home *** CD-ROM | disk | FTP | other *** search
-
-
- Computer underground Digest Sun Apr 19, 1998 Volume 10 : Issue 24
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Field Agent Extraordinaire: David Smith
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #10.24 (Sun, Apr 19, 1998)
-
- File 1--proposal of technical solutions to spam problem
- File 2--Cu Digest Header Info (unchanged since 13 April, 1998)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Tue, 31 Mar 98 21:35:02 -0800
- From: "Vladimir Z. Nuri" <vznuri@netcom.com>
- Subject: File 1--proposal of technical solutions to spam problem
-
- This essay is archived under the "cybernetics" section at
- www8.pair.com/mnajtiv/
-
- see bottom for other links
-
-
- SRN, Self Regulated Network
-
- a proposal of technical solutions to the spam problem
-
- * intro
- * what is spam?
- * history of spam
- * is spam worsening?
- * the software problem
- * economic approaches
- * identification systems
- * proposal for a self-regulating network (SRN)
- * observations on example informal SRNs
- * the connected SRN complaint system
- * node statistics databases
- * complaint types
- * analysis of the mail SRN in operation
- * other approaches
- * economics of databases and servers
- * free speech, privacy, censorship
- * conclusion
-
- intro
-
- This paper examines the internet "spam" problem and seeks to find
- technical solutions. By technical I am referring to solutions that do
- not require social conventions, legislative, or litigatory approaches.
- It is an open problem as to whether a technical solution exists,
- however I consider the following to outline many excellent
- possibilities that haven't been seriously explored (and I wouldn't
- agree that a technical solution does not exist until variations on the
- following have been exhausted).
-
- I have been using the internet since 1989 and have subscribed to many
- mailing lists and newsgroups. IMHO the spam problem has become
- progressively worse and I see no reason why this downward spiral will
- not continue without proactive action by concerned users. In the past
- I have advocated some ideas only to meet various degrees of resistance
- and hostility. Maybe the current climate will prove to be more
- amenable to a rational discussion of these crucial issues (or perhaps
- the opposite). The good news is that many technical solutions may be
- available to minimize the problem.
-
- I suspect all easy, localized approaches toward solutions may have
- been exhausted by now. I believe a collaborative solution is
- necessary.
-
- Personally, I believe that spam legislation has the potential to
- actually mar the internet. Even if a law existed, enforcement may be
- impossible, or draconian. IMHO legislative solutions should be avoided
- at all costs. It could lead to another new government bureacracy that
- fails to fulfill its function, not because of ineptitude, but because
- of a fundamental impossibility.
-
- what is spam?
-
- It is difficult to define "spam". If a definition precise enough to be
- specified in computer code was possible, the problem would probably
- not exist, as users could simply run some kind of automated filter to
- delete it. Is it "unsolicited commercial email"? This is one
- definition that seems clear and reasonable. But it is subject to
- similar ambiguity. Suppose I post to a newsgroup and request
- information on "fly fishing". I receive a few helpful replies.
- However, I continue to receive replies several months later, from fly
- fishing companies, long after I am interested in the subject. When did
- the email become spam?
-
- Another situation may occur in which I receive lots of "unsolicited
- commercial email", but then suddenly receive an offer that I find
- extremely valuable. Would I have wished it to be rejected by a filter?
-
- The definition of spam that I will use in this paper will tend to
- adhere to two basic ideas around which an automated system can be
- developed:
-
- * spam is email that leads to subjective complaints
- * spam is email that fits certain objective statistical properties
-
- history of spam
-
- Unfortunately spam is a problem that has existed long before
- cyberspace, which the particular economic dynamics of cyberspace has
- exacerbated. Spam has existed with postal mail and telephone calls. In
- the case of postal mail, at least a cost is involved in the
- distribution that may make it economically unviable in a variety of
- situations. The phone is similar, although automated systems that
- could deliver messages unattended changed the picture somewhat. The
- low cost of sending a message in cyberspace means spam is much more
- economically viable on the internet. (The "true" cost of email is
- subject to debate, but it seems clear that cyberspace message
- transmission is inherently inexpensive-- it is much of its reason for
- existence.)
