RE: [Asrg] Consent Proposal

Yakov Shafranovich <research@solidmatrix.com> Tue, 01 July 2003 17:48 UTC

Received: from www1.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA08434 for <asrg-archive@odin.ietf.org>; Tue, 1 Jul 2003 13:48:17 -0400 (EDT)
Received: (from exim@localhost) by www1.ietf.org (8.11.6/8.11.6) id h5RId4515809 for asrg-archive@odin.ietf.org; Fri, 27 Jun 2003 14:39:04 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19Vy7k-00046c-Gk for asrg-web-archive@optimus.ietf.org; Fri, 27 Jun 2003 14:39:04 -0400
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA11697; Fri, 27 Jun 2003 14:38:48 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19Vy6f-0003bR-6B; Fri, 27 Jun 2003 14:37:57 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19VwD3-0000Kx-Se for asrg@optimus.ietf.org; Fri, 27 Jun 2003 12:36:40 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA06868 for <asrg@ietf.org>; Fri, 27 Jun 2003 12:36:22 -0400 (EDT)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 19VwD2-0004XG-00 for asrg@ietf.org; Fri, 27 Jun 2003 12:36:24 -0400
Received: from 000-256-240.area7.spcsdns.net ([68.27.240.209] helo=68.27.240.209 ident=trilluser) by ietf-mx with smtp (Exim 4.12) id 19VwCq-0004X4-00 for asrg@ietf.org; Fri, 27 Jun 2003 12:36:13 -0400
Message-Id: <5.2.0.9.2.20030627123243.00b52458@std5.imagineis.com>
X-Sender: research@solidmatrix.com
X-Mailer: QUALCOMM Windows Eudora Version 5.2.0.9
To: Vernon Schryver <vjs@calcite.rhyolite.com>, asrg@ietf.org
From: Yakov Shafranovich <research@solidmatrix.com>
Subject: RE: [Asrg] Consent Proposal
In-Reply-To: <200306270403.h5R43Puj013664@calcite.rhyolite.com>
References: <DD198B5D07F04347B7266A3F35C42B0B0FD07E@io.cybercom.local>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
X-MimeHeaders-Plugin-Info: v2.03.00
X-GCMulti: 1
Sender: asrg-admin@ietf.org
Errors-To: asrg-admin@ietf.org
X-BeenThere: asrg@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/asrg>, <mailto:asrg-request@ietf.org?subject=unsubscribe>
List-Id: Anti-Spam Research Group - IRTF <asrg.ietf.org>
List-Post: <mailto:asrg@ietf.org>
List-Help: <mailto:asrg-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/asrg>, <mailto:asrg-request@ietf.org?subject=subscribe>
List-Archive: <https://www1.ietf.org/pipermail/asrg/>
Date: Fri, 27 Jun 2003 12:35:45 -0400

At 10:03 PM 6/26/2003 -0600, Vernon Schryver wrote:

> > From: "Peter Kay" <peter@titankey.com>
>
> >...
> > A. there exists a plug-in infrastructure that can run on MUA or MTA
> > (ISP).
>
>Things that MTAs and MUAs can do differ radically.

If a user's ISP does not run a consent-system, then the user will probably 
get a MUAs that does or a plugin for a MUAs that gives him that ability. 
The implementation of consent on MUAs will obviously differ from 
implementation on MTAs.

> > B. each plug-in provides for some type of policy definition, related to
> > the plugins purpose. This can range from filtering to CR to all the
> > other methods mentioned below.
>
>"Plug-in" worries me.  At best it suggests an implementation mechanism
>instead of a protocol notion.  At worst it suggests an intolerable
>security nightmare as is standard in commodity desktop software.

I think he picked a wrong term, we are seeking to create a common framework 
for consent systems. Various pieces of this framework are implementation 
specific and are done by MTAs and MUAs as they see fit. These various 
implementation i.e. consent systems, all interoperate via standard 
protocols such as CRI.


> > C. each plug-in can be configured by a hierarchy. Starting w/ the ISP
> > (for instance), then perhaps a domain-level admin (for corporate
> > applications0 and then the end-user.  We can decide on varying levels of
> > defaults or override capability so that for example if an ISP whitelists
> > a source, the end-user may have the option to blacklist it.
> > ...
>
>That needs to be made concrete in terms of protocols and mechanisms
>so that it can be discussed by a technical group.

Correct, more discussion is needed. CRI would me an example of a protocol 
that allows different consent systems to interoperate.

Yakov 


_______________________________________________
Asrg mailing list
Asrg@ietf.org
https://www1.ietf.org/mailman/listinfo/asrg