Re: [Asrg] request for review for a non FUSSP proposal

Claudio Telmon <claudio@telmon.org> Tue, 23 June 2009 21:26 UTC

Return-Path: <claudio@telmon.org>
X-Original-To: asrg@core3.amsl.com
Delivered-To: asrg@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 36DC928C0E2 for <asrg@core3.amsl.com>; Tue, 23 Jun 2009 14:26:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.612
X-Spam-Level:
X-Spam-Status: No, score=-0.612 tagged_above=-999 required=5 tests=[AWL=0.107, BAYES_00=-2.599, HELO_EQ_IT=0.635, HOST_EQ_IT=1.245]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Axxbi-BQvqkD for <asrg@core3.amsl.com>; Tue, 23 Jun 2009 14:26:46 -0700 (PDT)
Received: from slim-4a.inet.it (slim-4a.inet.it [213.92.5.126]) by core3.amsl.com (Postfix) with ESMTP id CFBD33A6C99 for <asrg@irtf.org>; Tue, 23 Jun 2009 14:26:45 -0700 (PDT)
Received: from 88-149-251-208.dynamic.ngi.it ([::ffff:88.149.251.208]) by slim-4a.inet.it via I-SMTP-5.6.0-560 id ::ffff:88.149.251.208+uYoCRdp927; Tue, 23 Jun 2009 23:26:59 +0200
Message-ID: <4A4148A3.9060903@telmon.org>
Date: Tue, 23 Jun 2009 23:26:59 +0200
From: Claudio Telmon <claudio@telmon.org>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.21) Gecko/20090318 Lightning/0.8 Thunderbird/2.0.0.21 Mnenhy/0.7.6.666
MIME-Version: 1.0
To: Anti-Spam Research Group - IRTF <asrg@irtf.org>
References: <4A3DFC91.2090506@telmon.org> <4A3F9B2B.8020603@tana.it> <4A3FF3AF.9030401@telmon.org> <4A3FF7F1.1060705@nd.edu> <4A3FFB64.6030409@telmon.org> <5AB32FFA-A830-4BB6-BEFC-EBA58CC090E4@mail-abuse.org> <4A4083B2.8060905@telmon.org> <AF3CC1CE-9FD2-4736-A54C-49D551F5300B@mail-abuse.org>
In-Reply-To: <AF3CC1CE-9FD2-4736-A54C-49D551F5300B@mail-abuse.org>
X-Enigmail-Version: 0.95.0
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Subject: Re: [Asrg] request for review for a non FUSSP proposal
X-BeenThere: asrg@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: Anti-Spam Research Group - IRTF <asrg@irtf.org>
List-Id: Anti-Spam Research Group - IRTF <asrg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/asrg>, <mailto:asrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/asrg>
List-Post: <mailto:asrg@irtf.org>
List-Help: <mailto:asrg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/asrg>, <mailto:asrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Jun 2009 21:26:48 -0000

Douglas Otis wrote:

> Your strategy requires servicing a method that does not depend upon
> "pass-tokens" as a means to obtain them. 

Tokens can be obtained trough a "consent request" email message, which
is a normal "text only" message with some constraints, or trough some
other communication channel, including face by face meetings. Other,
more powerful or easy means to obtain token would probably mean that the
address owner would be flooded by spam hiding as consent request, or
that tokens could be surreptitiously obtained.

> The task of collecting source
> specific tokens represents a fair amount of administrative effort for
> both senders and recipients that is likely to be problematic.  Not good.
> 

This kind of evaluation is a critical one for the model the framework is
based on. I take the cell phone numbers as an example. Most of us has
hundreds of cell phone numbers, (almost) none of which has been obtained
automatically. We took the burden of collecting them, and usually, if we
need to contact somebody, and this person is willing to talk with us, we
manage to get a phone number through one of the many communication
channels that are offered to us. We also happily take the burden of
distributing by hand our cell phone number, even if we could just put it
on phone directories and have it automatically distributed, because we
understand the advantages of not distributing it. I would say, most of
us is more unhappy with the ease unknown people can contact us through
email, than with the difficulties they have contacting us through our
cell phone.

> Spitting the email-address onto separate headers is problematic.  In
> addition, what one MTA might understand may not apply to the subsequent.
> 

I think this is a technical problem the framework deals properly with. I
may be missing something, of course. And, it requires an extension to SMTP.

> Review how one might use <local-part>"+"<tags> :
> http://css.its.psu.edu/news/emailplus.html
> 

Yes, I wrote a detailed answer on this to Seth in a previous message.

> Then imagine this acceptance criteria is combined valid DKIM
> respondent's messages.
> 

I don't think this would solve the problem of address (that is, tag)
disclosure in messages with multiple recipients.

> As yet a better alternative, to thwart wasted and undesired exchanges,
> an exchange by reference offers an inherent means to authenticate
> sources without cryptography, and avoid undesired exchanges.

Maybe I didn't catch this one, but tokens can be exchanged between
users, so a "reference" would just be the use of the same token. But
probably I didn't understand what "exchange by reference" is, google
just gives me some cryptic pages on taxation and foreign currency :)

-- 

Claudio Telmon
claudio@telmon.org
http://www.telmon.org