Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 10 Issue 24

  


Computer underground Digest Sun Apr 19, 1998 Volume 10 : Issue 24
ISSN 1004-042X

Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #10.24 (Sun, Apr 19, 1998)

File 1--proposal of technical solutions to spam problem
File 2--Cu Digest Header Info (unchanged since 13 April, 1998)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Tue, 31 Mar 98 21:35:02 -0800
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: File 1--proposal of technical solutions to spam problem

This essay is archived under the "cybernetics" section at
www8.pair.com/mnajtiv/

see bottom for other links


SRN, Self Regulated Network

a proposal of technical solutions to the spam problem

* intro
* what is spam?
* history of spam
* is spam worsening?
* the software problem
* economic approaches
* identification systems
* proposal for a self-regulating network (SRN)
* observations on example informal SRNs
* the connected SRN complaint system
* node statistics databases
* complaint types
* analysis of the mail SRN in operation
* other approaches
* economics of databases and servers
* free speech, privacy, censorship
* conclusion

intro

This paper examines the internet "spam" problem and seeks to find
technical solutions. By technical I am referring to solutions that do
not require social conventions, legislative, or litigatory approaches.
It is an open problem as to whether a technical solution exists,
however I consider the following to outline many excellent
possibilities that haven't been seriously explored (and I wouldn't
agree that a technical solution does not exist until variations on the
following have been exhausted).

I have been using the internet since 1989 and have subscribed to many
mailing lists and newsgroups. IMHO the spam problem has become
progressively worse and I see no reason why this downward spiral will
not continue without proactive action by concerned users. In the past
I have advocated some ideas only to meet various degrees of resistance
and hostility. Maybe the current climate will prove to be more
amenable to a rational discussion of these crucial issues (or perhaps
the opposite). The good news is that many technical solutions may be
available to minimize the problem.

I suspect all easy, localized approaches toward solutions may have
been exhausted by now. I believe a collaborative solution is
necessary.

Personally, I believe that spam legislation has the potential to
actually mar the internet. Even if a law existed, enforcement may be
impossible, or draconian. IMHO legislative solutions should be avoided
at all costs. It could lead to another new government bureacracy that
fails to fulfill its function, not because of ineptitude, but because
of a fundamental impossibility.

what is spam?

It is difficult to define "spam". If a definition precise enough to be
specified in computer code was possible, the problem would probably
not exist, as users could simply run some kind of automated filter to
delete it. Is it "unsolicited commercial email"? This is one
definition that seems clear and reasonable. But it is subject to
similar ambiguity. Suppose I post to a newsgroup and request
information on "fly fishing". I receive a few helpful replies.
However, I continue to receive replies several months later, from fly
fishing companies, long after I am interested in the subject. When did
the email become spam?

Another situation may occur in which I receive lots of "unsolicited
commercial email", but then suddenly receive an offer that I find
extremely valuable. Would I have wished it to be rejected by a filter?

The definition of spam that I will use in this paper will tend to
adhere to two basic ideas around which an automated system can be
developed:

* spam is email that leads to subjective complaints
* spam is email that fits certain objective statistical properties

history of spam

Unfortunately spam is a problem that has existed long before
cyberspace, which the particular economic dynamics of cyberspace has
exacerbated. Spam has existed with postal mail and telephone calls. In
the case of postal mail, at least a cost is involved in the
distribution that may make it economically unviable in a variety of
situations. The phone is similar, although automated systems that
could deliver messages unattended changed the picture somewhat. The
low cost of sending a message in cyberspace means spam is much more
economically viable on the internet. (The "true" cost of email is
subject to debate, but it seems clear that cyberspace message
transmission is inherently inexpensive-- it is much of its reason for
existence.)

If someone could come up with an elegant solution to spam in
cyberspace, there is reason to suppose that it might be implemented in
these other realms as well. Fame, glory, and perhaps riches await
whoever can pull it off. Unfortunately it seems to tend to require
collaborative solutions, something that is eminently feasible and
ubiquitious in cyberspace but difficult to initiate due to a
characteristic independent attitude of internet users. I believe there
is a bias among internet designers and programmers that virtually all
problems can be solved locally, and that the nagging persistence of
spam is a disproof.

is spam worsening?

