[ NNSquad ] Re: FCC paths to Internet network management? ( from IP )

2008-03-02 Thread Roy J. Tellason
   [ I really don't want to start another round of tit-for-tat arguments
 regarding the portion of the message text below that we've 
 discussed earlier.  But toward the end of this message a new
 topic is broached that I don't believe we've talked about
 directly on this list yet.  That is, ISP bouncing of *outgoing*
 e-mail based on the content -- in this case forbidden URLs
 as determined by a third party.

 Imagine if your obviously steamed-open letter came back from
 the postal service with this insert:

We opened your envelope to make sure that your letter was
 acceptable, and we discovered that according to our
 third-party rating service you mentioned some forbidden
 topics (we won't list them here, you'll need to
 guess!).  So, we're returning your letter to you
 undelivered.  Have a nice day! -- U.S.P.S.

 I suspect that most people receiving their letter back in such
 condition would be outraged.  Should it be any different for
 legal, non-spam e-mail, being sent through ISP servers since
 most subscribers aren't permitted to run their own servers?
 Is declaring outgoing e-mail to be spam based simply on the presence
 of particular URLs acceptable?  Silly?  Sloppy?  Actionable?

  -- Lauren Weinstein
 NNSquad Moderator ]  

On Friday 29 February 2008 01:52, Lauren Weinstein wrote:
 The following is my personal opinion, not a statement on behalf
 of NNSquad.

 At the risk of sounding a bit like Bob Frankston, I don't accept the
 premise that ISPs have any intrinsic right to monitor my
 applications and micromanage my use of the Internet, beyond flow
 control as necessary to keep their networks healthy.  Even the fact
 that a user is choosing to run application A or application B can be
 viewed as an element of content that should be none of the ISPs'
 business.

Agreed!  It has always been my position that what I'm buying is a chunk of 
connectivity,  at a certain level,  and that beyond that what's going through 
the wires is none of their business.  Unfortunately my experience has been to 
the contrary,  with one provider's handling of virus and spam issues 
being so heavy-handed that they interfered with legitimate communications,  
and if I hadn't been talking to the same person by way of fidonet (!) at that 
time I'd never have known.  The provider's suggestion that blacklisting a 
whole cable company in BC was reasonable didn't sound so to me,  nor did 
their solution to the party to hit a web site to remove the block work,  
either.

 Even if users choose to run 24/7 VPNs, with all applications layered
 within those encrypted channels, ISPs' main concerns should be that
 those subscribers' bandwidth usage stays within their contractual
 limits and that their overall throughput is managed to the extent
 necessary to avoid unfair impacts on other subscribers or the network
 itself.

 This implies that any subscriber should be able to run servers if
 they wish.  If a subscriber were determined to be engaging in
 illegal activities or actions that were disrupting other users (e.g.
 spam), they would be subject to appropriate actions, of course, but
 it's inappropriate to treat subscribers as if they were
 untrustworthy crooks on an a priori basis.

Indeed.  In the past few days I received an email from Verizon about them 
changing their TOS,  which strangely enough didn't link to the new one.  A 
quick perusal of it after some digging didn't show much different than what 
I'd remembered from the old one,  but that no servers clause is still in 
there.  They don't,  anywhere that I noticed,  define how they mean that 
term,  and if it turns out to be something that runs without my intervention 
then I'm probably in trouble.

 Disrupting other users by this definition doesn't include the
 simple running of protocols that make heavy use of subscribed
 circuits.  If ISPs have a problem with user throughput, they should
 be able to throttle the speed (not block!) as necessary.

Just so.

 But such throttling rules should be spelled out clearly, so that when a
 person pays for a circuit of a specific advertised up to this speed, they
 have some clue as to what they're actually paying for.

Yes.

 This all doesn't address the problem of how to avoid ISPs managing
 bandwidth in ways that favor their own entertainment and related
 delivery systems over outside services, but that's another story.

