Re: spam

2003-05-29 Thread J. Noel Chiappa
 From: Dean Anderson [EMAIL PROTECTED]

 If the corporation (like hotmail) brings in less than $1 per month from
 each user, pays all .. from this revenue, then quite clearly, there are
 no hidden costs, as you assert.
 Clearly, spam can not cost more than they bring in, in revenue, else
 they would go out of business.
 There are sites that offer email services (unsubsidized), for $1 - $2
 per month. They also have no hidden costs, and no subsidies.

You appear to be deliberately obtuse.

The costs of spam, to the users, include not just the cost of the emailbox,
but also the costs to process the mail. This includes, principally, their time
- a component on which others (including you) are not capable of placing a
value.

If the only cost associated with spam was the cost of storing/forwarding the
email, I'll wager most people wouldn't care.


Anyway, this whole discussion is moot. I'm sure there is rough consensus in
the IETF that getting rid of spam is a good idea. (Maybe a question worthy of
a plenary hum to confirm this.)

The only question left is if there are any *technical* components to doing so
(which would be the IETF's preserve), and, if so, what they are.

Noel





RE: spam

2003-05-29 Thread Sabharwal, Atul
Now to add the mess of spam which we all are doing... NO SPAM.
PLEASE...  It has been a unsolvable problem so far... Just like
Lots of social problems we have e.g. poverty...

Regulation/Discipline rather than technology can solve this one 
as when the Punishment for spamming is bigger than the profit, 
we solve the Problem.  On technology front, all we can do is 
make spamming difficult or filter the spam content better
e.g check for spam on mail servers on transmit, forwarding, 
redirection, receive.  Client level filters would not work.  These
all fall in the area of regulating general purpose Internet content
regulation.  Spam is just misuse of this content.  There are so many
other Internet scams we have.

In short, this should belong in some general purpose Internet Security
Forum discussions.

--
Atul

P.S: These are my personal opinions.

-Original Message-
From: Anthony Atkielski [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, May 27, 2003 1:23 PM
To: IETF Discussion
Subject: Re: spam

Paul writes:

 ... the problem isn't deterring spammers or even
 preventing abuse, but rather designing a new
 interpersonal batch communications system (ibcs?)
 which allows a receiving party to accept or reject
 inbound traffic with some kind of confidence in
 the identity of the sender, the intent of the relay or
 proxy, and the value (to the sender) of the reception.

Designing one is easy.  Getting a billion people around the world to all
implement the system, once designed, is very, very hard.

Additionally, nobody would be willing to accept a single design.  Someone
would claim patent infringement.  Different companies would want to turn it
into a money-making adventure, which would instantly make it unworkable for
most of the world.  Other companies would change the design slightly and
then try to force their own versions as the true standard, in order to
make commercial profits.  It would take forever to do.

Whatever the technical solution might be, I think it would have to be
something that requires only action at the receiving end, not the sending
end.  If you require action at both ends, you lock out 95% of the world's
Internet users at the push of a button.  It's like coming up with a solution
that requires everyone to upgrade to a new version of Windows with a certain
service pack.  It's not going to happen.

As always, be conservative in what you expect, and liberal in what you
accept.

 my own ideas have to do with trustbrokers ...

Trusted third parties are tempting, but that notion opens a tremendous can
of worms.  Personally, there isn't anyone I'd trust as a certification
authority even for strangers.  A PGP model is more tempting, but it would
require more sophistication on the part of users than can reasonably be
expected for 99% of the world's Internet citizens.  Indeed, any trustbroker
plan has this same problem.

Even if the certification is limited to mailers, you still have the above
problem, only with slightly reduced magnitude.

 we (the e-mail producing/consuming community) have
 the technology ...

We can rebuild it.  We can make it better.

Nah.  The Internet acquires more inertia with each passing day.  And the
more inertia it develops, the harder it is to implement any active technical
change (i.e., any change that requires actual modification of multiple
systems around the world).  Kind of like moving everyone to IPv6.

 what we lack, dear ietf, is simply: leadership.

No, we lack a genius who can come up with something that will work without
requiring a change on one billion computers around the world.  Preferably a
genius who won't file a patent on it, too.






What the IETF should do: Amend RFC 2822 (was: Re: spam)

2003-05-29 Thread Doug Sauder
Pardon me if I jump in here and change the direction of this discussion to 
something more relevant.

What the IETF should do: Amend RFC 2822 to change the definition of an
email address in a way that is entirely backward compatible, yet supports
aliases.  I propose a change like the following: (pardon the ambiguity)
addr-spec   =   local-part [ + password ] @ domain

local-part  =   dot-atom / quoted-string / obs-local-part

password=   atom

domain  =   dot-atom / domain-literal / obs-domain

domain-literal  =   [CFWS] [ *([FWS] dcontent) [FWS] ] [CFWS]

dcontent=   dtext / quoted-pair

dtext   =   NO-WS-CTL / ; Non white space controls

%d33-90 /   ; The rest of the US-ASCII
%d94-126;  characters not including [,
;  ], or \
First of all, realize that there are already implementations deployed that
recognize email aliases -- plus aliases in particular.
Second, there are implementations that recognize aliases, but in
incompatible ways.  (Sendmail and Exim recognize a + sign.  Qmail
recognizes a '-' sign.  There are still others.)  Therefore, it is
incumbent on the IETF to update the standard for an email address so that
implementations can interoperate.  There are also new products that depend
on a plus-alias-like mechanism to create useful filters.  Without
standarization, there is the real possibility of products that don't
interoperate.
Third, this definition is entirely backward compatible, so it has
absolutely no impact on existing (correct) implementations.
Fourth, with a standard for aliases, new products can be created, and
perhaps used in creative ways to block spam.  Without a standard, new
products will be created, but they will not interoperate.  I could envision
mainstream products being modified to support plus aliases in a way that
makes it easy for unsophisticated users to use them.  But that won't happen
if there is no chance for interoperability.
Fifth, plus aliases have an impact on the S/MIME standard.  I would like to
get one personal ID certificate and use it with many aliases.  That won't
happen if aliases are not recognized by a change in the standard.  Software
that checks the identity of the sender SHOULD remove the extra password
part when comparing the sender address to the email address in the
certificate.  That would provide the same assurance of the sender's
authenticity, while allowing the sender to create a family of related
aliases.  The way to think about this is, the local-part and the domain
establish identity, while the password is used only in delivery.  If you
think S/MIME is already difficult to use, imagine needing a different
certificate for each alias you use.
How this impacts spam:

I have talked to many individuals about the use of plus aliases.  Most
responses I get fall into two categories: (1) some have never been aware of
plus aliases, and (2) some are aware of them but think they are too
complicated for average users.  On the last point, I am not sure I agree
entirely.  Yes, they are too complicated as things are now.  But good
software designers are able to make complicated things simple.  (There are
already software products that try to make the use of aliases entirely
transparent.)
I think we could explain to unsophisticated users that the extra part in
their email address, if they choose to use it, is a password that keeps
junk out of their inbox.  They will understand that.  We can also explain
to them that if their email account is overrun with spam, they don't have
to change ISPs to get a new email address.  They can just change their
password.  And, I think that the popular email client applications could be
changed to make it very easy to use different aliases.  I'm not a user
interface expert, but I don't see why something as simple as
password-protecting a folder in your inbox should be complicated.  One
thing I do know, is that there are many unsophisticated users who feel
almost helpless against the onslaught of spam.  Some are driven to change
ISPs.  I think many would welcome the opportunity to password-protect a
folder in their inbox, and give out the password to only close relatives
and friends.
Using plus aliases is purely optional.  Users who want things simple
continue life as before -- not using plus aliases.  Users who choose to
receive a limited amount of email on their cell phone or PDA can use an
alias that they give out to only a handful of people.
The IETF is an organization that creates standards.  I believe we need a
standard for email aliases -- using a plus sign or whatever.  With almost
no impact on existing infrastructure, we can give creative anti-spam
engineers a new tool to use, and I am eager to see how such a tool might be
used.  But regardless of what one might think of the potential to control
spam through the use of aliases, creating a standard 

Re: spam - The IETF list is spam!

2003-05-29 Thread Andrew Newton
Anthony Atkielski wrote:
Tim writes:


Can the discussion now retire to the IRTF
anti-spam list?


Does your computer have a Delete key?
Look, you've solved the spam problem too!

-andy




Re: spam

2003-05-29 Thread Iljitsch van Beijnum
On woensdag, mei 28, 2003, at 02:36 Europe/Amsterdam, J. Noel Chiappa 
wrote:

Anyway, this whole discussion is moot.
I couldn't agree more. The bottom line is that most people simply don't 
want to receive spam, often to the degree that they are willing to pay 
extra to get rid of it.

I'm sure there is rough consensus in the IETF that getting rid of spam 
is a good idea. (Maybe a question worthy of a plenary hum to confirm 
this.)

The only question left is if there are any *technical* components to 
doing so
(which would be the IETF's preserve), and, if so, what they are.
It surprises me that so many people are so eager to declare defeat 
before even trying the protocol route. (With current protocols defeat 
is pretty much inevitable.) If we adopt such an attitude in other areas 
as well, we would all refuse to have locks on our doors because they 
don't stop all burglars, and refuse to call the police when someone is 
assaulted on the street because the perpetrator may have a diplomatic 
passport.

The problem with spam isn't that legitimate business are legitimately 
advertising legitimate services. (Although even in those cases I never 
gave them my email address so even this type of spam isn't completely 
above board.) For that, filtering or unsubscribing should keep the 
problem within reasonable bounds. Without forgery it isn't all that 
simple to bypass filters and legitimate businesses lose more than they 
gain from trying to do so.

The problem is that we are subjected to all kinds of filth and scams, 
and the SMTP protocol is severely abused in the process in order to 
avoid filtering. And this is only going to get worse over time, as 
people get more adept at avoiding spam. Spammers then simply have to 
send out more messages and address even more perverse demand to make 
money. Going after them in the real world won't work for the same 
reason that the war against drugs doesn't work: limiting supply only 
increases profit for the remaining suppliers so it's more attractive 
than ever to enter the game. So if we can't get spam under control 
(which isn't the same as eliminating it) by doing something about 
supply or demand, we have to do it in the middle by giving users the 
means to blacklist spammers or whitelist legitimate correspondents and 
make it sufficiently hard to fake an identity to get around this.

I don't think moving to some kind of SMTPng is quite as impossible as 
people seem to think. Receiving wouldn't be a problem anyway because 
the new service would simply fall back to SMTP when delivering 
messages. Most service providers would be thrilled to switch to a near 
spam-free email service given the opportunity, so email between service 
providers wouldn't be the problem. Email between customers and their 
service providers wouldn't be a problem either: here regular SMTP can 
be used together with existing authentication mechanisms. So that 
leaves people running their own mail server: either they have to 
upgrade, or subscibe to an upgraded email service.

About the charging for email thing: this doesn't have to be actual 
money. Doing it with some kind of cryptographic token that is passed 
from sender to recipient should work just as well in making sure people 
can't send many orders of magnitude more email than they receive, and 
this wouldn't have many of the adverse effects of using money for this.

Mabye a BOF would be in order in Vienna?




RE: spam

2003-05-29 Thread Tony Hain
Iljitsch van Beijnum wrote:
 ...
 About the charging for email thing: this doesn't have to be actual 
 money. Doing it with some kind of cryptographic token that is passed 
 from sender to recipient should work just as well in making 
 sure people 
 can't send many orders of magnitude more email than they receive, and 
 this wouldn't have many of the adverse effects of using money 
 for this.

Rather than passing a token, require the mail to be encrypted with the
public key of the recipient. This would do two things, make it expensive
to send mass random mailings, and provide an incentive for the ISPs to
actually deploy a PKI.

 
 Mabye a BOF would be in order in Vienna?

A better idea than leaving the problem to languish as a research topic.

Tony





Re: requiring payment (was spam)

2003-05-29 Thread David Morris
Simon,

The proposals haven't been to eliminate free email, only to provide an
alternative which folks can require be used to send them email if they
haven't established a free relationship with the sender.

In the USA today, it costs $.37 to send a physical mail. I don't think it
unreasonable for someone sending me mail to pay a similar fee and
conversely for me to pay such a fee for each of my posts to the IETF list,
even though I would expect the list to use a free channel to distribute
the result.

I don't believe there is any right to free mail or email service so I
don't see a reason to be overly concerned that a user of a community
computer can't send free email. In addition to the free email channel
which would have to continue to exist, providers of 'no charge' email
services such as the bottom end Yahoo service could offer some number of
free stamps per month combined with credits I suggested for receiveing
postage paid mail, folks with marginal economic situations should be able
to participate in email.