-
- If someone could come up with an elegant solution to spam in
- cyberspace, there is reason to suppose that it might be implemented in
- these other realms as well. Fame, glory, and perhaps riches await
- whoever can pull it off. Unfortunately it seems to tend to require
- collaborative solutions, something that is eminently feasible and
- ubiquitious in cyberspace but difficult to initiate due to a
- characteristic independent attitude of internet users. I believe there
- is a bias among internet designers and programmers that virtually all
- problems can be solved locally, and that the nagging persistence of
- spam is a disproof.
-
- is spam worsening?
-
- Spam appears to exhibit an interesting property. In small networks,
- apparently social taboo and stigma seems enough to keep people from
- spamming. However, as network sizes and degrees of anonymity seem to
- increase, the irresponsibility seems to increase as well. In other
- words, it's a problem that gets worse as network sizes increase. The
- spam situation seems to be a serious challenge to the fundamental
- scalability that the internet supposely embodies. This is often
- referred to as the "tragedy of the commons" quagmire of social
- systems, apparently referring to the tendency of farmers to overgraze
- an area with their livestock to society-as-a-whole's detriment (and
- even to their own).
-
- No studies exist about the percent of spam in small networks relative
- to large ones, but anecdotal experience of users seems to confirm the
- basic "the bigger it gets, the greater the proportion of spam" rule.
- An obvious reason for this is that a small audience does not make
- spamming useful enough to attract the element that perpetrates it.
-
- The internet was started in the mid-1970's as a system that could
- theoretically survive a nuclear attack by its seamless and invisible
- means of rerouting messages around failure points in the network.
- However, an interesting assumption in this configuration is now coming
- into focus in hindsight. Original designers assumed all "nodes" on the
- network would function according to specification. They did not
- consider the possibility that parts of the network might become
- "infected" in the sense of not behaving according to standard. Let us
- call this a "rogue site". Herein, a site that specializes in spam will
- be considered a rogue site.
-
- The problem becomes more serious when there is no overseeing policing
- entity. Some people will point to the beauty of the internet as its
- freedom from an overseeing agency, but in fact the lack of one may
- make it unstable in some ways. It is a hacker's paradise. Consider an
- internet site that does nothing but spam or mount denial-of-service
- attacks against other sites. There is currently no technical mechanism
- by which such a rogue site can be officially "removed" from the
- community. Each site must deal with these kinds of attacks
- independently. The system as a whole has persisted in spite of this
- apparent flaw, but this means of dealing with rogue sites seems
- inherently inelegant. IMHO A good, robust new network system should
- address the "denial of service" problem at many layers all the way
- down to lower level protocols.
-
- However, IMHO the internet community is wise to be wary (at some
- times, it seems, almost to the point of paranoia) of centralized
- controlling entities of the internet. One of the great values of the
- internet is the way in which it has been able to grow organically with
- a minimum of overseeing or centralized tracking/intervention. An ideal
- solution to the spam problem would be completely distributed and not
- require any "spam agency" or similarly unpalatable invention. The
- question that arises is, can a community self-police itself? Is there
- an equivalent of a "community watch" program for cyberspace? I think
- the answer is "yes" with a lot of ingenuity and will elaborate on this
- point.
-
- One problem of the internet is that increasing bandwidth has tended to
- disguise and exacerbate the spam problem. If more bandwidth is
- available, providers can pass increasing amounts of spam messages
- without it having any major economic cost. A secret of the internet's
- success is a curve of decreasing bandwidth costs. This means that
- spam, like all other activities on the net, becomes cheaper and
- cheaper. Generally in Usenet software, improved efficiency in
- mechanisms for transferring messages have been pursued instead of
- approaches for dealing with spam.