Spam appears to exhibit an interesting property. In small networks,
apparently social taboo and stigma seems enough to keep people from
spamming. However, as network sizes and degrees of anonymity seem to
increase, the irresponsibility seems to increase as well. In other
words, it's a problem that gets worse as network sizes increase. The
spam situation seems to be a serious challenge to the fundamental
scalability that the internet supposely embodies. This is often
referred to as the "tragedy of the commons" quagmire of social
systems, apparently referring to the tendency of farmers to overgraze
an area with their livestock to society-as-a-whole's detriment (and
even to their own).

No studies exist about the percent of spam in small networks relative
to large ones, but anecdotal experience of users seems to confirm the
basic "the bigger it gets, the greater the proportion of spam" rule.
An obvious reason for this is that a small audience does not make
spamming useful enough to attract the element that perpetrates it.

The internet was started in the mid-1970's as a system that could
theoretically survive a nuclear attack by its seamless and invisible
means of rerouting messages around failure points in the network.
However, an interesting assumption in this configuration is now coming
into focus in hindsight. Original designers assumed all "nodes" on the
network would function according to specification. They did not
consider the possibility that parts of the network might become
"infected" in the sense of not behaving according to standard. Let us
call this a "rogue site". Herein, a site that specializes in spam will
be considered a rogue site.

The problem becomes more serious when there is no overseeing policing
entity. Some people will point to the beauty of the internet as its
freedom from an overseeing agency, but in fact the lack of one may
make it unstable in some ways. It is a hacker's paradise. Consider an
internet site that does nothing but spam or mount denial-of-service
attacks against other sites. There is currently no technical mechanism
by which such a rogue site can be officially "removed" from the
community. Each site must deal with these kinds of attacks
independently. The system as a whole has persisted in spite of this
apparent flaw, but this means of dealing with rogue sites seems
inherently inelegant. IMHO A good, robust new network system should
address the "denial of service" problem at many layers all the way
down to lower level protocols.

However, IMHO the internet community is wise to be wary (at some
times, it seems, almost to the point of paranoia) of centralized
controlling entities of the internet. One of the great values of the
internet is the way in which it has been able to grow organically with
a minimum of overseeing or centralized tracking/intervention. An ideal
solution to the spam problem would be completely distributed and not
require any "spam agency" or similarly unpalatable invention. The
question that arises is, can a community self-police itself? Is there
an equivalent of a "community watch" program for cyberspace? I think
the answer is "yes" with a lot of ingenuity and will elaborate on this
point.

One problem of the internet is that increasing bandwidth has tended to
disguise and exacerbate the spam problem. If more bandwidth is
available, providers can pass increasing amounts of spam messages
without it having any major economic cost. A secret of the internet's
success is a curve of decreasing bandwidth costs. This means that
spam, like all other activities on the net, becomes cheaper and
cheaper. Generally in Usenet software, improved efficiency in
mechanisms for transferring messages have been pursued instead of
approaches for dealing with spam.

the software problem

Currently the large mass of internet sites use a mail program called
Sendmail developed chiefly by Eric Allman. Will all due respect to the
author and maintainers, IMHO the program is an embodiment in awkward
and monolithic legacy software. It features many extremely arcane
syntax rules and inscrutable conventions. Some users take pride in the
system but I currently see it as an obstacle to more sophisticated
email transfer systems. It has not proven agile and able to deal with
new developments and demands. IMHO new email systems with entirely
different approaches embodying flexibility and modularity must be
developed if the spam problem is to be solved in an elegant way.
Ideally market forces could be unleashed to pursue a flexible mail
package with good spam solution.

One of the deficiencies in sendmail is the inability to reject email
based on header information alone. An elegant email delivery system
might involve a sort of handshake going on between a receiver and
sender in which varying degrees of information (such as digital
signatures, passwords, etc.) are exchanged before the receiver agrees
to "accept" the message. The current standards do not really support
this. This allows the practice of "mailbombing" in which a massive set
of email can inundate a mail server.

In some cases, mail servers are configured to "drop on the floor"
without notification of the sender mail messages that are considered
to be possible spam. This seems very extreme-- in a robust system the
sender always ought to know at least if the mail is rejected or not
being delivered.