Dave Morris

On Wed, 28 May 2003, S Woodside wrote:


 On Tuesday, May 27, 2003, at 08:51  PM, J. Noel Chiappa wrote:

  Which is precisely why I say that the solution to spam is to charge for
  email. It avoids the whole question of defining what is and is not
  spam.
 
  More specifically, change the email protocol so that when email
  arrives from
  an entity which is not on the email from these entities is free
  list, the
  email is rejected unless is accompanied by a payment for $X (where X
  is set
  by a knob on the machine).

 This would be unfortunate for people who do not have a lot of money.
 Even if the payment were miniscule, 0.01$ or whatever, the payment
 system might require a bank account, or a credit card, etc., to
 participate in. That would effectively block out a substantial
 percentage of the earth's population, people who use community centres,
 libraries, schools, etc. for free access or internet cafes for cheap
 occasional access.

 simon

 --
 www.simonwoodside.com -- 99% Devil, 1% Angel


 ___
 This message was passed through [EMAIL PROTECTED], which is a sublist of [EMAIL 
 PROTECTED] Not all messages are passed. Decisions on what to pass are made solely by 
 Raffaele D'Albenzio.





RE: spam

2003-05-29 Thread Christian Huitema
  The only question left is if there are any *technical* components to
  doing so
  (which would be the IETF's preserve), and, if so, what they are.
 
 It surprises me that so many people are so eager to declare defeat
 before even trying the protocol route. (With current protocols defeat
 is pretty much inevitable.) 


There is an obvious issue with the protocol route: from a protocol point
of view, it is quite hard to distinguish unsolicited commercial e-mail,
which we would label spam, and unsolicited acceptable e-mail, which
could be more than welcome. 





Re: spam

2003-05-29 Thread David Morris

I'd like propose a theory reguarding the success of the junk fax law which
would provide a reason that similar laws reguarding junk email might not
be successful:

There are significant costs associated with the origination of junk faxes
in the the sender must tie up a phone line for the duration of the
transmission and in many/most cases will be originating the fax from a
commercial measured rate phone so that even local calls will cost real
money. A wide area junk fax transmission would include long distance costs
or many remote offices.

On that basis, my theory is that the junk fax law, with the potential for
fines, etc., tipped the economics for the sender sufficiently that the
problem was resolved.

Junk email on the other hand has an extremely low cost of transmission in
the current economic model. Adding laws which establish penalties for
sending junk email will probably send the offenders outside of the reach
of the enforcement authorities. In the US, we already have major
corporations moving shell headquarters offshore to friendly taxing
authorities to avoid MAJOR tax bills and can't even fix the problem when
there are serious economic consequences to the government. Based on that
example and many others, I have no faith that enforcement based penalties
will make a significant difference because the perceived change to the
economics will be minimal.

Dave Morris




Re: The utilitiy of IP is at stake here

2003-05-29 Thread David Morris


On Wed, 28 May 2003, Anthony Atkielski wrote:

 In the future, it may become more and more difficult to find ISPs that
 provide truly unrestrained two-way access to the Internet.

Another potential outcome (other than uninformed government intervention)
if the technical community doesn't participate as appropriate in changing
the economic model. The ISPs will change the economic model to maintain
their own viability.

Dave Morris






Re: spam

2003-05-29 Thread Terry Gray

On Wed, 28 May 2003, Anthony Atkielski wrote:

 The ability to receive e-mail is not a Constitutional right.

The ability to stand outside someone's window and shout or play loud
music all night is not a constitutional right either.  True, the U.S.
government may do that to torture its captives, but most citizens
would consider such activity to be an egregious abuse of 1st amendment
free speech rights.

That's how I think of spam...

-teg

p.s. For those who believe there is no signficant cost to spam, I'd
love to have you put your money where your mouth is.  I've got plenty
of direct costs that are attributable soley to dealing with spam --and
that's not even counting the indirect costs of a Type 1 spam storm
that brought the enterprise to its knees for two days and caused
legitimate email to be lost...

p.p.s. apologies to all for extending this futile debate; I tried
to control myself, but failed.





RE: spam

2003-05-29 Thread Tony Hain
Christian Huitema wrote:
 There is an obvious issue with the protocol route: from a 
 protocol point of view, it is quite hard to distinguish 
 unsolicited commercial e-mail, which we would label spam, and 
 unsolicited acceptable e-mail, which could be more than welcome. 

Which is why we shouldn't even start down that path. The protocol needs
to be basic and simple, but place the bulk of the operational cost at
the origin rather than the current model of placing it at the receiver.
The system needs to let people that are willing to pay the cost at the
origin send whatever they want, but make it indisputably clear who/where
the origin is. The external mechanisms already exist to deal with the
social engineering once the originator can be pinned down.

Tony






RE: spam

2003-05-29 Thread David Morris


On Wed, 28 May 2003, Christian Huitema wrote:

 There is an obvious issue with the protocol route: from a protocol point
 of view, it is quite hard to distinguish unsolicited commercial e-mail,
 which we would label spam, and unsolicited acceptable e-mail, which
 could be more than welcome.

I don't see where the commercial attribute has any significance.
Unsolicited BULK is what I label spam.  While I don't see the effort as
useful, detecting bulk email is probably easier than any attempt to
evaluate its purpose or (content beyond exceeding measures used to
detect the BULK nature).

Correct accurate labeling is a 2nd order solution which can be used to
reduce the people time impact via filtering, but filtering doesn't
eliminate resouce impacts such as consumption of scarce and/or costly
link bandwidth.

Protocol changes can deal with identification, authentication, trust
relationships, interoperable labeling, payment exchange, ... None of these
areas of new/improved protocols require any understanding of purpose or
content. [Perhaps even protocol support for interoperable wrapping of end
user spam nominations as documenation is collected and transfered about
the network.]


Dave Morris




Re: spam - The IETF list is spam!

2003-05-29 Thread Anthony Atkielski
Andy writes:

 Look, you've solved the spam problem too!

That's exactly how I deal with it personally, but not everyone finds this an
acceptable solution, so it would be nice to help them look at other options.




Re: spam

2003-05-29 Thread Anthony Atkielski
Tony writes:

 Rather than passing a token, require the mail to
 be encrypted with the public key of the recipient.

Public-key encryption of an entire e-mail is extremely processor-intensive.
Even conventional encryption is very time-consuming.  You can just hash it
and sign the key.

However, this would be a problem for people in countries that outlaw
encryption.  What would they do?

 ... and provide an incentive for the ISPs to
 actually deploy a PKI.

Who would you trust to certify keys?





Re: spam

2003-05-29 Thread S Woodside
On Wednesday, May 28, 2003, at 02:01  PM, David Morris wrote:

Junk email on the other hand has an extremely low cost of transmission 
in
the current economic model.
There is a difference between the people selling the product, and the 
people sending the spam. Usually not the same people. The SELLERS do 
have a transmission cost as they must pay the spammers to spam people 
for them. Admittedly not much, but the sellers are a much easier target 
than the spammers. Drive their costs up significantly and you dry up 
the spam market by implication (for types 1 and 2, which at least for 
me are the bulk of my 50 or so spams a day).

simon

--
www.simonwoodside.com -- 99% Devil, 1% Angel



Re: spam

2003-05-29 Thread Eric A. Hall

on 5/28/2003 11:17 AM Iljitsch van Beijnum wrote:

 I don't think moving to some kind of SMTPng is quite as impossible as 
 people seem to think.

Although I'm all for an SMTPng, it's important to delineate the benefits
that would be served from such an approach, and also some discussion on
how difficult this would be.

For example, a protocol would not be able to confidently deter the
transfer of unsolicited commercial email over a valid connection by
itself. However, an SMTPng by itself could specifically address the issue
of accountability.

The accountability information could in turn be used to help fight
forgeries, and this information would help to combat some kinds of spam.
It would help get a spammer's account yanked due to AUP violations since
you would be able to prove where the spam came from (assuming the ISP
enforced an AUP that prohibited spam). By the same measure, it would also
be useful for authoritatively rejecting mail from those ISPs who don't
enforce AUPs or who don't prohibit spam, and it would be usefule for
authoritatively rejecting mail from organizations who are known to be
spammers themselves (in these cases, it would effetively allow for better
blacklists). If we had a way to validate the transfer path (such as using
recursive signatures on the transfer path), then the accountability would
be further heightened by allowing us to reject any mail that had passed
through any of the known-offender networks. These would all be
improvements over what we have today, giving us better accuracy in our
rejection policies, but still allowing some spam through the network (eg,
first offenders).

Improved accountability would also substantially improve the enforcement
of anti-spam laws, should any exist. Since the improved accountability by
itself would not be sufficient to stop all spam, there would still be a
need for laws. Those laws would be significantly strengthened by the extra
accountability information. A strong law in conjunction with accurate and
credible filters would cumulatively be very effective in the fight against
spam, possibly even good enough to win the war.

An SMTPng could also help against forgery-related problems. This includes
common spam-related fraud, but also includes outright fraudulent
misrepresentations, worms, etc.

Co-existence with legacy SMTP is a problem. If it easy for spammers to
avoid using SMTPng, then they will stick with legacy SMTP. There are
operational ways for reducing the exposure (including heavily discounting
mail from SMTP during post-transfer filtering), but the hammer of law is
still going to be necessary to kill that problem. At the same time, if we
know that we can't directly fix this in protocol, then there is some
validity to the argument that we can just keep using the existing SMTP and
hope that laws do the rest. In that regard, the substantitive gain from
doing all of the work necessary is in the improved accountability that
SMTP *cannot* provide in its current form (even if all of the options such
as STARTTLS are used).

This is how I think an SMTPng might work:

  C: connect
  C: send certificate
  S: validate host identity
  S: ok
  C: request transfer
  S: ok
  C: send transfer headers
  S: validate sender identity
  S: validate transfer path
  S: validate recipients
  S: ...
  S: ok
  C: send message headers, possibly encrypted/signed
  S: validate headers (eg pass/reject contents)
  S: ok
  C: send message body
  S: ok
  C: close

That gives a lot of data to validate and substantially improves the level
of accountability over anything that SMTP can offer in its current form.

There are lots of other things that could be incorporated once this was
done which would further add to the value proposition. In fact, the
long-term value to an SMTPng would be to address all of the other
mail-related issues that are also already outstanding besides just the
credibility shortcomings. This includes features such as encrypted message
headers (rather than just bodies), true i18n support, per-recipient
message routing (similar to the expiremental MB and other per-recipient
RRs), end-to-end option negotiation across the messaging network (in
addition to the hop-by-hop negotiation we have now), extensible OIDs as
response codes, reduced round-trip latencies, and more.

Things that would probably be needed to support any of this:

  - new transfer protocol syntax (replace HELO with certificate
exchange, for example)

  - optionally a new submission service

  - URI and DNS types for the submission services

  - new message routing services separate from MX routing

  - new message format (separating transfer headers from message
headers from message contents, which are all one unit currently)

  - MIME types for each message component, for compatibility with
legacy mail stores

  - gateway rules for conversion betwen 821 and ng

This is a lot of work for the sole purpose of improving accountability but
it would probably be 

Re: requiring payment (was spam)

2003-05-29 Thread Anthony Atkielski
David writes:

 In the USA today, it costs $.37 to send a physical
 mail. I don't think it unreasonable for someone
 sending me mail to pay a similar fee ...

You can pay me via PayPal.  Looking at my inbox, you owe me $1.48 already.

 ... conversely for me to pay such a fee for each
 of my posts to the IETF list ...

Who would pay the fee for the sending of each post to each list member?
Shouldn't you be paying for that, too, since it is your post?

Looks like the bill is up to $20,000 or so now.  Will that be cash, card, or
check?

 ... even though I would expect the list to use a
 free channel to distribute the result.

Why?  If you want people to pay you, why shouldn't you pay everyone else?





A peer-to-peer trust system model (was: Re: spam)

2003-05-29 Thread Peter Deutsch
g'day,

Christian Huitema wrote:
...
 There is an obvious issue with the protocol route: from a protocol point
 of view, it is quite hard to distinguish unsolicited commercial e-mail,
 which we would label spam, and unsolicited acceptable e-mail, which
 could be more than welcome.