-
- the software problem
-
- Currently the large mass of internet sites use a mail program called
- Sendmail developed chiefly by Eric Allman. Will all due respect to the
- author and maintainers, IMHO the program is an embodiment in awkward
- and monolithic legacy software. It features many extremely arcane
- syntax rules and inscrutable conventions. Some users take pride in the
- system but I currently see it as an obstacle to more sophisticated
- email transfer systems. It has not proven agile and able to deal with
- new developments and demands. IMHO new email systems with entirely
- different approaches embodying flexibility and modularity must be
- developed if the spam problem is to be solved in an elegant way.
- Ideally market forces could be unleashed to pursue a flexible mail
- package with good spam solution.
-
- One of the deficiencies in sendmail is the inability to reject email
- based on header information alone. An elegant email delivery system
- might involve a sort of handshake going on between a receiver and
- sender in which varying degrees of information (such as digital
- signatures, passwords, etc.) are exchanged before the receiver agrees
- to "accept" the message. The current standards do not really support
- this. This allows the practice of "mailbombing" in which a massive set
- of email can inundate a mail server.
-
- In some cases, mail servers are configured to "drop on the floor"
- without notification of the sender mail messages that are considered
- to be possible spam. This seems very extreme-- in a robust system the
- sender always ought to know at least if the mail is rejected or not
- being delivered.
-
- Many of the limiting aspects of Sendmail are intertwined with the
- RFC822 standard for exchanging email. IMHO the RFC822 standard is just
- as venerable and limited as Sendmail. Some of the ideas I am proposing
- here are equivalent to a enhanced RFC822 standard, which would involve
- new headers and new mail exchange protocols. Increased functionality
- has a price, but IMHO in this case it's worth it.
-
- economic approaches
-
- Some people propose a "user pays" system in which people who sent the
- email would pay for the cost. But in fact the beauty of cyberspace is
- the low actual cost associated with merely moving electrons through a
- wire. IMHO it is unlikely that the true economic cost of sending email
- is actually larger than what spammers are now paying (typically an
- internet account). In other words, it is inherently very cheap to move
- bits around in cyberspace, and even if spammers were being charged the
- "true amount" that it costs to send huge batches of email, I assume it
- would only be marginally larger than the cost of their internet
- account. In fact, decreases in the cost of network transmission (i.e.
- higher bandwidth for less cost) will tend to make spam even more
- cost-effective and thereby annoyingly pervasive in time.
-
- Another interesting proposal involves microcurrency. In this idea a
- receiver could implement a charge on email. The sender would have to
- "enclose" the money required in an email or the email would be
- rejected. (This is an example where it makes sense to have a protocol
- that can exchange information, such as the microcurrency, before the
- message is accepted.) When the respondent might reply to the earlier
- sender, he could return the microcharge in his own envelope,
- reimbursing the sender. If he feels the person has wasted his time, he
- can withhold a return. In this system, email users can put any price
- on the scarce commodity involved: their attention.
-
- I consider this a very attractive approach, but unfortunately current
- mail protocols do not support this system. Moreover, despite that
- microcurrency might involve extremely non-costly economic
- transactions, thereby overcoming the major hurdle of implementing it
- (resistance to anything costly by users), microcurrency development
- and integration into internet protocols has been proceeding extremely
- slowly. It seems likely that spam will continue to persist for a long
- time before a good universal microcurrency system that is integrated
- into internet protocols is developed.
-
- identification systems
-
- One problem associated with mail delivery is the lack of a universal
- identity verification system on the internet. Such a system need not
- have any Orwellian implications, it might not do anything except
- ensure that mail cannot be forged (while still permitting unlimited
- pseudonymity by anyone on the internet). Complex issues such as
- cryptographic algorithm patents are involved here. It seems likely
- that, like microcurrency, such a system will not be implemented in a
- semi-universal way for some time. In the meantime, the spam problem
- demands an immediate solution.
-
- Once a semi-universal identification system is in place, a good mail
- standard would easily support it. If the mail server allowed a
- conversation between source and reciever before the message was
- actually transmitted, that interaction could easily (and would
- presumably by design) contain verification information.
