIC -//W3C//DTD HTML 3.2//EN
 HTML
 HEAD
 META HTTP-EQUIV=Content-Type CONTENT=text/html; charset=windows-1252
 META NAME=Generator CONTENT=MS Exchange Server version 5.5.2654.45
 TITLEOut of Office AutoReply: spoofing email addresses/TITLE
 /HEAD
 BODY

 PFONT SIZE=2I am currently out of the office and will be back on 6/14/2004. In 
 case of urgent matters, please contact /FONT
 BRFONT SIZE=2nbsp;nbsp;nbsp; Eric Yuan /FONT
 BRFONT SIZE=2nbsp;nbsp;nbsp; (408) 944-4928/FONT
 BRFONT SIZE=2nbsp;nbsp; [EMAIL PROTECTED]/FONT
 /P

 PFONT SIZE=2Thanks, /FONT
 BRFONT SIZE=2Joerg Reichelt/FONT
 /P

 /BODY
 /HTML
 --_=_NextPart_001_01C4436B.0F91EDC0--


___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: Categorization of TCP/IP service provision types

2004-03-23 Thread Vernon Schryver
 From: John C Klensin 

 ...
 However, the above statement just isn't true unless the 
 collection of terms and conditions I've seen are a very odd 
 subset.   You will not run a server is typical.  You are 
 required to use ours is much less common, and is often 
 associated with a commercial motive, e.g., you are required to 
 use ours, and our domain on your outgoing mail, unless you pay 
 us more money.

I agree my words are wrong.  I'd forgotten port 587.

When they say you will not run a server they are also implicitly
saying you will use someone else's MTA instead of your own.  You're
right that they don't prohibit the use of SUBMIT, POP3, or perhaps
even port 25 SMTP to reach an allowed MTA.  However, when they say
you will not run a server, they do not mean you will not run an
SMTP server in the sense I undestand SMTP server.  Most people think
mail server is any MTA and not only a system that answers port 25
to receive mail.

As I think you've said elsewhere, it is best to ignore service providers'
motives.  That allowing customers to run servers increases provider
costs for bandwidth, technical support, and abuse handling is irrelevant.
The document should not spell out business models any more than it
should have a matrix of all possible combinations of offerings or
technical details of how the limitations of the various types of
services are implemented.


Vernon Schryver[EMAIL PROTECTED]



Re: Categorization of TCP/IP service provision types (was: Re: The right to refuse, was: Re: Principles of Spam-abatement) (FWD: I-D ACTION:draft-klensin-ip-service-terms-00.txt)

2004-03-19 Thread Vernon Schryver
 From: John C Klensin 

 Last week's version of the spam discussions, led to an 
 interesting (to me) side-discussion about what was, and was not, 
 an Internet connection service.  ...

 draft-klensin-ip-service-terms-00.txt.

http://www.ietf.org/internet-drafts/draft-klensin-ip-service-terms-00.txt


 This clearly isn't finished, indeed, it is not much more than a 
 skeleton with a few examples.  It needs more work, probably 
 additional categories, and more clarity about the categories 
 that are there. 

I think it is about as clear as it should be.  Much more clearity
would require sample contracts or risk getting bogged down in
nitpicking on whether it is practical to run an SMTP server on a
dynamic IP address, whether an IP address that changes once a year
is really dynamic, and so forth.

What I see missing are hints why dynamic addresses are widely
blacklisted.  There need to be words about the first three classes
usually being priced so low that providers cannot afford to keep records
of who was using a given address when it was used to send spam, denial
of service attacks, or other naughtiness, or cannot afford to have
abuse department to consult any records there might be.


  If there is real interest in the subject, I'd 
 like to see someone else take over the writing and editing.   If 
 there isn't any real, perhaps we can stop spending time 
 discussing the subject.

The subject is not going to do away as long as people think they have
a fundamental human right to do the equivalent of moving to a cardboard
box under a bridge and then demanding banks and creditcard companies
to see them as creditworthy as their bourgeois neighbors.

If no one else will take the job and if there is any hope of getting it
past the IESG, I'll happily be your editor, elaborator, or whatever.  My
strengths don't include writing intelligible English, but it needs doing.


Vernon Schryver[EMAIL PROTECTED]



Re: Categorization of TCP/IP service provision types

2004-03-19 Thread Vernon Schryver
 From: Spencer Dawkins 

 I like the idea, and your draft is more than a skeleton plus examples.

quite true.

 ...
 - The client/server orientation doesn't explicitly handle peer-to-peer
 connectivity (unless all the SIP clients have to be servers so they
 can receive incoming phone calls). Saying I want incoming phone
 calls is different from saying I'm running my own mail server.

So you say now, but wait until the ROKSO spammers discover the bonaza
in VoIP.  Instead of owned proxies pumping email, they'll use the
same boxes to push pre-recorded voice messages.

For mail, the filtering at issue here has not been against incoming mail
to local SMTP servers but outgoing mail from local SMTP clients.

An ISP might want to filter against incoming port 80 so customers can't
use lots of the ISP's bandwidth on their HTTP servers, but against
outgoing port 25 to minimize the ISP's abuse handling costs.
The DUL DNS blacklist filtering that non-spammers whine about would
be that if it existed but currently is entirely at third party ISPs
and mail targets.  It is entirely orthogonal to and independent of the
filtering John wrote about.  It is a reaction to the lack of filtering
done by the low priced ISPs.

Of course, none of those words belong in John's document.

Of course, I'm not serious about VoIP spam.  To start, the bandwidth
needed for 10,000,000 5KByte spam is less than the bandwidth needed
for 10,000,000 60 second phone calls.


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-17 Thread Vernon Schryver
 From: Paul Vixie 

 ...
 identities without history will be a dime a dozen, or cheaper.  spammers
 with no history could trample your privacy all day long if you allowed it.

 accepting incoming communication from someone the world has no hooks into
 is off the table.  allowing the world to have its hooks in someone whose
 identity you don't know (and could never find out) has to continue to work,
 but anonymity and homelessness are not the same thing.

Stated that way, but perhaps with an unintended interpretation, I agree.
Every mail sender is hooked by an entity that the mail receiver knows
and that has its own reputation that can be checked today.  The ISPs
that own the IP addresses in every IP packet that Ralsky sends have
their hooks in Ralsky.   You can decide whether the implicit no-spam
guarantee from that hooking agency is sufficient by checking your own
blacklist or the blacklists of others via DNS or BGP.

All of the possible good and bad aspects of any possible trust or
reputation system are already present in the current system.  

  - If you say that you can't trust ISPs to check that a new customer
 is not Al Ralsky in disguise or one of his proxies, then you must
 say the same about any other organization.

  - If you say that ISPs cannot check the reputation of new customers
 for a $30/month account, then you must say the same about any other
 organization.

  - If you say that you cannot trust ISPs to terminate the accounts of
 spammers, then you must say that you cannot trust any other outfit
 to revoke the PKI cert or other assurance for spammers. 

  - If you trust some of those other outfits to revoke their virtual
 letters of introduction and recommendation, than you must be
 willing to trust some ISPs to do the same and terminate accounts.

  - If you say that third party organization could assure you that a
 mail sender is not a spammer, then you must agree that an ISP
 could check with that organization before adding a password to a
 RADIUS server or or turn on a DSLAM, and that an ISP could terminate
 an account when that third party revokes is assurance.

  - You can be anonymous on the Internet only if your ISP protects you.
 No one is homeless on the Internet.  The SYN-ACK for your SYN to
 port 25 must get back to your source IP address home at your ISP.

The connection between you, the spam or mail target, and the ISP that
has its hooks in the mail sender is better than any PKI or crypto
related system could possibly be.  It is not only much cheaper than
anything Microsoft/Yahoo/AOL/Verisign would sell, but technically more
reliable.  IP address spoofing was practically impossible for spam
even before RFC 1948 and related defenses, because it was too hard and
unreliable if you need to make 10,000,000 successfully spoofed ISN
predicted TCP connections per day.  On the other hand, we all knew
even before the bogus Microsoft Corporation certs or the discovery
that those bogus certs could not be revoked that commercial PKI is eyewash.

If you believe that reputation or trust systems might help the
spam problem, then the only room for improvement is in the trust query
protocol.  DNS is a screw driver being used as a hammer in DNS blacklists.
However, this is merely a matter of optimization or elegance.


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-17 Thread Vernon Schryver
|for a $30/month account, then you must say the same about any
|other organization.
|
|ISPs offering $30-per-month service are very likely losing money
| (and worrying who to lay off next). 

True and relevant, but only in the sense that any outfit that might
sell trust assurances might have trouble doing it for $30/month.

| Your bank, OTOH, is probably
| doing nicely on less than $30-per-month service charges. 

If that is true, then an ISP could do the same.  I think it is true
only in a facile and fundamentally false sense.  My banks makes money
on more than my explicit service fees, which are approximately $0/year.

|  Also, some
| ISPs have no reason to worry much about their reputation, because
| they have in effect a government-mandated near-monopoly.

No matter how often anyone says that, it remains false.  By now the
base motives for that old nonsense should be considered.  Outside some
totalitarian regimes, there are no monopolies of any sort on real real
Internet access.  There are monopolies on some imitation Internet
servcies at price points that some claim are related to basic human
rigts, while expecting us to ignore the fact that the $15-$35/month
point they claim necessary to protect their basic human right to send
mail is 10 or 100 times too high for the vast majority of humanity.


|  - If you trust some of those other outfits to revoke their virtual
|letters of introduction and recommendation, then you must be
|willing to trust some ISPs to do the same and terminate accounts.
|
|Ah, yes, but _which_ ISPs?

Currently the ISPs certified by your choice among your personal
blacklists, the SBL, CBL, XBL, SPEWS, MAPS, ORDB, etc.


| ...
|The second part (terminating) is not true, IMHO. There's a real
| danger of getting sued for that, not to mention the loss of revenue.

The second part of that is relevant.  An ISP that refuese to terminate
a spammer for fear of lost revenue does not have any IP addresses
that many of us want conencted to our SMTP servers,

The first part is nonsense spread by spammers and dishonest, spam-friendly
ISP spokeslime.  ISPs have no problems terminating customers with less
than minimal evidence.  Within the last 10 days, I watched a business
customer, not merely a home end-luser, get cut off by a major ISP with
telco connections for some time because it failed to respond to a report
of mine.  Of course an ISP must be careful to avoid breaking contracts
and so forth, but that does not prevent termination.  Why else is the
spam advertising bulletproof hosting common?


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-17 Thread Vernon Schryver
 -- there may be IETF work that could be done
 here.  It shouldn't be this difficult, and there needs to be a whole
 structure erected to make mail administrators accountable at some level.
 And ultimately, we may all have to be willing to pull the plug on

No, simply forwarding completely and faithful copies is more than sufficient.


 17.76.215.200.in-addr.arpa domain name pointer 
 BrT-S4-1-2-22-bnuce300.brasiltelecom.net.br.

I can't get a PTR RR for 17.76.215.200.in-addr.arpa.  Whether you use
reverse-DNS and whois or whois on the IP address is a minor, irrelevant
technical detail.  (Yes, I know Ralsky and others play games with PTR RRs.)


 and effectively cut them off from the Internet if they don't police
 their relays and e.g. refuse to accept mail from unregistered hosts.
 Only thus can we forge a chain of responsibility back to the SPs that
 they cannot easily evade.

We don't need any chains of responsibility.  EIther Brasiltelecom
deals with its spam or it doesn't, just like the zillions of other
outfits that do not have the reputation of a Brasiltelecom, Comcast,
or UUnet.  How Brasiltelecom manages that trick is none of our business,
unless we are customers or employees.

 I just don't think that the idea has been fully tested yet.  To properly
 test it, a certain amount of infrastructure would have to be built --
 not a horrible lot, actually, but some.  And the process of complaining
 in a standardized way would need to be made one click easy. ...

NO!  If Duke or AOL want to do that for its users, then fine.  If not,
that's also fine.  All that matters is that you accept responsibility
for your own incoming spam and deal with it by cutting off the sources.
You don't need any infrastructure to add to a sendmail access_db
or a router firewall.  (I've heard that AOL has a this-is-spam button.)


  The first part is nonsense spread by spammers and dishonest, spam-friendly
  ISP spokeslime.  ISPs have no problems terminating customers with less
  than minimal evidence. 

 Yes, I don't quite understand why people keep talking about suits and
 such. 

We all know why people go on about suits and such.  It is because they
have something personal to lose if spammers are routinely terminated.
That is variously cheap services subsidized by the lack of an abuse
desk at their ISP, services subsidized by revenue from spammers, a
desire to get rich or at least famous by flogging a Final Ultimate
Solution to the Spam Problem (FUSSP), a job at a spam haus of an ISP,
or a job at a spammer.
I realize this observation is impolitic, but it's past time to be
honest about the motives for the persistent nosense about spam.


Vernon Schryver[EMAIL PROTECTED]



Re: The right to refuse, was: Re: Principles of Spam-abatement

2004-03-14 Thread Vernon Schryver
 From: Dr. Jeffrey Race [EMAIL PROTECTED]

 On Sun, 14 Mar 2004 11:12:12 +0100, Iljitsch van Beijnum wrote:
 What we need here is a fundamentally different approach: one where 
 desired communication is tagged as such explicitly.

 You are right a different approach is needed, but not this one
 because it does not admit communication from strangers.

That is true in both theory and practice.

 The only solution is one which removes from connectivity those
 who dump their trash on the commons.   This is easy to do.  

That is true in theory.  In practice it has been difficult.  I'm not
referring to the lies and whines of spammers and address block hijackers.
There are big problems getting slumlords to evict tenents that throw
their garbage and slops out their tenement windows onto the commons.
UUnet is the classic case, with its years of claiming to be unable to
act because it is unable to know from which window of which tenement
any given stinking mess came (i.e. check RADIUS logs or count SYNs to
outside port 25 and decide which of its resellers resold bandwidth to
the spammer).  When respectable people unilaterally shun all residents
of a tenement with many spammers, we are greeted with demands for
government and IETF intervention to stop our vigilante terrorism and
redress our violation of the fundamental right to a free lunch.

It has been suggested that something the IETF could do is define terms.
It would help a lot if there were an official term describing the
consumer level service intended for little more than web browsing,
with often AUPs that prohibit servers, and often with blocks on port
25.  People who want real Internet connectivity wouldn't howl when
they don't get it after not paying for it.  Consumer level doesn't
quite work for me, since the a consumer might want the real thing
and a business might not.  No servers isn't quite right because it's
SMTP clients that port 25 filters disable.

