Re: [p2pi] Fwd: For those who think "User Fairness/Cost Fairness"is unacceptable...

"Robb Topolski" <robb@funchords.com> Mon, 09 June 2008 23:32 UTC

Return-Path: <p2pi-bounces@ietf.org>
X-Original-To: p2pi-archive@ietf.org
Delivered-To: ietfarch-p2pi-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EA1673A6A9B; Mon, 9 Jun 2008 16:32:42 -0700 (PDT)
X-Original-To: p2pi@core3.amsl.com
Delivered-To: p2pi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 452F63A6A9B for <p2pi@core3.amsl.com>; Mon, 9 Jun 2008 16:32:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.176
X-Spam-Level:
X-Spam-Status: No, score=-1.176 tagged_above=-999 required=5 tests=[AWL=0.200, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, J_CHICKENPOX_82=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7hHtkrap13kH for <p2pi@core3.amsl.com>; Mon, 9 Jun 2008 16:32:39 -0700 (PDT)
Received: from wf-out-1314.google.com (wf-out-1314.google.com [209.85.200.168]) by core3.amsl.com (Postfix) with ESMTP id C8C063A695B for <p2pi@ietf.org>; Mon, 9 Jun 2008 16:32:39 -0700 (PDT)
Received: by wf-out-1314.google.com with SMTP id 27so2514844wfd.31 for <p2pi@ietf.org>; Mon, 09 Jun 2008 16:32:58 -0700 (PDT)
Received: by 10.142.238.9 with SMTP id l9mr1720276wfh.20.1213054377448; Mon, 09 Jun 2008 16:32:57 -0700 (PDT)
Received: by 10.142.186.7 with HTTP; Mon, 9 Jun 2008 16:32:57 -0700 (PDT)
Message-ID: <3efc39a60806091632t70772a1fm40c10338ac279d0d@mail.gmail.com>
Date: Mon, 09 Jun 2008 16:32:57 -0700
From: Robb Topolski <robb@funchords.com>
To: "Livingood, Jason" <Jason_Livingood@cable.comcast.com>
In-Reply-To: <45AEC6EF95942140888406588E1A6602050F89B5@PACDCEXCMB04.cable.comcast.com>
MIME-Version: 1.0
References: <BBCA80CA-34E9-40B1-9B37-628F014F9108@ICSI.Berkeley.EDU> <3efc39a60806080822l575c83c1p2a370bbb20a41bd6@mail.gmail.com> <3efc39a60806080825yc1261ddmf2ce3da4b308a722@mail.gmail.com> <7DFBDD81-6551-42AD-9E8F-6B3E00EDF254@icsi.berkeley.edu> <3efc39a60806081448x7499519brbef093888d7ee29d@mail.gmail.com> <45AEC6EF95942140888406588E1A6602050F89B5@PACDCEXCMB04.cable.comcast.com>
Cc: p2pi@ietf.org
Subject: Re: [p2pi] Fwd: For those who think "User Fairness/Cost Fairness"is unacceptable...
X-BeenThere: p2pi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: P2P Infrastructure Discussion <p2pi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/p2pi>, <mailto:p2pi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/p2pi>
List-Post: <mailto:p2pi@ietf.org>
List-Help: <mailto:p2pi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/p2pi>, <mailto:p2pi-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0767328802=="
Sender: p2pi-bounces@ietf.org
Errors-To: p2pi-bounces@ietf.org

On Mon, Jun 9, 2008 at 12:49 PM, Livingood, Jason <
Jason_Livingood@cable.comcast.com> wrote:

>  One question inline below.
> -Jason
>
>  ------------------------------
> *From:* p2pi-bounces@ietf.org [mailto:p2pi-bounces@ietf.org] *On Behalf Of
> *Robb Topolski
>
> The only way to win "The Lifeboat Game<http://www.google.com/search?q=lifeboat+game>"
> is to assume that your particular values are better than anyone elses
> values.  And, odds are, you're right.  However, you are also probably in the
> minority of lifeboat passengers who hold that opinion.
>
> So while you're busy deciding who its okay to throw overboard, know that *I'm
> stubbornly going to remain convinced that a person who has paid their bill,
> who has not hacked their modem, who is using applications who have not
> behaved nefariously, and who is acting within the law has every right to the
> next bit of bandwidth as I do.  *I also believe that truly abusive users
> should not be handled through probability guesses enabled by packet
> inspection and throttling, but with evidence, due process, and the entire
> termination of their service.
>
> So here's a technical operations question for you then.  What do you do
> with the users of a network who may have "hacked their modem" (using your
> terms) or who is using apps that are behaving "nefariously," and who may *
> not* be "acting within the law?"  It sounds like you are suggesting that
> these are some specific and reasonable corner cases when applying reasonable
> network management may well be appropriate, provided a due and open process
> for determining and communicating this.  And that in some extreme cases
> (perhaps the "acting within the law" parameter you suggested), that this may
> result in termination of service.  To follow this logic you have suggested,
> it would *not*  be reasonable to apply such policies *unless *a user
> essentially knew such limits or whatever *beforehand* (transparency needed
> in advance).
>
> I was talking about network abuse and the commission of acts that ought not
require policies prohibiting them.  I was also talking about the wedge
tactic that pits one user against another in an effort to create "sides" in
a debate.

As to how Comcast should respond to a user innocently exceeding clearly
communicated service limits in an agreement is another subject.


-- 
Robb Topolski (robb@funchords.com)
Hillsboro, Oregon USA
http://www.funchords.com/
_______________________________________________
p2pi mailing list
p2pi@ietf.org
https://www.ietf.org/mailman/listinfo/p2pi