-
- proposal for a self-regulating network (SRN)
-
- The sophisticated technical idea I have been experimenting
- conceptually with for several years that may solve the spam problem
- and a host of related problems (such as denial-of-service) is what I
- call a "self-regulating network" (SRN for short). It is an idea that
- avoids the deficiencies of the potential approaches suggested above,
- and was designed very specifically to fit into the current
- distributed, decentralized nature of the internet. It will tend to
- require authentication systems to verify identity but they could be
- password-based. Cryptographic systems may improve the security of the
- system but hopefully are not entirely necessary.
-
- A SRN is a network that does not assume full future connectivity of
- all nodes. It presumes that some nodes currently within the network
- may have to be detached at the "discretion" of people running other
- nodes. The entire entity is seen as a sort of organism in which nodes
- are analogous to cells, and some cells may be cancerous (i.e. those
- that participate in acti
- here, an FCN is a network that has no such formal regulating mechanism
- (it may have informal mechanisms that for purposes here won't be
- considered part of the "system"). Indeed, multiple SRN topologies can
- exist on top of a FCN in the way that virtual networks exist on top of
- the internet. When I describe the operations of the SRN, it should not
- be taken to be a proposal for regulating the current internet
- connectivity. It is a proposal for creating virtual SRNs on top of the
- internet FCN under the discretion and voluntary cooperation of
- participants. In particular it will focus on internet providers
- creating a SRN, a sort of self-policing electronic guild system.
-
- observations on example informal SRNs
-
- Examples of "informal" SRNs that exist today on the internet are:
-
- * individual site administrators routinely filter packets from
- certain rogue sites
- * in Usenet, administrators may disconnect rogue sites from the
- network
- * mail server administrators may bar messages transferred from
- unknown sites (or perhaps kick off an existing user) in an attempt
- to deal with the spam problem
-
- The characteristic that virtually all these situations have in common
- is that they are informal SRNs, and that connectivity is related to
- informal judgement. The community, in a sense, measures rogue sites by
- observations of the behavior, blocking, and complaints about these
- sites. Is there some way to formalize this? The proposal I am focusing
- on would create a system in which observations, blocking, and
- complaints are not isolated or passed around informally around a
- network "out-of-band", but instead considered an inherent part of the
- network connectivity system and transmitted/shared in standard
- protocols.
-
- The difficulty is that one probably cannot have a centralized
- complaint registration server. The potential for abuse is high, and
- scalability, the key requirement of network connectivity, is lacking
- with this approach.
-
- Hence I have been working on a system for a distributed complaint
- system in which there is no centralized complaint server, but
- complaints are still recorded in a systematic way. Consider an
- application of this to mail servers in which people can complain about
- mail emanating from a site to the originating site. The general idea
- is that an automated complaint address would exist for each mail
- originating site, to which receivers can register complaints in
- machine-readable form.
-
- In the current internet, there is a definite "food chain" of providers
- connecting to "adjacent" providers. Informally, people may sometimes
- complain to an "upstream provider" if they fail to obtain reasonable
- results from a complaint to a particular provider. The goal of a SRN
- is to encode this informal network in a protocol.
-
- A major problem with informal, localized "blocking" of sites
- implemented today is that, inherently, rogue sites are a global
- problem. If denial-of-service or other kinds of rogue behavior (e.g.
- spamming) are mounted from a site, that's a problem for all sites, and
- ideally detection would not have to be inefficiently repeated all over
- the internet by each site subject to the attack. Arguably, the failure
- of the existing system to deal with this problem robustly, in a global
- fashion, is the key to its increasing pervasiveness. Spammers have
- odds in their favor when thousands of sites do not cooperate in
- detecting or blocking them. The SRN attempts to support global
- detection in a fashion resistant to flaws.
-
- the connected SRN complaint system
-
- The SRN would work as follows. A provider is responsible for archiving
- complaints sent to itself. A remote site can register a complaint
- about mail emanating from a site with that site. The site is
- responsible for the accuracy of its own complaint database and
- allowing any internet sites to peruse its own complaint database.