 --Lauren--
 NNSquad Moderator

I would also like suggestions as to how I might deal with providers that see 
fit to mess with things based on _content_.  For example,  I have an ongoing 
correspondence right now which had 20 or so posts sittiiing in my sent-mail 
folder,  and Verizon,  for some reason,  decided that it didn't like one of 
them:

Delivery Notification: Delivery has failed
From: [EMAIL PROTECTED]
  To: [EMAIL PROTECTED]
  Date: Today 05:36:19 am
   
This report 

[ NNSquad ] Re: FCC paths to Internet network management? (from IP)

2008-03-02 Thread Brett Glass

At 10:41 AM 3/2/2008, Seth Johnson wrote:


Despite the fact that Vint works for
them.  I'd like to see someone explain how differentiation based on
types of applications would not end net neutrality.


I will explain this for you, and I will try to put it very simply.

Network Neutrality simply means that carriers do not discriminate 
against content providers with which they compete.


It does not mean that they cannot manage their networks; throttle 
or block abusive behavior, protocols, or software; prioritize 
protocols which need near-isochronous bandwidth or are interactive; 
charge different rates for different tiers of service; cache 
content; or provide informative messages to their customers through 
their browsers as they surf.


Those who have sought to include the above restrictions in the 
definition of Network Neutrality are, IMHO, trying to exploit the 
bandwagon for their own purposes -- ideological or financial. Vuze, 
Inc., for example, has no high minded principles; it simply wants 
to avoid paying for the bandwidth it uses.


--Brett Glass

  [ Or to be more precise, that is the personal definition of
Network Neutrality promulgated by Mr. Brett Glass.  In the
broader universe, the term Network Neutrality currently has
various other meanings and implications as well for many persons
involved in these issues, and I for one would never suggest
that my personal definition need be accepted by everyone else.

In fact, Brett is correct to the extent that when the term
first came into widespread use (around the time of the Brand
X case) carrier discrimination was the dominant issue.  Since
then, the term has been widened in many circles to include a
much broader range of issues, and just as various other terms
morph over the years, many observers would suggest that the term
network neutrality has similarly changed to encompass much
more than it did initially.

But we should really be spending our time dealing with specific
issues, and not worrying so much about the names on the
pigeonholes.

 -- Lauren Weinstein
NNSquad Moderator ]


[ NNSquad ] Re: FCC paths to Internet network management? ( from IP )

2008-03-02 Thread Brett Glass
At 02:53 PM 3/2/2008, Roy J. Tellason wrote:

They're running something that looks at the content of my emails and bounces 
it if it doesn't like _some URLs_ that I have in it?  WTF?

This is quite common, actually. RHSBLs are generally very good ways of
detecting spam zombies -- better than, for example, blacklists that rely 
only on IP addresses. The rate of false positives is extremely low.

I'm glad to see that Verizon is being proactive about spam being sent from
their networks. They have, for years, been among the worst offenders --
always at the top of our list of spam sources.

The occasional false positive is well worth it compared to the alternative.
If you don't like it, of course, you can always get a business account on
which the running of a server is permitted -- or use a third party mail
service.

--Brett Glass

P.S. -- I'd be willing to be that it was the .com URL that got
your message blocked. Probably a porn site that's been advertised in
spam.




[ NNSquad ] Re: FCC paths to Internet network management? ( from IP )

2008-03-02 Thread John Meissen
[EMAIL PROTECTED] said:
  Verizon,  for some reason,  decided that it didn't like one of  them

You're misreading the error message:

 Your message cannot be delivered to the following recipients:

  Recipient address: (Snipped for privacy)
  Reason: SMTP transmission failure has occurred
  Diagnostic code: smtp;552 5.2.0 Remote MTA 206.46.252.46: An URL contained 
  in this message is blacklisted by SURBL. See http://www.surbl.org
  Remote system: (Snipped) (impinc04.yourhostingaccount.com NO UCE ESMTP 
  server ready )

That error, and the associated message, was generated by the remote
system, not Verizon.

Mail servers use a number of techniques to detect incoming spam. I know
Barracuda Systems can scan message bodies for blacklisted URLs, because
I know the person who implemented it for them.

