I think this discussion is revealing a deep truth and
avoiding that truth at the same time.
the real root-cause of this discussion is the assertion
of identity as determined by email address.
that's the operational basis for any kind of "subscription"
model based on email address.
the whole
Lloyd,
My explanation was probably a bit too short but it is not only members
who can send mails to the udlr mailing list but also non members as long
as they reply to a confirmation message. Spamers don't reply to
confirmation messages, furtunately.
When I was at INRIA, I was administrating
At 07:44 13/02/01, Lloyd Wood wrote:
You just can't do members-only on IETF WG lists. See recent discussion
on poisson. I'd suggest moving the list elsewhere...
I'm not sure what "members-only" means in your usage.
Self-moderated[1] lists have been permitted for some years in
IETF
Does anyone have a link for a listing of assigned vendor MAC addresses?
Someone said the IEEE has a list, but I was unable to find it on their
website.
Speaking as co-Chair of POISSON, before we go too far down this
discussion right now, POISSON will be taking up the topic of
requirements for IETF mailing lists with the goal of producing a
suitable document (or two or three or whatever).
Please be patient for a short while longer and watch for
Does anyone have a link for a listing of assigned vendor MAC addresses?
Someone said the IEEE has a list, but I was unable to find it on their
website.
If you mean OUIs, the original database is at
http://standards.ieee.org/regauth/oui/oui.txt
there's a searchable version on my site:
At 09:11 13/02/2001 -0500, Mike O'Dell wrote:
today, with many more people having email addresses
and many people having more than one email address
for good and righteous reasons, that model simply
doesn't work anymore. it isn't a "good-bad" thing,
it's a "not applicable at the current scale"
Look for OUIs.
http://standards.ieee.org/regauth/oui/index.shtml
http://standards.ieee.org/faqs/OUI.html
~Randy_
From: Rakers, Jason [mailto:[EMAIL PROTECTED]]
Does anyone have a link for a listing of assigned vendor MAC
addresses?
Someone said
Does anyone have a link for a listing of assigned vendor MAC addresses?
Someone said the IEEE has a list, but I was unable to find it on their
website.
Try:
http://standards.ieee.org/regauth/oui/oui.txt
There's a search interface at:
http://standards.ieee.org/regauth/oui/index.shtml
Try this url
http://standards.ieee.org/regauth/oui/index.shtml
-Original Message-
From: Rakers, Jason [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, February 13, 2001 10:05 AM
To: IETF mailing list (E-mail)
Subject: Media Access Control list
Does anyone have a link for a listing of
Yo Jason!
You can try IANA:
http://www.isi.edu/in-notes/iana/assignments/ethernet-numbers
Or better yet, Cavebear:
http://www.cavebear.com/CaveBear/Ethernet/vendor.html
RGDS
GARY
---
Gary E. Miller Rellim 20340 Empire
Title: RE: Media Access Control list
You can download the public OUI list from here:
http://standards.ieee.org/regauth/oui/index.shtml
-Original Message-
From: Rakers, Jason [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, February 13, 2001 8:05 AM
To: IETF mailing list (E-mail)
Harald Alvestrand wrote:
The mapping address - person is pretty strong, and mostly single-valued.
Interesting. Hypothesis: this might happen because (a) ISPs (in the US) try
to avoid reusing addresses in order to avoid ECPA problems; and (b)
corporations try to avoid reusing addresses because
Hypothesis: this might happen because (a) ISPs (in the US) try
to avoid reusing addresses in order to avoid ECPA problems; and (b)
corporations try to avoid reusing addresses because they'd rather
have email bounce than have confidential information go to the wrong person.
I also wonder
Thanks, this is what I am looking for!
-Original Message-
From: Dunlap, Randy [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, February 13, 2001 1:54 PM
To: 'Rakers, Jason'; IETF mailing list (E-mail)
Subject: RE: Media Access Control list
Look for OUIs.
At 10:30 PM 2/6/2001 +0800, Jun'an Gao wrote:
So transport layer should somehow enhance
the error check and/or correction mechanism.
actually, I would put it in the application layer. I would have the
application include some form of checksum (PGP signature, file CRC,
whatever) to ensure
From: John Stracke [EMAIL PROTECTED]
The mapping address - person is pretty strong, and mostly single-valued.
Interesting. Hypothesis: this might happen because (a) ISPs (in the US) try
to avoid reusing addresses in order to avoid ECPA problems; and (b)
corporations try to avoid reusing
FYI:
To: [EMAIL PROTECTED]
From: Jay Fenello [EMAIL PROTECTED]
Date: Wed, 14 Feb 2001 00:09:41 -0500
Subject: [awpd] Internet Governance - UPDATE
Hello,
For everyone who is interested in what's wrong with our
country, our society, our government, and our world ...
... Senator Conrad Burns
18 matches
Mail list logo