-
- Also, a site will keep a database of complaints against its "adjacent
- sites", or sites that feed into it. If a remote site can show evidence
- that a site failed to record properly a complaint, it can send the
- complaint to the "upstream provider" and that provider will register
- the complaint. This process can continue until an upstream provider
- eventually registers the complaint.
-
- One way to handle the "upstream complaint escalation" described above
- is to have a site give a "receipt" of a complaint. The site that
- registered this complaint can keep a random number of complaints
- around to verify they have stayed archived after a given amount of
- time, "pinging" the old complaints. If a complaint is not registered,
- the complainee can send the receipt to an upstream site, and the
- upstream site can verify the receipt is genuine and that the
- downstream site failed to record the complaint.
-
- The complaint databases are accessable to mail delivery servers that
- could query the complaint database of an originating site or its
- adjacent neighbors in deciding whether to accept a message from it. A
- distributed domain-name-server-like system (or member-name-server,
- MNS) could be created that records whether various sites are currently
- "accepted" as members in the SRN, suitable for fast lookups.
-
- Some kind of system whereby nodes are pushed out of the name database
- automatically depending on complaints can be implemented. It would be
- possible to have multiple, competing MNS systems that have different
- standards with receivers able to customize their choice.
-
- One can create a system of multiple layers of SRNs. One layer ensures
- that all the sites are correctly archiving complaints sent to each
- other, and sites that do not are kicked out (rogue sites). Another SRN
- layer on top of this basic layer can kick out spamming users (rogue
- users on sites). Note that a lower level layer failure will tend to
- make a higher level impossible. The system cannot succeed unless
- lower-level layers are stable. Higher-level problems should not be
- confused with lower-level ones. The SRN protocols should make explicit
- this layering characteristic. The general idea is that a failure at a
- high-level layer results in a new action at a lower-level layer.
-
- node statistics databases
-
- Another very useful invention is a "node statistics database" in which
- a server keeps track of statistics associated with nodes that it
- connects to, and keeps it open for queries by other servers. In the
- case of mail, a providers' server could keep track of statistics such
- as:
-
- * how long a user has been on their system (AGE)
- * how many messages they have sent (MS)
- * total number of bytes sent (BS)
- * total number of different users emailed, or "to: count" (TC), etc.
-
- The node statistics database could easily be combined with the
- complaint database to allow additional information to receiving sites.
- As many statistics as possible should be archived. Note the above
- statistics do not require much processing time or disk space to
- archive. The statistics would tend to exist in layers, with some at
- the user level, some at the site level, etc.
-
- complaint types
-
- Note that complaints may be in several categories, and some not
- currently envisaged. The complaint databases should try to record the
- different types of complaints rather than the mere presence of
- complaints. The complaints also refer to different SRN layers; a
- complaint could be against a user on a site or a site on the network.
-
- * email harassment
- * unsolicited commercial email
- * spurious complaints
- * mailbombing
- * user forgery
- * provider forgery
- * denial-of-service
- * etc.
-
- The overall combination of statistics and complaint databases, as well
- as and Member Name Servers, comprises a sophisticated reputation
- system for supporting the SRN.
-
- analysis of the mail SRN in operation
-
- Consider a few basic scenarios, and how the mail SRN (MSRN) handles
- them. The MSRN would be built on top of a site SRN that ensures sites
- behave legitimately.
-
- 1. A user gets a new internet provider, and begins spamming. The
- receiving mail servers are all querying his site's database as he
- attempts to deliver each message.
-
- + The originating site may notice that certain statistics
- suggest the user is spamming (notice no operator intervention
- is necessary, a completely automated system is possible with
- the database). Maybe the messages will be archived with an
- increasing delay in delivery of each one, they will be
- bounced, the account will be turned off temporarily, etc.
