Computer underground Digest    Sun  Apr 19, 1998   Volume 10 : Issue 24
                          ISSN  1004-042X

      Editor: Jim Thomas ([email protected])
      News Editor: Gordon Meyer ([email protected])
      Archivist: Brendan Kehoe
      Shadow Master: Stanton McCandlish
      Shadow-Archivists: Dan Carosone / Paul Southworth
                         Ralph Sims / Jyrki Kuoppala
                         Ian Dickinson
      Field Agent Extraordinaire:   David Smith
      Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #10.24 (Sun, Apr 19, 1998)

File 1--proposal of technical solutions to spam problem
File 2--Cu Digest Header Info (unchanged since 13 April, 1998)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Tue, 31 Mar 98 21:35:02 -0800
From: "Vladimir Z. Nuri" <[email protected]>
Subject: File 1--proposal of technical solutions to spam problem

This essay is archived under the "cybernetics" section at
  www8.pair.com/mnajtiv/

see bottom for other links


                         SRN, Self Regulated Network

a proposal of technical solutions to the spam problem

    * intro
    * what is spam?
    * history of spam
    * is spam worsening?
    * the software problem
    * economic approaches
    * identification systems
    * proposal for a self-regulating network (SRN)
    * observations on example informal SRNs
    * the connected SRN complaint system
    * node statistics databases
    * complaint types
    * analysis of the mail SRN in operation
    * other approaches
    * economics of databases and servers
    * free speech, privacy, censorship
    * conclusion

intro

  This paper examines the internet "spam" problem and seeks to find
  technical solutions. By technical I am referring to solutions that do
  not require social conventions, legislative, or litigatory approaches.
  It is an open problem as to whether a technical solution exists,
  however I consider the following to outline many excellent
  possibilities that haven't been seriously explored (and I wouldn't
  agree that a technical solution does not exist until variations on the
  following have been exhausted).

  I have been using the internet since 1989 and have subscribed to many
  mailing lists and newsgroups. IMHO the spam problem has become
  progressively worse and I see no reason why this downward spiral will
  not continue without proactive action by concerned users. In the past
  I have advocated some ideas only to meet various degrees of resistance
  and hostility. Maybe the current climate will prove to be more
  amenable to a rational discussion of these crucial issues (or perhaps
  the opposite). The good news is that many technical solutions may be
  available to minimize the problem.

  I suspect all easy, localized approaches toward solutions may have
  been exhausted by now. I believe a collaborative solution is
  necessary.

  Personally, I believe that spam legislation has the potential to
  actually mar the internet. Even if a law existed, enforcement may be
  impossible, or draconian. IMHO legislative solutions should be avoided
  at all costs. It could lead to another new government bureacracy that
  fails to fulfill its function, not because of ineptitude, but because
  of a fundamental impossibility.

what is spam?

  It is difficult to define "spam". If a definition precise enough to be
  specified in computer code was possible, the problem would probably
  not exist, as users could simply run some kind of automated filter to
  delete it. Is it "unsolicited commercial email"? This is one
  definition that seems clear and reasonable. But it is subject to
  similar ambiguity. Suppose I post to a newsgroup and request
  information on "fly fishing". I receive a few helpful replies.
  However, I continue to receive replies several months later, from fly
  fishing companies, long after I am interested in the subject. When did
  the email become spam?

  Another situation may occur in which I receive lots of "unsolicited
  commercial email", but then suddenly receive an offer that I find
  extremely valuable. Would I have wished it to be rejected by a filter?

  The definition of spam that I will use in this paper will tend to
  adhere to two basic ideas around which an automated system can be
  developed:

    * spam is email that leads to subjective complaints
    * spam is email that fits certain objective statistical properties

history of spam

  Unfortunately spam is a problem that has existed long before
  cyberspace, which the particular economic dynamics of cyberspace has
  exacerbated. Spam has existed with postal mail and telephone calls. In
  the case of postal mail, at least a cost is involved in the
  distribution that may make it economically unviable in a variety of
  situations. The phone is similar, although automated systems that
  could deliver messages unattended changed the picture somewhat. The
  low cost of sending a message in cyberspace means spam is much more
  economically viable on the internet. (The "true" cost of email is
  subject to debate, but it seems clear that cyberspace message
  transmission is inherently inexpensive-- it is much of its reason for
  existence.)