I've sat on this posting, give both the previous volume of the thread,
and the danger of getting too far into implementation discussions on a
general list, but I've seen several postings to the effect that it's
hard to see what we could do at the protocol level. Personally, I think
the problem would benefit from a little lateral thinking, so here's my
cut at it. Those who tire of my ramblings, and don't want a quote from
Tom Lehrer and allusions to Queen Elizabeth and Francis Drake, should
hit n now...


Concepts such as Hashcash or other payment-oriented systems, in which
you try to impose a cost on the sender to screen out bulk mailers, are
interesting enough, but I think they're addressing the wrong problem.
I've personally come to the conclusion that to address this problem
(that is, the decision as to whether I want to accept a message from
you), I don't actually need to know who you are, or even what you're
trying to send me, and I certainly don't need to impose artificial costs
on you (since this looks too much like punishing the innocent for the
crimes of the guilty).

The heart of the issue seems to be:

What I really need to decide is whether I
should trust you enough to start accepting
unsolicited email from you (or more generally,
to start interacting with you for purpose x).


I don't know what Paul Vixie meant by his allusion to a
trusted-introducer model but I'd love to hear more about that, since
I've been working on something that sounds a lot like that and I'd like
to compare notes and seem how much reinventing of the wheel I'm
currently doing (and to thrash the deceased equine a bit, mail I sent to
him died in his maze of twisty little email filters, all the same, so we
seem to have yet another existance proof that this problem is imposing
costs on us and hurting our ability to use the Internet for useful work.
To quote Tom Lehrer, but I digress).


One way I can learn whether I want to interact with you is to invest
some time building up a trust relationship with you (verifying you are
who say you are, etc). Another way would be for me to ask people I
already trust who might know you to issue you a reference.

My conclusion is that we need something along the lines of a
peer-to-peer trust authentication token system which would allow the
first time caller to authenticate him/herself to new MTAs by allowing
him/her to demonstrate his/her prior participation in existing trust
relationships. The idea is to build something more oriented towards
peer-to-peer relationship building, rather than the traditional PKI
central authority model we've seen so far.

In practice, I imagine it would be most practical, if we want to
interact with the traditional store-and-forward email system, for my
friends to issue signed, non-forgable trust tokens (I think I called
them letters of marque in a recent posting, since they convert
pirates to honest businessmen and women, just as Queen Elizabeth did
with Francis Drake... ;-) The redeemer would hand a set of these trust
tokens to me on first contact (you could embed them in the mail header,
or we'd negotiate which trust tokens I accept when you connect, or I'd
publish a list in son-of-DNS which trust groups I'm currently
trusting, etcetcetc).

When I receive such a {set of) trust token{s}, I'd check them to see if
they really do come from folks I trust and otherwise satisfy my current
policy requirements (e.g. I may need at least three valid tokens, or I
may need at least two, including one from somebody in Sweden, etc), and
if so I could start granting the bearer interaction privileges. The
unlying assumption here is that trust is a transitive relationship, and
thus I'd allow myself to build up webs of such trust relationships by
accepting references and references from references, so I wouldn't have
to rely solely on a single, centralized PKI infrastructure.

Now, in practice, I'd like to be able to adjust my policies based upon
the qualitity of your references (say, requiring x references from group
a, but only y references from group b to begin transacting). This has
the beneficial side effect of putting the policy decision making into
the hands of the grantor of privileges. All I require from the issuer of
certificates are that I can prove they come from the issuer, and that
they contain certain information (such as issuer, issue date, TTL, etc)
- the decision about what to do when they're valid rests with the
redeemer.

Obviously I'd also need to be able to issue my own letters of marque,
once I've developed sufficient trust in you (say, after I've experienced
z satisfactory interactions without incident, or maybe when I click a
button in my MUA because I 

Re: spam

2003-05-29 Thread David Morris


On Wed, 28 May 2003, S Woodside wrote:

 On Wednesday, May 28, 2003, at 02:01  PM, David Morris wrote:

  Junk email on the other hand has an extremely low cost of transmission
  in
  the current economic model.

 There is a difference between the people selling the product, and the
 people sending the spam. Usually not the same people. The SELLERS do
 have a transmission cost as they must pay the spammers to spam people
 for them. Admittedly not much, but the sellers are a much easier target
 than the spammers. Drive their costs up significantly and you dry up
 the spam market by implication (for types 1 and 2, which at least for
 me are the bulk of my 50 or so spams a day).

In one sense, you are agreeing with my basic premis .. the economic model
most change. Where we may disagree is whether any particular proposal will
make a significant change is costs. A cursory look at some small portion
of my spam suggests that the SELLERS have a very small physical footprint
in a very high percentage of the cases. Easy to morph into another entity.
Roughly $500 to incorporate in the US which at the minimum provides a
additional layer to the onion which must be removed to get at the real
people involved. If they move the whole operation to some carribean island
nation, it is no big deal to ship many of the products I'm offered these
days. For example, one homeopathic medical (oximoron I know) supply
company uses third party agents to take orders. The base company, which
has been in business for years, ships the product directly to the
consumer. I doubt that such a company would be found guilty of spamming if
one of these agents chose to use spam to generate business.

There are also international communications treaties, first amendment
rights, etc. which I suspect would preclude out and out blocking of
internet traffic from our infamous carribean neighbor.

Hence my conclusion that the only realistic way to alter the economics is
to collect the fee up front using a combination of protocols, social and
legal provisions designed to avoid or absolutely minimize the free
exchange of email/information between related parties.

Such fees could also support the new PKI, server, etc. infrastructure
needed to introduce other aspects of any possible technical solutions.

Dave Morris





Re: spam

2003-05-29 Thread Dean Anderson


On Wed, 28 May 2003, Eric A. Hall wrote:

 You still don't seem to understand the nature of proof, arguing instead
 that the existence of alternatives somehow disproves a matter of fact.
 Again, whether or not you think that the proof is significant is a matter
 of opinion, not a matter of proof.

This is exactly true of your position, but not mine.  Seems you are
looking in a mirror.

* Shannon's theorem is a fact, not an opinion.

* The cost of disks and networks are facts, not opinions.

* The cost of spam is a fact deduced from the costs on disks, networks and
computers. It is a fact, not an opinion.

* Anti-spammers already tried to use costs in 1998, and lost, when
disks, networks, and computers were much more expensive. That is a fact,
not an opinion.

Email, and thus spam, is practically a free service.  Spam costs
practically nothing.   That is a conclusion based on fact, not opinion.

Your attempts to somehow wave about the impressive cost of the
infrastructure to serve millions of users is simply irrelevant smoke, and
forms no justification for limiting spam.  Highways cost money. Postal
Systems cost money.  Telephone systems cost money. The fact that they cost
money is no reason (nor ever was) to ban Highway billboards, Junk Mail,
Junk faxes, or telemarketing.  The costs of highways systems, postal
systems, and telephone systems played no role whatsoever in the laws that
regulate BillBoards, Junk Mail, Junk Faxes, or Telemarketing. All of which
are regulated commercial speech.

--Dean





Re: spam

2003-05-29 Thread John Stracke
Tony Hain wrote:

The protocol needs
to be basic and simple, but place the bulk of the operational cost at
the origin rather than the current model of placing it at the receiver.
 

Hmm.  It's pretty much in the nature of human-to-human communication 
that the receiver is always going to have higher humanpower costs than 
the sender (since it's easier to say something than to understand it); 
so the only way to shift the balance is to impose extra costs on the sender.

In other words, any group chartered to work on such a protocol would be 
*required* to be inefficient.  At last, a charter goal we know we can 
meet! :-)

--
/==\
|John Stracke  |[EMAIL PROTECTED]   |
|Principal Engineer|http://www.centive.com |
|Centive   |My opinions are my own.|
|==|
|A man's concepts should exceed his vocabulary, or what's a|
|metaphor? |
\==/




Re: spam

2003-05-29 Thread Dean Anderson
Apparently, you've taken some axioms from radical antispammers.

--Dean

On Wed, 28 May 2003, John Stracke wrote:

 Dean Anderson wrote:

 In fact, it is an
 axiom that crowds are always wrong.
 
 I *suppose* that's a true statement--somebody somewhere (e.g., you) must
 be working with crowds are always wrong as an axiom.  But those of us
 who know what the word means understand that whether something is an
 axiom has nothing to do with whether it's true.

 --
 /===\
 |John Stracke  |[EMAIL PROTECTED]|
 |Principal Engineer|http://www.centive.com  |
 |Centive   |My opinions are my own. |
 |===|
 |Power corrupts; Powerpoint corrupts absolutely. -- Vint Cerf |
 \===/








Re: spam

2003-05-29 Thread Dean Anderson
Type 1 spammers don't take that discount. When they do, we make them
pay.

Type 1 spammers also seem to (in vast majority) understand that open
relays do not offer any anonymity.  This is the _false_ assertion of
radical anti-spammers, who seem to me to be the abusers.  Chris Neill
(antispammer open relay abuser eventually fired from Verio--he was
ironically, an abuse admin) was shocked to learn he was't anonymous, like
he thought.

The claims made by antispammers about open relays are false. Type 1
spammers seem to get that, judging by their behavior.  But radical
antispammers don't.

--Dean

On Wed, 28 May 2003, John Stracke wrote:

 Dean Anderson wrote:

 We are lucky that spammers don't get a discount
 
 Open relays give them a five-finger discount.

 --
 /===\
 |John Stracke  |[EMAIL PROTECTED]|
 |Principal Engineer|http://www.centive.com  |
 |Centive   |My opinions are my own. |
 |===|
 |Power corrupts; Powerpoint corrupts absolutely. -- Vint Cerf |
 \===/








Re: spam

2003-05-29 Thread Dean Anderson

On Wed, 28 May 2003, Iljitsch van Beijnum wrote:

 It surprises me that so many people are so eager to declare defeat
 before even trying the protocol route.

We tried protocols 5 years ago. They haven't worked.  I've explained why
specifically, and why in theory they can't work.  Now the protocol
designers say that controlling spam wasn't the goal. It was the goal when
they started. Perhaps they should have stayed focused.





Re: spam

2003-05-29 Thread Rick Wesson

dean a small note before i add you to my procmailrc


 On Wed, 28 May 2003, Eric A. Hall wrote:

  You still don't seem to understand the nature of proof, arguing instead
  that the existence of alternatives somehow disproves a matter of fact.
  Again, whether or not you think that the proof is significant is a matter
  of opinion, not a matter of proof.

 This is exactly true of your position, but not mine.  Seems you are
 looking in a mirror.

 * Shannon's theorem is a fact, not an opinion.

 * The cost of disks and networks are facts, not opinions.

 * The cost of spam is a fact deduced from the costs on disks, networks and
 computers. It is a fact, not an opinion.

 * Anti-spammers already tried to use costs in 1998, and lost, when
 disks, networks, and computers were much more expensive. That is a fact,
 not an opinion.

 Email, and thus spam, is practically a free service.  Spam costs
 practically nothing.   That is a conclusion based on fact, not opinion.


your conclusion is incorrect, we have to pay sysadmins to keep spam out of
our mail boxes and in some cases prefessional services to keep spam out of
mailboxes that are real important.

just as my paper shredder and the electricity to run it cost me to process
junk mail and garbage service to throw away the trash. buring it is not an
option in my fair city.

if you wish to continue draw conslusions through falty analysis you may
land in my filters...


-rick








Re: requiring payment (was spam)

2003-05-29 Thread Einar Stefferud
Hello Dave Morris ---

It would be helpful if you would explain how this payment system of 
yours might actually work in real life.

Perhaps like TELEX worked before it died, with settlements between 
the first posing ISP to the last receiving ISP, with settlement 
payments spread across all ISPs in between.

Of course this leads to bilateral agreements among al the thousands of 
ISPs, and collective agreements among the mass of global ISPs.

Now, consider the cost of such arrangements, to cover the frictional 
costs of just being in business, plus the required profit margins that
accrue to any such massive payment shuffling.

Everyone here advocating payments do not seem to understand the overhead costs of 
collecting and distributing the money. 

Be careful of what you wish for! -- You just might get it!

Cheers...\Stef

Simon,

The proposals haven't been to eliminate free email, only to provide an
alternative which folks can require be used to send them email if they
haven't established a free relationship with the sender.

In the USA today, it costs $.37 to send a physical mail. I don't think it
unreasonable for someone sending me mail to pay a similar fee and
conversely for me to pay such a fee for each of my posts to the IETF list,
even though I would expect the list to use a free channel to distribute
the result.