Don't complain to Verizon. Complain to the person who you were trying to
send the message to.

john-

  [ John is correct.  On closer inspection, the reject is from the
remote MTA, not the local MTA (Verizon), so it falls into the
more ordinary category of remote MTA spam filtering (however
perhaps over-aggressive in this case).  This appears to be:
impinc04.yourhostingaccount.com, mapping from:

GTE.net LLC GTEN-206-46 (NET-206-46-0-0-1)
  206.46.0.0 - 206.46.255.255
CTN VIO CTN-ENTERPRISE-NETWORKS (NET-206-46-224-0-1)
  206.46.224.0 - 206.46.255.255

While the error message from the remote MTA tells you how to
look at the SURBL blacklist, it doesn't seem to provide any
routine means to contact the MTA admin (good luck with
postmaster these days) to deal with the block.  For point of
reference I've always considered it very bad form to give an MTA
suspected spam reject without providing exception contact info.
Here's the URL and workarounds my MTAs provide whenever they
reject suspected spam:  http://www.vortex.com/mailblock.html .
I wish more sites provided something like this.

  -- Lauren Weinstein
 NNSquad Moderator ]



[ NNSquad ] Re: FCC paths to Internet network management? (from IP)

2008-03-01 Thread Brett Glass

At 11:41 PM 2/29/2008, Robb Topolski wrote:


Above is the link of an FCC filing from Google saying that the FCC should
prevent ISPs from most blocking or prioritizing, and that even though they
already pay a hefty fee for network access (page 24), that P2P applications
like Skype (page 36) are perfectly fine with them.


I've read Google's filing, and they do not at all say what you 
claim. In fact, Google states at the outset that


It should go without saying that Google is a confirmed believer in 
the free market. Unlike some who publicly tout the virtues of open 
markets while endeavoring behind the scenes to keep them closed, 
Google genuinely trusts that the marketplace will provide 
consumers, users, and providers alike with maximum benefits.


In short, Google prefers to let the marketplace sort things out.

What Google is concerned about is that providers such as SBC will 
try to charge Google more to reach its customers, even though it's 
already paying for its backbone bandwidth. It explicitly does NOT 
object to throttling of P2P by ISPs. It says:


Some forms of packet prioritization constitute reasonable business 
practices, because
they utilize objective criteria, and/or do not merely leverage 
unilateral control over last-mile connectivity.  These practices 
include differentiating based on the type of applications and/or 
the quantity  of  bandwidth  purchased  by  the  consumer. 
Other  forms  amount  to  unreasonable discrimination; these 
include differentiation based on the ownership or affiliation of 
the content (who), or the source or destination of the content (the where).


As for Skype: If you actually read Google's comment at Page 36, 
you'll see that P2P is never mentioned and certainly never branded 
as OK. What Google is concerned about, again, is blocking or 
hindrance of content or services by providers that offer similar ones.


--Brett Glass



[ NNSquad ] Re: FCC paths to Internet network management? (from IP)

2008-03-01 Thread Brett Glass
At 12:37 PM 3/1/2008, Kee Hinckley wrote:
 
On Mar 1, 2008, at 12:38 AM, Brett Glass wrote:
Secondly, Google is not in the business of harassing or antagonizing  
ISPs and would be ill advised to do so. ISPs are their customers and  
their way of reaching the rest of the world. Google -- which wants  
to avoid becoming an ISP itself -- needs them as allies.

That's a very odd statement. If Google is truly a customer, then  
presumably you can terminate your contract with them.  How long would  
an ISP survive that didn't allow access to Google?

I don't think you could possibly have understood what I said more
completely, so I will try again. 

ISPs are Google's customers. We advertise there. While we have noticed
some problems with what appears to be click fraud, in general we have
a fine relationship with them. Why would we want to terminate it?

And why on Earth would we not allow access to Google?

Your customers are end-users.  The services you provide are determined  
by what your end-users want.

Of course. It's for our customers' sake that we do what we do --
including P2P mitigation.

I know that ISPs would very much like to make companies like Google their 
customers.

Now, what you are saying is getting even stranger -- or maybe there is
a greater misunderstanding than I thought. Google does not happen to be
one of our customers (though we do develop technology that they might find
useful). But what does that have to do with the present discussion?