The IETF needs to admit to itself and the world that the IP addresses
assigned to many cable modem and DSL providers are beyond the edges
of the Internet where the End to End Principle applies.  Whether anyone
likes it or not, they are not connected to the Internet.  They might
answer ICMP echo requests and they're better connected than hosts on
the UUCP network were, but hosts on the UUCP network is what they are
like.  There is a pressing need to admit and publish this fact to
forestall governments saving the situation.  Contrary to the cries
of the free lunch crowd, government regulation would try to reduce
everyone's connectivity to their pale imitation than to give them the
real connectivity they demand.


Vernon Schryver[EMAIL PROTECTED]



Re: The right to refuse, was: Re: Principles of Spam-abatement

2004-03-14 Thread Vernon Schryver
 From: Yakov Shafranovich [EMAIL PROTECTED]

 ...
 This is a human problem, not a technical one - the ISPs are unwilling in 
 many cases to handle abuse reports seriously, or are unwilling to invest 
 in any kind of infrastructure to detect abuse. For example, one of the 
 ideas floating around the ASRG has been a BCP for handling hijacked 
 machines. A detection mechanism would be in place that counts outbound 
 email from a given machine or subscriber, and if that usage spikes the 
 mail would be queied and the subscriber notified. 

The ISP can't queue mail that doesn't go through its smarthosts. 
It can only block port 25.  That generally causes mail to be lost,
whether from legitimate MTAs to distant MUAs or from spamware.

   How many ISPs actually 
 willing to do that (although ComCast begun shutting down accounts of 
 hijacked machines)?  What monetary incentive would the ISPs have to do 
 that? And even if the IETF publishes the BCP, there is no way to enforce it.

At $30/month, an ISP can't afford to do much watching for spikes.  It
certainly can't hold the hands of users who couldn't be bothered to
install virus defenses or not open attachments.  About all that a
consumer grade ISP can afford to do is preemptively block outgoing
port 25, 135, etc. for all customers.  I've been complaining for years
that is slum tenement Internet service, but it seems to all that must
users are willing to pay for, in money and in acquiring and using
technical expertise (e.g. virus filters and not opening attechments).

If the IETF would officially define slum tenement Internet service
(with better words, of course), then truth in advertising laws, the
value of product differentiation to ISPs, and savvy users might make
port 25 filtering universal where it is needed and absent elsewhere.
That would stop lunacy like blacklisting any IP address whose reverse
DNS name contains the substring dsl.


 I do not see how the IETF can do anything to force ISPs to handle abuse 
 complaints more seriously. This is why people tend to to block ISPs and 
 IP blocks unilaterally in order to force ISPs to take action (not to say 
 that I necessarily agree with it). The only two things that I see here 
 that can be done by the IETF is either to facilitate easier abuse 
 handling by ISPs via standard formats for abuse reports;

ISPs don't need to exchange abuse reports, but to deal with their own.
There's no value in standardizing the unidirectional stream of abuse
reports from the spam-hostile part of the Internet to the spam friendly
part that largely ignores reports of abuse.

  or provide some 
 kind of standards for exchanging reputation data among receivers. Both 
 still rely on the human decisions made by both ISPs and receivers on how 
 this data is used.

Exchanging reputation about receivers makes as little sense as announcing
consent to receive mail or solving spam with authentication.  You can't
trust people to announce their own reputations or to obey your announced
refusal to receive spam.   Reputation exchanges are either systems
like TrustE's that in practice certify untrustworthiness and functional
equivalents of the current DNS blacklists.

Wise blacklist operators, and I think all major blacklist operators
do not, could not, and would not have any reputations to exchange.
You can add to your backlist only based on evidence that you can defend
in court.  Reports from outsiders, including users of your blacklist,
are almost useless.


Vernon Schryver[EMAIL PROTECTED]



Re: The right to refuse, was: Re: Principles of Spam-abatement

2004-03-14 Thread Vernon Schryver
 From: Yakov Shafranovich 

  If the IETF would officially define slum tenement Internet service
  (with better words, of course), then truth in advertising laws, the

 I am not sure if it's the IETF's role to define such definition. 

There are plenty of RFCs that consist of little more than definitions
of terms.  In a real sense, any standards track RFC is merely a list
of definitions of terms.

If the IETF has no business defining terms to name existing varieties
of Internet service, then it certainly has no business publishing BCPs
telling people how to provide Internet services, including how to run
blacklists.

But in 
 any case, the problem is that given the current situtation that ISPs do 
 not have sufficient incentive to deal with the problem at the end 
 points, is there anything that the IETF can really do aside from 
 providing some standards and publishing BCPs?

A definition of what they're doing and the truth in labeling laws could
give them some incentives.  If ISPs offering slum Internet service
would admit that's what they're selling, they could preemptively block
port 25 and stop a large part of today's spam, worms, and viruses.
The majority of their customers would not notice any difference, except
fewer spam, worms, and viruses.  Contrary to claims from some ISPs,
filtered Internet service is not technically difficult or expensive
to provide.  In fact it is significantly cheaper, because it uses less
bandwidth and abuse desk labor.  That is why many ISPs offer it instead
of real Internet service.  (Some do try the cheaper and less honest
tactic of submitting their own IP addresses to so called dynamic
blacklists so that they don't need to hire help to configure their
routers to block outgoing TCP SYNs to port 25.)

Those users that did complain could be pointed at AUPs that often today
prohibit the use of servers and offered upgrades to accounts with
prices that allow ISPs to deal with the risk of abuse.  That higher
price might still be $30/month but with a $3000 bond.  Or perhaps
$300/month for the first 6 months and $30/month thereafter.

As someone said privately, the slumlord ISPs are not only skipping on
abuse desks.  They also don't have valid SWIPEs, reverse DNS names,
NTP or NNTP servers, monitoring to meet the SLAs they almost claim to
offer and other services that come with real Internet service.


 Given that most ISPs do not make that much profit, what anything change 
 in the long run about their ignorance of abuse reports?

The Internet is being separated into two parts.  One part is of spam
filled slums that cannot send mail directly to the other part.  That
is the common purpose of DNS blacklists and port 25 filters.  Whether
you admit that fact and whether you say slum tenements and real
Internet or spiritual heir to UUCP and transitive closure of direct
SMTP connectivity doesn't change anything but the politics.

What is needed is for the IETF to try to prevent politicians, government
bureaucrats, and slumlord ISPs from colluding to regulate the whole
Internet down into the tenement slums.  There are interests that would
love to see laws funnel all mail sent through Microsoft/AOL/Verisign
servers (probably using a form of PKI cert).  Spooks, spies, and police
state officials would find those servers as convenient as monopolists
would find them profitable.


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-12 Thread Vernon Schryver
 From: Nathaniel Borenstein [EMAIL PROTECTED]

 ...
   When each ISP makes its own rules and metes out its own 
 vigilante-style punishment, that's not civilization, it's anarchy.  And 
 I find it considerably scarier than the underlying offense of spam 
 itself.  -- Nathaniel

Your repeated misrepresentation of the use of blacklists by one party
in a prospective SMTP transaction as vigilantism is as offensive as
it it is a familiar complaint of senders of unwanted mail, including
spammers and kooks.

Regardless of what governments or anyone else might do about spam, and
regardless of whether you and anyone else other than the targets of
your mail consider it spam, your implicit claim to a right to send is
wrong and scarier than any sort of Internet vigilante-style punishment.
Some of us are bothered a lot more by the notion that you might be
able to appeal to any third party to force the target of a prospective
communication to shut up and eat your [mail].

Your right to send mail stops at the border routers of your ISP.
Whether your mail gets any farther depends entirely on the sufferance,
whim, and caprice of others.  If prospective targets of your mail
reject it because your IP address is divisible by 91, that is entirely
fair, appropriate, and not for anyone but the owners of your targeted
mailboxes to judge.  Customers of ISPs that want to receive your mail
but can't for any reason, whether the use blacklists, the prime factors
of your IP address, or standard incompetence, have and should have
only one recourse, changing mail providers.

If the targets of your mail reject it because you have chosen a spam
friendly ISP or an ISP with the wrong number of letters in its domain
name, your only recourse is and should be to change mail service
providers.  The consequences of your choice in hiring an ISP that
subsidizes its rates by serving spammers are no one's concern but yours.

The incredible notion you have repeatedly, albeit indirectly advanced,
that you have a right to have your mail delivered that should be enforced
by governments or at least the IETF, would surely apply to backhoe fade,
power problems, misconfiguration, and all of other things that cause
mail to be lost or bounced.  Having governments or the IETF dictate
rights of mail senders to be be heard by their targets would be BAD!

Next you'll be telling me that if you telephone me, I can't hang up on
you.  not that I would, but I reserve the right.


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-12 Thread Vernon Schryver
 From: John C Klensin [EMAIL PROTECTED]

   * But, when the victim^H^H^H^H^H^H consumer is
   essentially faced with a monopoly --buy the ISP's
   service with whatever conditions it comes with or be
   stuck with dialup-- and is not permitted to run mail
   servers, has no real control over whatever filters the
   ISP decides to install, etc., the situation is a lot
   closer to the classic middlebox with no control by
   either endpoint one (and produces variations on the
   same arguments). ...

The major error with potentially catastrophic consequences in that
that thinking is the notion of ISPs as monopolies.  No ISP in the world
has a monopoly on real Internet service, with the exception the bad
situation in totalitarin states.


   servers of any sort, etc., without upgrading to much
   more costly business services.  Few, if any, will

That many so called ISPs are not selling Internet access is as irrelevant
as the fact that many grocery stores don't sell alcohol.  The lies
customers of those services providers are told and tell themselves
about what they are buying and using are also irrelevant.  The services
those providers offer are some kind of limited data services that
happens to use TCP/IP and portions of the Internet.  I'd like to see
those providers forced to label their services honestly, but that has
nothing to do with monopolies, natural or otherwise, except that
monopolies seem more likely to violate truth in labelling.

That there are parts of the world where you cannot buy Internet access
from local providers may disappoint you and me, but it implies nothing
about monopolies on Internet access.  There may be monopolies on those
limited data services, but that is as irrelevant as monopolies on plain
old telephone service.  People whose only available data services are
those non-Internet access services or POTS can always use those data
services or telephones to reach a real Internet service provider.  Whether
or not they could afford real Internet service is also irrelevant here.


 Where the disagreement you and Nathaniel are having leads, I 
 think inevitably except for timing, is into the state that you 
 assume Nathaniel is assuming: sufficient governmental 
 intervention to turn anyone who operates a mail relay into a 
 common carrier, without the right to filter mail except in 
 response to government-approved rituals.  For many reasons, I 
 hope we never get there, regardless of its potential advantages 
 for controlling spam and various other sorts of bad behavior. 
 But we don't have a free market here, with consumer choice 
 options among ISPs who filter and ISPs who don't, at least with 
 reasonable price differentials.

NO!  In fact we do have a fairly free market.  That many service
providers choose to not provide Internet service is evidence that the
market is free and that no monopolies for Internet Access prevail.
That those service providers charge less than providers that do provide
real Internet service is interesting is more evidence that monopolies
do not exist.

Perhaps governments should crack down the dishonesty of providers that
mislabel their non-Internet access services, but that has nothing to
do with monopolies.

No one should have any sympathy for savvy technicians who choose
to pay for a service that is not Internet access, don't get Internet
access, and then complain about terrorist and vigilantes who keep
them from getting services they've not paid for.

That Internet service no longer costs several $1000/month is great
but irrelevant.  That it costs more than $30/month is also irrelevant.

I think it's too bad that Internet access is not cheaper than it is,
but just now I'd rather worry about the costs of food and water for
most people on Earth.


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-12 Thread Vernon Schryver
 distant providers, thanks to the wonders of ATM
clouds and other mechanisms.  It often costs more than the service you
can buy locally, but that local service is often not Internet access.
It is often (in my view) a strangely crippled imitation that is to
Internet access as straw is to wheat.


 You have that right, and also the right not to answer the phone when my 
 name comes up on caller-id.  But your phone company doesn't have the 
 right to make the decision, on  your behalf and without your consent, 
 to not cause your phone to ring.  And no, acceptable use policies 
 aren't an adequate answer because the decreasing number of 
 consumer-level alternatives means I'm likely to be stuck with a AUP 
 that I find unacceptable.

You are not stuck with bad AUPs for Internet access.  You could always
buy real Internet access elsewhere and use the data services of your
local providers to reach your real ISP.  That you would have to pay
more than $30/month is just too bad.  That I can't get $30/month
imitation non-Internet/cable modem service because I live in the woods
is also just too bad.

 I don't see any difference between this situation and the situation 
 where, say, China uses its governmental/monopolistic powers to block 
 all email from Taiwan.  It's an abridgement of a fundamental human 
 right to communicate, which I think trumps the rights of monopolistic 
 ISP's to cut their spam-related expenses.  -- Nathaniel

That is offensive nonsense. The only right yours that is being abridged
is your supposed right to buy Internet access for $30/month.


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-12 Thread Vernon Schryver
 From: Nathaniel Borenstein [EMAIL PROTECTED]

  That would be relevant to your situation if you had any contract
  with those intermediaries, or if you had deigned to buy real Internet
  access instead of some sort of data service that happens to use
  TCP/IP and parts of the Internet.

 I don't care to argue over terminology, but when I say Internet I am 
 explicitly including the consumer-level services that are what 99.99% 
 of human beings think of as the Internet.

I think you're numbers are wrong, but that's irrelevant.  The label
used by 500,000,000 users don't change the nature things.  That
400,000,000 point point to a monitor and talk about the computer
doesn't change difference between a CRT and a CPU.  What you are calling
Internet access is not.  It differs from the real thing by both price
and features.


  That is a straw man.  Other than some governments, no third parties
  are interferring with your mail.  There are ISPs acting in accordance
  with contracts with their customers to block your mail.  You are
  demanding that ISPs violate their agreements with their customers
  and pass your mail.

 And *that* is disingenious.  A take-it-or-leave it contract from a near 
 monopoly is not a meaningful contract.

You are equating $30/month whatever-you-call-it with Internet access.
Then you claim that since the real Internet access available to you
costs more than $30/month, it is not available.  I think that is not
just disingenious but dishonest.


  from telephone companies.  Qwest sells various kinds of call blocking.
  By your reasoning, it is ok for Qwest to block telemarketing calls
  with inevitiably grossly inaccurate CID filters but not for Qwest to
  block email with much more accurate mechanisms.