I don't believe there is any right to free mail or email service so I
don't see a reason to be overly concerned that a user of a community
computer can't send free email. In addition to the free email channel
which would have to continue to exist, providers of 'no charge' email
services such as the bottom end Yahoo service could offer some number of
free stamps per month combined with credits I suggested for receiveing
postage paid mail, folks with marginal economic situations should be able
to participate in email.

Dave Morris

On Wed, 28 May 2003, S Woodside wrote:

 
  On Tuesday, May 27, 2003, at 08:51  PM, J. Noel Chiappa wrote:
 
   Which is precisely why I say that the solution to spam is to charge for
   email. It avoids the whole question of defining what is and is not
   spam.
  
   More specifically, change the email protocol so that when email
   arrives from
   an entity which is not on the email from these entities is free
   list, the
   email is rejected unless is accompanied by a payment for $X (where X
   is set
   by a knob on the machine).
 
  This would be unfortunate for people who do not have a lot of money.
  Even if the payment were miniscule, 0.01$ or whatever, the payment
  system might require a bank account, or a credit card, etc., to
  participate in. That would effectively block out a substantial
  percentage of the earth's population, people who use community centres,
  libraries, schools, etc. for free access or internet cafes for cheap
  occasional access.
 
  simon
 
  --
  www.simonwoodside.com -- 99% Devil, 1% Angel
 
 
  ___
  This message was passed through [EMAIL PROTECTED], which is a sublist of [EMAIL 
  PROTECTED] Not all messages are passed. Decisions on what to pass are made solely 
  by Raffaele D'Albenzio.
 




RE: spam

2003-05-29 Thread Tony Hain
Anthony Atkielski wrote:
 Public-key encryption of an entire e-mail is extremely 
 processor-intensive. 

Which is precisely the goal. It is not so extreme as to make routine
mail unusable, but extreme enough to make random bulk mail not worth the
cost.

 Even conventional encryption is very 
 time-consuming.  You can just hash it and sign the key.

That simply provides message integrity, the point is to make the cost
for the bulk sender higher than for the individual receiver. 

 
 However, this would be a problem for people in countries that 
 outlaw encryption.  What would they do?

Break the law, because it is likely they are anyway for anything that
those laws are designed to prevent. ;)

Realistically, those situations would be addressed by including a plain
text copy as well. The agency concerned about enforcing encryption laws
could run the plain text part through the same encryption process and
verify that the output matches. Alternatively, the origin could be
required to encrypt using the enforcement agency key, then have the
enforcement point decrypt  re-encrypt with the receiver's key. Either
way there is enough pain felt at the enforcement point to ensure any
random bulk spam is dealt with locally and quickly.

 
  ... and provide an incentive for the ISPs to
  actually deploy a PKI.
 
 Who would you trust to certify keys?

For the purpose of email through the ISP servers, the ISP would be able
to handle key certification. Those keys may or may not be useful or
meaningful outside the context of services arranged by that ISP. 

Tony





RE: spam

2003-05-29 Thread Paul Hoffman / IMC
At 11:36 AM -0700 5/28/03, Tony Hain wrote:
The external mechanisms already exist to deal with the
social engineering once the originator can be pinned down.
This is good to hear. I thought that the international trusted 
micropayments that would be needed for such a sender-pays system was 
a problem that was yet to be solved.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: A peer-to-peer trust system model (was: Re: spam)

2003-05-29 Thread Einar Stefferud
Hello  Peter --

I hate to be the one to tell you that the following is provably false:

The unlying (sic) assumption here is that trust is a transitive relationship, 

Which leaves a bit of a gapping hole in your entire logical build...

A trusts B and B trusts C  does not imply anything about A trusting C.

Even though you might decide to act on this assumption, believing it is true.

If trust is as transitive as you suggest, then it must also be true that if:
A trust B, and B trust C, and C trust D, and ... ; then A must also trust Z.

When you prover the latter true, then you have a chance at correctness: 
But even that is only true for a chain of 25 relationships.

If this assumption is true, then you must be a very gullible person, 
which I somehow seriously doubt;-)...

Cheers...\Stef

At 11:56 -0700 5/28/03, Peter Deutsch wrote:
g'day,

Christian Huitema wrote:
...
  There is an obvious issue with the protocol route: from a protocol point
  of view, it is quite hard to distinguish unsolicited commercial e-mail,
  which we would label spam, and unsolicited acceptable e-mail, which
  could be more than welcome.

I've sat on this posting, give both the previous volume of the thread,
and the danger of getting too far into implementation discussions on a
general list, but I've seen several postings to the effect that it's
hard to see what we could do at the protocol level. Personally, I think
the problem would benefit from a little lateral thinking, so here's my
cut at it. Those who tire of my ramblings, and don't want a quote from
Tom Lehrer and allusions to Queen Elizabeth and Francis Drake, should
hit n now...


Concepts such as Hashcash or other payment-oriented systems, in which
you try to impose a cost on the sender to screen out bulk mailers, are
interesting enough, but I think they're addressing the wrong problem.
I've personally come to the conclusion that to address this problem
(that is, the decision as to whether I want to accept a message from
you), I don't actually need to know who you are, or even what you're
trying to send me, and I certainly don't need to impose artificial costs
on you (since this looks too much like punishing the innocent for the
crimes of the guilty).

The heart of the issue seems to be:

What I really need to decide is whether I
should trust you enough to start accepting
unsolicited email from you (or more generally,
to start interacting with you for purpose x).


I don't know what Paul Vixie meant by his allusion to a
trusted-introducer model but I'd love to hear more about that, since
I've been working on something that sounds a lot like that and I'd like
to compare notes and seem how much reinventing of the wheel I'm
currently doing (and to thrash the deceased equine a bit, mail I sent to
him died in his maze of twisty little email filters, all the same, so we
seem to have yet another existance proof that this problem is imposing
costs on us and hurting our ability to use the Internet for useful work.
To quote Tom Lehrer, but I digress).


One way I can learn whether I want to interact with you is to invest
some time building up a trust relationship with you (verifying you are
who say you are, etc). Another way would be for me to ask people I
already trust who might know you to issue you a reference.

My conclusion is that we need something along the lines of a
peer-to-peer trust authentication token system which would allow the
first time caller to authenticate him/herself to new MTAs by allowing
him/her to demonstrate his/her prior participation in existing trust
relationships. The idea is to build something more oriented towards
peer-to-peer relationship building, rather than the traditional PKI
central authority model we've seen so far.

In practice, I imagine it would be most practical, if we want to
interact with the traditional store-and-forward email system, for my
friends to issue signed, non-forgable trust tokens (I think I called
them letters of marque in a recent posting, since they convert
pirates to honest businessmen and women, just as Queen Elizabeth did
with Francis Drake... ;-) The redeemer would hand a set of these trust
tokens to me on first contact (you could embed them in the mail header,
or we'd negotiate which trust tokens I accept when you connect, or I'd
publish a list in son-of-DNS which trust groups I'm currently
trusting, etcetcetc).

When I receive such a {set of) trust token{s}, I'd check them to see if
they really do come from folks I trust and otherwise satisfy my current
policy requirements (e.g. I may need at least three valid tokens, or I
may need at least two, including one from somebody in Sweden, etc), and
if so I could start granting the bearer interaction privileges. *** The
unlying assumption here is that trust is a transitive relationship, *** 
and thus I'd allow myself to build up webs of such trust relationships
by accepting references and references from references, so I wouldn't
have to rely solely on 

Re: spam

2003-05-29 Thread Dean Anderson
We are not going to agree.

Those who sincerely want to reduce spam are going to have to choose their
leadership: Those who brought them to technical and political failure, or
those who understand the issues that can be successfully promoted, as I
did as President of the League for Programming Freedom in the 90s.

If it is as I say, and the costs you assert are irrelevant, then you will
lose. If I am wrong, you really should have won in 1998.  No doubt the
1998 leaders think that.  No one has disputed that the costs of spam were
in fact higher in 1998 than they are now. Obviously, you had a stronger
case on the cost issue then, than now.  So, are you going to trust them
again?

Your procmailrc won't have any more effect on that issue now than it did
in 1998, after I was shouted down in 1997.  Same story, different day.
If people are so foolish as to follow Vixie and his crew again, same
result.  We will see.

Shannon's Theorem isn't a popularity contest. It is either applies to
spam, or it doesn't. True or false.  If true, it means your protocol
efforts are a waste of time.  It isn't going to go away, despite your
procmailrc.

If it is false, then I have to wonder why SMTP AUTH didn't have any effect
on spam.  Perhaps, like I alluded, the authors lost focus. I suppose that
could be the case.  Time will reveal the truth of that as well.

But no one has offered any explanation of why Shannon's Theorem doesn't
apply. They have just arm waved that it could be related to Godel's work
on Set Theory. I suppose just about any computer or information science
theorem must be a relative of Godel's work on Set Theory. This doesn't
prove it is either wrong, or doesn't apply to the development of a
spam-free protocol. (The very name spam-free protocol sounds ridiculous).

Unless someone has something new to say, I don't see anything else to say.
People will have to decide for themselves, and take the appropriate
personal action: Start work on a spam-free protocol, or contact me
off-list to work on productive anti-spam lobbying and start working with
the IETF to prevent standarization of gratuitous protocol changes.

--Dean

On Wed, 28 May 2003, Rick Wesson wrote:


 dean a small note before i add you to my procmailrc

 
  On Wed, 28 May 2003, Eric A. Hall wrote:
 
   You still don't seem to understand the nature of proof, arguing instead
   that the existence of alternatives somehow disproves a matter of fact.
   Again, whether or not you think that the proof is significant is a matter
   of opinion, not a matter of proof.
 
  This is exactly true of your position, but not mine.  Seems you are
  looking in a mirror.
 
  * Shannon's theorem is a fact, not an opinion.
 
  * The cost of disks and networks are facts, not opinions.
 
  * The cost of spam is a fact deduced from the costs on disks, networks and
  computers. It is a fact, not an opinion.
 
  * Anti-spammers already tried to use costs in 1998, and lost, when
  disks, networks, and computers were much more expensive. That is a fact,
  not an opinion.
 
  Email, and thus spam, is practically a free service.  Spam costs
  practically nothing.   That is a conclusion based on fact, not opinion.
 

 your conclusion is incorrect, we have to pay sysadmins to keep spam out of
 our mail boxes and in some cases prefessional services to keep spam out of
 mailboxes that are real important.

 just as my paper shredder and the electricity to run it cost me to process
 junk mail and garbage service to throw away the trash. buring it is not an
 option in my fair city.

 if you wish to continue draw conslusions through falty analysis you may
 land in my filters...


 -rick










Re: spam

2003-05-29 Thread Valdis . Kletnieks
On Wed, 28 May 2003 15:12:06 EDT, Dean Anderson said:
 Type 1 spammers don't take that discount. When they do, we make them
 pay.

On Wed, 28 May 2003 15:00:39 -0400, Dean Anderson said:
 Email, and thus spam, is practically a free service.  Spam costs
 practically nothing.   That is a conclusion based on fact, not opinion.

What a strange and interesting world you live in, Dean.  You simply *MUST*
write a guidebook so you can promote tourism there.

Alternatively, if spam is free, what exactly *do* the spammers pay, and
to whom?


pgp0.pgp
Description: PGP signature


Re: The utilitiy of IP is at stake here

2003-05-29 Thread Dave Crocker
Tony,

TH With this type of policy, the operations community is dictating which
TH applications can be run from specific ranges of IP addresses.

Does an ISP have a *right* to specify what applications may be run by
their customers?

Well, certainly an ISP has a right to make specifications concerning
consumption of the ISP's resources, and restrictions of applications
might be seen as falling under this.

That said, yes, this is about as dumb as an ISP's rules can get.
Certainly as cynical and possibly as manipulative.

The question is what the IETF can or should do about bad ISP customer
policies, when those policies do not cause operations problems for the
rest of the Internet?



d/

ps.  When AOL, MSN and Yahoo announced that they were going to lead an
initiative for spam control, it *did* occur to me that the policies that
might be tolerable for their mass-market customers would be entirely
inappropriate and damaging to the rest of the Internet's user base.

--
 Dave Crocker mailto:[EMAIL PROTECTED]
 Brandenburg InternetWorking http://www.brandenburg.com
 Sunnyvale, CA  USA tel:+1.408.246.8253, fax:+1.866.358.5301




Re: spam

2003-05-29 Thread Dean Anderson
Now you are just being obtuse.  But if travel brochures will help you come
to the real world, you should just log off and go outside for a bit.

Spammers pay for their connection, just like telemarketers, and for that
matter, just like Junk Mailers and anyone else.