[SNIP]

Also, you responded to that post by talking about P2P.  But what Barry  
Gold said was:

Their pages are copyright (at least, the logos and layout are, and I  
suspect a compilation copyright would apply to the information).   
Read up on derivative works.

Unless I screwed up on my threading, he's talking about modifying web  
pages and adding things to them.

Which is not the same thing we're talking about. We're talking about
displaying an informative message (not an ad; we don't spam our users) 
at the top of the browser window, and the page that the user requested 
-- unaltered -- below. 

--Brett Glass



[ NNSquad ] Re: FCC paths to Internet network management? (from IP)

2008-02-29 Thread Ed Jankiewicz

Brett:

I certainly don't advocate breaking contracts in force between a willing 
vendor and customer.  I was speaking in very broad terms about firewall 
behavior; generally everyone agrees that spam and botnet attacks are bad 
and we should try to block them.  I also respect your right and 
responsibility to protect your network from abuse, and to protect your 
customers from each other, but I guess the big debate on this list is 
over what constitutes abuse versus reasonable and allowable use of 
bandwidth, or what constitutes interference versus reasonable and 
allowable network management and protection. 

I am not familiar with your terms of use, nor am I a lawyer so I won't 
debate whether p2p inherently violates them, or whether you have the 
right under those terms to block or throttle packets based on the use of 
particular applications.  If your customers signed that agreement, and 
the terms forbid what they are trying to do, and permit what you are 
trying to do, then they have to live with it.  Perhaps I'll read my ISPs 
terms of use...


I'm glad to see both sides of the debate are allowed to flower here.  As 
Sy Syms says an educated consumer is our best customer (r) (sorry - if 
you are not in his market area see http://www.syms.com/) so we'd all be 
better off (vendors and customers) if everyone meant what they said and 
said what they meant, and customers read and understood the EULA and 
made their free-market decisions. 


Ed J.

Brett Glass wrote:

[A few responses to messages on the list, concatenated for brevity. -BG]

  
snip


Ed J. writes:

  
There should always be a very good reason, mutually acceptable to the network operator and its customers, for any blocking. 



How about that it was agreed to by contract and therefore was
mutually accepted by both parties at the get-go?

snip
--Brett Glass








  




[ NNSquad ] Re: FCC paths to Internet network management? (from IP)

2008-02-29 Thread Brett Glass
At 03:09 PM 2/29/2008, Barry Gold wrote:
 
Hah!  There you go again with a loaded term.  Blocking isn't mitigation, 
it's disruption.

Blocking is the strongest and most complete form of mitigation. Some folks, 
like Comcast, use a much lighter touch, but the value of treading so lightly is 
questionable. We, as an ISP in a rural college town, find that we have to push 
back much harder. P2P would take down our network if we let it.

I notice you ignored that part of my message when you chose what to reply to.

I'd be pretty tedious if I always replied to everything that was said. I'm 
doing an awful lot of replying right now, alas, because many of my colleagues 
on this list who agree with me are choosing to lurk. (I really hope that 
they'll come out of the shadows and post.)

Not that it matters.  You (collectively) just going to make things worse for 
yourselves.  The more you dig into user's bitstreams, the more people will 
switch to IPSec, https, and other encrypted schemes.  

The only motivation for doing this would be that one is violating his agreement 
with his ISP and wants to conceal it. ISPs will also be able to infer what is 
being done by the quantity of the traffic and the behavior of the node. And 
they'll throttle and block it for the sake of their honest customers, who -- 
thankfully -- are the majority.

The really bad thing about this, from my POV, is that you, the little guy, are 
caught in the middle.  YOu can try to be a good guy about P2P and everything 
else, 

We are. We're being a good guy by mitigating P2P (sorry if you don't like the 
term, but since it's the scourge of our network and a violation of our TOS we 
think it's appropriate) so that our honest customers can get good service. 

but what's really going to affect things are the behaviors of Comcast, Time 
Warner, and a couple of other big players. 

And kangaroo courts, such as the one that was held in Boston. What an 
embarrassing, one-sided circus! 

If they decide to start adding advertisements to people's webpages, everything 
will go to https because Google doesn't want other people putting ads on (or 
above) their webpages, 

Whether those ads appear is between the ISP and the customer. It's none of 
Google's business.

and neither does any other major commercial site.  And if they persist in 
resetting P2P sessions, everything will go to IPsec.