 If they sell it to me and I *choose* to buy it, that's one thing.  If 
 I'm given no alternative it's something else.  -- Nathaniel

You are misrepresenting your situation when claim that you have no
alternative.  You do have a choice, but it it is not only between
nothing and $30/month not-Internet-access.  You could buy real Internet
access, although it would cost as much as $400/month.

You compound your misrepresentations by implicitly claiming that the
same outfits that sell you $30/month not-Internet-access won't sell
you real Internet access.   Some of them won't, but many will.  If you
can get DSL, then you can get real Internet access.  That 200 kbit/sec
or more of Internet access generally costs more than $100/month does
not justify your complaints about whatever you get for $30/month.

I don't owe you the subsidies for your Internet access that are
demanding.  You want me to subsidize your access with my money and in
my spam loads.  If you were willing to pay what broadband Internet
access reall costs, your ISP could afford real abuse instead of just
letting the spam flow from your fellow $30/month lusers, and it could
afford to give you spam filtering than the worst DNS blacklists.


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-12 Thread Vernon Schryver
 From: Yakov Shafranovich [EMAIL PROTECTED]

 Since the IETF is a standards organization, can both you and vsj tell us 
   in your opinion, if there is anything the IETF should or should not be 
 doing in the spam arena (changing existing standards, making new 
 standards, etc.)?

draft-crocker-spam-techconsider-02.txt listed some opportunities for
IETF documents.  I vaguely recall they included:
  - codifying common sense for blacklist operators
  I thought ASRG time working on such a BCP, but it seems to have
  gone underground.
   - improved forms and formats for DSNs.
   - improved mechanisms, forms, and formats for logging mail rejections.
   - mechanisms for sharing white- and blacklists among MX servers
  for a domain.

On the other hand, it would be distructive to let the IETF seriously
consider supporting claims of the unfettered right to send mail
regardless of the desires of mail targets and their duly appointed
agents including ISPs or of entitlements to real Internet access
at less than $50/month.  That would further the ambitions of many
to convert the Internet into what PTTs and governments said we might
be allowed 20 years ago.

That the spam problem involves TCP/IP does not necessarily imply that
the IETF has a major role in dealing with the problem, any more than
the fact that guns contain metal implies that the American Society for
Testing and Materials (ASTM) has a major role in the search for world
peace.  Regardless of the ambitions of individuals to make a difference
or become famous, the IETF should strive first and foremost to do no
harm outside its charter in primarily non-technical arenas such as the
fight against spam.


Vernon Schryver[EMAIL PROTECTED]



Re: Apologies for the irony (was Re: Principles of Spam-abatement)

2004-03-12 Thread Vernon Schryver
 From: Nathaniel Borenstein 

...you  
 can't afford an expensive connection ...

 ...   it's not  
 primarily about property rights, it's about our right to choose to  
 communicate with each other.

If the second were true, the first would be irrelevant.  That the first
is relevant shows the right to choose to communicate is nonsense,
except in the same sense as the costs of gasoline and real estate
limit your right to travel, live, and work where you want.


 PS -- Are you really rejecting all mail from comcast.net?  Just  
 curious, that's a lot of people.  And if it's guppylake.com, it would  
 have been nice if someone had told me when I was blacklisted, seeing as  
 how I'm the administrator.  

I suspect it is Comcast, but in the same hypothetical, contrary to
facts spirit as your other questions, let's assume that it is
guppylake.com.  How would you be entitled to or even just expect
notification?  If I set my (non-existent) caller-ID filters to reject
phone calls from you, would you be entitled to or expect a notice?
Even if you were a telemarketer, why would you care?  What if Qwest
did the rejecting for me?  I suspect your answers for the two media
differ and that you have not considered your position on Internet
access except from an emotional sense of entitlement and of hurt
and outrage at being snubbed by various blacklists.


Vernon Schryver[EMAIL PROTECTED]



Re: paralysis

2004-03-07 Thread Vernon Schryver
 From: Dave Crocker 

 Serious discussions about spam control acknowledge the fact of
 limited, incremental benefit, significant deployment costs, potential
 impact on basic modes of legitimate email, and the like.

 Unfortunately, serious discussion is rather rare. What is missing from
 most proposals is any interest in such careful consideration about
 ramifications.

No, let's be honest no matter how impolitic.  What's out of order
from most anti-spam discussions is anything that might squelch the
urgent, exciting, and positive talk.  That certainly includes
consideration of inconvenient ramifications and obvious technical
issues.  The taboos also cover any sentiment like Ok, I'll implement
this and report back soon with results.

(Recent example technical issues:
  SMTP-TLS does not imply commericial PKI, except in the sense that
   commercial PKI is the only working(?) model of large scale key
   distribution.
 No law, standard, or anything else prohibits an SMTP relay from using
   the same authenticator on output that it used on input for a message.)


 Instead, efforts to explore real costs and real efficacy are met with
 the usual plea that this is an emergency and we have to do _something_.

That's true only in the sense of urgent pleas that _other_ people to
do something.  Every month or so, I check the ASRG archives.  If there
has been a change in the last year, I can't see it.  It's all urgent,
and devoid of anything like reports of actions.  Even survey and BCP
documents start and then fade into the mist.  I just now checked
https://www1.ietf.org/mail-archive/working-groups/asrg/current/maillist.html
to see if I'm being unfair.

Of course this problem is endemic to the Standards Process.  It's worse
with spam because the problem hard verging on unsolvable and few if
any of the participants are trying to ship a product before market
window closes, graduate students trying to complete a thesis, others
trying to publish papers before the grant runs out, or mail system
operators trying to avoid drowning.

There are vendors and so forth, but they see that it might make sense
to ship, install, or test a white box with Linux and SA but it is silly
to spend any salaries or time on proposals that can't have any effects
before the spam problem is finished by other effects.


 ...
 The IETF MARID BOF showed that serious discussion is, in fact, possible.
 One simply needs to insist on it and encourage it when it happens.

If http://www.imc.org/ietf-mxcomp/mail-archive/msg00067.html is
reasonably accurate, then I beg to differ.  As far as I can see, it
could be a summary of the most useful content of ASRG mailing list
from March and April, 2003.


  =


] From: Paul Hoffman / IMC 

] ...
] The majority of the anti-spam proposals being actively discussed
] are variants on the prove the sender is who he says he is. None of
] these are perfect, yet:

Given the shift of many major spammers from forging domain names to 
using their own throw-aways like xxcdfm1.com, pointlesstomovehere.com,
and attractiveinternetnews.com, not perfect is an understatement.


] - they are being actively discussed in the ASRG

Somehow actively discussed is doesn't quite convey continually
discussed round and round without any change.


Vernon Schryver[EMAIL PROTECTED]



Re: Proposal For Token-Based Authentication In Mail Submission As Anti-Forgery Effort

2004-03-06 Thread Vernon Schryver
 From: Sabahattin Gucukoglu 

 ...
 and important catch in this proposal, that being a modification to all 
 MUAs and MTAs to allow the acceptance and carrying of a password token 
 which should persist throughout the entire mail delivery, ...

 My proposal is a scheme for anti-forgery, which makes use of a non-blank 
 token, or password, which can be verified by a recipient system ...

How does your scheme prevent forgery better than SMTP-AUTH, SMTP-TLS,
S/MIME, or PGP?  Most MTAs support SMTP-AUTH and SMTP-TLS.

The difficulties in preventing spam sender forgery are not in defining
token protocols but in

 - defining forgery in a way that excludes common, legitimate practices.
Why isn't sending mail with your Hotmail account as sender while
sitting at your desk at work or with your work sender address while
in a customer site, hotel room, or airplane forgery that would be
prevented by the proposed sender-verifying mechanism?

 - key distribution.
Verisign/Microsoft would be happy become the toll collecter for
all Internet mail using the current or a variation of the current
commercial PKI.  Some of us are not keen on that idea.  All other
key distribution mechansims have their own substantial problems,
including those that would use the DNS.

 - preventing spammers from buying as many tokens as they need.
The major spammer that currently calls itself Zhang Jun and Qing
Zhang has been burning several new domain names per day for the
last 2 or 3 months.  Why won't it be able to make or buy tokens
to go with each of its domain names?  Why won't domain2004.com,
managernic.com, namelite.com, nicsimple.com, sitesadmin.com, and
the rest of its DNS servers serve its SPF RRs or your password
tokens as readily as they serve NS, MX, and A RRs?  Why can't it
replace those DNS servers as they become recognized with new DNS
servers, as it has been doing for years?


 1.  Sender MUA submits message through some host X, indicating token to X 
 using the stok extension to be defined in SMTP as an extention to its 
 mail from: command:
 mail from:[EMAIL PROTECTED] stok=blorb 

 ...
 4.  MX begins a password query.  It must connect to some kind of password 
 query resource.  The MX may connect to a designated MTA for a domain and 
 use the stok keyword to query for a password (stok blorb 250 Token 
 is tasty!) or some other simplified database query.  ...

 5.  Authenticated submitters are welcome, unauthenticated submitters 
 aren't, policy-dependent.   ...

Have you looked at SMTP-AUTH?
What about SMTP-TLS with verified certs required?

I hope you won't be too offended if someone points out 
http://www.rhyolite.com/anti-spam/you-might-be.html
I wrote it during the first months of the ASRG mailing list.


Vernon Schryver[EMAIL PROTECTED]



Re: paralysis

2004-03-06 Thread Vernon Schryver
 From: Michael Thomas [EMAIL PROTECTED]

 ...
 So... instead of pointing out the obvious that
 there is no silver bullet, wouldn't it be a lot
 more productive to frame this debate in terms of
 what incremental steps could be taken to at least
 try to change the overall climate? To perhaps move
 things in a direction that might be in our favor?
 To perhaps be open to making some mistakes and/or
 no-ops?

Am I interfering with incremental debate framing, climate changing, or
designing, implementing, testing, and deploying possible solutions that
might be mistakes and no-ops?  I hope not and I don't think so.  In about
1997 Paul Vixie mentioned the notion of spam checksum clearinghouses.
I pointed out the obvious problems, but 6 or 9 months later hacked a
form of the idea into sendmail.  The DCC is now resisting about
350,000,000 spam/week.  When I heard about greylisting, I pointed out
some obvious problems, but worked hard to add it to the DCC client code.

That a problem seriously wants a solution does not imply that it has
one.  That personal immortality, matter transmission, and communicating
consent to receive mail sound nice does not imply that they are possible
or that they would solve more problems than they would create.  Either
way, lists of problems from wet bankets like me should not stop anyone
from designing, implementing, testing and deploying, unless they need
to sell a lot of stock beforehand.


 We know spammers are smart and adaptable. The
 problem is that in our paralysis, we are not.

Whose paralysis do you mean, Kemo Sabe?  Outside the mass media, mailing
lists, and usenet, plenty is being done about spam.  Some efforts have
been more effective than others.  Others such as laws have more future
hope than past performance.  Filter effectiveness above 95% is common.
Reasonably spam free mailboxes that are open to mail from perfect strangers
are more readily available today then they were 3 years ago.  Nothing
so far have been or will be a silver bullet.  Unless you believe vague
handwaving or swallow any of several brands of patent medicine, there is
no prospect of a FUSSP (Final Ultimate Solution to the Spam Problem).

By itself, framing debates is not productive unless you're only
interested in debates.  Few of those who do more talking and writing
about spam than administrating anti-spam mechanisms, designing, writing
or deploying code, enforcing laws, or anything else that directly
affects spam in more than their personal mailboxes are contributing
to solutions.


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-03 Thread Vernon Schryver
 From: David Morris [EMAIL PROTECTED]

 ...
 Well, I don't read such mail if I can avoid it ... I have never received
 email of value where there was no pre-existing 'connection'. People with
 business opportunities with mutual value continue to take the time to use
 the telephone even though email would be a viable alternative.
 ...

Your experience differs from mine and I think other people's.

I'm talking about entirely non-bulk, purely private, I think
unsolicited mail business proposals from strangers.  If anything
comes of the contact, telephone and face to face meetings often
occur, but email is often the cheapest (not just in money or time)
way for an initial contact.


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-01 Thread Vernon Schryver
 From: Paul Vixie [EMAIL PROTECTED]

 ...
 we are eventually going to be able to tell whether a message was generated
 by someone who was present and gave consent, or whether it's just wormware;
 and whether the owner of an ip-using device intends to act as a mail server;
 and whether a bond has been posted by this present/consenting sender and if
 so how much; and whether there exists or not a trust path from the sender,
 through their bank or school or employer or insurance company to the
 recipient.  the internet doesn't care what your meatspace identity is and
 anonymity is a necessary way of life -- but we do care very much whether
 transitive trust exists.  who you are matters less than who you know,
 and this is true not just for messaging but also for web service accounts and
 passwords, for trading and payments, and for so-called social networking.

The trouble with that is that trust is not and cannot be made transitive.

There is a finite chain of people that connects you with anyone you
care to name, with each person asserting any sort of trust you want
for the next person in the chain.  The chain that connects you with
Al Ralsky for the trust operator the next person to corrently identifies
people is probably shorter than 6 people.  The chain that connects
you with Ralsky for next person to does not spam is probably longer
than 6, but shorter than a couple dozen.  Even worse, the chain the
connects you to Al Ralsky for the next person is not Al Ralsky is
probably shorter than the first, short chain.

The notion of transitive trust makes as much sense as assuming that
all of the keys on the key rings of the people who will be signing PGP
keys at the IETF this week are of people who you can trust to not send
you mail you'd not want.

In the real world, there is nothing like transitive trust.  That's why
it is so hard to cash third-party checks.  The closest you can get to
transitive trust is something like the check clearing system, which
has only about 5 parties, with three (the two banks and the Federal
Reserve) so entangled that they can be considered a single outfit.
And check forgery remains a major problem.

If transitive trust could be made to work, then government security
clearances would be easy.  If it could work, we would have more than
3 credit reporting agencies, and we would not have so much machinery
to deal with their errors.  If transitive trust cannot be made to work
for those cases where there are major penalties for cheating, how can
you expect to make it work for mail, which no one values at more than
$30/year/seat?

You might say that you don't want fully transitive trust but only
to trust the people who know people you know.  If you want that
kind of mail system that does not carry message between strangers, 
you've already got it with any of the many kinds of whitelisting.