Many of the limiting aspects of Sendmail are intertwined with the
RFC822 standard for exchanging email. IMHO the RFC822 standard is just
as venerable and limited as Sendmail. Some of the ideas I am proposing
here are equivalent to a enhanced RFC822 standard, which would involve
new headers and new mail exchange protocols. Increased functionality
has a price, but IMHO in this case it's worth it.

economic approaches

Some people propose a "user pays" system in which people who sent the
email would pay for the cost. But in fact the beauty of cyberspace is
the low actual cost associated with merely moving electrons through a
wire. IMHO it is unlikely that the true economic cost of sending email
is actually larger than what spammers are now paying (typically an
internet account). In other words, it is inherently very cheap to move
bits around in cyberspace, and even if spammers were being charged the
"true amount" that it costs to send huge batches of email, I assume it
would only be marginally larger than the cost of their internet
account. In fact, decreases in the cost of network transmission (i.e.
higher bandwidth for less cost) will tend to make spam even more
cost-effective and thereby annoyingly pervasive in time.

Another interesting proposal involves microcurrency. In this idea a
receiver could implement a charge on email. The sender would have to
"enclose" the money required in an email or the email would be
rejected. (This is an example where it makes sense to have a protocol
that can exchange information, such as the microcurrency, before the
message is accepted.) When the respondent might reply to the earlier
sender, he could return the microcharge in his own envelope,
reimbursing the sender. If he feels the person has wasted his time, he
can withhold a return. In this system, email users can put any price
on the scarce commodity involved: their attention.

I consider this a very attractive approach, but unfortunately current
mail protocols do not support this system. Moreover, despite that
microcurrency might involve extremely non-costly economic
transactions, thereby overcoming the major hurdle of implementing it
(resistance to anything costly by users), microcurrency development
and integration into internet protocols has been proceeding extremely
slowly. It seems likely that spam will continue to persist for a long
time before a good universal microcurrency system that is integrated
into internet protocols is developed.

identification systems

One problem associated with mail delivery is the lack of a universal
identity verification system on the internet. Such a system need not
have any Orwellian implications, it might not do anything except
ensure that mail cannot be forged (while still permitting unlimited
pseudonymity by anyone on the internet). Complex issues such as
cryptographic algorithm patents are involved here. It seems likely
that, like microcurrency, such a system will not be implemented in a
semi-universal way for some time. In the meantime, the spam problem
demands an immediate solution.

Once a semi-universal identification system is in place, a good mail
standard would easily support it. If the mail server allowed a
conversation between source and reciever before the message was
actually transmitted, that interaction could easily (and would
presumably by design) contain verification information.

proposal for a self-regulating network (SRN)

The sophisticated technical idea I have been experimenting
conceptually with for several years that may solve the spam problem
and a host of related problems (such as denial-of-service) is what I
call a "self-regulating network" (SRN for short). It is an idea that
avoids the deficiencies of the potential approaches suggested above,
and was designed very specifically to fit into the current
distributed, decentralized nature of the internet. It will tend to
require authentication systems to verify identity but they could be
password-based. Cryptographic systems may improve the security of the
system but hopefully are not entirely necessary.

A SRN is a network that does not assume full future connectivity of
all nodes. It presumes that some nodes currently within the network
may have to be detached at the "discretion" of people running other
nodes. The entire entity is seen as a sort of organism in which nodes
are analogous to cells, and some cells may be cancerous (i.e. those
that participate in acti
here, an FCN is a network that has no such formal regulating mechanism
(it may have informal mechanisms that for purposes here won't be
considered part of the "system"). Indeed, multiple SRN topologies can
exist on top of a FCN in the way that virtual networks exist on top of
the internet. When I describe the operations of the SRN, it should not
be taken to be a proposal for regulating the current internet
connectivity. It is a proposal for creating virtual SRNs on top of the
internet FCN under the discretion and voluntary cooperation of
participants. In particular it will focus on internet providers
creating a SRN, a sort of self-policing electronic guild system.

observations on example informal SRNs

Examples of "informal" SRNs that exist today on the internet are:

* individual site administrators routinely filter packets from
certain rogue sites
* in Usenet, administrators may disconnect rogue sites from the
network
* mail server administrators may bar messages transferred from
unknown sites (or perhaps kick off an existing user) in an attempt
to deal with the spam problem

The characteristic that virtually all these situations have in common
is that they are informal SRNs, and that connectivity is related to
informal judgement. The community, in a sense, measures rogue sites by
observations of the behavior, blocking, and complaints about these
sites. Is there some way to formalize this? The proposal I am focusing
on would create a system in which observations, blocking, and
complaints are not isolated or passed around informally around a
network "out-of-band", but instead considered an inherent part of the
network connectivity system and transmitted/shared in standard
protocols.

The difficulty is that one probably cannot have a centralized
complaint registration server. The potential for abuse is high, and
scalability, the key requirement of network connectivity, is lacking
with this approach.

Hence I have been working on a system for a distributed complaint
system in which there is no centralized complaint server, but
complaints are still recorded in a systematic way. Consider an
application of this to mail servers in which people can complain about
mail emanating from a site to the originating site. The general idea
is that an automated complaint address would exist for each mail
originating site, to which receivers can register complaints in
machine-readable form.

In the current internet, there is a definite "food chain" of providers
connecting to "adjacent" providers. Informally, people may sometimes
complain to an "upstream provider" if they fail to obtain reasonable
results from a complaint to a particular provider. The goal of a SRN
is to encode this informal network in a protocol.

A major problem with informal, localized "blocking" of sites
implemented today is that, inherently, rogue sites are a global
problem. If denial-of-service or other kinds of rogue behavior (e.g.
spamming) are mounted from a site, that's a problem for all sites, and
ideally detection would not have to be inefficiently repeated all over
the internet by each site subject to the attack. Arguably, the failure
of the existing system to deal with this problem robustly, in a global
fashion, is the key to its increasing pervasiveness. Spammers have
odds in their favor when thousands of sites do not cooperate in
detecting or blocking them. The SRN attempts to support global
detection in a fashion resistant to flaws.

the connected SRN complaint system

The SRN would work as follows. A provider is responsible for archiving
complaints sent to itself. A remote site can register a complaint
about mail emanating from a site with that site. The site is
responsible for the accuracy of its own complaint database and
allowing any internet sites to peruse its own complaint database.

Also, a site will keep a database of complaints against its "adjacent
sites", or sites that feed into it. If a remote site can show evidence
that a site failed to record properly a complaint, it can send the
complaint to the "upstream provider" and that provider will register
the complaint. This process can continue until an upstream provider
eventually registers the complaint.

One way to handle the "upstream complaint escalation" described above
is to have a site give a "receipt" of a complaint. The site that
registered this complaint can keep a random number of complaints
around to verify they have stayed archived after a given amount of
time, "pinging" the old complaints. If a complaint is not registered,
the complainee can send the receipt to an upstream site, and the
upstream site can verify the receipt is genuine and that the
downstream site failed to record the complaint.

The complaint databases are accessable to mail delivery servers that
could query the complaint database of an originating site or its
adjacent neighbors in deciding whether to accept a message from it. A
distributed domain-name-server-like system (or member-name-server,
MNS) could be created that records whether various sites are currently
"accepted" as members in the SRN, suitable for fast lookups.

Some kind of system whereby nodes are pushed out of the name database
automatically depending on complaints can be implemented. It would be
possible to have multiple, competing MNS systems that have different
standards with receivers able to customize their choice.

One can create a system of multiple layers of SRNs. One layer ensures
that all the sites are correctly archiving complaints sent to each
other, and sites that do not are kicked out (rogue sites). Another SRN
layer on top of this basic layer can kick out spamming users (rogue
users on sites). Note that a lower level layer failure will tend to
make a higher level impossible. The system cannot succeed unless
lower-level layers are stable. Higher-level problems should not be
confused with lower-level ones. The SRN protocols should make explicit
this layering characteristic. The general idea is that a failure at a
high-level layer results in a new action at a lower-level layer.

node statistics databases

Another very useful invention is a "node statistics database" in which
a server keeps track of statistics associated with nodes that it
connects to, and keeps it open for queries by other servers. In the
case of mail, a providers' server could keep track of statistics such
as:

* how long a user has been on their system (AGE)
* how many messages they have sent (MS)
* total number of bytes sent (BS)
* total number of different users emailed, or "to: count" (TC), etc.