No. The miscreants will go to IPSec and thus will become easier to identify.

It's sort of like watching the end of a tragedy, everything just falls down 
and you can see it coming but you can't do anything about it.

I'm doing plenty about it. I'm going to speak out -- for the sake of my 
livelihood and for the sake of my customers. Just as I'm doing here.

--Brett Glass



[ NNSquad ] Re: FCC paths to Internet network management? (from IP)

2008-02-29 Thread Robb Topolski
  Thirdly, Google would lose a big advantage if ISPs were required to allow
  P2P. Right now, Vuze, Inc. is trying to compete with YouTube without
  buying the sort of pipes that Google can afford. It's doing this by
  stealing the bandwidth from users' ISPs. If ISPs are required to allow
  this theft, Google loses its edge.

http://fjallfoss.fcc.gov/prod/ecfs/retrieve.cgi?native_or_pdf=pdfid_document=6519529458

Above is the link of an FCC filing from Google saying that the FCC should
prevent ISPs from most blocking or prioritizing, and that even though they
already pay a hefty fee for network access (page 24), that P2P applications
like Skype (page 36) are perfectly fine with them.





[ NNSquad ] Re: FCC paths to Internet network management? (from IP)

2008-02-28 Thread Robb Topolski
The FCC should establish the rules necessary to take on the enforcement role
WRT adherence to established Internet Standards as defined by qualified and
recognized standards-setting bodies such as the IETF.  While these standards
do exist and have existed for a long time, these bodies have no enforcement
powers.  The rules were enforced through mutual agreement, and the process
is better reflective of an Internet built upon human-to-human handshake than
it is reflective of a corporate service provider agreement.  As a result,
the only stick to our carrot-and-stick system is trying to convince an
upstream provider or peer to discontinue peering with someone who is
nefariously violating the standards.  

This is not unlike how the FCC handles matters involving authoritative but
non-enforcement bodies in the areas of International Frequency Allocation
(WRT mode, power, content), Amateur Radio Repeater and Packet coordination,
and broadcast standards and practices.  

The FCC specifically should avoid taking on the role of setting such
standards, in that they would be unique and limiting only to the United
States.  Except, however, the FCC may be asked to apply imperfectly-matched
standards to resolve complaints which would set precedent.  For example, the
FCC may need to balance desires to provide -some- low-bandwidth Internet
Services by radio to currently unserved areas, even if it means allowing
that ISP to use technology limiting or prohibiting high-bandwidth
applications over such networks.  

As in the current case, when a question of reasonableness comes up, the FCC
should weigh the claim against both the written standards and its own common
judgment, perhaps after consultation with various experts willing to
testify.  This is not unlike the way it acts in questions of broadcast
decency. 

The above sounds like less of a technical solution than you might have liked
as a technologist, but I believe it is the best direction for the FCC to
take.

Robb Topolski


 -Original Message-
 From: [EMAIL PROTECTED] [mailto:nnsquad-
 [EMAIL PROTECTED] On Behalf Of Lauren Weinstein
 Sent: Wednesday, February 27, 2008 7:53 AM
 To: nnsquad@nnsquad.org
 Cc: [EMAIL PROTECTED]
 Subject: [ NNSquad ] FCC paths to Internet network management? (from IP)
 
 
 From: David Farber [EMAIL PROTECTED]
 To: ip [EMAIL PROTECTED]
 Subject: [IP] the FCC and Comcast  - a query from your editor
 Date: Wed, 27 Feb 2008 09:35:28 -0500
 
 I have heard endless suggestions that the FCC stop what many consider
 improper network management practices by Comcast .. As a former Chief
 Technologist of the FCC I have some understanding of the level of
 technical competence and deapth at the FCC and some understanding of
 the process they and the companies they regulate go through to enforce
 regulations -- long and painful and often producing the opposite
 results intended.
 
 So lets get down to details. What exactly do you want to FCC to do
 about network management. Details -- not just enforce NN -- that is a
 motherhood statement. Details and then  maybe the conversation can get
 meaningful.
 