These problems with trust have nothing to do with the network protocols
involved.  They are fundamentally non-technical.  Talking about replacing
SMTP to implement transitive trust is at best a distraction.


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-01 Thread Vernon Schryver
 From: Paul Vixie [EMAIL PROTECTED]

 ...
 that's not an unreasonable question.  and yet, the meatspace world copes.

The real world copes only by having laws against enforced violations
of trust.  Until the first spammer goes to jail for breaking the laws
that have long made most current spam illegal, all talk of trust fixing
spam is academic.  If the activities of the ROKSO 200 really get them
real penalties, then talk of trust vs. spam becomes relevant, but only
for as one among many fixes for what is currently a trivial part of
the spam problem, the spam from people who are not criminals.

 the thing cybertrust hasn't done is to take advantage of existing meatspace
 relationships.  ...
... meatspace world and its millenia
 of traditions and mechanisms, trust clearly can scale.

It is not trust that scales but police.  There is no transitive trust
in the real world.  There are only bi- and sometimes trilateral contracts
and lots of people with guns ready to punish those who break trust.  If
transitive trust were even in the real world, buying a house would not
be such a big expensive ritual with escrow, title insurance, and so
forth.  If trust scaled in the real world, it would be a lot easier
to get the title for your car converted from one state to another.

Some might offer title insurance as a model for stopping spam, but
only if they've never paid for it.

 if your bond is only $30/year then i probably wouldn't trust you no matter
 what my bank told me about your insurance company or what your insurance
 company said about you.  remember, i don't want to know who you are, i only
 want to know who you know.  if the world has no hooks into you then i would
 withhold my consent.  presumably there are others who would only give consent
 if your religion was the same as theirs or if your identity was known -- but
 that all fits under the all communications by mutual consent banner.

There are problems there.  First is that you are not talking about
anything that might be called transitive trust.  The word transitive
is wrong and misleading.  Please use something like secondary trust
or bonding or letter of recommendation.  Second, as Dave Crooker
wrote, your hooks are too nebulous.

There's a cool and relevant article in the March-April 2004 issue
American Scientist.  It concerns how religious groups manage to trust
their members.  The problem/analogy with your trust model is that mail
is not worth $30/year to anyone, not to mention self-mutilation.  How
much does a check guarantee card or real estate title insurance or
a jail bail bond cost?


 ...
 unpleasant distinction between the transport and mailbox, and it *will* get
 replaced with something that can carry trust indicators and deal with
 multilevel agency.  but the real and larger work is the meatspace-sized trust
 web, without which smtp is probably as good as e-messaging can ever get.

I do not agree, but mostly because I doubt that vastly larger goal
of a meatspace-sized trust web.  Whether SMTP disappears doesn't
matter to me.  I was using email long before it appeared.

And I say again: every time you, with your standing, even whisper about
replacing SMTP with a protocol that carries trust tokens, you give aid
and comfort to spammers and the parasites using the spam problem.
Regardless of what you mean, they translate your words as Paul Vixie
agrees that TOES/SPF/RMX/SMTP-AUTH/CalleriD/HashCash/E-postage/...
is the Final Ultimate Solution to the Spam Problem.


Vernon Schryver[EMAIL PROTECTED]



RE: digital signature request

2004-02-26 Thread Vernon Schryver
 From: Robert G. Brown [EMAIL PROTECTED]

 ...
 It has been pointed out several times now that unless you are willing to
 receive mail only from a small, closed group of individuals that all
 agree to use digital signatures and whose mail you whitelist while
 blacklisting EVERYTHING ELSE you are right back where you are right now.
 ...

If you are interested in that model, then you do not need any fancy
cryptography, certs, pretty good encryption, S/MIME, or anything else
not already present in all SMTP mail.  You can whitelist using bits
that are already associated with every SMTP mail message and in
the body delivered to your MUA if your MTA is not broken junk.

Ever mail message carries a practically unforgeable (for spammers)
token identifying its source.  That token is the IP address of the
SMTP client.  If your MTA is reasonable, it is included in the Received
header it adds.  You only need fancy extra stuff if you cannot arrange
for your community to use only trustworthy MTAs or if your traffic is
worth the thousands of dollars (or equivalent labor) that breaking
security based on IP addresses requires.

Yes, I've heard of Bellovin, Mitnick, RFC 1948, etc. so forth and so
on and on.   TCP ISN faking is harder now than it used to be.  It was
always incompatible with the bulk in unsolicited bulk mail.


The spam problem starts with accepting mail from strangers.  Give
up that design goal, and spam disappears.  So does much of the
justification for mail.


Vernon Schryver[EMAIL PROTECTED]



Re: digital signature request

2004-02-26 Thread Vernon Schryver
 From: Ed Gerck 

 ...
 If we force strangers to jump some hoops before their email can reach 
 our mailboxes, it seems clear to me that we can still keep receiving 
 email from strangers. 

That is the e-postage and other...I'm sorry but the best phrase is
snake oil.  There is no and can never be a hoop that is low enough
to pass enough human strangers but exclude spammers' computers.  If
your hoop passes mail from
  - the deaf
  - the blind
  - those who don't understand the spoken form of your native tongue
  as well as a computer
  - those who don't use graphics (e.g. lynx)
  - whose whose computers don't play audio files (mine doesn't)
  - those who don't have computers made within the last 5 years
  - the tired, confused, or intoxicated
  - the lazy or disinterested
  - the mentally challenged or just plain stupid
then it will also pass mail from spammer's computers.

The idea of forcing your correspondents to jump through hoops that
spammers' computers can't is fundamentally wrong and crazy.  If there
is one good characterization of the difference between human and
mechanical minds it is that machines are far better at jumping through
hoops than we are.  Computers are happy to try a bazillion times until
they get it right.  We get bored.  A spammer's computer will happily
continue trying to guess the answer to your puzzle as long as you let
it, or look for it in a crib sheet of 1,000,000,000 clues.  We not
only won't; we can't.

Only the meta-hoop of fear of prosecution might work.  419 spam
demonstrates its severe limitations.


Vernon Schryver[EMAIL PROTECTED]



Re: digital signature request

2004-02-25 Thread Vernon Schryver
 From: [EMAIL PROTECTED]

 ...
  Having the latest tools means nothing, unless they are used right.  Are 

 i'm using them correctly

I, for one, am unconvinced.  I have had no trouble filtering unwanted
mail from this list, thanks to procmail.  My various filters have no
trouble dealing with more than 99.9% of the unsolicited bulk mail
including viruses and worms directed at my mailbox.  For my mail, my
filters have a total false positive rate (legitimate rejected divided
by total legitimate) of less than 0.1%.  Whether your filters are doing
as well as you want them to does not seem like a concern of the IETF.

 ...
 the value in having the list processor sign all posts 
 is simple.  guaranteed identification of the list 
 traffic for any recipient who decides to verify 
 signatures.  

I think it would be simpler for all concerned and in this case just
as effective if the IETF list processor would offer to do SMTP-TLS and
for an appropriate cert to be published on http://ietf.org/

However, I would not suggesting that for any practical or operational
reason.  It would merely set a good example. 


Vernon Schryver[EMAIL PROTECTED]



RE: digital signature request

2004-02-25 Thread Vernon Schryver
 From: [EMAIL PROTECTED]

 ...
 false positives.  even *one* false positive is 
 unacceptable.  even if my filter accuracy was 99.99% i 
 would still need to trawl my spam folder to check for 
 false positives.  and as the spam volume continues to 
 grow trawling the spam folder takes more and more 
 time.  i need to stop false positives and digital 
 signatures are one possible solution.

Digital signatures cannot stop false positives.  Even if all mail were
digitally signed, there would still be cases where the wrong key was
used, the right key did not reach the mail recipient before the mail
message, a cert expires, or something else hiccups.  The underlying
error rate for SMTP before spam appeared was worse than 0.01%.  Do you
think that 99.99% of HTTPS (HTTP over TLS or SSL) transactions work?
If so, look again.  If not, why would email be better?

If you cannot afford even one false positive, then you had better give
up on email.  My spam load is more than 300 messages/day, counting
only unsolicited bulk advertising.  I receive 50-150 legitimate messages
per day.  It would be impossible for me manually filter that stream
to 99.99% accuracy and so overlook fewer than 1 legitimate message per
10,000 or fewer than one per month.  No one can look at 10,000 messages
per month, never misclassify any as spam or not, and do any other work.
Talk about not losing even one message makes sense only if you receive
almost no spam.

People who talk about 99.99% accurate spam filters as if they were
possible
  - don't know how computers work in the real world (e.g. have no idea
  why the phrase key distribution makes some people cringe or
  assume the tooth fairy handles key revocation)
  - don't receive much spam
  - are innumerate
  - are charlatans.
  - are two or more of the above.

At least weekly I'm told of yet another final ultimate solution to the
spam problem with 100% accuracy.  They are all frauds, like weight loss
diets without hunger or any other inconveniences.  Sometimes they have
creative definitions of spam and false positive.  Usually they are
merely obvious wishful thinking and nonsense, like the hoary old claim
that authentication (including digital signatures) will stop spam.


Vernon Schryver[EMAIL PROTECTED]



Re: How Not To Filter Spam

2004-02-19 Thread Vernon Schryver
 From: Ed Gerck [EMAIL PROTECTED]

 Yes. However, if your mailbox could automatically handle confirmation
 requests based on messages that were actually sent by you (in much
 the same way that NAT boxes work -- you only get a reply to a request 
 you send), then you would not be bothered by the C-R traffic at all. 

As long as you are wishing for things with no prospect of reality
in the foreseeable future, why not wish for long jail terms for the
ROKSO 200?

Automatic C-R handling in MUAs would solve the spam problem much
as NAT boxes have solved the address shortage and routing table
size problems, by creating other problems that are worse in the
long run.  For example, C-R handling in MUAs would do nothing for
the problems C-R systems have with mail that is not simplistic
messages between individuals.

Someone recently wrote that challenge/response systems would be practical
if there were a way for C-R systems to identify and not challenge
mailing list traffic.  That made me choke, because all spam is mailing
list traffic.  Perhaps what was intended was making C-R systems recognize
solicited mailing list traffic.  If your C-R system could do that,
there would be no need for any challenging or responding.  You would
challenge neither non-bulk nor solicited bulk mail, and would simply
reject all unsolicited bulk or spam mailing list traffic.


 Messages among complete strangers is a necessary feature, IMO, but  
 shouldn't it behave in cyberspace as we learned to do it in the 
 social space? Trust is earned. When a complete stranger calls me, 
 I usually ask who or what introduced me to him before I start any 
 conversation. If the complete stranger has no satisfactory answer, 
 I ask him to take me off his database and not call again.

If that's good enough for you, then you already have it.  The start
of a phone call from a stranger corresponds to the initial mail
message.  The asking to be added to a DNC list corresponds to adding
an entry to your email blacklist.

You probably want PKI magic that will tell your MTA or MUA whether
substantially identical copies of an incoming message from a complete
stranger will soon be sent to 30,000,000 of your intitmate friends.
That magic would happen before you do the equivalent of answering
a phone call from a stranger.

If you are among those who configure their telephones to reject calls
with caller-ID values not in whitelist, then you can configure your
email system to do the same with IP addresses.  That will eliminate
essentially all spam.  It also eliminates messages from strangers.


  People who know each other's crypto keys are not strangers.

 It is possible for my MUA to automatically provide a complete stranger 
 with my PK if I receive an email from him. The barrier to have my 
 crypto keys does not have to be any higher than the barrier to have 
 my email address.

If a complete stranger is the sender of an incoming message, then
crypto keys are irrelevant to determining the message is unsolicited
bulk.  If the sender of spam is not a stranger, then you made a mistake
in handling keys.

The PGP mantra that a good key does not imply that the sender or the
message is good applies here.


Vernon Schryver[EMAIL PROTECTED]



Re: How Not To Filter Spam

2004-02-19 Thread Vernon Schryver
 From: Ed Gerck [EMAIL PROTECTED]

  If a complete stranger is the sender of an incoming message, then
  crypto keys are irrelevant to determining the message is unsolicited
  bulk.  

 No. In PGP, for example, I accept a key based on who signed it and
 when. If I can trust the signer(s), I may use a key from a stranger.

That sounds like the old authentication solves spam hope.  It was
wrong before SMTP-AUTH and it is still wrong.  If the sender is a
stranger, then by the definition of stranger you can know nothing
more than that the key works.  You cannot know whether the stranger
is one of Alan Ralsky's myriad of aliases delivering spam.


  The PGP mantra that a good key does not imply that the sender or the
  message is good applies here.

 Define good key and you'll define what the key is good for.

The ancient PGP mantra refers to keys that work, as in the results
of decoding using the indicated public keys yield a valid messages.
The key can be good, but a good key tells you nothing more than that
the sender of the message knows the corresponding private key. 

Would you trust every PGP key from the IETF key signings to guarantee
that a message is not spam?  Some IETF participants have been unashamed
senders of unsolicited bulk commercial advertisements.  The person I'm
thinking of objected to his entry in my blacklist by insisting that
although he had sent the triggering message, it was not spam because
he had not sent more than one copy per mailbox.  He might have since
changed his definition and stopped sending unsolicited bulk mail, but
it would be silly to think everyone who gets a PGP key signed at an
IETF key signing party is someone from whom you want to receive mail.

Given who will pay certifiers, the IETF key signings are far less
bad guarantors of non-spam than commercial certifiers.  Consider
privacy policy certifiers and see one of the several versions of
http://enterprise-security-today.newsfactor.com/story.xhtml?story_title=Online_Privacy_Policies_Misleading

] An analysis of Web sites carrying those seals found that the
] companies running them ask for more personal information -- and
] protect it less -- than sites that have no seals.


Vernon Schryver[EMAIL PROTECTED]



RE: How Not To Filter Spam

2004-02-18 Thread Vernon Schryver
 From: Tony Hain 
 To: 'Vernon Schryver' [EMAIL PROTECTED], [EMAIL PROTECTED]

 So if you had received the mail sent here yesterday claiming to be from
 Alain Durand would you block Sun or IBM?  ...

I should not have responded specifically (if at all) to the other
gentleman's complaint about my blacklists.  Whatever I do to mail
directed at stuff I control is irrelevant here, provided I do not
affect any third parties.  My freedom to filter access to port 25 (SMTP)
and port 23 (telnet) is equally and completely unfettered.