But the costs of Junk Mail and telemarketing on either infrastructure or
the recipient were not issues, even though those costs are obviously
higher than the corresponding spam costs. It takes more time to take out
the trash, and to answer and hang up the phone, than it does to delete a
spam.  It costs the telephone companies much more to complete a
telemarketing call than it costs ISPs to transport a spam. And it costs
the post office way more to deliver junk mail.

You want to focus exclusively on the Junk Fax law, and take it out of
context, and just completely make up issues (infrastructure costs on
telecoms) that weren't in its passage.

As I've pointed out, the Junk Fax law was unique due to the fact that
unlike either spam, junk postal mail, or telemarketing, faxes consume the
*recipients* paper, and consume the *recipients* ink, and causes the
*recipient* to run out of paper.  This is a unique characteristic to junk
fax, which doesn't apply to spam, or telemarketing, or junk mail.  Junk
faxes don't just borrow the paper, or borrow the use of the answering
machine.  They *consume* the paper and the ink.  And having consuming
these limited resources, they aren't available for other purposes.  Thus,
there is a government interest in the utilization of those resources.

Whatever your hopes otherwise, they are not realistic.

My point (the goal of this whole discussion) is that you simply can't just
hope to wave your arms, quote some impressive numbers about infrastructure
costs, and win by shouting down your opponents. It doesn't work that way
in the world outside mailing lists.  Your opponents are going to analyze
your numbers, point out the irrelevancies and inconsistencies, and
untangle anything that is confusing while you are forced to sit quietly.

And if you somehow lie to the FTC, and get the FTC to exclude your
opponents, as happened recently, they will eventually find out, and that
misinformation will be corrected.  And the antispammers are discredited
(as a consequence of actions by radicals).  Moderates are always expected
to reign in (and rat out) the radicals, whether they anti-spammers,
palestinians, or jewish settlers.  You can be absolutely sure that this
won't happen in Congress, where the DMA maintains a presence.

--Dean

On Wed, 28 May 2003 [EMAIL PROTECTED] wrote:

 On Wed, 28 May 2003 15:12:06 EDT, Dean Anderson said:
  Type 1 spammers don't take that discount. When they do, we make them
  pay.

 On Wed, 28 May 2003 15:00:39 -0400, Dean Anderson said:
  Email, and thus spam, is practically a free service.  Spam costs
  practically nothing.   That is a conclusion based on fact, not opinion.

 What a strange and interesting world you live in, Dean.  You simply *MUST*
 write a guidebook so you can promote tourism there.

 Alternatively, if spam is free, what exactly *do* the spammers pay, and
 to whom?





RE: The utilitiy of IP is at stake here

2003-05-29 Thread Tony Hain
Dave Crocker wrote:
 Tony,
 
 TH With this type of policy, the operations community is dictating 
 TH which applications can be run from specific ranges of IP 
 addresses.
 
 Does an ISP have a *right* to specify what applications may 
 be run by their customers?

Not if it simultaneously wants protection from liability for any content
that the customer might be sending. The ISP is either an immune carrier
of content, or in the content management business, not both. The
transport protocol id and everything past it are only really meaningful
to the endpoints, so that qualifies as content. More below.

 
 Well, certainly an ISP has a right to make specifications 
 concerning consumption of the ISP's resources, and 
 restrictions of applications might be seen as falling under this.

The lines that were crossed here are guilt-by-association, and the
declaration by one ISP that an entire class of another ISPs customers do
not have the right to run a particular app. 

In context, it is clearly the right of a mail server operator to refuse
mail. My concern is more about the precedent where a large ISP decides
that address ranges have particular application semantics. 

 
 That said, yes, this is about as dumb as an ISP's rules can 
 get. Certainly as cynical and possibly as manipulative.
 
 The question is what the IETF can or should do about bad ISP 
 customer policies, when those policies do not cause 
 operations problems for the rest of the Internet?
 

The IETF needs to recognize that the ISPs don't really have a good
alternative, and work on providing one. If they have an alternative and
continue down the path, you are right there is not much the IETF can do.
At the same time, market forces will fix that when customers move to the
ISP that implements the alternative.

 
 
 d/
 
 ps.  When AOL, MSN and Yahoo announced that they were going 
 to lead an initiative for spam control, it *did* occur to me 
 that the policies that might be tolerable for their 
 mass-market customers would be entirely inappropriate and 
 damaging to the rest of the Internet's user base.

MSN  Yahoo have not (yet?) implemented the address range controls. At
least I am not getting any bounces, while my wife is active on a couple
of Yahoo groups and I can still send mail to my MSN account. 

Tony






Re: requiring payment (was spam)

2003-05-29 Thread S Woodside
On Wednesday, May 28, 2003, at 01:42  PM, David Morris wrote:

In the USA today, it costs $.37 to send a physical mail. I don't think 
it
unreasonable for someone sending me mail to pay a similar fee and
conversely for me to pay such a fee for each of my posts to the IETF 
list,
even though I would expect the list to use a free channel to distribute
the result.
Really? I email with people who would not be able to afford $.37 to 
send me an email. (They live developing nations.)

I don't believe there is any right to free mail or email service so I
don't see a reason to be overly concerned that a user of a community
computer can't send free email.
But consider that the internet today is based on widely available free 
email. There would be major changes to the whole email dynamic if that 
changed. Besides people who have different economics at work, Another 
that comes to mind is people who use email interfaces to websites, 
maybe because they're firewalled at work, or they can only use a 
store-and-forward system if they on a sufficiently remote / slow link 
(in a very remote area, this could include researchers as well as 
people who simply live in a very rural place).

simon




Re: requiring payment (was spam)

2003-05-29 Thread David Morris


On Wed, 28 May 2003, Einar Stefferud wrote:

 Hello Dave Morris ---

 It would be helpful if you would explain how this payment system of
 yours might actually work in real life.

One model exists in the postal service operated 'by' each country. Stamps
exist, procedures exist for sharing revenue or whatever when, say, a US
Stamp is used to get mail delivered in Germany. Using the new protocols,
my MUA would drop the mail in the local post box ... the SMTPnew server I
use to send mail. That server would need to authenticate me and verify
that I have money or credit available. That server would be resonsible to
a local epostal clearing house for payment and would initiate delivery
transfer of the post paid email. Could be that an electronic stamp token
is included, generated with the servers private PKI key. It is possibly
reasonable in the current network to insist that all mail delivery be
point to point, but if not, intervening MXlike servers just move the
bundle along.  The final destination SMTPnew server verifies that the
proper postage is attached, mostly a PKI decryption exercise. The stamp
tokens are recorded in a database. Periodically, stamps would be
bundled and sent to the epostoffice, perhaps along with cash, to
get the local epostage meter recharged. Depending on the epostal cost
structure, perhaps each received stamp would be worth 1/2 of a to send
stamp. Based on local SMTPnew operator policy, end users might get 1/4 of
a stamp credit for each received email.

 Perhaps like TELEX worked before it died, with settlements between
 the first posing ISP to the last receiving ISP, with settlement
 payments spread across all ISPs in between.

As implied above, one or a few organizations per nation would provide
clearing services.



 Of course this leads to bilateral agreements among al the thousands of
 ISPs, and collective agreements among the mass of global ISPs.

No, only between the ISPs (where ISP means SMTPnew operator) and the
chosen epostal service. And then tiered between epostal services. Millions
of businesses today use postage meters, humble folks just by stamps.

 Now, consider the cost of such arrangements, to cover the frictional
 costs of just being in business, plus the required profit margins that
 accrue to any such massive payment shuffling.

Of course, there is a cost. And if you will, friction. A new PKI based
trust system will also have added 'frictional' costs to create and
support. My general approach provides a funding mechanism to pay those
costs on a per use basis.


 Everyone here advocating payments do not seem to understand the
 overhead costs of collecting and distributing the money.

I think I understand the costs quite well. One of the protocol design
challenges will to be minimize costs. Probably by appropriate tiering of
responsiblity and granularity of transactions recharging meters.


 Be careful of what you wish for! -- You just might get it!

Hooray!





Re: requiring payment (was spam)

2003-05-29 Thread David Morris
Simon,

I have repeatedly asserted that the current free SMTP service or
equivalent would be preserved. You could choose with any degree of
filtering you choose to accept postage free mail. You could choose to
only accept free mail or all free mail.

I frankly don't see random free mail as an important part of the internet
dynamic. People who who send email from work for personal perposes are
often violating published AUP, even if it is not enforced. They are often
using work time to do personal work. One of the 'hidden' costs of the
internet revolution which is likely to receive more focus over time. I
don't see any reason why protocol design should accomadate theft or
other violations of employer policies.

On Wed, 28 May 2003, S Woodside wrote:


 On Wednesday, May 28, 2003, at 01:42  PM, David Morris wrote:

  In the USA today, it costs $.37 to send a physical mail. I don't think
  it
  unreasonable for someone sending me mail to pay a similar fee and
  conversely for me to pay such a fee for each of my posts to the IETF
  list,
  even though I would expect the list to use a free channel to distribute
  the result.

 Really? I email with people who would not be able to afford $.37 to
 send me an email. (They live developing nations.)

  I don't believe there is any right to free mail or email service so I
  don't see a reason to be overly concerned that a user of a community
  computer can't send free email.

 But consider that the internet today is based on widely available free
 email. There would be major changes to the whole email dynamic if that
 changed. Besides people who have different economics at work, Another

You mean, no more spam? You mean the employers will have a better return
on their investment in payroll? You mean more thought before sticking ones
foot in the electronic mouth?

The point of this proposal is to change the dynamic of email by
associating a small but significant cost with sending mail to folks with
whom one has no established relationship.

 that comes to mind is people who use email interfaces to websites,
 maybe because they're firewalled at work, or they can only use a
 store-and-forward system if they on a sufficiently remote / slow link
 (in a very remote area, this could include researchers as well as
 people who simply live in a very rural place).

They have bigger problems than a charge for email, but if the web site
email server chooses, it can accept free email ... qed ... no problem.

Dave Morris




Re: The utilitiy of IP is at stake here

2003-05-29 Thread Eliot Lear
Tony Hain wrote:
The IETF needs to recognize that the ISPs don't really have a good
alternative, and work on providing one. If they have an alternative and
continue down the path, you are right there is not much the IETF can do.
At the same time, market forces will fix that when customers move to the
ISP that implements the alternative.
This is very well said.  That first sentence could arguably be the credo 
of the IETF, only perhaps not limiting to ISPs.

Eliot






Re: The utilitiy of IP is at stake here

2003-05-29 Thread Steven M. Bellovin
In message [EMAIL PROTECTED], Eliot Lear writes:
Tony Hain wrote:
 The IETF needs to recognize that the ISPs don't really have a good
 alternative, and work on providing one. If they have an alternative and
 continue down the path, you are right there is not much the IETF can do.
 At the same time, market forces will fix that when customers move to the
 ISP that implements the alternative.

This is very well said.  That first sentence could arguably be the credo 
of the IETF, only perhaps not limiting to ISPs.

Yes.  Normally, I'd worry a lot about backwards compatibility.  In this 
case, I think the problems for ISPs -- and users -- are so severe that 
people will switch *rapidly* to a new protocol if it solved most of the 
spam problem.

My new concern is making sure that we get a *good* solution -- one that 
preserves privacy and the end-to-end principle, as well as blocking 
spam.

--Steve Bellovin, http://www.research.att.com/~smb (me)
http://www.wilyhacker.com (2nd edition of Firewalls book)





Re: The utilitiy of IP is at stake here

2003-05-29 Thread Richard Shockey
A
That said, yes, this is about as dumb as an ISP's rules can get.
Certainly as cynical and possibly as manipulative.
The question is what the IETF can or should do about bad ISP customer
policies, when those policies do not cause operations problems for the
rest of the Internet?


In the short term let me plead once again ...

One question is what can or should individual members of the IETF do about 
bad US Congressional policies. In the absence of personal initiates by 
folks like us to Senators and Congressmen..let me assure you they will 
screw things up.

Its not that hard to write a letter, sign it with a return address and put 
a postage stamp on it or make a phone call to a local representatives office..

The US Congress is not very good a dealing with email ..trust me.

they like snail mail...