 ---
 Archives: http://www.listbox.com/member/archive/247/=now
 RSS Feed: http://www.listbox.com/member/archive/rss/247/
 Powered by Listbox: http://www.listbox.com




[ NNSquad ] Re: FCC paths to Internet network management? (from IP)

2008-02-28 Thread Brett Glass

At 07:35 AM 2/27/2008, David Farber wrote:


So lets get down to details. What exactly do you want to FCC to do
about network management. Details -- not just enforce NN -- that is a
motherhood statement. Details and then  maybe the conversation can get
meaningful.


I agree. Let me start by responding to some remarks in Brad 
Templeton's posting to IP, since these responses lay the groundwork 
for a workable solution. I'll follow with seven specific suggestions.


Brad writes:


In this case, with BitTorrent, users trade their spare upstream
bandwidth -- which in many cases, such as the typical DSL ISP is otherwise
going unused and wasted --


This is fundamentally incorrect, and it's important to understand 
this. All bandwidth, and especially upstream bandwidth, is a scarce 
and precious commodity.(This is especially true for ISPs, such as 
mine, which buy economical asymmetrical pipes to support fast Web 
browsing. Without them, many ISPs' balance sheets would go 
negative.) We need absolutely every shred of bandwidth we buy, 
because at the prices we pay we can't afford to waste it.



to other users in exchange for their
upstream bandwidth in return.   (Or, in a pay it forward/golden 
rule situation,
they sometimes just do it out of philanthropy or in the hope of 
promoting a system

where they will be rewarded later.)


Actually, as Brad should be well aware, with BitTorrent the 
contribution of bandwidth isn't voluntary; it is compulsory. And 
just as sharing the copyrighted materials which constitute all 
but a vanishingly small percentage of P2P traffic is not really 
sharing, so too P2P is not sharing one's own bandwidth but taking 
bandwidth from the ISP in violation of its terms of service.



It is commonly incorrectly stated that
this is done to benefit the 3rd party (such as ubuntu.com) but the trade is
really mostly among the users.  The seed gets no means to reward tit for tat.


This is likewise incorrect, particularly in the case of Vuze, Inc. 
-- the most strident of the commercial P2P companies in the current 
debate. Vuze's petition to the FCC is, by its own admission, 
motivated by its selfish economic interests. Unlike YouTube, it 
doesn't want to pay for the upstream bandwidth that's needed to 
deliver its content to customers. BitTorrent's testimony at the 
hearing was likewise self-serving.



What is often missed is the question really comes out of this concept of
the user having spare upstream bandwidth.   Most ISPs sell a flat rate,
upstream package and as such the bandwidth is sold to the customer and
is theirs to use to further their usage of the internet.   In the case
of DSL, the upstream is truly otherwise unused and is lost forever if not
used.


Not true. While the bandwidth of an individual user's telephone 
line may be idle, the provider's upstream bandwidth is being used 
by many such upstream connections and is, if the ISP is optimizing 
its network properly, close to full utilization given normal usage 
that conforms to its terms of service.



With DOCSIS and wireless ISPs this is not as true.


Actually, wireless ISPs are in a much better position than cable 
providers in this regard for two reasons. Our (mostly IEEE 
standard) wireless is flexible in that it can shift bandwidth from 
downstream to upstream as needed and only puts 50 customers on an 
access point, not 500. New access points are also less expensive 
for us than new distribution points are for the cable guys.


However, the cable guys have one insurmountable advantage over us: 
they can bundle
and cross-subsidize. We only do Internet, so if mandatory passage 
of P2P traffic is imposed by regulation, it would raise the cost of 
providing adequate service above our retail prices. We'd be out of 
business in a hurry unless we increased our rates somewhere between 
50% and 100% (depending upon what the rules said).



Some ISPs want to claim you don't really have any spare bandwidth to trade,
that they didn't really sell it to you, that it is theirs, not yours,
in spite of what they advertise.