Two groups oppose that principle.  Some people demand SPEWS and other
filters with what they consider too many false positives be outlawed,
because those filters might affect their outgoing mail.  They are
unmoved by users knowingly choosing their own filters.  They feel their
right to be heard by whomever they choose overrides the rights of their
targets to be left alone.

Other people see nothing wrong in spewing junk at third parties if it
might reduce their own spam loads.  These people include users of
systems based on challenge/responses, bounces after the initial SMTP
transaction (sometimes from within MUAs), bitch lists that send
complaints to dozens of third parties.  These people feel their right
to consent to whatever appears in their mailbox overrides the similar
right of others.

As I see it, both groups suffer the same pathology as spammers.


 .

] From: Robert G. Brown [EMAIL PROTECTED]

] ...
] In the department, where we do USE spam assassin, no bounce messages are
] generated except when mail fails for one of the standard reasons
] unrelated to filtering of any sort.  ...

On today's Internet, innocents are almost certainly receiving bounced
spam and viruses from your system that could not be delivered for
reasons unrelated to filtering, such as bogus target addresses.

] ...
] If that rejection occurred during the original transaction and generated
] a bounce -- well, that's the kind of thing we see above, a cure that can
] easily be worse than the disease, ...

The idiotic messages from that stupid challenge/response system are
not generated during the original SMTP transaction.  It is possible
to do challenge/responses that do not involve separate messages, but
they suffer from MUAs and MTAs that do not handle SMTP rejections
properly and users who cannot understand them.

Somehow making SMTP rejections understandable to users is something
that the IETF might attempt.  I think that is something the ASRG is
considering.  I also think that is nearly impossible.  such is life.


] If I understand what you are saying, perhaps there is a way to do it
] correctly -- reject the spam at the original smtp transaction but with
] a message that goes back to the original sender (only) in spite of the
] fact that both the From and Return Path header entries might well be
] forged and the message relayed through one or more open relays.  ...

Headers and the SMTP envelope, forged or not, are irrelevant to SMTP
5yz and 4yz rejections, as far as the rejecting SMTP server is concerned.
If the spam came through an open relay, then a proper SMTP rejection
might cause the relay to send a bounce to an innocent mailbox, but
SMTP relays are out of favor among spammers compared to open proxies.


Vernon Schryver[EMAIL PROTECTED]



RE: How Not To Filter Spam

2004-02-18 Thread Vernon Schryver
 From: Robert G. Brown [EMAIL PROTECTED]

 ...
 If a message comes in incorrectly addressed, yes, it will bounce.  It
 should, shouldn't it?  This has nothing to do with whether or not it is
 spam or a virus or any other kind of message.  If it is a bad thing, it
 is a very fundamental bad thing...
 ...

If the envelope sender was forged as is common in spam, universal in
worms, and practically nonexistent in legitimate mail, then your bounce
will afflict third party's mailbox.  My mailbox receives enough worm
bounces to make me say it is an awfully bad thing.

The only fix is to have your external MX servers know all valid
addresses and so reject junk before it can be accepted and later
need to be bounced.  That fix is often impractical or impolitic.

No, SPF, RMX, TOES, etc. etc. etc. cannot fix this problem unless you
assume frictions (deployment resistence and delays) do not exist
or you discard SMTP design goals including transporting messages among
complete strangers.

People who know each other's crypto keys are not strangers.  

If you could someday trust organizations to vouch for strangers and
not sell spam-for-a-day certs to Ralsky/Ricther/co, then today you
could trust the same outfits to not sell spam-for-a-day/week/years IP
bandwidth accounts.


Vernon Schryver[EMAIL PROTECTED]



Re: covert channel and noise -- was Re: proposal ...

2004-02-17 Thread Vernon Schryver
 From: John Leslie 

 ...
- local administrative choices that keep bastion SMTP servers ignorant
of per-user filter preferences

This is a feature, not a problem. If the end user wants a filtering
 process individualized that much, s/he should choose to use a SMTP
 server which agrees to do so.

That is a feature only if the user accepts the consequences of discarding
mail without generating bounces, including not informing senders of false
positives.  Bounces from internal spam filters (either in MUAs or MTAs
inside organizations) are a major source of unsolicited bulk mail or spam.


- filtering at the DATA command requires either (1) rejecting for
   all or no targets or (2) accepting for all targets and siliently
   discarding the message for those targets that want it filtered.

Alternatively, the receiving SMTP server could reject any multiply-
 addressed email.

People running SMTP servers that handle 100K or more msgs/day have
been uniformly horrified when I've suggested that.  I don't really
understand why, but I have given up on the idea.



(Silently discarding _is_ a bad idea, when done by the SMTP server
 itself. IMHO, it's better to mark for later discard -- which actually
 could be done in such a way as to mark only for those recipients who
 requested the more restrictive filtering.)

A better positition is that everything should be logged, particularly
including discarded mail, and in that case, enough of bodies to allow
targets to identify senders and the nature of the discarded messages.
Of course, one should assume users won't normally look at those logs.
Spam you read is not filtered, but at most categorized and stigmatized.


Vernon Schryver[EMAIL PROTECTED]



Re: covert channel and noise -- was Re: proposal ...

2004-02-17 Thread Vernon Schryver
 filtering manually or in
your personal MUA.  The only caveat is that your account should be
terminated for network abuse if whatever mechanisms you choose
bounce very much spam to innocents.

That many filtering systems are junk including not allowing per-user
preferences is as illuminating as the fact that spam flogging spam
filters is common.  All I can see from either is that hard problems
attract charletans and would be gurus.


 ...
 It is perfectly reasonable for you to add content filters that YOU
 control ABOVE this transport layer.  If you want to hire a secretary to
 open all of your mail for you and sort it and reject all the
 advertisements, you can.  

You are welcome to require manual filtering for your mail, but you
have no standing to dictate to others at other institutions.

Transport layer seems like a misuse of the term.  It certainly
conveys nothing to me.


 With that all said, there are tools that ALREADY provide the kind of
 content level filtering mentioned above.  The better ones do not
 themselves discard or bounce any mail to any user.  

People with experience in this field never say never.

 They simply SCORE
 THE CONTENT with regard to its likelihood of being spam (or a virus) on
 the basis of a whole battery of tests.  Scores that exceed a given
 threshold can easily and automatically be rejected or binned for a
 ...

All of that can be done during the SMTP transaction just as effectively
as after.  Rejecting spam after the SMTP transaction should be and in
many quarters already is seen as network abuse requiring at least a
stern warning.


Vernon Schryver[EMAIL PROTECTED]



How Not To Filter Spam

2004-02-17 Thread Vernon Schryver
Thn enclosed example of how not to filter spam is offered for those
who might want to preemptively add accuspam.com or downloadfast.com
to their blacklists.

It is also a classic example of what is wrong with the MUA filtering
tactics Robert Brown advocates.


I certainly did not try to contact anyone at 3dize.com.  A few readers
of this mailing list might recall that Shelby H. Moore III and I don't
see eye to eye.
I do not know what the From: header of [EMAIL PROTECTED] is about.
Perhaps it was forged.  Or perhaps someone at that address wired a
subscription to this mailing list through an unusually braindea)
challenge/response spam filter at DownloadFAST.com.  If so, the
Secretariat should blacklist accuspam.com and/or downloadfast.com from
subscriptions to IETF mailing lists.  (It would need to be unusually
braindead to send me the challenge instead of the envelope sender.)


Vernon Schryver[EMAIL PROTECTED]


 From [EMAIL PROTECTED]  Tue Feb 17 19:26:14 2004
 Received: from www.DownloadFAST.com (www.downloadfast.com [65.61.155.11])
   by calcite.rhyolite.com (8.12.11/8.12.11) with ESMTP id i1I2QDiM048994
   for [EMAIL PROTECTED] env-from [EMAIL PROTECTED];
   Tue, 17 Feb 2004 19:26:13 -0700 (MST)
 Received: from www.downloadfast.com (localhost.downloadfast.com [127.0.0.1])
   by www.DownloadFAST.com (8.12.10/8.12.10) with ESMTP id i1I1hIQf002492
   for [EMAIL PROTECTED]; Tue, 17 Feb 2004 19:43:18 -0600 (CST)
 Received: (from [EMAIL PROTECTED])
   by www.downloadfast.com (8.12.10/8.12.6/Submit) id i1I1hITA002491;
   Tue, 17 Feb 2004 19:43:18 -0600 (CST)
 Date: Tue, 17 Feb 2004 19:43:18 -0600 (CST)
 Message-Id: [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: Re: Re: covert channel and noise -- was Re: proposal ...
 From: [EMAIL PROTECTED]
 Reply-To: [EMAIL PROTECTED]

 You attempted to contact us via email, and our anti-spam system is returning your 
 email below.

 Please kindly resend your email below, using our Contact Form on our web page:

 http://accuspam.com?kM,vbrJT

 After using our Contact Form only once, your future emails will not be returned.

 If you do not use our Contact Form to re-send your email below, then we can not read 
 it.

 __
 Powered by http://AccuSpam.com. Signup instantly for FREE!


 Your Returned Message:
 From: Robert G. Brown 

  ...
  Or, mark for later accept/reject decisioning AFTER the SMTP server per
  se, in the filter pipeline between the server and the mail spool of the
  addressee.  Spam assassin does the right thing already (and this is
  exactly what it does).

 ***NO***!  Except when run as a milter or otherwise during the SMTP
 ...



Re: How Not To Filter Spam

2004-02-17 Thread Vernon Schryver
 From: william(at)elan.net 

  It is also a classic example of what is wrong with the MUA filtering

 You certain dont assume that there is nothing wrong with the filtering
 system you use and others may try duplicate as well. Otherwise how would 
 you explain that you have Elan and completewhois.com listed as filtered
 on your site. Do you honestly believe we ever sent you any SPAM? Or maybe 
 you're making certain assumptions about envelope from or normal From: 
 headers and complaining when others are making the similar assumptions?

Mail from Elan and completewhois.com is unwelcome at rhyolite.com in
patt because of a message that said:

] Elan.Net Internet
] T.1 T.3 Frame Relay
] If you need more information about us or are interested in network services 
] (managed hosting, collocation, dedicated servers, t1, t3), please send email to 
[EMAIL PROTECTED] 
] 
] For More info 
] http://www.elan.net
] [EMAIL PROTECTED]

There are additional, independent, sufficient reasons for that listing
that we do not need to explore.  If you will read my web pages, you'll
see that my list of unwelcome domains is not only about senders of
unsolicited bulk email.

An advantage of a vanity or other tiny domain is that it can use
blacklists that would have intolerable false positive rates at other
or larger outfits but that have 0.000% local false positive rates.


Vernon Schryver[EMAIL PROTECTED]



Re: covert channel and noise -- was Re: proposal ...

2004-02-16 Thread Vernon Schryver
 From: Robert G. Brown [EMAIL PROTECTED]

 ...
 I agree.  However, all of the observations made so far regarding
 spam/virus filtering in general still apply to filtering at the SMTP
 level. I would say that NO keyword filtering could take place.  The
 best that one could do at the protocol level would be to reject messages
 that fail to meet a tighter criterion than is currently required.

What is the SMTP level?  Is that during SMTP transactions between MTAs? 
Is the protocol level the same or something else?

If both of those levels refer to SMTP transactions between MTAs, then
the conclusion is wrong.  Except for local administrative hassles, all
spam and virus filtering that can be done later can instead be done
during SMTP transactions between MTAs.  Your SMTP server may need to
wait to until the end of the DATA command to object to messages
containing viruses, missing or bad SMTP headers or other objectionable
content, but that works fine.  I know of many millions of spam that
are filtred during the DATA command every day, and I don't claim to
know about any really big sites.

The only problems are:
  - local administrative choices that keep bastion SMTP servers ignorant
  of per-user filter preferences
  - filtering at the DATA command requires either (1) rejecting for
 all or no targets or (2) accepting for all targets and siliently
 discarding the message for those targets that want it filtered.

In theory the second problem could be fixed if the DATA command could
accept a vector of 250-OK/4yz-try-later/5yz-fatal responses, one for
each target named with a Rcpt_To command.  In practice the spam problem
will be solved one way or another long before such a protocol change
would be sufficiently widely deployed to matter.


Vernon Schryver[EMAIL PROTECTED]



Re: The IETF Mission

2004-01-19 Thread Vernon Schryver
  Not all important ideas enter the working group process and emerge
  as standards, and the fact that some working group chooses not to
  capture an document does not make it necessarily unworthy of
  preservation.  ...

 Another approach here is to allow for the creation of ad-hoc WGs. That
 would provide a cleaner path for tangential documents that don't fit
 ... 

Let's see if I've got all of this straight:

 - The IETF is working on a Dilbert Standard compliant Mission Statement.
  The Dilbert Mission Statement Standard requires foursquare support
  of all virtues and opposition to all vices, without unnecessary
  (read any) limitations.

 - There are many wonderful ideas that are so awesome that if they were
  self-published, their publishers cannot be slashdotted and would
  never be indexed by Google.  To remedy this unfair lack of publishers
  and de facto censorship, the IETF will go into competition with the
  ACM, IEEE, etc. in both the refereed academic publish-or-perish
  business (e.g. CACM or *Transactions) and the random research notes
  business (SIGCOMM).

 - Salescritters, marketoons, and trade rag espurts find it inconvenient
  to utilize the IETF imprimatur by submitting I-Ds (possibly pushed
  to Informational) and then advertising compliance.  To fix this
  terrible shortcoming of the IETF Standards Process that hinders
  innovatation by Microsoft and other leading edge organizations, the
  new IETF Mission Statement will require that anyone who wants a WG
  can have one.

I think those are excellent proposals, although perhaps not for the
same reasons as other adovcates.  I've been complaining about nonsense
I-Ds and write-only RFCs for many years.  The most effective way to
relive the pressure for junk RFCs and nonsense IDs is to make IETF's
stamp of approval meaningless by giving it to anything and everything
that comes along.  Within a matter of at most a year or two, RFCs might
go back to what they were 20 years ago.

To solve any funding problems or overwork of the IESG,
http://www.ietf.org/html.charters/wg-dir.html will become an automated
index of links much like http://reshmeat.net/ and we'll do away with
Last Calls. 