- + Destination sites may query the database and discover the
- user has sent mail to a huge number of different addresses in
- a short amount of time (TC/AGE), that he has sent a lot of
- messages in a short amount of time (MS/AGE), etc. Presumably
- these variable threshholds could be easily customized by the
- receiver to values he considers optimal.
- + They may reject the message prior to it even being
- transferred, in such a way that denial-of-service attacks are
- minimized.
- + Or, the receiving site is a member of a certain kind of
- group, which is updated based on all these statistics, and
- that Member Name Server is queried rapidly to see if the
- sender is contained, and the mail is rejected if not.
- + To address the problem of spammers hopping between sites, the
- sending site could put all users on "probation" in which they
- can't send more than a certain number or size of messages in
- a given amount of time when they are first signed up. As
- their AGE increases, they have more leeway. Such restrictions
- could hopefully be tailored so that they are never
- encountered by legitimate users.
-
- 2. A rogue site creates a fake statistics database in which bogus
- statistics are contained, and allows people to spam from the site.
-
- + Complaints will accrue to the rogue site. It will either
- refuse to register them or will throw away complaints.
- Complainees can escalate the complaint to a higher site using
- the site SRN that duly either replicates the inability to
- archive the complaint, or is again rogue, in which case the
- complaints continue to escalate to a higher level (the
- complaints escalate until satisfactory response is achieved,
- i.e. at least an archival of the complaint in some place).
- + The Member Name Servers (MNS) routinely query the complaint
- databases and may exclude sites or chains of sites based on
- too many complaints at upstream providers.
-
- 3. User "forges" email address on a message.
-
- A good system would not permit forgeries. A system superior to
- that currently installed would allow email to be submitted only
- through the provider, and individual users could not create
- headers on messages. In any case, the complaint system could also
- support a framework that rejects sites that permit too many
- forgers. Based on the header of the email message, the mail
- servers could follow a procedure of finding the earliest verified
- originating source address in a dialogue with various servers who
- track mail in statistics databases and register a complaint. If
- users could arbitarily create their own aliases (see below), the
- "legitimate" needs for From: line modification would diminish.
-
- 4. A bunch of users gang up and try to knock a particular user off of
- the system under a vendetta.
-
- The system could support a verification scheme where someone can
- make a complaint about a given node only if they were involved in
- some interaction with that node, i.e. receiving mail from it. So
- for example an internet provider with the statistics database can
- verify that a complaint is coming from a party that a user
- actually sent mail to, and reject spurious complaints (perhaps
- even complaining about the spurious complaints to that site).
- Sites can "scroll off" information on old transactions.
-
- 5. Internet provider forges header information.
-
- The receiving mail servers are postulated to have a lot of logic
- that can respond dynamically, and query remote sites. Presumably
- enough information would be available in the headers of messages
- and intermediate servers such that rogue intermediaries could be
- detected and the complaint system invoked without human
- intervention.
-
- other approaches
-
- A few other approaches deserve mention. Currently a user cannot create
- his own email addresses arbitrarily. Software could easily support
- this feature. Site providers probably do not support it due to the
- potential for abuse. But if outgoing email always had an effective
- "complaint address" irrespective of its originator, site
- administrators may not have a problem if the abuses can be taken care
- of automatically.
-
- Consider this scenario: a user posts to Usenet under a self-created
- email address. He keep this alias open for about 2 weeks after his
- post, and after he is no longer interested, closes that alias. Or, if
- he finds an alias is receiving too much spam, he could close it off.
-
- As long as the complaint address on the posted message is accurate (to
- which spam can't be sent to), this practice is not susceptible to
- abuse. If the user begins to spam under an alias, the complaints will
- accrue. Different providers may handle the alias situation in various
- ways. Some may permit anonymity, others pseudonymity (in which
- outsiders can link an alias to an existing account), etc. Note however
- that an automated complaint system can still support anonymity.
-
- Also, consider a system in which messages are not stored on a
- destination site, only requests. A sender puts a request in the
- receiver's mail queue, storing the message on the sender's site. The
- receiver looks at the header (which may include the subject line, or
- whatever) and decides arbitrarily whether or not to fetch the message.
