Re: [Asrg] 2. Problem Characterization - Defining spam within consent paradigm

"C. Wegrzyn" <wegrzyn@garbagedump.com> Thu, 03 July 2003 19:18 UTC

Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA02924 for <asrg-archive@odin.ietf.org>; Thu, 3 Jul 2003 15:18:35 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19Y9ao-0005PM-IL for asrg-archive@odin.ietf.org; Thu, 03 Jul 2003 15:18:06 -0400
Received: (from exim@localhost) by www1.ietf.org (8.12.8/8.12.8/Submit) id h63JI6eL020789 for asrg-archive@odin.ietf.org; Thu, 3 Jul 2003 15:18:06 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19Y9ao-0005PE-E2 for asrg-web-archive@optimus.ietf.org; Thu, 03 Jul 2003 15:18:06 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA02907; Thu, 3 Jul 2003 15:18:05 -0400 (EDT)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 19Y9an-0007bH-00; Thu, 03 Jul 2003 15:18:05 -0400
Received: from ietf.org ([132.151.1.19] helo=optimus.ietf.org) by ietf-mx with esmtp (Exim 4.12) id 19Y9am-0007bE-00; Thu, 03 Jul 2003 15:18:04 -0400
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19Y9aj-0005NN-2E; Thu, 03 Jul 2003 15:18:01 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19Y9Zm-0005KK-Vz for asrg@optimus.ietf.org; Thu, 03 Jul 2003 15:17:03 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA02843 for <asrg@ietf.org>; Thu, 3 Jul 2003 15:17:01 -0400 (EDT)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 19Y9Zl-0007aK-00 for asrg@ietf.org; Thu, 03 Jul 2003 15:17:01 -0400
Received: from mxsmta03.inithost.com ([209.235.30.105] helo=mxsmta03.dellhost.com) by ietf-mx with esmtp (Exim 4.12) id 19Y9Zh-0007aF-00 for asrg@ietf.org; Thu, 03 Jul 2003 15:16:57 -0400
Received: from garbagedump.com ([24.128.102.183]) by mxsmta03.dellhost.com (InterMail vM.5.01.03.06 201-253-122-118-106-20010523) with ESMTP id <20030703191810.VKWY28645.mxsmta03.dellhost.com@garbagedump.com>; Thu, 3 Jul 2003 15:18:10 -0400
Message-ID: <3F04810A.2000309@garbagedump.com>
From: "C. Wegrzyn" <wegrzyn@garbagedump.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.4a; MultiZilla v1.4.0.4A) Gecko/20030612
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Madscientist <madscientist@microneil.com>
CC: asrg@ietf.org
Subject: Re: [Asrg] 2. Problem Characterization - Defining spam within consent paradigm
References: <005201c3418d$229b1990$0a2458d8@MNR01>
In-Reply-To: <005201c3418d$229b1990$0a2458d8@MNR01>
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Content-Transfer-Encoding: 7bit
Content-Transfer-Encoding: 7bit
Sender: asrg-admin@ietf.org
Errors-To: asrg-admin@ietf.org
X-BeenThere: asrg@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/asrg>, <mailto:asrg-request@ietf.org?subject=unsubscribe>
List-Id: Anti-Spam Research Group - IRTF <asrg.ietf.org>
List-Post: <mailto:asrg@ietf.org>
List-Help: <mailto:asrg-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/asrg>, <mailto:asrg-request@ietf.org?subject=subscribe>
List-Archive: <https://www1.ietf.org/pipermail/asrg/>
Date: Thu, 03 Jul 2003 15:16:26 -0400
Content-Transfer-Encoding: 7bit
Content-Transfer-Encoding: 7bit

Seems like a lot of what you get with a cert. This is almost the 
approach I took with the design I did. I can tell you it works and works 
well.

Chuck Wegrzyn


Madscientist wrote:

>>-----Original Message-----
>>From: asrg-admin@ietf.org [mailto:asrg-admin@ietf.org] On 
>>Behalf Of Bob Wyman
>>Barry Shein wrote:
>>    
>>
>>>Although reasonable-sounding these descriptions [of consent]
>>>are starting to remind me of those long-ago Artificial Intelligence 
>>>seminars where you'd get to ponder why some seemingly simple 
>>>human behavior was so difficult to code into a program. 
>>>      
>>>
>>	We've had precisely the same issue with software 
>>    
>>
>
><snip>
>
>  
>
>>detect identity. The machine can only detect the use of things 
>>which are assumed to indicate identity. (i.e. When if someone 
>>says "Only Bob can send mail" what the machine needs to hear 
>>is "Only someone using Bob's private key can send mail." For a 
>>person, "identity" is an attribute of being. For the computer, 
>>identity is a property which is assumed belong to users of 
>>certain proofs of identity. 
>>	But, this is all getting a bit philosophical. Barry has 
>>a point. As we get into dealing with the issues of expressing 
>>and managing consent, we must all be careful to ensure that 
>>people understand the inherent limitations of machines in this 
>>realm. There is only so much that the machine can do for you.
>>
>>		bob wyman
>>    
>>
>
>There are some simple and effective mechanisms for the scenario of
>identifying consent, though they may not be applicable in some cases.
>
>Here is one that is not a complete solution, but is very effective and
>solves the problem of expectation and identification in many of the most
>critical scenarios (such as children and grandmothers avoiding porn
>spam):
>
>Simplified: 
>
>1. The recipient issues a secret code (PL code) of their choice to each
>of the people they wish to communicate with.
>
>1.1. The secret code _should_ be cryptographically secure but _may_ be
>anything unique enough to be effective for that user's purpose.
>
>1.2. The user in this case _may_ be broadly defined as a group of users
>such as a family, or a special team in a corporate environment.
>
>2. The user filters out / rejects all messages that do not contain the
>secret code in the body of the message.
>
>2.1. The secret code becomes a mechanism of explicit consent.
>
>2.2. In some cases (such as juvinile accounts) the ability to change the
>code or adjust the filtering may be restricted.
>
>3. Trusted users who receive the code may freely distribute the code to
>other users whom they wish to include in the group. In this way the
>"authority" to transmit messages to members of the group can naturally
>extend to appropriate senders in a "viral" manner with very little
>administration.
>
>3.1. Kids will naturally share their PL code with their friends.
>3.2. Parents will share/register the code with teachers and extended
>family members.
>
>4. If the PL code is compromized then it can be easily changed because a
>new code can be generated and transmitted to everyone in the group (or
>at least a large collection of them). If this mechanism is automated in
>some way then the system can be very secure an lightweight.
>
>5. Attempts to send to members of this group withou the appropriate code
>can be used to detect attempted abuse - and these statistics can be used
>to drive other mechanisms such as black lists or statisitical training
>systems.
>
>This mechanism can be implemented right now and is extremely effective.
>
>The user's expectations are precise: If someone has the code I can hear
>from them. If they do not have the code I should not hear from them.
>
>The system's responses are precise: If the code exists then the message
>passes, if it does not then the message does not pass. (The PL code may
>be implemented with stronger controls such as placement in specific
>message headers or other specific rules, however it generally works well
>when simply included in the body of the message like a signature or some
>kind of "inside joke").
>
>The system is extremely secure because anonymous senders are not
>generally able to extract or guess these PL codes and if they do then
>the codes are easily changed.
>
>The system can be extended to support legitimate mailing lists because
>special codes can be provided to the mailing list author at the time of
>subscription by the subscriber as part of the normal customization data
>provided by the user. One variant of this is to subscribe to the list
>using a cryptographic alias that can be turned off if it is ever abused.
>A more secure implementation would require the author of the list to
>include the code provided as part of the customized portion of the
>subscriber's messages (customization is often the norm these days anyway
>such as including the subscriber's name and so forth).
>
>This mechanism naturally extends a COT model (Circle Of Trust) because
>is a good example of that paradigm. COT systems provide for effective,
>lightweight authentication mechanisms without a centralized authority.
>
>This mechanism is not proprietary, not centrally controlled, represents
>very little cost, and does not preclude any other mechanisms that might
>also be enforced as part of a local policy.
>
>Extended implementation example:
>
>The mechanism can also be aggregated and driven forward within the
>systems of a given provider such that individual users might register
>their authorized codes with the provider (using some standardized format
>established by the provider), those codes could then be aggregated into
>a hash table, and message content reaching a border MTA could examine
>incoming messages against the hash tables during the SMTP conversation
>by scanning for the appropriate codes in the data segment before
>accepting a message. If the message does not contain the code and also
>does not satisfy an alternative policy evaluation then the message would
>be rejected and incident recorded as abuse forcing a period of
>rejections at the envelope level for some period of time (consistent
>with the local policy of course).
>
>A system such as the above might be implemented as a "Special Service"
>for families with children on the internet. - This means low cost, high
>value, and profit potential (so it's likely to be adopted), plus a
>significant impact on spam reduction.
>
>I recommend that this should be included in a suite of protocols and
>practices that are part of the final solution.
>
>Sorry for the length.
>I hope this is helpful.
>_M
>
>PS: PL = Private Listening, from a common radio meachanism (PL tones). I
>posted infromation about this in another thread I believe so I'm not
>repeating it here.
>
>PPS: We recommend and use this mechanism with great success, though I
>don't have hard statistics to show. Hopefully it is logically obvious
>how effective this solution can be in many scenarios. A TINY bit of
>automation can go a very long way with this one also.
>
>
>
>_______________________________________________
>Asrg mailing list
>Asrg@ietf.org
>https://www1.ietf.org/mailman/listinfo/asrg
>
>  
>



_______________________________________________
Asrg mailing list
Asrg@ietf.org
https://www1.ietf.org/mailman/listinfo/asrg