Let's hurry up and advance or at least archive these IDs before they expire:

  draft-terrell-internet-protocol-t1-t2-ad-sp-06.pdf
  draft-terrell-iptx-dhcp-req-iptx-ip-add-spec-00.pdf
  draft-terrell-iptx-dns-req-iptx-ip-add-spec-03.pdf
  draft-terrell-iptx-spec-def-cidr-ach-net-descrip-01.pdf


Vernon  Schryver[EMAIL PROTECTED]



Re: The IETF Mission

2004-01-19 Thread Vernon Schryver
 From: grenville armitage [EMAIL PROTECTED]

 ...
 then that's a problem we can fix without creating an indestructable I-Ds.
 ...

IETF rules to the contrary, I-Ds are indestructable for anyone who
cares to look for them.  Every several months I'm moved to point to
classic I-Ds that should have been destroyed as proof that almost
anyone can submit an I-D that says almost anything, no matter
how...ah...controversial.  I have never failed to find copies somewhere
on the net.  Today the only aspect of an I-D that expires after 6 months 
is the endorsement implicit in a copy at venera.isi.edu or www.ietf.org.

Today an endorsement of some sort is the only difference between having
your ideas heard by self-publishing and having them officially published.
The web is taking us a major step forward to 400 or 500 years ago when
good ideas were self-published and readers didn't need the moderation
of a Rupert Murdoch or the IETF.  I don't know what the academic
publish-or-perish, RIAA, and other commercial and mass media worlds
will do to replace their citation indecies, royalties, and advertising
revenues, and I don't much care.

I'm not saying anything against WGs producing Informational RFCs. 
I'm only pointing out that calls to have the IETF Mission Statement
broaden the scope and quantity of documents to be published suggest
ignorance of search engines or needs to have things endorsed by the IETF.


] From: Fred Baker [EMAIL PROTECTED]

] I don't know that we're changing anything in what the IETF does. What is 
] happening is that the IETF is growing up and taking control of its own 
] destiny in a variety of ways, and trying to clean up its own processes. In 
] all the *other* problems it tries to solve, the IETF tries to say what 
] problem it is solving sometime before finishing solving it, if for no other 
] reason so that it can decide whether it did in fact solve it. Same here.

The facilitators hired by H-R departments to run mission statement
off-sites always say all of that.  They are always perfectly sincere
and well meaning.  Those good intentions do not change the fact that
trying to write a mission statement changes the organization.  If an
organization lacks an unstated consensus purpose, then writing a mission
statement is unlikely to create one.  On the other hand, trying to
write one exposes any lack of consensus and turns into a race to the
Dilbert Standard of advocating all virtues, condemning all vices, and
creating new mandates such as ad hoc WGs and archived I-Ds.

You could be right and I might be wrong if much this thread were not
filled with talk about turning the IETF an unfunded Reed Elsevier.

] ...
] Once we have decided that we did in fact solve the problem before us, I 
] don't know that the bumper sticker gets us all that much further. But the 
] bumper sticker can be helpful when we are asking the questions what are we 
] trying to accomplish? and are we accomplishing it?.

It's one thing to consider those questions and something else to write
a mission statement.  Mission statement facilitators always say the
only purpose is to consider those to questions, but the results are
what they always are.  Those results are related to the fact that they're
officiously titled Mission Statements instead of ad hoc comments
about what we're trying to do and how well we're doing it.

I know many of you must have been through Mission Statement charades.
Have you ever seen one that with 12 months hindsight was not a waste
of time or worse?  My personal experience suggests that write a mission
statement means the same as jump the shark.  See
http://www.google.com/search?q=%22jump+the+shark%22


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-13 Thread Vernon Schryver
 From: Nathaniel Borenstein [EMAIL PROTECTED]

 ...
  Mr. Sauve could rent an IP address that is not on dial-up or dynamic
  blacklists and run his systems there.

 In other words, because some ISP with whom he has NO relationship has 
 deemed his own ISP spam-friendly, he should abandon his ISP, whether 
 *he* thinks they are spam-friendly or not. The words that come to mind 
 to describe this sort of arrangement are cartel, blackmail, and 
 extortion.  It is also a perfect example of an assertion I made 
 before, which is that blacklists are being used by the large ISP's as a 
 tool for consolidation in the ISP market.  When RoadRunner blocked my 
 ISP, the *only* thing they were helpful about was offering to help me 
 get better Internet service by changing ISPs.

Exactly the same charges can be made about taxis, pizza delivery
services, and so forth that refuse to deliver to bad parts of the
real world.  Perhaps in some cases you are right, but in the vast
majority you are wrong.  Is a simple, undeniable fact that the sources
of spam are concentrated in a small fraction of the IPv4 address space.
For example, the last numbers I saw about SPEWS had it listing a tiny
fraction of 1% of the IPv4 address space.

There are other problems with your theory.  The biggest is the link
between the big ISPs and the blacklisters.  Besides the undeniable
spammers (e.g. the ROKSO members), it is the big ISPs that are most
likely to be blacklisted, particularly in dialup or dynamic
blacklists.  According to your theory, Charter Communications is part
of a conspiracy of big outfits to drive away their own customers by
blacklisting their own IP addresses.  How sane and honest is that?

If you are saying that blacklists and boycotts are dangerous weapons,
then you're certainly right.  That's why contrary to my naive reading
of the U.S. Constitution, there are federal laws that limit or outlaw
boycotts in some circumstances that I don't understand.  
See http://www.google.com/search?q=%22secondary+boycott%22

Exactly what do you want? 
  - a U.S. Federal law against IP address blacklists?
  - a test for social responsibility and good sense given prospective
  IP address blacklist opererators administrated by the IESG?
  - a U.N. regulation prohibiting stupidity and foolishness by users
  and ISPs while choosing blacklists?

Pardon me, but it seems you want the IETF to declare that all blacklisting
and spam rejecting by IP address wrong and nasty.  As far as I can
tell, you would require me to accept mail from 69.6.0.0/18 because you
fear I might refuse mail from you.  Or perhaps you would allow me to
reject Wholesalebandwidth spam provided I not tell anyone.


  Blacklists also, quite clearly, don't work to eliminate spam.
 
  No honest person who actually looks at spam agrees with that.

 As I've made clear, *I* agree with that.  Given the exchanges that 
 preceded this, it sounds like you are asserting that I -- and all the 
 other people who have argued against you in good faith on this list -- 
 are dishonest.  Is everyone who disagrees with your conclusions 
 necessarily dishonest?  If so, why are you wasting time talking with 
 us?

You might be ignorant instead of dishonest.  If you have not looked
any blacklists except those that have affected your mail, then you
have not, in my words, really looked at spam.

Are you calling me and those who point out that some blacklists 
detect 70-90% of spam with false positive rates below 1% liers?
It your words could be read that way.


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-13 Thread Vernon Schryver
 From: Nathaniel Borenstein [EMAIL PROTECTED]

  You might be ignorant instead of dishonest.

 How very kind of you to consider two possibilities, thank  you.

My original words that you felt labelled you dishonest explicitly
included that possibility.  Most people have strong opinions about
spam, but have not really looked at it, and are quite wrong about it.


 ...
  (And, by the way, I consider *any* false positives unacceptable if 
 there's no suitable mechanism for detecting and correcting them.)

That wisdom applies to a lot more than spam defenses.

However, it is worth noting that many and perhaps most email users
value avoiding false negatives more than avoiding false positives in
their spam defenses.  That is one reason why the blunt, high false
positive blacklists are popular.  One also must not try to reduce false
positives from spam filters much below the error rate of SMTP in the
real world (e.g. not just bounces but blackholes).


 This discussion is going nowhere, so I'm going back to more serious 
 work on comprehensive spam control.  

That's fine, but it would be wise to recognize the overall situation
while developing those comprehensive controls.  Railing against the
evil conspiracy of big monopolistic ISPs using blacklists against
themselves isn't productive.  Except for organizations that run their
own private blacklists, public anti-spam blacklists will remain quite
popular.  MAPS used to claim 45% of the Internet used the RBL.  I
suspect that at least that much uses the RBL+, CRL, XBL, SBL, and/or
SPEWS.  Public blacklists are here to stay, because they work.

The only likely tactic for reducing the use of blunt blacklists such
as those listing dynamic IP addresses is to convince ISPs to take network
abuse seriously.  As long as big ISPs make listing their own IP adddresses
dynamic lists their main response to their own bad customers, those
blunt, high false positive blacklists will remain popular.

Talk about transition plans to IPv6, comprehensive spam controls,
the evils of NAT, the evils of blacklists, media conglomerate ISPs
distributing NAT boxes to break VoIP, and monopolisitic ISPs using
blacklists is one thing.  Actually doing something is something else.


Vernon Schryver[EMAIL PROTECTED]



RE: Death of the Internet - details at 11

2004-01-13 Thread Vernon Schryver
 From: John C Klensin [EMAIL PROTECTED]

 ...
 (1) As others have pointed out, the knowledge/skill level of a 
 typical ISP seems to be on a rapid downslope with no end in 
 sight. ...

 ...
   * The difference between those business rates and
   whatever you are paying are mostly determined by a what
   they can get away with mentality -- we know what the
   marginal operational costs are.   If those prices stay
   high, it is either because there is no alternate
   provider, or because there is (illegal) price-fixing
   going on, or because no one sees a business opportunity
   by operating a business service at a lower margin.  

The second segment seems to ignore the implications of the first segment.
The marginal cost difference between business and residental is
zilch only if you have the same people running things and interacting
with customers.  Front line tech-support droids that are dumber than
the Windows boxes of residential customer cost a lot less than humans.
If your front line support people know have a clue about the LSRR IP
option, then either your rates are higher than $30/month or you have
customers like us who do most of our own support (and cost our employers
or ourselves a lot more than $30/month for that support).

   Many
   of us can remember when the solution to no viable
   Internet dialup service was go form a consortium with
   a few friends... 

There are some surviving ISPs that were started and still run that way
least in geographical areas I know about.  Their prices seem to be
higher than the organizations in that race to maximum stupidity.

It is not a coincidence that they have very few internal spam problems.
They are never blacklisted, not even by the second tier spam blacklists,
even when they rent straight modem dial-up ports.  (Third tier DNS
blacklists are kooky 32-bit random number generators.)


 perhaps it is time to do something
   similar with DSL.  

I know people who have done that sort of thing with DSL and 802.11.
However, I fear that idea is generally killed for now by the fact
that IP bandwidth pricing is set by those outfits racing for ultimate
stupidity.  They see IP bandwidth as a loss-leader.

  Or maybe we would rather whine than
   do something, perhaps because what we have been fed is good 
   enough.

Until people like the individual complaining here that his cable-modem
is listed as a dynamic address are willing to pay for the costs of
real IP service, including the costs of doing more against your spamming
customers than asking blacklists to list your own addresses, there's
not much hope.

We could accept the fact that people who are not willing pay more than
$10-30/month are not interested in the Internet and stop listen to
their whining.  Detroit laughs as people who expect to get Mercedes
for Chevrolet prices.  Why can't we laugh at people who expect to get
real IP service for $10-30/month, or least stop taking their demands
literally?

If cable-modem IP is good enough for you, then you're not interested
in multihoming or even running your own VoIP system.  You might be
happy to have your phones connected to the email and web browser
demark/appliance maintained by your telco/cableco, but you're not really
interested in the Internet.  You lack the interest to be allowed to
run your own servers for anything.


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-12 Thread Vernon Schryver
 From: Nathaniel Borenstein [EMAIL PROTECTED]

 ...
 I also have to say that I fear your approach would help the larger ISPs 
 use spam as an excuse to kill off smaller ISP's...  

How so?  Exactly what is my approach?  Please note what I've said too
many times:
  - I don't currently use a public blacklist and have never used one
  for non-trivial mail.
  - I'm flogging spam defenses that compete with blacklists.

  and I question the 
 fundamental legitimacy of blocking all of an ISP's customers before 
 there's a fair due process to establish the ISP's culpability. 

Fair due process and free speech and even legitimacy are none
of your concern unless you own the mailbox that would *RECEIVE* the
blocked mail.  No one has any right to send anyone any mail.  We have
only privileges granted by targets of our mail.  If our targets are
foolish and hire ISPs with long histories of both permitting a lot of
outgoing spam and blocking a lot of incoming legitimate mail (see
recent complaints about RR's false positives), then that's just tough
and perhaps we should convince our correspondents to switch ISPs or
find new correspondents.

Good or bad spam filtering is merely a part of the rest of good or bad
SMTP or any other ISP service.  It makes no more sense to condemn the
HTTP protocol because many web pages are junk than it does to condemn
blacklists because some blacklists are junk or used badly.

If you think blacklists are bad because they can be run by fools, then
you also must hate any network authentication and authorization
mechanism.  What's the difference between Kerberos and a mail blacklist?
Both are responsible for summary denial of services.

I fear there are bad reasons for the disdain for blacklists:
 - they are effective against spam from spam friendly ISPs.
 - some of us work for spam friendly ISPs and let the interests of
our employers color our thinking.
 - some of us are lazy and hire ISPs have been spam friendly.
 - some of us feel we have a devine right to send any mail to anyone
and are deeply offended by any contrary suggestion, not to mention
an effective mechanism.


 Caring 
 enough about spam is an awfully slippery concept on which to base a 
 blacklist.

I am offended by your implication that I suggested any such thing. 
I only pointed out that using spam-friendly ISPs has consequences.
(You evidently know about XO's reputation, which I think has improved
lately.)  The only major blacklist that does anything remotely like
your implication is SPEWS, which escalates in order to get the
attention of ISPs.  If I did use a blacklist, it wouldn't be SPEWS but
that would be only one reason among serveral.


 ...
  that is not blacklist, then why can't a blacklist be run properly?

 Good point.  That's why I favor giving users access to their spam pool 
 when they suspect problems, and using challenge/response in certain 
 (carefully defined) situations.  A good filtering mechanism is not 
 nearly as black and white as a blacklist.

The last part of that is simply wrong.  Every filtering mechanism is
exactly as black and white as a blacklist.  Whether or not an SMTP
server keeps good logs has nothing to do with whether it decides to
reject messages using blacklists of IP addresses or domain names or
anything else.  If your correspondents use software that consults any
blacklist but doesn't keep good logs, then the fault lies first with
your correspondents for using bad software, second with you for having
foolish correspondents, and not at all with the blacklist.

Yes, I realize that I'm implying that to keep good logs you need to
act on a blacklist (if you use one) at the end of the DATA command
instead of before the HELO.


  Any fool
  can set up a blacklist.  That many fools have and other fools have
  used them does not show that blacklists are bad any more than the ease
  of setting up an IP network shows TCP is the spawn of the devil.