-
- Also, systems which store mail, wait some period of time, and forward
- it only if the originating site stays "clean" of complaints or
- inciminating statistics, otherwise bouncing or deleting it, are
- possible.
-
- A system of "round robin moderation" used in Usenet may be useful for
- aspects of the SRN, like a sort of rotating Neighborhood Watch
- program.
-
- Another possibility is user configurable blocking options. Servers
- could compile statistics about sites blocked by individual users.
- However, this approach may have the "redundancy" flaw in that spam
- sites have to be repeatedly identified by diverse users.
-
- economics of databases and servers
-
- Hopefully all the mechanisms described above are economically
- self-sufficient, and users (either end users or internet providers)
- would pay for the value-added services.
-
- The current internet supports a Domain Name Server system without
- serious economic problems (although it is currently subject to some
- controversy over its administration). Hence similar Member Name
- Servers could probably be created without scaling or architecture
- problems. In some ways they would be similar to the web search engines
- that continually query sites to update their searchable databases.
-
- Hopefully internet providers will see the statistics databases and
- complaint databases as useful cost-saving automations of services that
- they already have to perform anyway in currently time-consuming human
- interactions. Internet providers already presumably do not wish to
- deal with rogue sites, and the system might be a more automated means
- of identifying and unplugging them. Upstream sites are motivated to
- keep accurate statistics on downstream sites, and downstream sites are
- motivated to keep accurate statistics so they aren't unplugged by
- upstream ones. Also, note that users that require the most database
- processing time are likely to be spammers and are likely to be kicked
- off the system.
-
- There may be economic incentives such that user demand can be
- leveraged into building it. I.e. certain providers who make the
- development investment (time, code, meetings, etc.) might advertise as
- being part of the "spam free network" and charge a small premium. A
- provider may even find "spamfree" service not only covers the cost of
- overhead, but is lucrative in the face of high demand.
-
- In some cases, the data that is used for an SRN is already available
- and being archived. For example, most sites already log information
- about past mail transactions, just not in a way that is accessable to
- some kind of protocol or query. Also, informal databases of spammer IP
- addresses are available. As noted, the informal approach of "complaint
- escalations" to upstream providers is already considered a basic
- aspect of Internet culture. This SRN proposal in many ways merely
- suggests ways of rearranging and formalizing procedures and protocols
- that are already in place.
-
- Obviously, all of the above will require more processing time and
- storage than the current system. IMHO I don't see this as a liability,
- because the current system is proving to be increasingly dysfunctional
- at larger scales, and cycles and disk space are in relative abundance.
- Moreover, the processing time currently associated with mail is
- negligible. There's a lot of room for additional processing while
- still perserving the near-instantaneous-transmission of email. Delays
- of a few seconds are certainly tolerable if the new system really
- provides improved "signal-to-noise" features it is designed to
- support.
-
- The above ideas vary significantly in terms of difficulty of
- implementation; some can be readily implemented in existing software
- (such as local statistics tracking), others would require significant
- additional independent development efforts. (The system does not
- require every feature be implemented simultaneously to provide
- benefits.) I do not expect any to be implemented quickly; my
- experience suggests that people will tend to resist modifying internet
- software or cooperate to create and implement new software and
- approaches to deal with what is now regarded chiefly as a "social
- problem", doing so only when all other alternatives have been
- exhausted.
-
- Current mail and Usenet programs currently have very strong degrees of
- inertia due to their widespread use, justifiably so. Changes should
- not be considered lightly. But on the other hand, I think their
- current architecture is revealing itself increasingly at times to be a
- "weak reed to stand on". Billions of email messages are transmitted
- over the Internet with increasingly important contents, and I wonder
- if the informality of current systems continues to be appropriate or
- the best that can be achieved.