We never advertise any such thing. In fact, we are very explicit. 
Again, the analogy of an all-you-can-eat buffet is a good one. 
Customers do not own all of the food on the buffet; they only own 
what they, individually, can put in their own stomachs during the 
meal. Everyone who eats must pay to do so. You can only eat what's 
on the buffet; you can't raid the pantry. And there are no doggie 
bags and no smuggling food out to third parties. Not even if those 
third parties are not-for-profit.


If so, there have been calls for them to be clear in their 
advertising about these limits.


The cable companies' ads do point out many of these limitations, 
though they often do it at the bottom in the fine print. Our ISP is 
more explicit; we tell every user, and state very clearly in our 
terms of service, what we restrict.


And, hence, my suggestions with regard to what (if anything) the 
FCC should do with 

[ NNSquad ] Re: FCC paths to Internet network management? (from IP)

2008-02-28 Thread Brett Glass
At 10:48 PM 2/28/2008, Lauren Weinstein wrote:
 

Brett Glass says: Sixth, there should be no obfuscation of P2P.

B!  Sorry, no can do, at least if we're talking about some sort
of enforced ban.  I'm personally not a user of P2P currently, but I
reserve the right to encrypt any or all of my Internet traffic for
security and privacy purposes as I see fit, and most security
consultants worth their salt recommend encrypting as much as
possible, given the nature of the Internet today.

Encrypt the content if you will, but if you try to obfuscate the
fact that you are DOING P2P, in violation of a contract you made
with your ISP, you are being dishonest. And if you announce from
the start your intent to be dishonest, then there can never be
a truce, much less a mutually beneficial agreement. And you will
be exactly the kind of customer whom we will be glad to send
packing. We like doing business honestly, with honest people.

--Brett Glass



[ NNSquad ] Re: FCC paths to Internet network management? (from IP)

2008-02-28 Thread Lauren Weinstein

The following is my personal opinion, not a statement on behalf
of NNSquad.

At the risk of sounding a bit like Bob Frankston, I don't accept the
premise that ISPs have any intrinsic right to monitor my
applications and micromanage my use of the Internet, beyond flow
control as necessary to keep their networks healthy.  Even the fact
that a user is choosing to run application A or application B can be
viewed as an element of content that should be none of the ISPs'
business.

Even if users choose to run 24/7 VPNs, with all applications layered
within those encrypted channels, ISPs' main concerns should be that
those subscribers' bandwidth usage stays within their contractual
limits and that their overall throughput is managed to the extent
necessary to avoid unfair impacts on other subscribers or the network
itself.

This implies that any subscriber should be able to run servers if
they wish.  If a subscriber were determined to be engaging in
illegal activities or actions that were disrupting other users (e.g.
spam), they would be subject to appropriate actions, of course, but
it's inappropriate to treat subscribers as if they were
untrustworthy crooks on an a priori basis.  

Disrupting other users by this definition doesn't include the
simple running of protocols that make heavy use of subscribed
circuits.  If ISPs have a problem with user throughput, they should
be able to throttle the speed (not block!) as necessary.  But such
throttling rules should be spelled out clearly, so that when a person
pays for a circuit of a specific advertised up to this speed, they 
have some clue as to what they're actually paying for.

This all doesn't address the problem of how to avoid ISPs managing
bandwidth in ways that favor their own entertainment and related
delivery systems over outside services, but that's another story.

--Lauren--
NNSquad Moderator

 - - -

 At 10:48 PM 2/28/2008, Lauren Weinstein wrote:
  
 
 Brett Glass says: Sixth, there should be no obfuscation of P2P.
 
 B!  Sorry, no can do, at least if we're talking about some sort
 of enforced ban.  I'm personally not a user of P2P currently, but I
 reserve the right to encrypt any or all of my Internet traffic for
 security and privacy purposes as I see fit, and most security
 consultants worth their salt recommend encrypting as much as
 possible, given the nature of the Internet today.
 
 Encrypt the content if you will, but if you try to obfuscate the
 fact that you are DOING P2P, in violation of a contract you made
 with your ISP, you are being dishonest. And if you announce from
 the start your intent to be dishonest, then there can never be
 a truce, much less a mutually beneficial agreement. And you will
 be exactly the kind of customer whom we will be glad to send
 packing. We like doing business honestly, with honest people.
 
 --Brett Glass