 I will confess that my personal experience makes it very hard for me to 
 be rational on the subject of blacklists, as I fear that any concession 
 to them will only encourage the creation of destructive blacklists by 
 fools.  In general I prefer a solution that any fool can implement, 
 because one surely will.  

Then you'd better give up on the Internet.  As with much of the net,
the information in and functioning of any spam system is at least
somewhat administrative and subject to the whims of any fools
administrating it.  The buyer must beware, not only of hiring a spam
friendly ISP, but contracting with a foolish spam filter.  The greater
fool is often the buyer of services offered by lesser fools.


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-12 Thread Vernon Schryver
 From: Bill Sommerfeld [EMAIL PROTECTED]

 ...
 One problem with dropping suspected spam into a spam cesspool as
 opposed to rejecting it outright in the SMTP session is that many
 people (myself included) have neither the time nor the inclination to
 wade through our spam cesspools on a regular basis looking for
 misclassified messages.

That's too true.  Since the spam collected/rejected by my real mailbox
and personal spam traps exceeded 1000 spam/day, I can only skim envelopes.
If I count duplicates, my average for the last 40 days is 3516/day.

 An SMTP-level reject at least gives the sender a real-time indication
 that the recipient will not be seeing the message any time soon..

There may be a false dichotomy there.  You can reject a message during
the SMTP transaction and so give the sender a real-time indication while
also capturing the entire message in a spam cesspool.  All 787 MBytes
now in my 40-day rolling cesspoll were rejected with a 5yz or 4yz SMTP
response.  That many systems don't capture what they reject implies
nothing about anything except those SMTP servers.

I'm flummoxed by criticism of external DNS blacklists based on the
lack logging by SMTP servers.  That's predictable among the general
public, but not here.

This thread is related to the nearby thread about the end of life
announcement for SpeakFreely.  The problem in both cases is less with
evil media conglomerates converting the Internet into TV than with people
who won't feed themselves.  Instead of getting their code and networks
running IPv6, they install NAT boxes and complain about the RIAA.
Contrary to the whines from ISPs with major spam problem, those that
have real (including enforced) anti-spam policies don't have spamming
customers.  Instead of paying the extra cost to hire an ISP that cares
enough to not have spamming customers, people complain about the evils
of blacklists.  Instead of taking the extra trouble to use an operating
system or at least an MTA that is not a worm delivery and spam
facilitation system, they send mail to random, spam-obsessed strangers
like me asking how to add spam filtering to Outlook.


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-12 Thread Vernon Schryver
 From: [EMAIL PROTECTED] (Mike S)

 ...
 Instead of paying the extra cost to hire an ISP that cares
 enough to not have spamming customers, people complain about the evils
 of blacklists. 

 ...
 I can't do so because my IP address is on a blacklist. I have
 cable modem, but the world thinks I'm a dial-up. For that reason
 alone, having nothing whatsoever to do with spam, I'm forced to
 give up privacy and control of my communications.

Mr. Sauve could rent an IP address that is not on dial-up or dynamic
blacklists and run his systems there.  A remote co-lo or hosting service
would cost more than the $30/month or whatever slum rate he is paying
for cable modem service.  Or he could convince his correspondents to
whitelist his IP address or stop using the relevant blacklists.  Either
he has not tried that, his correspondents also pay slum rates for slum
service, or they don't want enough to hear from him to increase their
spam loads.

Perhaps I should ask if Mr. Sauve is violating the terms of service
of his ISP.  What does Charter say about servers?  Did Charter
give Mr. Sauve's IP address to the blacklists that bother him?

Or perhaps he has already rented an IP address that is not dynamic.
But if he has done that, where is his complaint?  Is it just
Interveloce/GO International's rates?


 Anti-spam initiatives that are based on such blacklists are
 quite simply the failed results of irrational, fascist thought.

In that he is calling his correspondents irrational fascists, because
it is they who have chosen to reject his mail.

Never mind that facism has something to do with centralized autocratic
government headed by a dictatorial leader, severe economic and social
regimentation, and forcible suppression of opposition and that seems
like the opposite of the anarchy of blacklists.
Also ignore the fact that a taxi or pizza delivery service refusing
to go to dangerous parts of town is no more irrational than refusing
mail from the IP address neighborhoods that are major sources of spam.
Any individual is unlikely to be a spammer or mugger, but the statistical
risk/reward ratio is too high.  By all accounts, the odds that the the
next SYN to your port 25 from a dynamic IP address involve spam are
very high.


 Regardless of your exact definition of spam, all reasonable ones
 I've heard have one thing in common - it's based on CONTENT, not
 IP address. Blacklists couldn't care less about content 

That's nonsense.  Blacklists do care about content in a statistical
sense.  If blacklists don't care about content, then neither do so
called Bayseian filters.  I've often said that lists like the DUL bug
me, but not because they are useless.  Lists like the DUL catch a
lot of spam and little legitimate mail.


  - legitimate
 email or spam, out it goes, to the detriment of communications,
 which is the Internet's raison d'etre. I take that back, it used
 to be that way. Now the Internet is meant to make big corporations
 lots of money.

I've been around for a few years (TIP-25 (DOCB) in 1972), but I don't
recall that Communication in the sense Mr. Sauve means was ever the
Internet's raison d'etre.  15 years ago, would be communalists were
bemoaning the commercialization of the net and interference with
capital-C-Communication, by which they meant they deserved free
bandwidth.  Their successors complain about the free ride they never
got.  Back in Mr. Sauve's golden era, his perfect unfiltered IP bandwdith
was either not available to small or commercial outfits like Alientech
LLC or it would have cost 2000% more ($5000/year) for 10% as many
bits/sec (56K).


 Blacklists also, quite clearly, don't work to eliminate spam. 

No honest person who actually looks at spam agrees with that.
Good blacklists (e.g. CRL) are better than 70% effective with 
false negative rates that large, very conservative corportations
can tolerate.


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-11 Thread Vernon Schryver
 From: Keith Moore [EMAIL PROTECTED]

 ...
  In any case, what standing do you have to comment on what mail is
  rejected by other peoples SMTP servers?

 Sites can reject mail to their own servers if they want to.  the issue 
 is whether they're being misled about the criteria used by a blacklist.

If that is an issue, it ought to be raised by those who are being
misled, the targets of mail, instead of senders and other third parties.


   I think that as long as
  those using blacklists get what they ask for, no outsiders have any
  business commenting, and particularly not would be senders of
  unsolicited bulk mail.

 Apparently you also think that it's acceptable to forward mail from 
 people you don't like to DCC, misrepresenting it as spam.  The only 
 reasonable response to people with this kind of attitude ends with and 
 the horse you rode in on.  Actually, that's being far too polite.

First, contrary to Keith Moore's the baloney, DCC clients detect bulk
mail.  It is impossible to (mis)represent mail as unsolicited bulk
mail or spam by forwarding it to a DCC server.  Doing so only reports
it as bulk.  Are the courtesy copies mailing list contributions
that Keith Moore insists on sending bulk?  If they are private, then
forwarding them to the DCC instead of my mailbox can have no effect
because no one else will see them.  If they are bulk, then some extra
reporting also has no effect; if DCC clients haven't marked them solicited
bulk by whitelisting the IETF list, they should be rejected as unsolicited
bulk mail.  That's how the DCC works.  So why is Keith Moore so exercised?

Consider courtesy copies of mailing list messages and the people who
send them.  Many courtesy copies are sent unthinkingly by using a
reply all function, but others are intentional.  The intentional
copies amount to microphone queue jumping.  Their senders they feel
their targets should see and respond to their words first.  When the
IETF reflector took literally days to finish sending copies to people
at the end of alphabet like me, there might have been other reasons,
but today it finishes within several dozen minutes.

I didn't realize that courtesy copies are often intentional queue
jumping until I noticed that senders of courtesy copies tend to foam
at the mouth about the evils of MAPS, the RBL, blacklists, and spam
filtering in general.  I did not notice that common thread until I
tired of courtesy copies of foaming flaming nonsense and started
dropping senders into my personal, non-published blacklist.

If you want to see apoplectic fits, use a sendmail access_DB instead
of procmail to for your filtering.  That will spare your system a few
cycles, but it also lets senders know they're not being heard.  People
who hate the RBL and DUL for impersonally filtering their earthshaking
words really hate being being personally shunned.


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-11 Thread Vernon Schryver
 Cc: Keith Moore [EMAIL PROTECTED], [EMAIL PROTECTED]
 From: Keith Moore [EMAIL PROTECTED]
 To: Vernon Schryver [EMAIL PROTECTED]

 ...
  If that is an issue, it ought to be raised by those who are being
  misled, the targets of mail, instead of senders and other third 
  parties.

 it IS being raised by them, for those who are actually able to figure 
 out what's going on.  of course, when the recipient doesn't receive the 
 mail he's expecting, he has no idea where to look - so he tends to 
 blame the sender.

Keith Moore is not complaining about mail he has not received because
of the dasterdly misinformation from the RBL.  He is either a third
party sender of reject mail that he is certain was wanted by its targets
despite being rejected or he is a fourth party presuming to speak for
the first parties (spam targets) against the second parties (blacklist
providers).

An odd thing about users of DNS blacklists and other filters is that
many users avoid confronting senders of rejected mail.  Many users are
happy to let senders assume what the senders want to believe, that the
evil nasty rbl consipracy used lies, bribery, and extortion to force
an ISPs to use a blacklist.  Never mind that after being informed of
that evil nexus by senders, most users do nothing but demand even more
filtering.  Ignore the fact that blacklists are free or cost money and
are now generally selling points.

Of course popularity in the market is not proof of virtue, but it does
poke holes in the claims of senders of rejected mail about blacklists.


 ...
 whatever.  your mail server claims it's forwarding my mail to DCC, and 
 it's not bulk mail.

The first phrase is true but only of mail sent directly from Keith
Moore to my SMTP server.  His second statement is false.  Bulk mail
includes any message which has a a bunch of copies sent to one or
more mailboxes.  All mail sent through non-trivial mailing list
reflectors is bulk.  Spam is bulk mail that is unsolicited.  A bunch
varies depending on whom you ask and when.

Keith Moore has long known that his courtesy copies to my mailbox
are unsolicited and unwelcome.  They are identical except in headers
to hundreds of copies of the same messages, and so are bulk.  I
tolerate (and sometimes find interesting) the copies of his messages
that arrive through the IETF reflector, but I object to duplicate
copies of flames and insults.  If your a bunch threshold for bulk
is 2, then Keith Moore's attempts to put 2 copies of his messages in
my mailbox are spam regardless of the hundreds of copies sent
elsewhere.  (Some people say 2 is the right threshold for bulk, but
I run my DCC client with a threshold of 5.  5 is a common choice for
vanity domains.  Choices for real domains range from 20 to 200 as well
as the overflow value of many.)


  Consider courtesy copies of mailing list messages and the people who
  send them.  Many courtesy copies are sent unthinkingly by using a
  reply all function, but others are intentional.  The intentional
  copies amount to microphone queue jumping.

 and the horse you rode in on.

 you are misleading people, and you know it. 

Notice that he does not specify whom is being misled or the falsehood.

Sheesh!--what would a reasonable person do who knows that one of his
targets doesn't want his courtesy copies?


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-11 Thread Vernon Schryver
 Cc: Keith Moore [EMAIL PROTECTED], [EMAIL PROTECTED]
 From: Keith Moore [EMAIL PROTECTED]
 To: Vernon Schryver [EMAIL PROTECTED]

  If that is an issue, it ought to be raised by those who are being
  misled, the targets of mail, instead of senders and other third
  parties.
 
  it IS being raised by them, for those who are actually able to figure
  out what's going on.  of course, when the recipient doesn't receive 
  the
  mail he's expecting, he has no idea where to look - so he tends to
  blame the sender.
 
  Keith Moore is not complaining about mail he has not received because
  of the dasterdly misinformation from the RBL.  He is either a third
  party sender of reject mail that he is certain was wanted by its 
  targets
  despite being rejected or he is a fourth party presuming to speak for
  the first parties (spam targets) against the second parties (blacklist
  providers).

 You are a barefaced liar.

How so in that assertion of mine?  Unless I missed something that seems
unlikely, Keith Moore is not complaining about mail he has failed to
receive.  He surely would not have been misled by blacklist operators
into configuring his SMTP servers to use one of their evil nasty
cheating lying dishonest fraudulent unhealthy fattening cancer-causing
end-to-end principle breaking RBLs.  The remaining possibilities are
that he writing is on behalf of himself as a sender of rejected mail
or he is a fourth party presuming to speak for the people actually
involved, senders, receivers, and blacklist operators.

I admit that I would not be surprised if his opinion of anti-spam
blacklists was informed long ago when some of his more or less innocent
mail was rejected with a reference to MAPS's RBL.  I've no evidence
of that except his use of archaic jargon and what his courtesy copies
and statements about how I've configured my SMTP server show of his
views of those who would be happier with fewer of his words.

Concerning how I've configured my SMTP server--Juging from the headers
of the IETF list messages, today it has rejected 2 copies of and the
horse you rode in on and one copy of You are a barefaced liar.  That
seems like a Good Thing(tm), but perhaps not enough.


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-10 Thread Vernon Schryver
 From: [EMAIL PROTECTED] (Mike S)

 ...
 The RBL and DUL are quite clearly (and openly) designed and
 intended to be used to implement denial of service. Doing so with
 the explicit authorization of the email recipient would be legal.

 ...
 The MAPS system does not, and cannot, distinguish between spam
 email and legitimate, addressee desired email. It is a brute force
 system which throws the baby out with the bathwater.

Who but someone incapable of understanding the concept of one person
never wanting to receive any mail or other communications from another
could say something like that?  For the rest of us, it makes perfect
sense to say I never want to receive any mail from any IP address
owned by Stanford Wallace.  I also never want to receive mail from any
SMTP client using an IP address that has been declared 'dynamic' by
its owner, because that declaration says that its owner cannot figure
out who is using the address at any given time.

I suspect that Mike Sauve (msauve at alientech.net) is upset with the
RBL and DUL because some of his mail was rejected.  I cannot find any
evidence that he has sent unsolicited bulk commecial email, although
some of his public statements about the definition of spam have been
a little unusual.  Perhaps he tried to run a commercial site on
residential IP addresses and blames MAPS instead of the ISP that
labelled those addresses.


Note:
  - The DUL was largely populated with declarations by the owners of
   the IP addresses in question.

  - The IP address owners are ISPs, not the end users renting them,
   at least if they're not SWIPed.

