Re: [rrg] Rebooting the RRG

heinerhummel@aol.com Wed, 05 February 2014 08:08 UTC

Return-Path: <heinerhummel@aol.com>
X-Original-To: rrg@ietfa.amsl.com
Delivered-To: rrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7EB381A00AD for <rrg@ietfa.amsl.com>; Wed, 5 Feb 2014 00:08:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.535
X-Spam-Level:
X-Spam-Status: No, score=-0.535 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-0.535, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CC7gAJ9RGmHe for <rrg@ietfa.amsl.com>; Wed, 5 Feb 2014 00:07:59 -0800 (PST)
Received: from omr-d07.mx.aol.com (omr-d07.mx.aol.com [205.188.109.204]) by ietfa.amsl.com (Postfix) with ESMTP id C58E81A009E for <rrg@irtf.org>; Wed, 5 Feb 2014 00:07:58 -0800 (PST)
Received: from mtaomg-mae01.mx.aol.com (mtaomg-mae01.mx.aol.com [172.26.254.143]) by omr-d07.mx.aol.com (Outbound Mail Relay) with ESMTP id 21D59700000B3; Wed, 5 Feb 2014 03:07:58 -0500 (EST)
Received: from core-dqc003c.r1000.mail.aol.com (core-dqc003.r1000.mail.aol.com [172.29.161.137]) by mtaomg-mae01.mx.aol.com (OMAG/Core Interface) with ESMTP id C6C3838000081; Wed, 5 Feb 2014 03:07:57 -0500 (EST)
To: surfer@mauigateway.com, rrg@irtf.org
X-MB-Message-Source: WebUI
X-MB-Message-Type: User
MIME-Version: 1.0
From: heinerhummel@aol.com
Content-Type: multipart/alternative; boundary="--------MB_8D0F0608343AC0E_B50_1D4A6_webmail-m280.sysops.aol.com"
X-Mailer: AOL Webmail 38331-STANDARD
Received: from 178.26.195.50 by webmail-m280.sysops.aol.com (64.12.145.234) with HTTP (WebMailUI); Wed, 05 Feb 2014 03:07:56 -0500
Message-Id: <8D0F06082D16A0E-B50-77E0@webmail-m280.sysops.aol.com>
X-Originating-IP: [178.26.195.50]
Date: Wed, 05 Feb 2014 03:07:57 -0500
x-aol-global-disposition: G
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mx.aol.com; s=20121107; t=1391587677; bh=5PKA90TkfXRdTKs3AbYj/iTVyN4VVVpKbjCq+nO1TTA=; h=From:To:Subject:Message-Id:Date:MIME-Version:Content-Type; b=n1rBmElE7dpoOItAFJV2YNWEemS+ieVSHe6EBSgSzz+yG2k+NGtGwWZB877n1LmMC +hvn5By6esg0yN7+PwTVpzx42AlFapNKGetEKw5aO52b4tVEv/GdhHZeFzg9pFhliW 0NpImFdvqK2vFWPZu3ylVVxa6vivstK9i3aaSbvA=
x-aol-sid: 3039ac1afe8f52f1f15d6d84
Subject: Re: [rrg] Rebooting the RRG
X-BeenThere: rrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IRTF Routing Research Group <rrg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/options/rrg>, <mailto:rrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/rrg/>
List-Post: <mailto:rrg@irtf.org>
List-Help: <mailto:rrg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/rrg>, <mailto:rrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Feb 2014 08:08:00 -0000

The user should be made aware that his equipment is about to send out data.
I have no problems if this were done in either case (national or international destination).


Look, a government is suit for not protecting its people for being spied out. This means there is a strong interest for such protection
but this also means, a state has to be empowered to effectively prevent what it is accused for.


This is not balkanization. People have created states/nations themselves for good reason. The existing permanent data fraud must not last forever.
Or do you think this is a special form of "freedom/liberty" ?


Heiner



-----Ursprüngliche Mitteilung----- 
Von: Scott Weeks <surfer@mauigateway.com>
An: heinerhummel <heinerhummel@aol.com>
Verschickt: Mi, 5 Feb 2014 2:52 am
Betreff: Re: [rrg] Rebooting the RRG



Wouldn't this lead to balkinization of the internet?

scott


--- heinerhummel@aol.com wrote:
From: heinerhummel@aol.com

With the current routing architecture and its complete absence of any 
WHERE-awareness there is no way to give back any country its sovereignty. 
With TARA that wouldn't be a problem: Each country would recognize "its" 
part of the internet (intra- and inter-domain portions alike) and could 
take action that within its borders packets were encrypted according to 
its own keys. Packets which are being sent to outside of the country would 
be recognized as such ones and the user might be questioned to confirm 
whether forwarding should be done or not - just like he is reminded  to 
add a subject line if missing.