  If someone could come up with an elegant solution to spam in
  cyberspace, there is reason to suppose that it might be implemented in
  these other realms as well. Fame, glory, and perhaps riches await
  whoever can pull it off. Unfortunately it seems to tend to require
  collaborative solutions, something that is eminently feasible and
  ubiquitious in cyberspace but difficult to initiate due to a
  characteristic independent attitude of internet users. I believe there
  is a bias among internet designers and programmers that virtually all
  problems can be solved locally, and that the nagging persistence of
  spam is a disproof.

is spam worsening?

  Spam appears to exhibit an interesting property. In small networks,
  apparently social taboo and stigma seems enough to keep people from
  spamming. However, as network sizes and degrees of anonymity seem to
  increase, the irresponsibility seems to increase as well. In other
  words, it's a problem that gets worse as network sizes increase. The
  spam situation seems to be a serious challenge to the fundamental
  scalability that the internet supposely embodies. This is often
  referred to as the "tragedy of the commons" quagmire of social
  systems, apparently referring to the tendency of farmers to overgraze
  an area with their livestock to society-as-a-whole's detriment (and
  even to their own).

  No studies exist about the percent of spam in small networks relative
  to large ones, but anecdotal experience of users seems to confirm the
  basic "the bigger it gets, the greater the proportion of spam" rule.
  An obvious reason for this is that a small audience does not make
  spamming useful enough to attract the element that perpetrates it.

  The internet was started in the mid-1970's as a system that could
  theoretically survive a nuclear attack by its seamless and invisible
  means of rerouting messages around failure points in the network.
  However, an interesting assumption in this configuration is now coming
  into focus in hindsight. Original designers assumed all "nodes" on the
  network would function according to specification. They did not
  consider the possibility that parts of the network might become
  "infected" in the sense of not behaving according to standard. Let us
  call this a "rogue site". Herein, a site that specializes in spam will
  be considered a rogue site.

  The problem becomes more serious when there is no overseeing policing
  entity. Some people will point to the beauty of the internet as its
  freedom from an overseeing agency, but in fact the lack of one may
  make it unstable in some ways. It is a hacker's paradise. Consider an
  internet site that does nothing but spam or mount denial-of-service
  attacks against other sites. There is currently no technical mechanism
  by which such a rogue site can be officially "removed" from the
  community. Each site must deal with these kinds of attacks
  independently. The system as a whole has persisted in spite of this
  apparent flaw, but this means of dealing with rogue sites seems
  inherently inelegant. IMHO A good, robust new network system should
  address the "denial of service" problem at many layers all the way
  down to lower level protocols.

  However, IMHO the internet community is wise to be wary (at some
  times, it seems, almost to the point of paranoia) of centralized
  controlling entities of the internet. One of the great values of the
  internet is the way in which it has been able to grow organically with
  a minimum of overseeing or centralized tracking/intervention. An ideal
  solution to the spam problem would be completely distributed and not
  require any "spam agency" or similarly unpalatable invention. The
  question that arises is, can a community self-police itself? Is there
  an equivalent of a "community watch" program for cyberspace? I think
  the answer is "yes" with a lot of ingenuity and will elaborate on this
  point.