Richard Shockey, Senior Manager, Strategic Technology Initiatives
NeuStar Inc.
46000 Center Oak Plaza  -   Sterling, VA  20166
Voice +1 571.434.5651 Cell : +1 703.593.2683,  Fax: +1 815.333.1237
mailto:richard(at)shockey.us or mailto:richard.shockey(at)neustar.biz
 http://www.neustar.biz ; http://www.enum.org




Re: The utilitiy of IP is at stake here

2003-05-29 Thread Dave Crocker
Tony and Steve, et al,

TH In context, it is clearly the right of a mail server operator to refuse
TH mail. My concern is more about the precedent where a large ISP decides
TH that address ranges have particular application semantics. 
...
TH The IETF needs to recognize that the ISPs don't really have a good
TH alternative, and work on providing one.

and

SMB Yes.  Normally, I'd worry a lot about backwards compatibility.  In this
SMB case, I think the problems for ISPs -- and users -- are so severe that
SMB people will switch *rapidly* to a new protocol if it solved most of the
SMB spam problem.


Most of this thread is really about legal and customer service issues.
I do not see how it is an IETF topic, no matter how much each of us
might (and do) feel strongly about it.


However I'll join the ranks of those heartily supporting your
conclusion about the absence of good alternatives...

However there is a catch:

  With respect to spam, and many other content-related activities,
  what does it mean to provide a good alternative?

  To answer this means we need to understand the problem very well
  and understand the technical underpinnings of the problem very
  well.

It is easy to note features that are lacking from email, but dangerous
to assume that adding those features will result in their being adopted
or that their adoption will magically fix the problem at hand.

Worse is that, by and large, spam is a topic for which reasoned
discussion -- and especially careful analysis -- is so far proving
impossible in an open forum. Between the formal fuzziness of the topic,
the strong emotion it engenders, and the compulsive self-interest of
many constituencies, the reality is fragmented, heated exchanges, rather
than anything really productive.

Here are some realities that I think we must juggle:

1.  We do not understand the full range of email (ie, electronic
mediated human exchanges) very well at all;

2.  An installed base of 100 million users should be expected to adopt
changes very, very slowly

3. Each change will have large, unintended consequences, most of which
will be undesirable. (This statement is an absolute cliché in serious
discussions about organizational and social change.)

Note that the definition of spam largely depends upon the person making
the definition; unless and until we can develop of reasonably simple
definition that has a) broad acceptance, and b) a largely technical
basis, then it is pure folly for the IETF to think it can do anything
major in this arena.  It might be useful for us to standardize some relatively
straight tools, like a client/filter-server exchange protocol, but we
are not going to achieve really strategic improvements.

I should also note that the last two years have seen at least two
efforts to consider a replacement email service -- or at least an
alternative one -- but that neither seems to have achieved a critical
mass of interest.

And before anyone claims that spam will be the flag around which
Email(ng) troops will rally, I'll ask what changes anyone thinks are
required. As soon as anyone tries to answer that, everyone else should
watch the style of responses they get...

(if you want to save time, just look at the discussion of spam on the
ietf over the last few days. has it been analytic? has it been systemic?
has it been productive? -- except for the thread that Tony just started,
of course.)

d/
--
 Dave Crocker mailto:[EMAIL PROTECTED]
 Brandenburg InternetWorking http://www.brandenburg.com
 Sunnyvale, CA  USA tel:+1.408.246.8253, fax:+1.866.358.5301




Re: requiring payment (was spam)

2003-05-29 Thread John C Klensin
Since Stef has chimed in here, let me point out one other aspect 
of payment systems, one that is more or less the corollary to 
his observation about bilateral agreements.  It is an 
interesting and useful property of the Internet email 
environment that we have SMTP servers all over the place, some 
of them operated at rather large scale and others operated at 
fairly small scale.   In general, anyone can send mail to anyone 
else.

But, as soon as one institutes either charging schemes or 
collections of bilateral agreements, there are huge incentives 
to created hub systems or carriers -- entities whose 
business it is to make agreements with lots of local 
providers/servers (whom they will come to call customers) and 
bilateral agreements with each other.  Without that, everyone 
who wants to run a mail server has to either establish bilateral 
agreements with everyone else, or a regulatory regime becomes 
necessary to make the sequential settlement arrangements work. 
Economies of scale, if only in agreement-making, imply few 
enough, and large enough, carriers for governments to start 
taking interest on a competition or anti-trust or consumer 
protection basis.   Sorry to be pessimistic about this, but I 
think it quickly takes us where we don't want to go.

Quoting Stef, be careful what you wish for...

 john



--On Wednesday, 28 May, 2003 13:04 -0700 Einar Stefferud 
[EMAIL PROTECTED] wrote:

Hello Dave Morris ---

It would be helpful if you would explain how this payment
system of  yours might actually work in real life.
Perhaps like TELEX worked before it died, with settlements
between  the first posing ISP to the last receiving ISP, with
settlement  payments spread across all ISPs in between.
Of course this leads to bilateral agreements among al the
thousands of  ISPs, and collective agreements among the mass
of global ISPs.
Now, consider the cost of such arrangements, to cover the
frictional  costs of just being in business, plus the required
profit margins that accrue to any such massive payment
shuffling.
Everyone here advocating payments do not seem to understand
the overhead costs of collecting and distributing the money.
Be careful of what you wish for! -- You just might get it!

Cheers...\Stef







Re: requiring payment (was spam)

2003-05-29 Thread Einar Stefferud
Thanks John for your support!

I think we should all be careful not to return to the good old days of Telex
bilateral agreements!

Cheers...\Stef

At 22:06 -0400 5/28/03, John C Klensin wrote:
Since Stef has chimed in here, let me point out one other aspect of payment systems, 
one that is more or less the corollary to his observation about bilateral agreements. 
 It is an interesting and useful property of the Internet email environment that we 
have SMTP servers all over the place, some of them operated at rather large scale and 
others operated at fairly small scale.   In general, anyone can send mail to anyone 
else.

But, as soon as one institutes either charging schemes or collections of bilateral 
agreements, there are huge incentives to created hub systems or carriers -- 
entities whose business it is to make agreements with lots of local providers/servers 
(whom they will come to call customers) and bilateral agreements with each other.  
Without that, everyone who wants to run a mail server has to either establish 
bilateral agreements with everyone else, or a regulatory regime becomes necessary to 
make the sequential settlement arrangements work. Economies of scale, if only in 
agreement-making, imply few enough, and large enough, carriers for governments to 
start taking interest on a competition or anti-trust or consumer protection 
basis.   Sorry to be pessimistic about this, but I think it quickly takes us where we 
don't want to go.

Quoting Stef, be careful what you wish for...

 john



--On Wednesday, 28 May, 2003 13:04 -0700 Einar Stefferud [EMAIL PROTECTED] wrote:

Hello Dave Morris ---

It would be helpful if you would explain how this payment
system of  yours might actually work in real life.

Perhaps like TELEX worked before it died, with settlements
between  the first posing ISP to the last receiving ISP, with
settlement  payments spread across all ISPs in between.

Of course this leads to bilateral agreements among al the
thousands of  ISPs, and collective agreements among the mass
of global ISPs.

Now, consider the cost of such arrangements, to cover the
frictional  costs of just being in business, plus the required
profit margins that accrue to any such massive payment
shuffling.

Everyone here advocating payments do not seem to understand
the overhead costs of collecting and distributing the money.

Be careful of what you wish for! -- You just might get it!

Cheers...\Stef




Re: A peer-to-peer trust system model (was: Re: spam)

2003-05-29 Thread Valdis . Kletnieks
On Wed, 28 May 2003 13:33:22 PDT, Einar Stefferud said:

 A trusts B and B trusts C  does not imply anything about A trusting C.
 
 Even though you might decide to act on this assumption, believing it is true.

Mathematically provably true is a term used mostly by mathematicians - which
often means that what they come up with (being mathematicians(*) and thus often
disjoint from reality) is something that may be not usable.  There are a LOT
of transitive trust relationships that may not be *strictly* true, but are
close enough to trust billions of dollars with...

Every time I use a credit card, the entire scheme only works because the
vendor trusts the people at Visa to trust the bank to trust me to actually
pay the bill.  Now mathematically speaking, this scheme is a large crock
of concentrated fertilizer - but you add a few laws making it illegal to
use it to defraud, the various middlemen take 3-4%, write off 1% for bad
debt losses, and you have a system that 99% works and is widely accepted
because that last 1% is just too much effort for too little gain.

 If this assumption is true, then you must be a very gullible person, 
 which I somehow seriously doubt;-)...

The next time you walk into a delicatessen and hand the cashier a piece
of paper printed by some government, and walk out of there holding a
salami and several smaller-denomination pieces of paper and pieces of
metal, think about what size web of trust makes *that* transaction work.

/Valdis

(*) My degree is in math.  I'm allowed to say that. ;)


pgp0.pgp
Description: PGP signature


Re: A peer-to-peer trust system model (was: Re: spam)

2003-05-29 Thread Peter Deutsch
g'day,

Einar Stefferud wrote:
 
 Hello  Peter --
 
 I hate to be the one to tell you that the following is provably false:
 
 The unlying (sic) assumption here is that trust is a transitive relationship,
 
 Which leaves a bit of a gapping hole in your entire logical build...

Not at all, since the assumption of transitive trust is used merely to
prime the pump. Once you start to develop evidence that disagrees with
your assumptions, you are expected to change your trust rules
accordingly. That's actually the heart of the system.

For example, I might start off by trusting mail from a particular
mailing list, and all its participants (say, anyone from my family
mailing list). I would then accept trust tokens from anyone who submits
a valid token from anyone on that mail list. Of course, if anyone used
such a tokento feed me spam, I'd hit the Junk This button on my MUA,
which would in turn tell my MTA to remove both the sender and that trust
token from my trusted list.

Put simply, I'd use a rule that says something like fool me once, shame
on you, fool me twice, shame on me.

Note that this wouldn't prevent any of the folks on that mailing list
from reaching me, it would only prevent my MTA from trusting the
offender's token in the future. You could even tune that by putting
additional policy info in the trust token (you could put in a degree of
trust number, indicating how well you know the bearer, for example).


Now, suppose I wanted to send mail to Paul Vixie. I might just try to
send him mail, but from recent experience, I would expect that to go
something like this: Hi, Paul!, Mail System Error - Returned Mail.

Hmmm...

So, my MTA checks Paul's list of trusted buddies in the new, improved
DNS++, but doesn't recognize anyone in the list as somebody who's issued
me a trust token recently. So, off it goes to the Token Oracle, and ask
her for a trust path between myself and Paul Vixie (trust me, this can
be done. I have a proof of this, but the margins of my screen are too
small to contain it. It's enough for the purposes of this exposition to
note that this is something that can be precomputed so it can be
obtained somewhat efficiently).

So, back comes the Oracle, with the path:

  Peter Deutsch - Einar Stefferud - Randy Bush - Paul Vixie


In other words, there is a trust chain from Einer Stefferud (who trust
me), to Randy Bush (who trusts Einar), to Paul Vixie (who trusts Randy).

Well, that's okay then, since I have a trust token from Einar Stefferud,
because I earned a trust token from you last week and you'd kindly
supplied me with one. Okay, so my MTA again contacts Paul's MTA and
offers it the trust token I have from you, as well as the trust chain.
Now, Paul can elect to accept mail from me, since the path checks out
and the token's good, and we'd be in business. Parenthetically, his MTA
would add the trust token from Einar Stefferud to his keychain for the
next time somebody comes a'calling.

Of course, if Paul reads my mail and decides that I really am as much of
a bozo as he'd feared, he's free to hit *his* Junk This button. This
would revoke my credit, and your trust token to me in his eyes, so he's
free to go back and finish reading the IETF mailing list without any
further direct interruption me. If I really want to reach him again, I
could try to find other paths from the tokens I've got left, until
either I've used up all my friends and acquaintences in a vain attempt
to get Paul's attention, or perhaps until I finally (through constant
allusions to Tom Lehrer) convince Paul Vixie that I'm not so bad after
all (heck, he says, this guy's a dope, but I do like 'Poisoning
Pigeons in the Park'...)


So, trust can be assumed to be transitive to prime the pump. Where you
find that this assumption is not valid, you can use the evidence that
it's not to tune and adjust your list of trusted sources. It's this
tuning over time that would make them more effective and lead to the
predicted success of the technique. 


As a final observation, the transitive nature of the trust is not the
key part of the system. To me, it's the ability to put policy decisions
in the hands of the recipient based upon past experience with trusted
sources, without having those trusted sources participate in the
interaction in real time. This seems to offer simplicity and scaling,
and means we can build this beast and get it out without requiring such
things as a single globally populated PKI, or universal takeup on the
scheme (the degenerative case is to accept everything, as folks do today
- the benefits accrue to the participants proportional to their
participation, but it begins paying off the first time you reject an
unknown sender without a trust token).


So, in summary, trust may not be transitive, but it makes a useful axiom
to kick things off. To paraphrase somebody's point a few hundred
postings ago, something can be an axiom without being true... ;-)


- peterd



-- 

Re: The utilitiy of IP is at stake here

2003-05-29 Thread Eric A. Hall

on 5/28/2003 8:30 PM Richard Shockey wrote:

 Its not that hard to write a letter, sign it with a return address and
 put a postage stamp on it or make a phone call to a local
 representatives office..
 
 The US Congress is not very good a dealing with email ..trust me.
 
 they like snail mail...

As a follow-up to anyone considering it, one office has said that the
anthrax scare has made snail-mail processing even more snail-like on the
hill. Sending postal mail to the home-state office is supposedly much
faster. If it has an in-state return address then it is that much more
likely to get read.

Also, at least some of the senators supposedly get several thousand emails
each week. Interestingly, about half the senators and reps no longer
publish email addresses, and many of them bounce email with a message
saying to resubmit via a web form. Whether this is due to the volume of
political spamming or UCE spamming is left to the reader to ponder.

All of that aside, the one response I've received which doesn't appear to
be completely automated (or at least somebody had to manually choose the
correct automated response) was to email.

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/




Re: A peer-to-peer trust system model (was: Re: spam)

2003-05-29 Thread Peter Deutsch
g'day,

Oops, bad form to follow-up to your own posts, but I just want to make
sure I'm on record as being the first to notice that this is really just
another instantiation of the Six Degrees of Kevin Bacon. In honour of
this observation, my current working name for this system is Bacon
(for the hopefully obvious reason).


I wrote:

 So, back comes the Oracle, with the path:
 
   Peter Deutsch - Einar Stefferud - Randy Bush - Paul Vixie

Sorry Randy, I'm going to drop you from the example. I think it's
funnier if it reads:


   Peter Deutsch - Einar Stefferud - Kevin Bacon - Paul Vixie



And if you don't get this, go read:

   http://www-distance.syr.edu/bacon.html



- peterd


-- 
-
Peter Deutsch   [EMAIL PROTECTED]
Gydig Software

Bungle...
   That's an 'i', you idiot...
  Oh, right. 'Bingle...

- Red versus Blue...

-



Re: spam

2003-05-29 Thread Anthony Atkielski
Tony writes:

 Which is precisely the goal. It is not so extreme
 as to make routine mail unusable, but extreme enough
 to make random bulk mail not worth the cost.

Point taken, although I think conventional encryption would probably a
better choice for this purpose.

I think, though, that a more effective method would be to find something
that one can require on each message and that is not trivially easy for a
computer to do automatically.

For example, the various admininstrations passing through the White House
have long had a policy of establishing a secret number or similar text
that must be placed on any incoming letter that is to be forwarded directly
to the President or his family with minimal screening.  The President and
family then give this number to a select few people.  Any correspondence
without the number goes through all the usual screening.

This works because the number is an out-of-band datum that the average
sender is not likely to have.  It is communicated from human being to human
being, and isn't to be found anywhere in public.  So it cannot be
automatically added by a machine, nor can unauthorized people add it.

A simple e-mail implementation of this would be to place a random string in
the subject line of a message intended for a specific recipient that serves
the same purpose as this secret number.  The string would be different for
each recipient, and the only way to obtain it would be through some
out-of-band process (such as contacting the recipient by phone, or
something).  Since there would be no record of this anywhere that spammers
could harvest, it would be impossible for spammers to include these numbers
on outgoing mail.  Very simple, and very effective.  It would, however, be
nice to have e-mail clients that automated this, by allow for a secret
number field in address books that would make it possible to insert them
automatically on outgoing mail (most clients already provide a way to filter
for such numbers on incoming mail).

Digital signatures and similar authentication would work but are overkill.
All you need is some bit of information that spammers cannot harvest, and
the above random string fits that purpose.  Spammers might pick up your
address on a newsgroup or Web site, but they'd have no way of discovering
your secret number.

 That simply provides message integrity ...

Hash it and sign it with the public key of the recipient.  That would work,
because spammers would not have the public key, whereas legitimate senders
would.

However, I think the secret-number concept described above would be much
similar and would be just as effective.




Re: The utilitiy of IP is at stake here

2003-05-29 Thread Anthony Atkielski
Dave writes:

 The question is what the IETF can or should do
 about bad ISP customer policies, when those policies
 do not cause operations problems for the rest
 of the Internet?

Nothing.  While I'm strongly opposed to such restrictive policies at ISPs, I
don't see how they have anything to do with Internet engineering.  The ITU
does not tell telephone companies that they cannot charge extra for
Touch-Tone service.




Re: The utilitiy of IP is at stake here

2003-05-29 Thread Anthony Atkielski
Tony writes:

 Not if it simultaneously wants protection from
 liability for any content that the customer might
 be sending.

Now that I can fully agree with, although it's not an engineering issue.

ISPs that simultaneously want common-carrier protection from liability AND
the ability to finely dictate what types of traffic they will accept need to
choose one or the other.  Either you screen and restrict the traffic on your
network, but you take full responsibility for whatever is passing over it,
or you just provide raw bandwidth and you are shielded from any claims of
impropriety in the use thereof.  You can't have it both ways, as companies
like Prodigy have discovered.





Re: requiring payment (was spam)

2003-05-29 Thread Anthony Atkielski
David writes:

 One model exists in the postal service operated
 'by' each country.

Have you really thought through how much this would cost in the Internet
world?  It would be a staggering burden, just as it already is for postal
mail.

A large part of what you pay in postage for a letter simply covers the cost
of collecting and verifying the postage for a letter.  And a large part of
the delay in getting the letter to its destination comes from the need to
collect and verify postage.

 As implied above, one or a few organizations
 per nation would provide clearing services.

Monopolies, you mean?  I can imagine the effect on prices.  Then again, I
don't have to imagine, since it has already been done in other domains.
That's another reason why sending a letter costs 37 cents--and that's a
price-controlled monopoly.

 Of course, there is a cost.

The cost is far beyond what you appear to be imagining.

 I think I understand the costs quite well.

I think not.  I hope your ideas are not too widespread.

 Probably by appropriate tiering of responsiblity
 and granularity of transactions recharging meters.

Transactions recharging meters.  With a billion computers talking to a
billion other computers a trillion times a day?

What you are suggesting is a bit like billing for telephone service based on
the content of a conversation, or billing for cable TV based on the stars in
the cast of the show you are watching.




Re: spam

2003-05-29 Thread Valdis . Kletnieks
On Thu, 29 May 2003 06:20:47 +0200, Anthony Atkielski [EMAIL PROTECTED]  said:

 A simple e-mail implementation of this would be to place a random string in
 the subject line of a message intended for a specific recipient that serves
 the same purpose as this secret number. 

This works for the somewhat restricted case of e-mail between people who
already have some out-of-band way of communicating.

You're welcome to extend your proposal to handle bootstrapping
communications between people who haven't before - if the whole intent
of the secret number is so I can ignore email without it so I don't
get spam, people can't send me e-mail to ask me for a secret number
so they can e-mail me...

And if I *still* have to check my mail that doesn't have the number on it,
in case I've missed a request like that, what has this proposal bought me?

 Hash it and sign it with the public key of the recipient.  That would work,
 because spammers would not have the public key, whereas legitimate senders
 would.

Only if it's an *UNPUBLISHED* public key - at which point it just degenerates
into your secret number protocol, with the same bootstrapping issues.


pgp0.pgp
Description: PGP signature


Re: requiring payment (was spam)

2003-05-29 Thread Paul Vixie
[EMAIL PROTECTED] (John C Klensin) writes:

 ..., as soon as one institutes either charging schemes or collections of
 bilateral agreements, there are huge incentives to created hub systems
 or carriers -- entities whose business it is to make agreements with
 lots of local providers/servers (whom they will come to call customers)
 and bilateral agreements with each other.  Without that, everyone who
 wants to run a mail server has to either establish bilateral agreements
 with everyone else, or a regulatory regime becomes necessary to make the
 sequential settlement arrangements work.  Economies of scale, if only in
 agreement-making, imply few enough, and large enough, carriers for
 governments to start taking interest on a competition or anti-trust
 or consumer protection basis.  Sorry to be pessimistic about this, but
 I think it quickly takes us where we don't want to go.
 
 Quoting Stef, be careful what you wish for...

i'm not worried about this.  in fact, i'm *counting* on the existence of a
new class of businesses which i call trust providers or trust brokers
whose only claim to revenue is when they act as a trusted trust aggregator
so that i don't have to attend key signing parties in order to be able to
confidently accept mail based on reasonable certainty of the relay's intent,
the identity of the sender, and the value (to the sender) of the receipt.

will it be abused?  you betcha.  two ways off the top of my head.  first,
as jck says above, there's a lot of antitrust concern if for example verisign
decided to trust-peer with yahoo and noone else, and yahoo did likewise,
in hopes that the two of them could pull a uunet in terms of making everyone
else in the world their customer before a more diverse market can become
established.  fortunately we have the sherman act in the usa and similar
things elsewhere, so, unless microsoft itself decided to play, we're safe.

second, will be a class of trustbrokers who will try very hard to blur the
distinctions as to exactly what they are promising about, so as to feed
you gray spam and reap both the transactional rewards associated with the
work AND kickbacks and bribes from the senders of the gray spam.  these folks
will have to be put out of business the old fashioned way, by poison reverse.
that is, a large number of consumers and other trustbrokers will have to
declare gray promises to have negative value, thus rendering them worthless.

all this goes to show is that there is no silver bullet, no one size fits all,
no magic pill or potion.  as long as we fit breitbart's can be reached by
an ip packet from notation, then we'll have the lower end of the humanity
scale nibbling at our resources, trying to take something and give nothing,
and so on.  however, even though unsolicited fax is dead, consider the
telemarketing field.  when my phone rings, there's a better than even chance
that it isn't a telemarketer.  it's not 100% but it's better than even.  if
we could get that for an ibcs that replaced smtp, i'd be singing in the aisles.

by the way mr. deutsch, there is no reference work available.  i've waved my
arms about this stuff and described it to no less than 1.5 dozen people in
the last six years, at varying levels of bakedness, but i don't want to have
to do the work myself and i met have no success in getting anybody else to
take it on.  therefore there's no formal design, not even a list of criteria,
and nothing's been wrote up, and there's no wheel for you to duplicate, so you
have a clear field and i encourage you to take advantage of the fact that the
rest of the world thinks this is just crackpot stupidity on the march.  please
put me on your friends and family list if you squeeze an IPO out of it, though.
-- 
Paul Vixie



Re: spam

2003-05-29 Thread Doug Sauder
Do we have to solve *the* spam problem?  How about a much simpler, solvable 
problem that perhaps a large majority of email users struggle with?

The hard problem is how to allow people to be generally accessible by email, 
but not so accessible that they get tons of spam.  In other words, how they 
can participate in a public forum -- say a newsgroup or mailing list -- 
allowing other individuals to contact them with non-spam, while keeping the 
spam out.

The easy problem is how to allow two consenting parties to communicate via 
email without interference from spam.  Not everyone feels it's necessary 
that they participate in a public forum.  Many would be happy if just the 
easy problem were solved.

The easy problem has not been solved satisfactorily.  Some options:

1. Get multiple email accounts.  Some are throw-away accounts.  Some are 
closely guarded, but eventually end up compromised.

2. Change email addresses from time to time.  For many users, that, to them, 
means changing ISPs.

3. Just learn to live with spam.

4. Try a filter and live with false positives.

Those are the options available to average email users.  For more capable 
users, there is another option:

5. Some clever ad hoc solution.  Like putting a special string in the 
subject line.

As this easy problem is a truly solvable problem, and one that many people 
care about, why not solve it in a standard way?

See my further comments below...

Anthony Atkielski wrote:
[snip]
I think, though, that a more effective method would be to find something
that one can require on each message and that is not trivially easy for a
computer to do automatically.
For example, the various admininstrations passing through the White House
have long had a policy of establishing a secret number or similar text
that must be placed on any incoming letter that is to be forwarded directly
to the President or his family with minimal screening.  The President and
family then give this number to a select few people.  Any correspondence
without the number goes through all the usual screening.
This works because the number is an out-of-band datum that the average
sender is not likely to have.  It is communicated from human being to human
being, and isn't to be found anywhere in public.  So it cannot be
automatically added by a machine, nor can unauthorized people add it.
A simple e-mail implementation of this would be to place a random string in
the subject line of a message intended for a specific recipient that serves
the same purpose as this secret number.  The string would be different for
each recipient, and the only way to obtain it would be through some
out-of-band process (such as contacting the recipient by phone, or
something).  Since there would be no record of this anywhere that spammers
could harvest, it would be impossible for spammers to include these numbers
on outgoing mail.  Very simple, and very effective.  It would, however, be
nice to have e-mail clients that automated this, by allow for a secret
number field in address books that would make it possible to insert them
automatically on outgoing mail (most clients already provide a way to filter
for such numbers on incoming mail).
As Anthony's suggestion implies, the solution is simple.  It works like 
this: You can get into my email imbox because I authorized you to get in. 
You prove that you are authorized by presenting the secret that I provided 
to you.

While some would prefer to re-engineer the entire Internet mail system, I 
just see that average users would be happy if email from their relatives, 
friends, co-workers, and acquaintances went into one folder, while 
everything else went into another folder, automatically.  Why is that so 
hard to do?  Why isn't it done?

Personally, I think that plus aliases (also called subaddresses) are the 
best way to solve the easy problem.  But I would be thrilled to see the 
problem solved for the sake of Joe Average User by whatever technique: plus 
aliases, secret number in the subject line, new mail header field, or any 
other good idea.  Once that problem is solved sufficiently, we can go back 
to our research problems.

BTW, some commercial enterprises are on to this idea in a big way.  Just as 
one example, there is ZoEmail (www.zoemail.com).

Digital signatures and similar authentication would work but are overkill.
All you need is some bit of information that spammers cannot harvest, and
the above random string fits that purpose.  Spammers might pick up your
address on a newsgroup or Web site, but they'd have no way of discovering
your secret number.

That simply provides message integrity ...


Hash it and sign it with the public key of the recipient.  That would work,
because spammers would not have the public key, whereas legitimate senders
would.
However, I think the secret-number concept described above would be much
similar and would be just as effective.





--
Doug Sauder
Hunny Software, Inc



Re: spam

2003-05-29 Thread Anthony Atkielski
Valdis writes:

 You're welcome to extend your proposal to handle
 bootstrapping communications between people who
 haven't before ...

There isn't any way to automate this without opening the door to spammers.

 ... if the whole intent of the secret number
 is so I can ignore email without it so I don't
 get spam, people can't send me e-mail to ask me
 for a secret number so they can e-mail me...

Correct.  They'll have to ask you in some out-of-band way.  There isn't any
other option.  Any means you provide of obtaining your secret number without
your explicit, out-of-band approval will be used by spammers just as readily
as by anyone else.  There is no unambiguous, automated way to distinguish
between spammers and any other sender of unsolicited e-mail.

 And if I *still* have to check my mail that
 doesn't have the number on it, in case I've missed
 a request like that, what has this proposal bought me?

Not very much, but for people with a small circle of legitimate
correspondents as compared to the volume of e-mail they receive, it might
help.

In the world of postal mail, the same problem of spam exists, and there is
no solution to it.  Political figures, celebrities, and organizations
receive incredible volumes of unsolicited, junk mail; the one and only way
to separate the truly useless mail from legitimate mail is to hire human
beings to sort through it.  There isn't any other way.  And prosecuting
those who send mail improperly doesn't work, either; it stops one entity
from sending mail, but all the rest continue, so the incoming volume does
not decrease.

If you send a letter to the President of the United States, he may not read
it himself, but the letter will definitely be read by a human being.  All
incoming mail is read.  The same is true for all incoming e-mail.  And the
President is not the only one having this done.  Many celebrities have staff
or subcontractors that do nothing but read every piece of incoming mail.
There isn't any other option.  And prosecuting someone who sends mail
illegally, or sends threats, or something like that, does nothing to slow
the flow of mail overall.

It may be that spam is an insoluble problem.  No automated filter can
protect against it.  No after-the-fact prosecution or lawsuits can slow the
flow significantly.  No billing scheme can slow the flow of spam without
equally affecting the flow of legitimate e-mail, because there isn't really
any fundamental difference between the two, except in the eye of the
recipient.




Re: spam

2003-05-29 Thread Anthony Atkielski
Doug writes:

 Do we have to solve *the* spam problem?

I'm beginning to think that it cannot be solved--not technically, and not
legally.  One man's spam is another man's legitimate e-mail.  It's like
censorship.

 The hard problem is how to allow people to be
 generally accessible by email, but not so accessible
 that they get tons of spam.  In other words, how they
 can participate in a public forum -- say a newsgroup
 or mailing list -- allowing other individuals to contact
 them with non-spam, while keeping the spam out.

Agreed.  Most spammers seem to pull addresses from newsgroups, discussion
forums, and Web sites.  Addresses of mine that appear on none of these never
receive any spam.

 While some would prefer to re-engineer the entire
 Internet mail system, I just see that average users
 would be happy if email from their relatives,
 friends, co-workers, and acquaintances went into
 one folder, while everything else went into another
 folder, automatically.

I agree.

 Why is that so hard to do?

It's not.

 Why isn't it done?

Probably because the same people who might easily be able to use such a
system are not receiving spam, anyway, because their e-mail addresses are
invisible to spammers (they don't post to USENET, they have no Web sites,
they've never given their e-mail address to a Web site, and their e-mail
address is largely immune to a dictionary or exhaustive attack).





Re: spam

2003-05-29 Thread John Loughney
Hi,

What is a 'radical anti-spammer'?

--

This is the _false_ assertion of
radical anti-spammers, who seem to me to be the abusers.  Chris Neill
(antispammer open relay abuser eventually fired from Verio--he was
ironically, an abuse admin) was shocked to learn he was't anonymous, like
he thought.

The claims made by antispammers about open relays are false. Type 1
spammers seem to get that, judging by their behavior.  But radical
antispammers don't.

--Dean

On Wed, 28 May 2003, John Stracke wrote:

 Dean Anderson wrote:

 We are lucky that spammers don't get a discount
 
 Open relays give them a five-finger discount.

 --
 /===\
 |John Stracke  |[EMAIL PROTECTED]|
 |Principal Engineer|http://www.centive.com  |
 |Centive   |My opinions are my own. |
 |===|
 |Power corrupts; Powerpoint corrupts absolutely. -- Vint Cerf |
 \===/










Re: A peer-to-peer trust system model (was: Re: spam)

2003-05-29 Thread Einar Stefferud
Hi Peter -- 

Your two additional explanatory messages here were needed to explain 
how you deal with trust transitivity when trust is not simply transitive, 
but might serve to allow you to explore for a path that, when tested by 
trial and error, might find a working transitive case in reality, based 
on more information than the simple assumption of transitivity without 
testing it to obtain more information via additional information 
transmission channels.

So, now you are confirming what I understand about defining trust.

Information, per Shannon, is some specific bits which the recipient did 
not expect to receive.  On this definitional foundation he built a huge 
edifice of mathematics for computing a lot of stuff about the capacities 
of wires and other transmission media, and the design of telephone and 
other communications channels, including how many redundant bits are 
needed to detect and correct errors.

And Trust, per my friend Ed Gerck, is that information, obtained via 
some different channel (or channels), which is required to 
understand and to trust said received information bits that (per Shannon) 
were not specifically expected to be received.

So, what you have done to counter the fact that trust is simply not 
transitive, is to add more channels to the process of communication, 
to obtain the required trust information via other channels, which you 
also state might not prove to induce the desired trust. 

In the specific case you have chosen, I expect that your target will not 
accept your tokens as I have been considered to be the most dangerous 
person on the Internet, per various people.  This means that I might not 
be considered to be trustworthy.

This condition of untrustworthy perceptions is OK with me, but in the 
context of this discussion, you may very well have not gotten your message 
to be accepted by Paul Vixie.

Maybe next time you will succeed, but so far, the odds are against you 
next time too;-)...

So, for all intentions and purposes, trust is not simply transitive.

In part this is because it assumes a single channel, while additional 
channels are required because trust information cannot be meaningfully 
sent via the same channel as carried the information to be trusted.

This is why people typically laugh when a salesman says Trust Me!
Because they intuitively know that self assertion of trustworthiness 
has no value.

Cheers...\Stef

PS:  In this case, it is good that you did follow-up on your own message.
 ...\S




At 20:58 -0700 5/28/03, Peter Deutsch wrote:
g'day,

Oops, bad form to follow-up to your own posts, but I just want to make
sure I'm on record as being the first to notice that this is really just
another instantiation of the Six Degrees of Kevin Bacon. In honour of
this observation, my current working name for this system is Bacon
(for the hopefully obvious reason).


I wrote:

  So, back comes the Oracle, with the path:
  
Peter Deutsch - Einar Stefferud - Randy Bush - Paul Vixie

Sorry Randy, I'm going to drop you from the example. I think it's
funnier if it reads:


   Peter Deutsch - Einar Stefferud - Kevin Bacon - Paul Vixie



And if you don't get this, go read:

   http://www-distance.syr.edu/bacon.html



   - peterd


-- 
-
Peter Deutsch   [EMAIL PROTECTED]
Gydig Software

Bungle...
   That's an 'i', you idiot...
  Oh, right. 'Bingle...

- Red versus Blue...

-




Re: requiring payment (was spam)

2003-05-29 Thread Einar Stefferud
I suggest that those who wish to more fully understand all this trust stuff might find 
it useful to look at http://mcg.org.br/.

Cheers...\Stef


At 6:24 + 5/29/03, Paul Vixie wrote:
[EMAIL PROTECTED] (John C Klensin) writes:

  ..., as soon as one institutes either charging schemes or collections of
  bilateral agreements, there are huge incentives to created hub systems
  or carriers -- entities whose business it is to make agreements with
  lots of local providers/servers (whom they will come to call customers)
  and bilateral agreements with each other.  Without that, everyone who
  wants to run a mail server has to either establish bilateral agreements
  with everyone else, or a regulatory regime becomes necessary to make the
  sequential settlement arrangements work.  Economies of scale, if only in
  agreement-making, imply few enough, and large enough, carriers for
  governments to start taking interest on a competition or anti-trust
  or consumer protection basis.  Sorry to be pessimistic about this, but
  I think it quickly takes us where we don't want to go.
  
  Quoting Stef, be careful what you wish for...

i'm not worried about this.  in fact, i'm *counting* on the existence of a
new class of businesses which i call trust providers or trust brokers
whose only claim to revenue is when they act as a trusted trust aggregator
so that i don't have to attend key signing parties in order to be able to
confidently accept mail based on reasonable certainty of the relay's intent,
the identity of the sender, and the value (to the sender) of the receipt.

will it be abused?  you betcha.  two ways off the top of my head.  first,
as jck says above, there's a lot of antitrust concern if for example verisign
decided to trust-peer with yahoo and noone else, and yahoo did likewise,
in hopes that the two of them could pull a uunet in terms of making everyone
else in the world their customer before a more diverse market can become
established.  fortunately we have the sherman act in the usa and similar
things elsewhere, so, unless microsoft itself decided to play, we're safe.

second, will be a class of trustbrokers who will try very hard to blur the
distinctions as to exactly what they are promising about, so as to feed
you gray spam and reap both the transactional rewards associated with the
work AND kickbacks and bribes from the senders of the gray spam.  these folks
will have to be put out of business the old fashioned way, by poison reverse.
that is, a large number of consumers and other trustbrokers will have to
declare gray promises to have negative value, thus rendering them worthless.

all this goes to show is that there is no silver bullet, no one size fits all,
no magic pill or potion.  as long as we fit breitbart's can be reached by
an ip packet from notation, then we'll have the lower end of the humanity
scale nibbling at our resources, trying to take something and give nothing,
and so on.  however, even though unsolicited fax is dead, consider the
telemarketing field.  when my phone rings, there's a better than even chance
that it isn't a telemarketer.  it's not 100% but it's better than even.  if
we could get that for an ibcs that replaced smtp, i'd be singing in the aisles.

by the way mr. deutsch, there is no reference work available.  i've waved my
arms about this stuff and described it to no less than 1.5 dozen people in
the last six years, at varying levels of bakedness, but i don't want to have
to do the work myself and i met have no success in getting anybody else to
take it on.  therefore there's no formal design, not even a list of criteria,
and nothing's been wrote up, and there's no wheel for you to duplicate, so you
have a clear field and i encourage you to take advantage of the fact that the
rest of the world thinks this is just crackpot stupidity on the march.  please
put me on your friends and family list if you squeeze an IPO out of it, though.
-- 
Paul Vixie