  - I've always considered dynamic declarations by ISPs as implying
   that the ISP is a slumlord uninterested in tracking abuse by its
   users.  Contrary to years of knowingly false statements from such
   as UUNET, anyone with standing to contribute to this list knows
   that figuring out which modem, DSL port, or cable modem port was
   using a block of dynamic IP addresses at any given instant requires
   only the will to maintain and consult RADIUS or other logs.


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-09 Thread Vernon Schryver
 From: Keith Moore [EMAIL PROTECTED]

 ...
 His mate is a wise man.  RBLs are a really terrible idea, and they've
 caused a lot of valid mail to be rejected.  There's really no way to
 reliably determine that a message is spam based on the IP address or
 sender's domain name.  The most you should do with RBLs is delay or
 rate-limit mail from the blacklisted sites, you should never reject
 such mail.
 ..

It's never clear to me what Keith Moore means by RBL when he repeats
that claim.  Those three letters are a registered service mark for a
product that historically has been run so conservatively that claims
that should not be used to reject mail sound silly.  You would certainly
want to do more than just rate limit Cyberpromo's spam.

He might be referring to other DNS (or BGP) distributed, more or less
real time blacklists.  Depending on which of the zillions of lists he
is talking about, his claim is either entirely accurate or even worse
than it would be if it refers to MAPS's RBL(sm).  Some DNS blacklists
are at best used for scoring and only by those who don't mind affecting
legitimate email.  Other DNS blacklists have false positive rates
(legitimate rejected/total legitimate) below 0.01% that allow them to
be used by corporations that would rather receive 1000 spam than reject
one legitimate message.

If his claim refers to private blacklists, then it is obvious nonsense.
There are many IP addresses (e.g. WholesaleBandwidth's /18) that will
never send mail that anyone but a spammer wants delivered for the
foreseeable future.  Then there are private blacklists of domain names
that are undeniably valid targets of complete blacklisting, starting
with Cyberpromo.com.

The clear and undesputed (except by spammers and some others with
special interests) consensus is that blacklists are undesirable but
entirely legitimate, useful, and often necessary mechanisms for dealing
with network abuse by rejecting, not just delaying mail.  The buyer
(or user) must beware, but Keith Moore blanket condemnation of RBLs
is simply wrong.  His apparent claim that SMTP servers must accept
mail from everywhere as much sense as claims R. Stallman's complaints
20 years ago closed telnet ports.

Note none of the SMTP servers I run use any DNS (or BGP) SMTP
blacklists.  He's not trying to gore any of my oxen.


Vernon Schryver[EMAIL PROTECTED]



Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-09 Thread Vernon Schryver
 From: Keith Moore [EMAIL PROTECTED]

 ...
  It's never clear to me what Keith Moore means by RBL when he repeats
  that claim.  Those three letters are a registered service mark for a
  product that historically has been run so conservatively that claims
  that should not be used to reject mail sound silly. 

 Yes, RBL did indeed reject valid mail,

I never heard of any examples of mail considered valid by its targets
that was rejected as the result of RBL listings.  There was plenty of
screaming and whining by advertisers would be about their supposed
free speech rights.

Could you point to significant amounts of real mail, as opposed to
theoretical examples, that might reasonably have consider legitimate
by its targets but that was rejected as the result of a MAPS RBL
listing?  Note that the validity of mail is determined not its senders
but by its targets.

  because it misled site
 administrators into thinking that mailers that failed its test were
 inherently able to be exploited into relaying significant amounts of
 spam.  So sites that trusted RBL's misrepresentation blocked valid mail
 from sites that rate-limited relayed mail (including the site I ran at
 one time) even when that rate-limiting was an effective spam block. 

That makes no sense to me.  It sounds like a confounding of other
blacklists with MAPS's RBL.  The RBL is (was?) based on spam received
instead of open relays inferred by probing.  Or perhaps it is a statement
that you were misled ... into thinking that some mailer failed
some test.  Or is it at statement that bulk mail you sent was rejected
by its targets?

In any case, what standing do you have to comment on what mail is
rejected by other peoples SMTP servers?  I think that as long as
those using blacklists get what they ask for, no outsiders have any
business commenting, and particularly not would be senders of
unsolicited bulk mail.


 I really have no sympathy for net vigilanties who insist on trying to
 enforce their own narrow-minded definitions for how the net should work,
 and who disrupt others' service in the process.  

Do you have any idea how ironic that statement is?  Can you imagine
that the saying their network; their rules might apply to all of us?
I happen to agree with some of your statements about NAT, but I hope
I'm sane enough to not act on them, because trying to enforce [that]
narrow-minded [definition] for how the net should work [would] disrupt
others' service in the process.

By the way, do you also agree with the other individual who repeated
the familiar (in spammy circles) kooky wishful thinking that running
a DNS blacklist somehow violates U.S. Federal law?


Vernon Schryver[EMAIL PROTECTED]



Re: Hashing spam

2003-12-18 Thread Vernon Schryver
 From: escom [EMAIL PROTECTED]

 I work on an approach to block spam with a database of hash (md5) string of
 spam email:
 1) Reporting a verified spam to the database server on the web
 2) the mail client check incoming mail, generate a hash string send to and
 verify the presence on the server, is yes block email.
 3) download a hot list to block directly on the machine

 i don't know if it's a good or bad idea.

The several existing implementations of something like that idea suggest
that some people think it is a reasonable idea.  I think it is useful
but has limitations.
See http://www.google.com/search?q=vipul+razor and http://cloudmark.com
for one (set of?) implementation(s).
See http://www.dcc-servers.net/ for another.  The DCC is often used
with SpanAssassin.  Refusing mail that has been seen anywhere else
(i.e. with non-zero DCC target counts) seems like a perfect fit for a
mailing list, but I'm probably biased and so won't suggest that.


I vote no if someone is taking a vote about trashing the Subject
headers.  Access to this mailing list should be more, not less difficult.
Anyone who cannot figure out how to sort mail from this list based on
its existing headers and rewrite Subject headers or anything else to
taste is not really interested in the nominal purpose of the list.

If it were practical, it would be good to require subscribers or at
least contributors to prove their interest by showing they can fetch,
compile, install, configure, and operate a simple TCP application such
as an SMTP server.  Anyone who lacks sufficient interest to do (or
already have done) something like that is unlikely to have anything
interesting to say to this list, except to other go-ers.  Such a test
might reduce the number of people who are interested only in non-technical
issues such as the administrative work of the IETF, the nasty evil
power grabbing U.N., ICANN, or legacy internet engineers widening the
digital divide, or whatever else concerns the people who are prompting
the continued statements of the painfully obvious.  (For some reason
perhaps related to procmail, I'm not seeing the questions that prompt
the obvious answers.  It would be swell if those offering the answers
would desist.)

Anyone who cannot find a usable POP3 or SMTP server with which to
subscribe to this list would certainly be better served and better
serve the rest of us by using the web pages of its archive.
See http://www.ietf.org/mail-archive/ietf/Current/maillist.html


Vernon Schryver[EMAIL PROTECTED]



Re: Hashing spam

2003-12-18 Thread Vernon Schryver
 From: John Stracke [EMAIL PROTECTED]

 I work on an approach to block spam with a database of hash (md5) string of
 spam email:

 ...
 It's been done, and the spammers have already evolved to get around it: 
 they randomize the messages so that the hashes don't match.

Unless you are mean naive and simplistic hashes, that is an overstatement.
As long as you want to accept mail from strangers, no spam filter can
perfectly predict whether copies of the next message from a stranger
are being sent to 30,000,000 of your intimate friends, but the various
hashing filters do some good work.

An estimate of the effectiveness of a large scale filter can be obtained
from what it sees as the spam ratio.  If it claims that 60% of all
mail is spam but the real ratio is 70%, then it must be 85% effective.

 

Concerning false positives for this mailing list--it would be wise to
define what mail is legitimate.  In many places, you must accept at
least 99.9% of all even remotely legitimate mail.  However, this context
is different.  Here a boolean good/spam is simplistic and wrong.
Instead we have a spectrum:
  1. on-topic messages from subscribers
  2. on-topic messages from non-subscribers
  3. noise from subscribers
  4. noise from non-subscribers
  5. pure spam such as advertisements for loan sharks

In this list, only #1 is clearly good. It is good to avoid rejecting
#2, but there is surely no harm in sometimes delaying #2.  If the
senders of any rejected or false positive #2 received an informative
non-delivery report so that they could retransmit, what would be the harm?

SpamAssassin is reported to be better than 60% accurate.  #2 is surely
rare compared to #1.  Thus, as long as SpamAssassin white-lists all
subscribers, there would be no harm in the occasional rejection of #2.


Vernon Schryver[EMAIL PROTECTED]



Re: What eMail is legitimate

2003-12-18 Thread Vernon Schryver
 From: John Leslie [EMAIL PROTECTED]

 ...
This is where I must disagree. Whitelisting something as easily
 forged as the From address is simply wrong -- and if it is published
 rule, we're sure to see spammers forging whitelisted From addresses
 as their standard operating practice.

As is true of many theories about what spammers do or will do, practice
differs from (simplistic) theory.  In the real world, whitelisting by
sender works fine and is not abused often enough to matter.  Whether
it works today because it is rarely used is a secondary issue good for
no more than trying to predict the future.

Yes, I know that spammers often forge source addresses.  I get more
than my fair share of demands from lusers that I unsubscribe them from
this or that stream of porn or other offensive spam.  Nevertheless,
such problems are trivial in this context.

That reasoning involves a second error common to IETF talk about spam
and mailing list noise.  It is the academic pretense that all failures
are of equal gravity and completely unacceptable.  In this case, the
failure mode that supposedly makes whitelisting by sender unacceptable
is merely leaking a little spam.


If, OTOH, Vernon would like to whitelist the combination of From
 address and IP address of the sending SMTP server, that could be a
 very worthwhile practice, virtually immune to spammer forging.

If you mean manual whitelisting, that sounds good in theory, but fails
in practice.  I've experience with various sorts of whitelisting,
because the DCC depends on whitelists to distinguish solicited from
unsolicited bulk mail.  Whitelisting by IP address fails in practice
because so much bulk mail comes from so many different and changing
SMTP clients.  For an example at the small end of the spectrum of
 bulk mail sources, I've had to regularly change the whitelisting
for IETF mailings.  Bigger legitimate bulk mailer often have too
many SMTP clients for outsiders to count, not to mention manually
whitelist.  You must find other ways to whitelist them.

However, whitelisting bulk mail by IP address is trivial compared to
whitelisting private mail by IP address.  I use greylisting (see
http://www.dcc-servers.net/dcc/greylist.html ) which can be described
as automated whitelisting by the triple (sender,sender-IP-address,target).
It works well, but only because it is automated and it uses 4yz soft
failures.  Many ISPs start sending a single message from one IP address
and switch to another after a few minutes--lather and repeat for up
to half a dozen different IP addresses for a single message.  It would
be hopeless to try to manually whitelist the IP addresses used by
customers of such ISPs.  The ISPs that do this sort of thing are among
the largest.


Vernon Schryver[EMAIL PROTECTED]



Re: Re[2]: www.isoc.org unreachable when ECN is used [was: Re: ITU takes over?]

2003-12-11 Thread Vernon Schryver
 From: [EMAIL PROTECTED] (Scott Bradner)

  Yes, but if you're a firewall that stepped into a temporal stasis box
  before 3168 was published, you're still thinking that the bits are
  reserved, 

 woe be to new applications through such a firewall

Yes, such junk no doubt has worse defects than having been built by
idiots who can't understand the difference between reseved for now
and must be zero forever.

Or perhaps charletans who want their marks to install new versions of 
their malware every few months...or weeks...or days.


Vernon Schryver[EMAIL PROTECTED]

P.S. Don't mind me.  I'm just peeved because some large cable modem
 providers seems to be following the technical advice of trade
 rag espurts and filtering all UDP packets above port 1024.  
 Why 1024?--I've no idea that's not an insult to whomever thinks it.



Re: howto WLAN, several subnets

2003-11-21 Thread Vernon Schryver
 From: Alexandru Petrescu [EMAIL PROTECTED]

 ...
 Rogue malicious wily ruthless users skilled enough to configure hostap
 can rightfully be blamed; but not the novice user turning on
 a particular vendor's laptop.

That may be true in some situations, but should it be tolerated at
the IETF?  Why shouldn't such behavior be prima facie evidence of
insufficent interest or experience in the business of the IETF to be
allowed to participate?

Even in other situations, that sort of behavior is the direct cause
of most of the current security and spam problems on the Internet.
If people would not run user friendly products that have designed
and implemented such gross negligence that they execute with full
system privileges any data that happens to come along, then there
would be as many worms, virus, and spam amplifiers in general on the
Internet as there are among UNIX based products.

So a Modest Proposal: Discover which user friendly products were
responsible for your troubles and ban everything from their maker(s)
from the next meeting.  Ban any person who breaks that ban at the next
meeting from the following 3 meetings.


(Cue cries about the business of the IETF including educating the masses,
the complete unfairness of holding anyone accuntable for anything,
and the need to be open to innovation.)


Vernon Schryver[EMAIL PROTECTED]



Re: FYI: BOF on Internationalized Email Addresses (IEA)

2003-10-31 Thread Vernon Schryver
 From: [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED]

 ...
 Are we doing *anybody* favors ...

Contrary to super heated claims about unfairness and disenfranchisement,
the purposes of this approaching train wreck do not include doing any
users any favors.  At best it is about proving the maturity of the
IETF by inventing a scheme that will make x.400 addresses seem clear
and obvious.

The first and most important thing about train wrecks is that you
don't want to be standing close to where they happen.  After waiving
your lantern at the people in the engine cabs, it's best run as fast
as you can.

The second thing is that after the fire, smoke, and noise settles,
you will see armies of people and equipment working on enormous piles
of debris.

The third thing is that although the debris piles and surrounding
encampments will look permanent, they will disappear almost overnight
and leave almost no sign.  In 5 years, everyone except the most laggard
acolytes of trade rag gurus will have forgotten it.  By then there
will be a new runaway internationalization mail address train about
to derail. 

It's not as if we've not been here before.  It's past time to start
running to get out of the way of this train.  Who knows?  Maybe this
time time the internationalized mail address train won't wreck itself
at the bottom of the pass.

In other words, do all three of these mailing lists need this traffic?


Vernon Schryver[EMAIL PROTECTED]



  1   2   3   4   >