-
- free speech, privacy, censorship
-
- Issues of free speech, privacy, and censorship, barely resolved in the
- government arena, are probably the reason for the dramatic angst that
- typically accompanies any proposal for modification of a communication
- or identification system, particularly related to the internet, which
- contains a very politically active and charged community.
-
- Hopefully users will not see the statistics databases as Orwellian.
- Statistics such as total bytes sent, total number of addresses sent to
- (not the particular addresses themselves) etc. do not seem at all like
- privacy violations.
-
- This proposal is offered with the idea that nothing in it interferes
- with free speech or privacy. The right of free speech does not apply
- to anyone who wishes to be heard against the preferences of a
- particular audience. However, a SRN system could be manipulated to
- negative ends. The design I have arrived at has been specifically,
- painstakingly sculpted and crafted to be resistant to "single points
- of failure" or individual tyrannies.
-
- However, there are always certain hypothetical pathological situations
- in which virtually any technology would fail. This system does not
- seek to solve all problems, but instead only to be more appealing to
- users than the current system is. That is, it can only be fairly
- judged against the existing system and not some hypothetical, possibly
- impossible idealization.
-
- conclusion
-
- The SRN system creates a sort of Caller ID mechanism by which
- recipients of mail have more flexibility in rejecting messages
- according to their own criteria, and invents a dynamic network
- connectivity based on potentially "rogue" sites. It will be opposed by
- spammers but I hope the larger internet community can see it as
- enhancing, and organize and cooperate enough to implement it or
- something similar.
-
- The system as proposed has been designed with the current
- idiosyncracies of the internet in mind. It does not require
- significant new technologies such as microcurrency, universal
- identification, etc. although those could be integrated within it with
- positive results. It is a highly distributed system that might scale
- better than even existing technologies. It may become more necessary
- if the current system continues to scale poorly relative to spam.
-
- The system permits a sort of global information system on rogue users.
- Instead of every victim independently, inefficiently attempting to
- deal with the same problem, the system collects complaints, and
- ideally users could leverage off of each other's knowledge about rogue
- users.
-
- Ideally the SRN system described above would not be overly difficult
- to implement, and if done so, would significantly change the dynamics
- of the mail network to make spam far less viable. Obviously the
- overall system will fail if there are too many rogue sites that behave
- in pernicious ways (one can ask the question whether anything would
- function in such a scenario), but the expectation is that if the
- majority of sites are not corrupt, the SRN will be effectively
- self-policing in a dynamic, proactive, and responsive manner.
-
- I propose these ideas only because I suspect they have the potential
- to ultimately save time and effort after setup costs have been
- overcome. If aspects of the SRN prove in practice to be too complex,
- they should be discarded. However, some internet providers, especially
- large ones, have found that spam prevention is a costly,
- time-consuming, and attention-intensive process. No study exists about
- the actual magnitude of the expense, but possibly even a complex
- system could be superior.
-
- If the network eventually became free of spam, administrators might be
- tempted to turn off the SRN features. However, to my mind this would
- be like taking down a dike because the water is contained. The SRN is
- analogous to an immune system that must be engaged and active to
- prevent infections.
-
- If effective, by its intentionally general-purpose design, the SRN may
- be useful for areas other than mail such as Usenet, or perhaps in the
- best case, if proven to the satisfaction of the overall internet
- community, even low-level internet connectivity, maybe eliminating
- most denial-of-service attacks.
-
-
- See also:
-
- Usenet2 - new spamfree form of Usenet
- www.usenet2.org
-
- Qmail - new replacement for sendmail by Dan Bernstein
- www.qmail.org
-
- CAUCE - Coalition against unsolicited commercial email
- www.cauce.org
-
- Boycott SPAM - software, rogue site lists, etc.
- spam.abuse.net/spam
-
- ------------------------------
-
- Date: Thu, 7 May 1997 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 2--Cu Digest Header Info (unchanged since 13 April, 1998)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- In ITALY: ZERO! BBS: +39-11-6507540
-
- UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
- Web-accessible from: http://www.etext.org/CuD/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #10.24
- ************************************
-
-