  One problem of the internet is that increasing bandwidth has tended to
  disguise and exacerbate the spam problem. If more bandwidth is
  available, providers can pass increasing amounts of spam messages
  without it having any major economic cost. A secret of the internet's
  success is a curve of decreasing bandwidth costs. This means that
  spam, like all other activities on the net, becomes cheaper and
  cheaper. Generally in Usenet software, improved efficiency in
  mechanisms for transferring messages have been pursued instead of
  approaches for dealing with spam.

the software problem

  Currently the large mass of internet sites use a mail program called
  Sendmail developed chiefly by Eric Allman. Will all due respect to the
  author and maintainers, IMHO the program is an embodiment in awkward
  and monolithic legacy software. It features many extremely arcane
  syntax rules and inscrutable conventions. Some users take pride in the
  system but I currently see it as an obstacle to more sophisticated
  email transfer systems. It has not proven agile and able to deal with
  new developments and demands. IMHO new email systems with entirely
  different approaches embodying flexibility and modularity must be
  developed if the spam problem is to be solved in an elegant way.
  Ideally market forces could be unleashed to pursue a flexible mail
  package with good spam solution.

  One of the deficiencies in sendmail is the inability to reject email
  based on header information alone. An elegant email delivery system
  might involve a sort of handshake going on between a receiver and
  sender in which varying degrees of information (such as digital
  signatures, passwords, etc.) are exchanged before the receiver agrees
  to "accept" the message. The current standards do not really support
  this. This allows the practice of "mailbombing" in which a massive set
  of email can inundate a mail server.

  In some cases, mail servers are configured to "drop on the floor"
  without notification of the sender mail messages that are considered
  to be possible spam. This seems very extreme-- in a robust system the
  sender always ought to know at least if the mail is rejected or not
  being delivered.

  Many of the limiting aspects of Sendmail are intertwined with the
  RFC822 standard for exchanging email. IMHO the RFC822 standard is just
  as venerable and limited as Sendmail. Some of the ideas I am proposing
  here are equivalent to a enhanced RFC822 standard, which would involve
  new headers and new mail exchange protocols. Increased functionality
  has a price, but IMHO in this case it's worth it.

economic approaches

  Some people propose a "user pays" system in which people who sent the
  email would pay for the cost. But in fact the beauty of cyberspace is
  the low actual cost associated with merely moving electrons through a
  wire. IMHO it is unlikely that the true economic cost of sending email
  is actually larger than what spammers are now paying (typically an
  internet account). In other words, it is inherently very cheap to move
  bits around in cyberspace, and even if spammers were being charged the
  "true amount" that it costs to send huge batches of email, I assume it
  would only be marginally larger than the cost of their internet
  account. In fact, decreases in the cost of network transmission (i.e.
  higher bandwidth for less cost) will tend to make spam even more
  cost-effective and thereby annoyingly pervasive in time.

  Another interesting proposal involves microcurrency. In this idea a
  receiver could implement a charge on email. The sender would have to
  "enclose" the money required in an email or the email would be
  rejected. (This is an example where it makes sense to have a protocol
  that can exchange information, such as the microcurrency, before the
  message is accepted.) When the respondent might reply to the earlier
  sender, he could return the microcharge in his own envelope,
  reimbursing the sender. If he feels the person has wasted his time, he
  can withhold a return. In this system, email users can put any price
  on the scarce commodity involved: their attention.

  I consider this a very attractive approach, but unfortunately current
  mail protocols do not support this system. Moreover, despite that
  microcurrency might involve extremely non-costly economic
  transactions, thereby overcoming the major hurdle of implementing it
  (resistance to anything costly by users), microcurrency development
  and integration into internet protocols has been proceeding extremely
  slowly. It seems likely that spam will continue to persist for a long
  time before a good universal microcurrency system that is integrated
  into internet protocols is developed.

identification systems

  One problem associated with mail delivery is the lack of a universal
  identity verification system on the internet. Such a system need not
  have any Orwellian implications, it might not do anything except
  ensure that mail cannot be forged (while still permitting unlimited
  pseudonymity by anyone on the internet). Complex issues such as
  cryptographic algorithm patents are involved here. It seems likely
  that, like microcurrency, such a system will not be implemented in a
  semi-universal way for some time. In the meantime, the spam problem
  demands an immediate solution.

  Once a semi-universal identification system is in place, a good mail
  standard would easily support it. If the mail server allowed a
  conversation between source and reciever before the message was
  actually transmitted, that interaction could easily (and would
  presumably by design) contain verification information.

proposal for a self-regulating network (SRN)

  The sophisticated technical idea I have been experimenting
  conceptually with for several years that may solve the spam problem
  and a host of related problems (such as denial-of-service) is what I
  call a "self-regulating network" (SRN for short). It is an idea that
  avoids the deficiencies of the potential approaches suggested above,
  and was designed very specifically to fit into the current
  distributed, decentralized nature of the internet. It will tend to
  require authentication systems to verify identity but they could be
  password-based. Cryptographic systems may improve the security of the
  system but hopefully are not entirely necessary.

  A SRN is a network that does not assume full future connectivity of
  all nodes. It presumes that some nodes currently within the network
  may have to be detached at the "discretion" of people running other
  nodes. The entire entity is seen as a sort of organism in which nodes
  are analogous to cells, and some cells may be cancerous (i.e. those
  that participate in acti
  here, an FCN is a network that has no such formal regulating mechanism
  (it may have informal mechanisms that for purposes here won't be
  considered part of the "system"). Indeed, multiple SRN topologies can
  exist on top of a FCN in the way that virtual networks exist on top of
  the internet. When I describe the operations of the SRN, it should not
  be taken to be a proposal for regulating the current internet
  connectivity. It is a proposal for creating virtual SRNs on top of the
  internet FCN under the discretion and voluntary cooperation of
  participants. In particular it will focus on internet providers
  creating a SRN, a sort of self-policing electronic guild system.

observations on example informal SRNs

  Examples of "informal" SRNs that exist today on the internet are:

    * individual site administrators routinely filter packets from
      certain rogue sites
    * in Usenet, administrators may disconnect rogue sites from the
      network
    * mail server administrators may bar messages transferred from
      unknown sites (or perhaps kick off an existing user) in an attempt
      to deal with the spam problem

  The characteristic that virtually all these situations have in common
  is that they are informal SRNs, and that connectivity is related to
  informal judgement. The community, in a sense, measures rogue sites by
  observations of the behavior, blocking, and complaints about these
  sites. Is there some way to formalize this? The proposal I am focusing
  on would create a system in which observations, blocking, and
  complaints are not isolated or passed around informally around a
  network "out-of-band", but instead considered an inherent part of the
  network connectivity system and transmitted/shared in standard
  protocols.

  The difficulty is that one probably cannot have a centralized
  complaint registration server. The potential for abuse is high, and
  scalability, the key requirement of network connectivity, is lacking
  with this approach.

  Hence I have been working on a system for a distributed complaint
  system in which there is no centralized complaint server, but
  complaints are still recorded in a systematic way. Consider an
  application of this to mail servers in which people can complain about
  mail emanating from a site to the originating site. The general idea
  is that an automated complaint address would exist for each mail
  originating site, to which receivers can register complaints in
  machine-readable form.

  In the current internet, there is a definite "food chain" of providers
  connecting to "adjacent" providers. Informally, people may sometimes
  complain to an "upstream provider" if they fail to obtain reasonable
  results from a complaint to a particular provider. The goal of a SRN
  is to encode this informal network in a protocol.

  A major problem with informal, localized "blocking" of sites
  implemented today is that, inherently, rogue sites are a global
  problem. If denial-of-service or other kinds of rogue behavior (e.g.
  spamming) are mounted from a site, that's a problem for all sites, and
  ideally detection would not have to be inefficiently repeated all over
  the internet by each site subject to the attack. Arguably, the failure
  of the existing system to deal with this problem robustly, in a global
  fashion, is the key to its increasing pervasiveness. Spammers have
  odds in their favor when thousands of sites do not cooperate in
  detecting or blocking them. The SRN attempts to support global
  detection in a fashion resistant to flaws.

the connected SRN complaint system

  The SRN would work as follows. A provider is responsible for archiving
  complaints sent to itself. A remote site can register a complaint
  about mail emanating from a site with that site. The site is
  responsible for the accuracy of its own complaint database and
  allowing any internet sites to peruse its own complaint database.

  Also, a site will keep a database of complaints against its "adjacent
  sites", or sites that feed into it. If a remote site can show evidence
  that a site failed to record properly a complaint, it can send the
  complaint to the "upstream provider" and that provider will register
  the complaint. This process can continue until an upstream provider
  eventually registers the complaint.

  One way to handle the "upstream complaint escalation" described above
  is to have a site give a "receipt" of a complaint. The site that
  registered this complaint can keep a random number of complaints
  around to verify they have stayed archived after a given amount of
  time, "pinging" the old complaints. If a complaint is not registered,
  the complainee can send the receipt to an upstream site, and the
  upstream site can verify the receipt is genuine and that the
  downstream site failed to record the complaint.

  The complaint databases are accessable to mail delivery servers that
  could query the complaint database of an originating site or its
  adjacent neighbors in deciding whether to accept a message from it. A
  distributed domain-name-server-like system (or member-name-server,
  MNS) could be created that records whether various sites are currently
  "accepted" as members in the SRN, suitable for fast lookups.

  Some kind of system whereby nodes are pushed out of the name database
  automatically depending on complaints can be implemented. It would be
  possible to have multiple, competing MNS systems that have different
  standards with receivers able to customize their choice.

  One can create a system of multiple layers of SRNs. One layer ensures
  that all the sites are correctly archiving complaints sent to each
  other, and sites that do not are kicked out (rogue sites). Another SRN
  layer on top of this basic layer can kick out spamming users (rogue
  users on sites). Note that a lower level layer failure will tend to
  make a higher level impossible. The system cannot succeed unless
  lower-level layers are stable. Higher-level problems should not be
  confused with lower-level ones. The SRN protocols should make explicit
  this layering characteristic. The general idea is that a failure at a
  high-level layer results in a new action at a lower-level layer.

node statistics databases

  Another very useful invention is a "node statistics database" in which
  a server keeps track of statistics associated with nodes that it
  connects to, and keeps it open for queries by other servers. In the
  case of mail, a providers' server could keep track of statistics such
  as:

    * how long a user has been on their system (AGE)
    * how many messages they have sent (MS)
    * total number of bytes sent (BS)
    * total number of different users emailed, or "to: count" (TC), etc.

  The node statistics database could easily be combined with the
  complaint database to allow additional information to receiving sites.
  As many statistics as possible should be archived. Note the above
  statistics do not require much processing time or disk space to
  archive. The statistics would tend to exist in layers, with some at
  the user level, some at the site level, etc.

complaint types

  Note that complaints may be in several categories, and some not
  currently envisaged. The complaint databases should try to record the
  different types of complaints rather than the mere presence of
  complaints. The complaints also refer to different SRN layers; a
  complaint could be against a user on a site or a site on the network.

    * email harassment
    * unsolicited commercial email
    * spurious complaints
    * mailbombing
    * user forgery
    * provider forgery
    * denial-of-service
    * etc.

  The overall combination of statistics and complaint databases, as well
  as and Member Name Servers, comprises a sophisticated reputation
  system for supporting the SRN.

analysis of the mail SRN in operation

  Consider a few basic scenarios, and how the mail SRN (MSRN) handles
  them. The MSRN would be built on top of a site SRN that ensures sites
  behave legitimately.

   1. A user gets a new internet provider, and begins spamming. The
      receiving mail servers are all querying his site's database as he
      attempts to deliver each message.

         + The originating site may notice that certain statistics
           suggest the user is spamming (notice no operator intervention
           is necessary, a completely automated system is possible with
           the database). Maybe the messages will be archived with an
           increasing delay in delivery of each one, they will be
           bounced, the account will be turned off temporarily, etc.
         + Destination sites may query the database and discover the
           user has sent mail to a huge number of different addresses in
           a short amount of time (TC/AGE), that he has sent a lot of
           messages in a short amount of time (MS/AGE), etc. Presumably
           these variable threshholds could be easily customized by the
           receiver to values he considers optimal.
         + They may reject the message prior to it even being
           transferred, in such a way that denial-of-service attacks are
           minimized.
         + Or, the receiving site is a member of a certain kind of
           group, which is updated based on all these statistics, and
           that Member Name Server is queried rapidly to see if the
           sender is contained, and the mail is rejected if not.
         + To address the problem of spammers hopping between sites, the
           sending site could put all users on "probation" in which they
           can't send more than a certain number or size of messages in
           a given amount of time when they are first signed up. As
           their AGE increases, they have more leeway. Such restrictions
           could hopefully be tailored so that they are never
           encountered by legitimate users.

   2. A rogue site creates a fake statistics database in which bogus
      statistics are contained, and allows people to spam from the site.

         + Complaints will accrue to the rogue site. It will either
           refuse to register them or will throw away complaints.
           Complainees can escalate the complaint to a higher site using
           the site SRN that duly either replicates the inability to
           archive the complaint, or is again rogue, in which case the
           complaints continue to escalate to a higher level (the
           complaints escalate until satisfactory response is achieved,
           i.e. at least an archival of the complaint in some place).
         + The Member Name Servers (MNS) routinely query the complaint
           databases and may exclude sites or chains of sites based on
           too many complaints at upstream providers.

   3. User "forges" email address on a message.

      A good system would not permit forgeries. A system superior to
      that currently installed would allow email to be submitted only
      through the provider, and individual users could not create
      headers on messages. In any case, the complaint system could also
      support a framework that rejects sites that permit too many
      forgers. Based on the header of the email message, the mail
      servers could follow a procedure of finding the earliest verified
      originating source address in a dialogue with various servers who
      track mail in statistics databases and register a complaint. If
      users could arbitarily create their own aliases (see below), the
      "legitimate" needs for From: line modification would diminish.

   4. A bunch of users gang up and try to knock a particular user off of
      the system under a vendetta.

      The system could support a verification scheme where someone can
      make a complaint about a given node only if they were involved in
      some interaction with that node, i.e. receiving mail from it. So
      for example an internet provider with the statistics database can
      verify that a complaint is coming from a party that a user
      actually sent mail to, and reject spurious complaints (perhaps
      even complaining about the spurious complaints to that site).
      Sites can "scroll off" information on old transactions.

   5. Internet provider forges header information.

      The receiving mail servers are postulated to have a lot of logic
      that can respond dynamically, and query remote sites. Presumably
      enough information would be available in the headers of messages
      and intermediate servers such that rogue intermediaries could be
      detected and the complaint system invoked without human
      intervention.

other approaches

  A few other approaches deserve mention. Currently a user cannot create
  his own email addresses arbitrarily. Software could easily support
  this feature. Site providers probably do not support it due to the
  potential for abuse. But if outgoing email always had an effective
  "complaint address" irrespective of its originator, site
  administrators may not have a problem if the abuses can be taken care
  of automatically.

  Consider this scenario: a user posts to Usenet under a self-created
  email address. He keep this alias open for about 2 weeks after his
  post, and after he is no longer interested, closes that alias. Or, if
  he finds an alias is receiving too much spam, he could close it off.

  As long as the complaint address on the posted message is accurate (to
  which spam can't be sent to), this practice is not susceptible to
  abuse. If the user begins to spam under an alias, the complaints will
  accrue. Different providers may handle the alias situation in various
  ways. Some may permit anonymity, others pseudonymity (in which
  outsiders can link an alias to an existing account), etc. Note however
  that an automated complaint system can still support anonymity.

  Also, consider a system in which messages are not stored on a
  destination site, only requests. A sender puts a request in the
  receiver's mail queue, storing the message on the sender's site. The
  receiver looks at the header (which may include the subject line, or
  whatever) and decides arbitrarily whether or not to fetch the message.

  Also, systems which store mail, wait some period of time, and forward
  it only if the originating site stays "clean" of complaints or
  inciminating statistics, otherwise bouncing or deleting it, are
  possible.

  A system of "round robin moderation" used in Usenet may be useful for
  aspects of the SRN, like a sort of rotating Neighborhood Watch
  program.

  Another possibility is user configurable blocking options. Servers
  could compile statistics about sites blocked by individual users.
  However, this approach may have the "redundancy" flaw in that spam
  sites have to be repeatedly identified by diverse users.

economics of databases and servers

  Hopefully all the mechanisms described above are economically
  self-sufficient, and users (either end users or internet providers)
  would pay for the value-added services.

  The current internet supports a Domain Name Server system without
  serious economic problems (although it is currently subject to some
  controversy over its administration). Hence similar Member Name
  Servers could probably be created without scaling or architecture
  problems. In some ways they would be similar to the web search engines
  that continually query sites to update their searchable databases.

  Hopefully internet providers will see the statistics databases and
  complaint databases as useful cost-saving automations of services that
  they already have to perform anyway in currently time-consuming human
  interactions. Internet providers already presumably do not wish to
  deal with rogue sites, and the system might be a more automated means
  of identifying and unplugging them. Upstream sites are motivated to
  keep accurate statistics on downstream sites, and downstream sites are
  motivated to keep accurate statistics so they aren't unplugged by
  upstream ones. Also, note that users that require the most database
  processing time are likely to be spammers and are likely to be kicked
  off the system.

  There may be economic incentives such that user demand can be
  leveraged into building it. I.e. certain providers who make the
  development investment (time, code, meetings, etc.) might advertise as
  being part of the "spam free network" and charge a small premium. A
  provider may even find "spamfree" service not only covers the cost of
  overhead, but is lucrative in the face of high demand.

  In some cases, the data that is used for an SRN is already available
  and being archived. For example, most sites already log information
  about past mail transactions, just not in a way that is accessable to
  some kind of protocol or query. Also, informal databases of spammer IP
  addresses are available. As noted, the informal approach of "complaint
  escalations" to upstream providers is already considered a basic
  aspect of Internet culture. This SRN proposal in many ways merely
  suggests ways of rearranging and formalizing procedures and protocols
  that are already in place.

  Obviously, all of the above will require more processing time and
  storage than the current system. IMHO I don't see this as a liability,
  because the current system is proving to be increasingly dysfunctional
  at larger scales, and cycles and disk space are in relative abundance.
  Moreover, the processing time currently associated with mail is
  negligible. There's a lot of room for additional processing while
  still perserving the near-instantaneous-transmission of email. Delays
  of a few seconds are certainly tolerable if the new system really
  provides improved "signal-to-noise" features it is designed to
  support.

  The above ideas vary significantly in terms of difficulty of
  implementation; some can be readily implemented in existing software
  (such as local statistics tracking), others would require significant
  additional independent development efforts. (The system does not
  require every feature be implemented simultaneously to provide
  benefits.) I do not expect any to be implemented quickly; my
  experience suggests that people will tend to resist modifying internet
  software or cooperate to create and implement new software and
  approaches to deal with what is now regarded chiefly as a "social
  problem", doing so only when all other alternatives have been
  exhausted.

  Current mail and Usenet programs currently have very strong degrees of
  inertia due to their widespread use, justifiably so. Changes should
  not be considered lightly. But on the other hand, I think their
  current architecture is revealing itself increasingly at times to be a
  "weak reed to stand on". Billions of email messages are transmitted
  over the Internet with increasingly important contents, and I wonder
  if the informality of current systems continues to be appropriate or
  the best that can be achieved.

free speech, privacy, censorship

  Issues of free speech, privacy, and censorship, barely resolved in the
  government arena, are probably the reason for the dramatic angst that
  typically accompanies any proposal for modification of a communication
  or identification system, particularly related to the internet, which
  contains a very politically active and charged community.

  Hopefully users will not see the statistics databases as Orwellian.
  Statistics such as total bytes sent, total number of addresses sent to
  (not the particular addresses themselves) etc. do not seem at all like
  privacy violations.

  This proposal is offered with the idea that nothing in it interferes
  with free speech or privacy. The right of free speech does not apply
  to anyone who wishes to be heard against the preferences of a
  particular audience. However, a SRN system could be manipulated to
  negative ends. The design I have arrived at has been specifically,
  painstakingly sculpted and crafted to be resistant to "single points
  of failure" or individual tyrannies.

  However, there are always certain hypothetical pathological situations
  in which virtually any technology would fail. This system does not
  seek to solve all problems, but instead only to be more appealing to
  users than the current system is. That is, it can only be fairly
  judged against the existing system and not some hypothetical, possibly
  impossible idealization.

conclusion

  The SRN system creates a sort of Caller ID mechanism by which
  recipients of mail have more flexibility in rejecting messages
  according to their own criteria, and invents a dynamic network
  connectivity based on potentially "rogue" sites. It will be opposed by
  spammers but I hope the larger internet community can see it as
  enhancing, and organize and cooperate enough to implement it or
  something similar.

  The system as proposed has been designed with the current
  idiosyncracies of the internet in mind. It does not require
  significant new technologies such as microcurrency, universal
  identification, etc. although those could be integrated within it with
  positive results. It is a highly distributed system that might scale
  better than even existing technologies. It may become more necessary
  if the current system continues to scale poorly relative to spam.

  The system permits a sort of global information system on rogue users.
  Instead of every victim independently, inefficiently attempting to
  deal with the same problem, the system collects complaints, and
  ideally users could leverage off of each other's knowledge about rogue
  users.

  Ideally the SRN system described above would not be overly difficult
  to implement, and if done so, would significantly change the dynamics
  of the mail network to make spam far less viable. Obviously the
  overall system will fail if there are too many rogue sites that behave
  in pernicious ways (one can ask the question whether anything would
  function in such a scenario), but the expectation is that if the
  majority of sites are not corrupt, the SRN will be effectively
  self-policing in a dynamic, proactive, and responsive manner.

  I propose these ideas only because I suspect they have the potential
  to ultimately save time and effort after setup costs have been
  overcome. If aspects of the SRN prove in practice to be too complex,
  they should be discarded. However, some internet providers, especially
  large ones, have found that spam prevention is a costly,
  time-consuming, and attention-intensive process. No study exists about
  the actual magnitude of the expense, but possibly even a complex
  system could be superior.

  If the network eventually became free of spam, administrators might be
  tempted to turn off the SRN features. However, to my mind this would
  be like taking down a dike because the water is contained. The SRN is
  analogous to an immune system that must be engaged and active to
  prevent infections.

  If effective, by its intentionally general-purpose design, the SRN may
  be useful for areas other than mail such as Usenet, or perhaps in the
  best case, if proven to the satisfaction of the overall internet
  community, even low-level internet connectivity, maybe eliminating
  most denial-of-service attacks.


See also:

Usenet2 - new spamfree form of Usenet
www.usenet2.org

Qmail - new replacement for sendmail by Dan Bernstein
www.qmail.org

CAUCE - Coalition against unsolicited commercial email
www.cauce.org

Boycott SPAM - software, rogue site lists, etc.
spam.abuse.net/spam

------------------------------

Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <[email protected]>
Subject: File 2--Cu Digest Header Info (unchanged since 13 April, 1998)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

    SUBSCRIBE CU-DIGEST
Send the message to:   [email protected]

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  [email protected]
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

        In ITALY: ZERO! BBS: +39-11-6507540

 UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
   Web-accessible from: http://www.etext.org/CuD/CuD/
                 ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                 aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                 world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                 wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
 EUROPE:         nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
                 ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
 URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
           the views of the moderators. Digest contributors assume all
           responsibility for ensuring that articles submitted do not
           violate copyright protections.

------------------------------

End of Computer Underground Digest #10.24
************************************