The node statistics database could easily be combined with the
complaint database to allow additional information to receiving sites.
As many statistics as possible should be archived. Note the above
statistics do not require much processing time or disk space to
archive. The statistics would tend to exist in layers, with some at
the user level, some at the site level, etc.

complaint types

Note that complaints may be in several categories, and some not
currently envisaged. The complaint databases should try to record the
different types of complaints rather than the mere presence of
complaints. The complaints also refer to different SRN layers; a
complaint could be against a user on a site or a site on the network.

* email harassment
* unsolicited commercial email
* spurious complaints
* mailbombing
* user forgery
* provider forgery
* denial-of-service
* etc.

The overall combination of statistics and complaint databases, as well
as and Member Name Servers, comprises a sophisticated reputation
system for supporting the SRN.

analysis of the mail SRN in operation

Consider a few basic scenarios, and how the mail SRN (MSRN) handles
them. The MSRN would be built on top of a site SRN that ensures sites
behave legitimately.

1. A user gets a new internet provider, and begins spamming. The
receiving mail servers are all querying his site's database as he
attempts to deliver each message.

+ The originating site may notice that certain statistics
suggest the user is spamming (notice no operator intervention
is necessary, a completely automated system is possible with
the database). Maybe the messages will be archived with an
increasing delay in delivery of each one, they will be
bounced, the account will be turned off temporarily, etc.
+ Destination sites may query the database and discover the
user has sent mail to a huge number of different addresses in
a short amount of time (TC/AGE), that he has sent a lot of
messages in a short amount of time (MS/AGE), etc. Presumably
these variable threshholds could be easily customized by the
receiver to values he considers optimal.
+ They may reject the message prior to it even being
transferred, in such a way that denial-of-service attacks are
minimized.
+ Or, the receiving site is a member of a certain kind of
group, which is updated based on all these statistics, and
that Member Name Server is queried rapidly to see if the
sender is contained, and the mail is rejected if not.
+ To address the problem of spammers hopping between sites, the
sending site could put all users on "probation" in which they
can't send more than a certain number or size of messages in
a given amount of time when they are first signed up. As
their AGE increases, they have more leeway. Such restrictions
could hopefully be tailored so that they are never
encountered by legitimate users.

2. A rogue site creates a fake statistics database in which bogus
statistics are contained, and allows people to spam from the site.

+ Complaints will accrue to the rogue site. It will either
refuse to register them or will throw away complaints.
Complainees can escalate the complaint to a higher site using
the site SRN that duly either replicates the inability to
archive the complaint, or is again rogue, in which case the
complaints continue to escalate to a higher level (the
complaints escalate until satisfactory response is achieved,
i.e. at least an archival of the complaint in some place).
+ The Member Name Servers (MNS) routinely query the complaint
databases and may exclude sites or chains of sites based on
too many complaints at upstream providers.

3. User "forges" email address on a message.

A good system would not permit forgeries. A system superior to
that currently installed would allow email to be submitted only
through the provider, and individual users could not create
headers on messages. In any case, the complaint system could also
support a framework that rejects sites that permit too many
forgers. Based on the header of the email message, the mail
servers could follow a procedure of finding the earliest verified
originating source address in a dialogue with various servers who
track mail in statistics databases and register a complaint. If
users could arbitarily create their own aliases (see below), the
"legitimate" needs for From: line modification would diminish.

4. A bunch of users gang up and try to knock a particular user off of
the system under a vendetta.

The system could support a verification scheme where someone can
make a complaint about a given node only if they were involved in
some interaction with that node, i.e. receiving mail from it. So
for example an internet provider with the statistics database can
verify that a complaint is coming from a party that a user
actually sent mail to, and reject spurious complaints (perhaps
even complaining about the spurious complaints to that site).
Sites can "scroll off" information on old transactions.

