RE: [Asrg] 3. Requirements - Must Address Issue of Hijacked Computers

"Bob Wyman" <bob@wyman.us> Thu, 17 July 2003 17:39 UTC

Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA14787 for <asrg-archive@odin.ietf.org>; Thu, 17 Jul 2003 13:39:43 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19dCiq-00073c-TN for asrg-archive@odin.ietf.org; Thu, 17 Jul 2003 13:39:17 -0400
Received: (from exim@localhost) by www1.ietf.org (8.12.8/8.12.8/Submit) id h6HHdGT7027127 for asrg-archive@odin.ietf.org; Thu, 17 Jul 2003 13:39:16 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19dCiq-00073S-PF for asrg-web-archive@optimus.ietf.org; Thu, 17 Jul 2003 13:39:16 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA14754; Thu, 17 Jul 2003 13:39:12 -0400 (EDT)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 19dCio-0000AX-00; Thu, 17 Jul 2003 13:39:14 -0400
Received: from ietf.org ([132.151.1.19] helo=optimus.ietf.org) by ietf-mx with esmtp (Exim 4.12) id 19dCii-0000AR-00; Thu, 17 Jul 2003 13:39:08 -0400
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19dChd-0006qK-L4; Thu, 17 Jul 2003 13:38:01 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19dCh3-0006h1-AE for asrg@optimus.ietf.org; Thu, 17 Jul 2003 13:37:25 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA14722 for <asrg@ietf.org>; Thu, 17 Jul 2003 13:37:21 -0400 (EDT)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 19dCh1-00009e-00 for asrg@ietf.org; Thu, 17 Jul 2003 13:37:23 -0400
Received: from vmmrnat.verisignmail.com ([216.168.230.187] helo=vmmr7.verisignmail.com) by ietf-mx with esmtp (Exim 4.12) id 19dCgq-00009O-00 for asrg@ietf.org; Thu, 17 Jul 2003 13:37:12 -0400
Received: from ms3.verisignmail.com (ms3.verisignmail.com [216.168.230.176] (may be forged)) by vmmr7.verisignmail.com (Mirapoint Messaging Server MOS 3.2.2-GA) with ESMTP id OYK04156; Thu, 17 Jul 2003 13:36:43 -0400 (EDT)
Received: from BOBDEV (pool-162-83-238-146.ny5030.east.verizon.net [162.83.238.146]) by ms3.verisignmail.com (Mirapoint Messaging Server MOS 3.2.2-GA) with ESMTP id AKY40006; Thu, 17 Jul 2003 13:36:41 -0400 (EDT)
Reply-To: bob@wyman.us
From: Bob Wyman <bob@wyman.us>
To: 'Yakov Shafranovich' <research@solidmatrix.com>, asrg@ietf.org
Subject: RE: [Asrg] 3. Requirements - Must Address Issue of Hijacked Computers
Message-ID: <002b01c34c89$fe83b1e0$640aa8c0@BOBDEV>
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.4024
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1165
In-Reply-To: <5.2.0.9.2.20030713122535.00ba27a8@pop.pocketmail.com>
Importance: Normal
Content-Transfer-Encoding: quoted-printable
Sender: asrg-admin@ietf.org
Errors-To: asrg-admin@ietf.org
X-BeenThere: asrg@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/asrg>, <mailto:asrg-request@ietf.org?subject=unsubscribe>
List-Id: Anti-Spam Research Group - IRTF <asrg.ietf.org>
List-Post: <mailto:asrg@ietf.org>
List-Help: <mailto:asrg-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/asrg>, <mailto:asrg-request@ietf.org?subject=subscribe>
List-Archive: <https://www1.ietf.org/pipermail/asrg/>
Date: Thu, 17 Jul 2003 13:36:45 -0400
Content-Transfer-Encoding: quoted-printable
Content-Transfer-Encoding: quoted-printable

Yakov Shafranovich wrote:
> Should the following be part of the requirements:
> "Proposals must address issues of hijacked 
> computers used for sending spam."
	No. This should not be a requirement for *all* proposals since
not all proposals rely on any particular knowledge of source server. On
the other hand, proposals which rely on knowledge of source servers
*should* address the issue of hijacked machines.
	Undoubtedly, one of the objectives of research should be to
determine what, if any, unique problems are introduced by the use of
hijacked machines. However, the understanding that results from this
research will only be applicable to a subset of all of the various
mechanisms that may contribute to a reduction of spam.

		bob wyman


_______________________________________________
Asrg mailing list
Asrg@ietf.org
https://www1.ietf.org/mailman/listinfo/asrg