Re: ietf-nntp Initial draft FINALLY available

Brian Kantor <brian@nothing.ucsd.edu> Thu, 03 October 1996 00:01 UTC

Received: from cnri by ietf.org id aa16545; 2 Oct 96 20:01 EDT
Received: from PHEASANT.ACADEM.COM by CNRI.Reston.VA.US id aa25429; 2 Oct 96 20:01 EDT
Received: (from majordom@localhost) by pheasant.ACADEM.COM (8.7.5/8.7.3) id SAA26198 for ietf-nntp-outgoing; Wed, 2 Oct 1996 18:56:43 -0500
X-Authentication-Warning: pheasant.ACADEM.COM: majordom set sender to owner-ietf-nntp using -f
Received: from academ.com (root@ACADEM.COM [198.137.249.2]) by pheasant.ACADEM.COM (8.7.5/8.7.3) with ESMTP id SAA26194 for <ietf-nntp@PHEASANT.ACADEM.COM>; Wed, 2 Oct 1996 18:56:41 -0500
Received: from jareth.sesqui.net (JARETH.SESQUI.NET [128.241.0.93]) by academ.com (8.7.6/8.7.1) with ESMTP id SAA04488 for <ietf-nntp@academ.com>; Wed, 2 Oct 1996 18:56:40 -0500 (CDT)
Received: from nothing.ucsd.edu (nothing.ucsd.edu [132.239.1.4]) by jareth.sesqui.net (8.7.1/8.6.9) with SMTP id SAA19894 for <ietf-nntp@academ.com>; Wed, 2 Oct 1996 18:56:37 -0500 (CDT)
Received: by nothing.ucsd.edu (8.6.12/UCSDGENERIC.5) id QAA08691 to ; Wed, 2 Oct 1996 16:49:20 -0700
Date: Wed, 2 Oct 1996 16:49:20 -0700
From: Brian Kantor <brian@nothing.ucsd.edu>
Message-Id: <199610022349.QAA08691@nothing.ucsd.edu>
To: magill@isc.upenn.edu, mike@cosy.sbg.ac.at
Subject: Re: ietf-nntp Initial draft FINALLY available
Cc: ietf-nntp@academ.com
Sender: owner-ietf-nntp@academ.com
Precedence: bulk

> For one thing, most "sucking feeds" are not legit feeds in the first place,
> but rather people running readers, or pretending to be running readers,
> which are in fact servers. 

But not all.  I have in fact supported fully authorised 'sucking' feeds
that were implemented in that way because of various special circumstances.

Because a number (perhaps even a majority) of sites have no use for such
does not in the least invalidate the concept.

As a historical note, the 'sucking' feed was at first the PREFERRED
method when we were designing NNTP.  That it was never implemented
efficiently and with proper access control is its main downfall.

I believe it should remain as an optional but fully-defined command.
	- Brian