5. Internet provider forges header information.

The receiving mail servers are postulated to have a lot of logic
that can respond dynamically, and query remote sites. Presumably
enough information would be available in the headers of messages
and intermediate servers such that rogue intermediaries could be
detected and the complaint system invoked without human
intervention.

other approaches

A few other approaches deserve mention. Currently a user cannot create
his own email addresses arbitrarily. Software could easily support
this feature. Site providers probably do not support it due to the
potential for abuse. But if outgoing email always had an effective
"complaint address" irrespective of its originator, site
administrators may not have a problem if the abuses can be taken care
of automatically.

Consider this scenario: a user posts to Usenet under a self-created
email address. He keep this alias open for about 2 weeks after his
post, and after he is no longer interested, closes that alias. Or, if
he finds an alias is receiving too much spam, he could close it off.

As long as the complaint address on the posted message is accurate (to
which spam can't be sent to), this practice is not susceptible to
abuse. If the user begins to spam under an alias, the complaints will
accrue. Different providers may handle the alias situation in various
ways. Some may permit anonymity, others pseudonymity (in which
outsiders can link an alias to an existing account), etc. Note however
that an automated complaint system can still support anonymity.

Also, consider a system in which messages are not stored on a
destination site, only requests. A sender puts a request in the
receiver's mail queue, storing the message on the sender's site. The
receiver looks at the header (which may include the subject line, or
whatever) and decides arbitrarily whether or not to fetch the message.

Also, systems which store mail, wait some period of time, and forward
it only if the originating site stays "clean" of complaints or
inciminating statistics, otherwise bouncing or deleting it, are
possible.

A system of "round robin moderation" used in Usenet may be useful for
aspects of the SRN, like a sort of rotating Neighborhood Watch
program.

Another possibility is user configurable blocking options. Servers
could compile statistics about sites blocked by individual users.
However, this approach may have the "redundancy" flaw in that spam
sites have to be repeatedly identified by diverse users.

economics of databases and servers

Hopefully all the mechanisms described above are economically
self-sufficient, and users (either end users or internet providers)
would pay for the value-added services.

The current internet supports a Domain Name Server system without
serious economic problems (although it is currently subject to some
controversy over its administration). Hence similar Member Name
Servers could probably be created without scaling or architecture
problems. In some ways they would be similar to the web search engines
that continually query sites to update their searchable databases.

Hopefully internet providers will see the statistics databases and
complaint databases as useful cost-saving automations of services that
they already have to perform anyway in currently time-consuming human
interactions. Internet providers already presumably do not wish to
deal with rogue sites, and the system might be a more automated means
of identifying and unplugging them. Upstream sites are motivated to
keep accurate statistics on downstream sites, and downstream sites are
motivated to keep accurate statistics so they aren't unplugged by
upstream ones. Also, note that users that require the most database
processing time are likely to be spammers and are likely to be kicked
off the system.

There may be economic incentives such that user demand can be
leveraged into building it. I.e. certain providers who make the
development investment (time, code, meetings, etc.) might advertise as
being part of the "spam free network" and charge a small premium. A
provider may even find "spamfree" service not only covers the cost of
overhead, but is lucrative in the face of high demand.

In some cases, the data that is used for an SRN is already available
and being archived. For example, most sites already log information
about past mail transactions, just not in a way that is accessable to
some kind of protocol or query. Also, informal databases of spammer IP
addresses are available. As noted, the informal approach of "complaint
escalations" to upstream providers is already considered a basic
aspect of Internet culture. This SRN proposal in many ways merely
suggests ways of rearranging and formalizing procedures and protocols
that are already in place.

Obviously, all of the above will require more processing time and
storage than the current system. IMHO I don't see this as a liability,
because the current system is proving to be increasingly dysfunctional
at larger scales, and cycles and disk space are in relative abundance.
Moreover, the processing time currently associated with mail is
negligible. There's a lot of room for additional processing while
still perserving the near-instantaneous-transmission of email. Delays
of a few seconds are certainly tolerable if the new system really
provides improved "signal-to-noise" features it is designed to
support.

The above ideas vary significantly in terms of difficulty of
implementation; some can be readily implemented in existing software
(such as local statistics tracking), others would require significant
additional independent development efforts. (The system does not
require every feature be implemented simultaneously to provide
benefits.) I do not expect any to be implemented quickly; my
experience suggests that people will tend to resist modifying internet
software or cooperate to create and implement new software and
approaches to deal with what is now regarded chiefly as a "social
problem", doing so only when all other alternatives have been
exhausted.

Current mail and Usenet programs currently have very strong degrees of
inertia due to their widespread use, justifiably so. Changes should
not be considered lightly. But on the other hand, I think their
current architecture is revealing itself increasingly at times to be a
"weak reed to stand on". Billions of email messages are transmitted
over the Internet with increasingly important contents, and I wonder
if the informality of current systems continues to be appropriate or
the best that can be achieved.

free speech, privacy, censorship

Issues of free speech, privacy, and censorship, barely resolved in the
government arena, are probably the reason for the dramatic angst that
typically accompanies any proposal for modification of a communication
or identification system, particularly related to the internet, which
contains a very politically active and charged community.

Hopefully users will not see the statistics databases as Orwellian.
Statistics such as total bytes sent, total number of addresses sent to
(not the particular addresses themselves) etc. do not seem at all like
privacy violations.

This proposal is offered with the idea that nothing in it interferes
with free speech or privacy. The right of free speech does not apply
to anyone who wishes to be heard against the preferences of a
particular audience. However, a SRN system could be manipulated to
negative ends. The design I have arrived at has been specifically,
painstakingly sculpted and crafted to be resistant to "single points
of failure" or individual tyrannies.

However, there are always certain hypothetical pathological situations
in which virtually any technology would fail. This system does not
seek to solve all problems, but instead only to be more appealing to
users than the current system is. That is, it can only be fairly
judged against the existing system and not some hypothetical, possibly
impossible idealization.

conclusion

The SRN system creates a sort of Caller ID mechanism by which
recipients of mail have more flexibility in rejecting messages
according to their own criteria, and invents a dynamic network
connectivity based on potentially "rogue" sites. It will be opposed by
spammers but I hope the larger internet community can see it as
enhancing, and organize and cooperate enough to implement it or
something similar.

The system as proposed has been designed with the current
idiosyncracies of the internet in mind. It does not require
significant new technologies such as microcurrency, universal
identification, etc. although those could be integrated within it with
positive results. It is a highly distributed system that might scale
better than even existing technologies. It may become more necessary
if the current system continues to scale poorly relative to spam.

The system permits a sort of global information system on rogue users.
Instead of every victim independently, inefficiently attempting to
deal with the same problem, the system collects complaints, and
ideally users could leverage off of each other's knowledge about rogue
users.

Ideally the SRN system described above would not be overly difficult
to implement, and if done so, would significantly change the dynamics
of the mail network to make spam far less viable. Obviously the
overall system will fail if there are too many rogue sites that behave
in pernicious ways (one can ask the question whether anything would
function in such a scenario), but the expectation is that if the
majority of sites are not corrupt, the SRN will be effectively
self-policing in a dynamic, proactive, and responsive manner.

I propose these ideas only because I suspect they have the potential
to ultimately save time and effort after setup costs have been
overcome. If aspects of the SRN prove in practice to be too complex,
they should be discarded. However, some internet providers, especially
large ones, have found that spam prevention is a costly,
time-consuming, and attention-intensive process. No study exists about
the actual magnitude of the expense, but possibly even a complex
system could be superior.

If the network eventually became free of spam, administrators might be
tempted to turn off the SRN features. However, to my mind this would
be like taking down a dike because the water is contained. The SRN is
analogous to an immune system that must be engaged and active to
prevent infections.

If effective, by its intentionally general-purpose design, the SRN may
be useful for areas other than mail such as Usenet, or perhaps in the
best case, if proven to the satisfaction of the overall internet
community, even low-level internet connectivity, maybe eliminating
most denial-of-service attacks.


See also:

Usenet2 - new spamfree form of Usenet
www.usenet2.org

Qmail - new replacement for sendmail by Dan Bernstein
www.qmail.org

CAUCE - Coalition against unsolicited commercial email
www.cauce.org

Boycott SPAM - software, rogue site lists, etc.
spam.abuse.net/spam

------------------------------

Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 2--Cu Digest Header Info (unchanged since 13 April, 1998)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

In ITALY: ZERO! BBS: +39-11-6507540

UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #10.24
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT