Computer underground Digest    Sun  Apr 19, 1998   Volume 10 : Issue 24
                           ISSN  1004-042X

       Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
       News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
       Archivist: Brendan Kehoe
       Shadow Master: Stanton McCandlish
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Field Agent Extraordinaire:   David Smith
       Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #10.24 (Sun, Apr 19, 1998)

File 1--proposal of technical solutions to spam problem
File 2--Cu Digest Header Info (unchanged since 13 April, 1998)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Tue, 31 Mar 98 21:35:02 -0800
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Subject: File 1--proposal of technical solutions to spam problem

This essay is archived under the "cybernetics" section at
   www8.pair.com/mnajtiv/

see bottom for other links


                          SRN, Self Regulated Network

a proposal of technical solutions to the spam problem

     * intro
     * what is spam?
     * history of spam
     * is spam worsening?
     * the software problem
     * economic approaches
     * identification systems
     * proposal for a self-regulating network (SRN)
     * observations on example informal SRNs
     * the connected SRN complaint system
     * node statistics databases
     * complaint types
     * analysis of the mail SRN in operation
     * other approaches
     * economics of databases and servers
     * free speech, privacy, censorship
     * conclusion

intro

   This paper examines the internet "spam" problem and seeks to find
   technical solutions. By technical I am referring to solutions that do
   not require social conventions, legislative, or litigatory approaches.
   It is an open problem as to whether a technical solution exists,
   however I consider the following to outline many excellent
   possibilities that haven't been seriously explored (and I wouldn't
   agree that a technical solution does not exist until variations on the
   following have been exhausted).

   I have been using the internet since 1989 and have subscribed to many
   mailing lists and newsgroups. IMHO the spam problem has become
   progressively worse and I see no reason why this downward spiral will
   not continue without proactive action by concerned users. In the past
   I have advocated some ideas only to meet various degrees of resistance
   and hostility. Maybe the current climate will prove to be more
   amenable to a rational discussion of these crucial issues (or perhaps
   the opposite). The good news is that many technical solutions may be
   available to minimize the problem.

   I suspect all easy, localized approaches toward solutions may have
   been exhausted by now. I believe a collaborative solution is
   necessary.

   Personally, I believe that spam legislation has the potential to
   actually mar the internet. Even if a law existed, enforcement may be
   impossible, or draconian. IMHO legislative solutions should be avoided
   at all costs. It could lead to another new government bureacracy that
   fails to fulfill its function, not because of ineptitude, but because
   of a fundamental impossibility.

what is spam?

   It is difficult to define "spam". If a definition precise enough to be
   specified in computer code was possible, the problem would probably
   not exist, as users could simply run some kind of automated filter to
   delete it. Is it "unsolicited commercial email"? This is one
   definition that seems clear and reasonable. But it is subject to
   similar ambiguity. Suppose I post to a newsgroup and request
   information on "fly fishing". I receive a few helpful replies.
   However, I continue to receive replies several months later, from fly
   fishing companies, long after I am interested in the subject. When did
   the email become spam?

   Another situation may occur in which I receive lots of "unsolicited
   commercial email", but then suddenly receive an offer that I find
   extremely valuable. Would I have wished it to be rejected by a filter?

   The definition of spam that I will use in this paper will tend to
   adhere to two basic ideas around which an automated system can be
   developed:

     * spam is email that leads to subjective complaints
     * spam is email that fits certain objective statistical properties

history of spam

   Unfortunately spam is a problem that has existed long before
   cyberspace, which the particular economic dynamics of cyberspace has
   exacerbated. Spam has existed with postal mail and telephone calls. In
   the case of postal mail, at least a cost is involved in the
   distribution that may make it economically unviable in a variety of
   situations. The phone is similar, although automated systems that
   could deliver messages unattended changed the picture somewhat. The
   low cost of sending a message in cyberspace means spam is much more
   economically viable on the internet. (The "true" cost of email is
   subject to debate, but it seems clear that cyberspace message
   transmission is inherently inexpensive-- it is much of its reason for
   existence.)

   If someone could come up with an elegant solution to spam in
   cyberspace, there is reason to suppose that it might be implemented in
   these other realms as well. Fame, glory, and perhaps riches await
   whoever can pull it off. Unfortunately it seems to tend to require
   collaborative solutions, something that is eminently feasible and
   ubiquitious in cyberspace but difficult to initiate due to a
   characteristic independent attitude of internet users. I believe there
   is a bias among internet designers and programmers that virtually all
   problems can be solved locally, and that the nagging persistence of
   spam is a disproof.

is spam worsening?

   Spam appears to exhibit an interesting property. In small networks,
   apparently social taboo and stigma seems enough to keep people from
   spamming. However, as network sizes and degrees of anonymity seem to
   increase, the irresponsibility seems to increase as well. In other
   words, it's a problem that gets worse as network sizes increase. The
   spam situation seems to be a serious challenge to the fundamental
   scalability that the internet supposely embodies. This is often
   referred to as the "tragedy of the commons" quagmire of social
   systems, apparently referring to the tendency of farmers to overgraze
   an area with their livestock to society-as-a-whole's detriment (and
   even to their own).

   No studies exist about the percent of spam in small networks relative
   to large ones, but anecdotal experience of users seems to confirm the
   basic "the bigger it gets, the greater the proportion of spam" rule.
   An obvious reason for this is that a small audience does not make
   spamming useful enough to attract the element that perpetrates it.

   The internet was started in the mid-1970's as a system that could
   theoretically survive a nuclear attack by its seamless and invisible
   means of rerouting messages around failure points in the network.
   However, an interesting assumption in this configuration is now coming
   into focus in hindsight. Original designers assumed all "nodes" on the
   network would function according to specification. They did not
   consider the possibility that parts of the network might become
   "infected" in the sense of not behaving according to standard. Let us
   call this a "rogue site". Herein, a site that specializes in spam will
   be considered a rogue site.

   The problem becomes more serious when there is no overseeing policing
   entity. Some people will point to the beauty of the internet as its
   freedom from an overseeing agency, but in fact the lack of one may
   make it unstable in some ways. It is a hacker's paradise. Consider an
   internet site that does nothing but spam or mount denial-of-service
   attacks against other sites. There is currently no technical mechanism
   by which such a rogue site can be officially "removed" from the
   community. Each site must deal with these kinds of attacks
   independently. The system as a whole has persisted in spite of this
   apparent flaw, but this means of dealing with rogue sites seems
   inherently inelegant. IMHO A good, robust new network system should
   address the "denial of service" problem at many layers all the way
   down to lower level protocols.

   However, IMHO the internet community is wise to be wary (at some
   times, it seems, almost to the point of paranoia) of centralized
   controlling entities of the internet. One of the great values of the
   internet is the way in which it has been able to grow organically with
   a minimum of overseeing or centralized tracking/intervention. An ideal
   solution to the spam problem would be completely distributed and not
   require any "spam agency" or similarly unpalatable invention. The
   question that arises is, can a community self-police itself? Is there
   an equivalent of a "community watch" program for cyberspace? I think
   the answer is "yes" with a lot of ingenuity and will elaborate on this
   point.

   One problem of the internet is that increasing bandwidth has tended to
   disguise and exacerbate the spam problem. If more bandwidth is
   available, providers can pass increasing amounts of spam messages
   without it having any major economic cost. A secret of the internet's
   success is a curve of decreasing bandwidth costs. This means that
   spam, like all other activities on the net, becomes cheaper and
   cheaper. Generally in Usenet software, improved efficiency in
   mechanisms for transferring messages have been pursued instead of
   approaches for dealing with spam.

the software problem

   Currently the large mass of internet sites use a mail program called
   Sendmail developed chiefly by Eric Allman. Will all due respect to the
   author and maintainers, IMHO the program is an embodiment in awkward
   and monolithic legacy software. It features many extremely arcane
   syntax rules and inscrutable conventions. Some users take pride in the
   system but I currently see it as an obstacle to more sophisticated
   email transfer systems. It has not proven agile and able to deal with
   new developments and demands. IMHO new email systems with entirely
   different approaches embodying flexibility and modularity must be
   developed if the spam problem is to be solved in an elegant way.
   Ideally market forces could be unleashed to pursue a flexible mail
   package with good spam solution.

   One of the deficiencies in sendmail is the inability to reject email
   based on header information alone. An elegant email delivery system
   might involve a sort of handshake going on between a receiver and
   sender in which varying degrees of information (such as digital
   signatures, passwords, etc.) are exchanged before the receiver agrees
   to "accept" the message. The current standards do not really support
   this. This allows the practice of "mailbombing" in which a massive set
   of email can inundate a mail server.

   In some cases, mail servers are configured to "drop on the floor"
   without notification of the sender mail messages that are considered
   to be possible spam. This seems very extreme-- in a robust system the
   sender always ought to know at least if the mail is rejected or not
   being delivered.

   Many of the limiting aspects of Sendmail are intertwined with the
   RFC822 standard for exchanging email. IMHO the RFC822 standard is just
   as venerable and limited as Sendmail. Some of the ideas I am proposing
   here are equivalent to a enhanced RFC822 standard, which would involve
   new headers and new mail exchange protocols. Increased functionality
   has a price, but IMHO in this case it's worth it.

economic approaches

   Some people propose a "user pays" system in which people who sent the
   email would pay for the cost. But in fact the beauty of cyberspace is
   the low actual cost associated with merely moving electrons through a
   wire. IMHO it is unlikely that the true economic cost of sending email
   is actually larger than what spammers are now paying (typically an
   internet account). In other words, it is inherently very cheap to move
   bits around in cyberspace, and even if spammers were being charged the
   "true amount" that it costs to send huge batches of email, I assume it
   would only be marginally larger than the cost of their internet
   account. In fact, decreases in the cost of network transmission (i.e.
   higher bandwidth for less cost) will tend to make spam even more
   cost-effective and thereby annoyingly pervasive in time.

   Another interesting proposal involves microcurrency. In this idea a
   receiver could implement a charge on email. The sender would have to
   "enclose" the money required in an email or the email would be
   rejected. (This is an example where it makes sense to have a protocol
   that can exchange information, such as the microcurrency, before the
   message is accepted.) When the respondent might reply to the earlier
   sender, he could return the microcharge in his own envelope,
   reimbursing the sender. If he feels the person has wasted his time, he
   can withhold a return. In this system, email users can put any price
   on the scarce commodity involved: their attention.

   I consider this a very attractive approach, but unfortunately current
   mail protocols do not support this system. Moreover, despite that
   microcurrency might involve extremely non-costly economic
   transactions, thereby overcoming the major hurdle of implementing it
   (resistance to anything costly by users), microcurrency development
   and integration into internet protocols has been proceeding extremely
   slowly. It seems likely that spam will continue to persist for a long
   time before a good universal microcurrency system that is integrated
   into internet protocols is developed.

identification systems

   One problem associated with mail delivery is the lack of a universal
   identity verification system on the internet. Such a system need not
   have any Orwellian implications, it might not do anything except
   ensure that mail cannot be forged (while still permitting unlimited
   pseudonymity by anyone on the internet). Complex issues such as
   cryptographic algorithm patents are involved here. It seems likely
   that, like microcurrency, such a system will not be implemented in a
   semi-universal way for some time. In the meantime, the spam problem
   demands an immediate solution.

   Once a semi-universal identification system is in place, a good mail
   standard would easily support it. If the mail server allowed a
   conversation between source and reciever before the message was
   actually transmitted, that interaction could easily (and would
   presumably by design) contain verification information.

proposal for a self-regulating network (SRN)

   The sophisticated technical idea I have been experimenting
   conceptually with for several years that may solve the spam problem
   and a host of related problems (such as denial-of-service) is what I
   call a "self-regulating network" (SRN for short). It is an idea that
   avoids the deficiencies of the potential approaches suggested above,
   and was designed very specifically to fit into the current
   distributed, decentralized nature of the internet. It will tend to
   require authentication systems to verify identity but they could be
   password-based. Cryptographic systems may improve the security of the
   system but hopefully are not entirely necessary.

   A SRN is a network that does not assume full future connectivity of
   all nodes. It presumes that some nodes currently within the network
   may have to be detached at the "discretion" of people running other
   nodes. The entire entity is seen as a sort of organism in which nodes
   are analogous to cells, and some cells may be cancerous (i.e. those
   that participate in acti
   here, an FCN is a network that has no such formal regulating mechanism
   (it may have informal mechanisms that for purposes here won't be
   considered part of the "system"). Indeed, multiple SRN topologies can
   exist on top of a FCN in the way that virtual networks exist on top of
   the internet. When I describe the operations of the SRN, it should not
   be taken to be a proposal for regulating the current internet
   connectivity. It is a proposal for creating virtual SRNs on top of the
   internet FCN under the discretion and voluntary cooperation of
   participants. In particular it will focus on internet providers
   creating a SRN, a sort of self-policing electronic guild system.

observations on example informal SRNs

   Examples of "informal" SRNs that exist today on the internet are:

     * individual site administrators routinely filter packets from
       certain rogue sites
     * in Usenet, administrators may disconnect rogue sites from the
       network
     * mail server administrators may bar messages transferred from
       unknown sites (or perhaps kick off an existing user) in an attempt
       to deal with the spam problem

   The characteristic that virtually all these situations have in common
   is that they are informal SRNs, and that connectivity is related to
   informal judgement. The community, in a sense, measures rogue sites by
   observations of the behavior, blocking, and complaints about these
   sites. Is there some way to formalize this? The proposal I am focusing
   on would create a system in which observations, blocking, and
   complaints are not isolated or passed around informally around a
   network "out-of-band", but instead considered an inherent part of the
   network connectivity system and transmitted/shared in standard
   protocols.

   The difficulty is that one probably cannot have a centralized
   complaint registration server. The potential for abuse is high, and
   scalability, the key requirement of network connectivity, is lacking
   with this approach.

   Hence I have been working on a system for a distributed complaint
   system in which there is no centralized complaint server, but
   complaints are still recorded in a systematic way. Consider an
   application of this to mail servers in which people can complain about
   mail emanating from a site to the originating site. The general idea
   is that an automated complaint address would exist for each mail
   originating site, to which receivers can register complaints in
   machine-readable form.

   In the current internet, there is a definite "food chain" of providers
   connecting to "adjacent" providers. Informally, people may sometimes
   complain to an "upstream provider" if they fail to obtain reasonable
   results from a complaint to a particular provider. The goal of a SRN
   is to encode this informal network in a protocol.

   A major problem with informal, localized "blocking" of sites
   implemented today is that, inherently, rogue sites are a global
   problem. If denial-of-service or other kinds of rogue behavior (e.g.
   spamming) are mounted from a site, that's a problem for all sites, and
   ideally detection would not have to be inefficiently repeated all over
   the internet by each site subject to the attack. Arguably, the failure
   of the existing system to deal with this problem robustly, in a global
   fashion, is the key to its increasing pervasiveness. Spammers have
   odds in their favor when thousands of sites do not cooperate in
   detecting or blocking them. The SRN attempts to support global
   detection in a fashion resistant to flaws.

the connected SRN complaint system

   The SRN would work as follows. A provider is responsible for archiving
   complaints sent to itself. A remote site can register a complaint
   about mail emanating from a site with that site. The site is
   responsible for the accuracy of its own complaint database and
   allowing any internet sites to peruse its own complaint database.

   Also, a site will keep a database of complaints against its "adjacent
   sites", or sites that feed into it. If a remote site can show evidence
   that a site failed to record properly a complaint, it can send the
   complaint to the "upstream provider" and that provider will register
   the complaint. This process can continue until an upstream provider
   eventually registers the complaint.

   One way to handle the "upstream complaint escalation" described above
   is to have a site give a "receipt" of a complaint. The site that
   registered this complaint can keep a random number of complaints
   around to verify they have stayed archived after a given amount of
   time, "pinging" the old complaints. If a complaint is not registered,
   the complainee can send the receipt to an upstream site, and the
   upstream site can verify the receipt is genuine and that the
   downstream site failed to record the complaint.

   The complaint databases are accessable to mail delivery servers that
   could query the complaint database of an originating site or its
   adjacent neighbors in deciding whether to accept a message from it. A
   distributed domain-name-server-like system (or member-name-server,
   MNS) could be created that records whether various sites are currently
   "accepted" as members in the SRN, suitable for fast lookups.

   Some kind of system whereby nodes are pushed out of the name database
   automatically depending on complaints can be implemented. It would be
   possible to have multiple, competing MNS systems that have different
   standards with receivers able to customize their choice.

   One can create a system of multiple layers of SRNs. One layer ensures
   that all the sites are correctly archiving complaints sent to each
   other, and sites that do not are kicked out (rogue sites). Another SRN
   layer on top of this basic layer can kick out spamming users (rogue
   users on sites). Note that a lower level layer failure will tend to
   make a higher level impossible. The system cannot succeed unless
   lower-level layers are stable. Higher-level problems should not be
   confused with lower-level ones. The SRN protocols should make explicit
   this layering characteristic. The general idea is that a failure at a
   high-level layer results in a new action at a lower-level layer.

node statistics databases

   Another very useful invention is a "node statistics database" in which
   a server keeps track of statistics associated with nodes that it
   connects to, and keeps it open for queries by other servers. In the
   case of mail, a providers' server could keep track of statistics such
   as:

     * how long a user has been on their system (AGE)
     * how many messages they have sent (MS)
     * total number of bytes sent (BS)
     * total number of different users emailed, or "to: count" (TC), etc.

   The node statistics database could easily be combined with the
   complaint database to allow additional information to receiving sites.
   As many statistics as possible should be archived. Note the above
   statistics do not require much processing time or disk space to
   archive. The statistics would tend to exist in layers, with some at
   the user level, some at the site level, etc.

complaint types

   Note that complaints may be in several categories, and some not
   currently envisaged. The complaint databases should try to record the
   different types of complaints rather than the mere presence of
   complaints. The complaints also refer to different SRN layers; a
   complaint could be against a user on a site or a site on the network.

     * email harassment
     * unsolicited commercial email
     * spurious complaints
     * mailbombing
     * user forgery
     * provider forgery
     * denial-of-service
     * etc.

   The overall combination of statistics and complaint databases, as well
   as and Member Name Servers, comprises a sophisticated reputation
   system for supporting the SRN.

analysis of the mail SRN in operation

   Consider a few basic scenarios, and how the mail SRN (MSRN) handles
   them. The MSRN would be built on top of a site SRN that ensures sites
   behave legitimately.

    1. A user gets a new internet provider, and begins spamming. The
       receiving mail servers are all querying his site's database as he
       attempts to deliver each message.

          + The originating site may notice that certain statistics
            suggest the user is spamming (notice no operator intervention
            is necessary, a completely automated system is possible with
            the database). Maybe the messages will be archived with an
            increasing delay in delivery of each one, they will be
            bounced, the account will be turned off temporarily, etc.
          + Destination sites may query the database and discover the
            user has sent mail to a huge number of different addresses in
            a short amount of time (TC/AGE), that he has sent a lot of
            messages in a short amount of time (MS/AGE), etc. Presumably
            these variable threshholds could be easily customized by the
            receiver to values he considers optimal.
          + They may reject the message prior to it even being
            transferred, in such a way that denial-of-service attacks are
            minimized.
          + Or, the receiving site is a member of a certain kind of
            group, which is updated based on all these statistics, and
            that Member Name Server is queried rapidly to see if the
            sender is contained, and the mail is rejected if not.
          + To address the problem of spammers hopping between sites, the
            sending site could put all users on "probation" in which they
            can't send more than a certain number or size of messages in
            a given amount of time when they are first signed up. As
            their AGE increases, they have more leeway. Such restrictions
            could hopefully be tailored so that they are never
            encountered by legitimate users.

    2. A rogue site creates a fake statistics database in which bogus
       statistics are contained, and allows people to spam from the site.

          + Complaints will accrue to the rogue site. It will either
            refuse to register them or will throw away complaints.
            Complainees can escalate the complaint to a higher site using
            the site SRN that duly either replicates the inability to
            archive the complaint, or is again rogue, in which case the
            complaints continue to escalate to a higher level (the
            complaints escalate until satisfactory response is achieved,
            i.e. at least an archival of the complaint in some place).
          + The Member Name Servers (MNS) routinely query the complaint
            databases and may exclude sites or chains of sites based on
            too many complaints at upstream providers.

    3. User "forges" email address on a message.

       A good system would not permit forgeries. A system superior to
       that currently installed would allow email to be submitted only
       through the provider, and individual users could not create
       headers on messages. In any case, the complaint system could also
       support a framework that rejects sites that permit too many
       forgers. Based on the header of the email message, the mail
       servers could follow a procedure of finding the earliest verified
       originating source address in a dialogue with various servers who
       track mail in statistics databases and register a complaint. If
       users could arbitarily create their own aliases (see below), the
       "legitimate" needs for From: line modification would diminish.

    4. A bunch of users gang up and try to knock a particular user off of
       the system under a vendetta.

       The system could support a verification scheme where someone can
       make a complaint about a given node only if they were involved in
       some interaction with that node, i.e. receiving mail from it. So
       for example an internet provider with the statistics database can
       verify that a complaint is coming from a party that a user
       actually sent mail to, and reject spurious complaints (perhaps
       even complaining about the spurious complaints to that site).
       Sites can "scroll off" information on old transactions.

    5. Internet provider forges header information.

       The receiving mail servers are postulated to have a lot of logic
       that can respond dynamically, and query remote sites. Presumably
       enough information would be available in the headers of messages
       and intermediate servers such that rogue intermediaries could be
       detected and the complaint system invoked without human
       intervention.

other approaches

   A few other approaches deserve mention. Currently a user cannot create
   his own email addresses arbitrarily. Software could easily support
   this feature. Site providers probably do not support it due to the
   potential for abuse. But if outgoing email always had an effective
   "complaint address" irrespective of its originator, site
   administrators may not have a problem if the abuses can be taken care
   of automatically.

   Consider this scenario: a user posts to Usenet under a self-created
   email address. He keep this alias open for about 2 weeks after his
   post, and after he is no longer interested, closes that alias. Or, if
   he finds an alias is receiving too much spam, he could close it off.

   As long as the complaint address on the posted message is accurate (to
   which spam can't be sent to), this practice is not susceptible to
   abuse. If the user begins to spam under an alias, the complaints will
   accrue. Different providers may handle the alias situation in various
   ways. Some may permit anonymity, others pseudonymity (in which
   outsiders can link an alias to an existing account), etc. Note however
   that an automated complaint system can still support anonymity.

   Also, consider a system in which messages are not stored on a
   destination site, only requests. A sender puts a request in the
   receiver's mail queue, storing the message on the sender's site. The
   receiver looks at the header (which may include the subject line, or
   whatever) and decides arbitrarily whether or not to fetch the message.

   Also, systems which store mail, wait some period of time, and forward
   it only if the originating site stays "clean" of complaints or
   inciminating statistics, otherwise bouncing or deleting it, are
   possible.

   A system of "round robin moderation" used in Usenet may be useful for
   aspects of the SRN, like a sort of rotating Neighborhood Watch
   program.

   Another possibility is user configurable blocking options. Servers
   could compile statistics about sites blocked by individual users.
   However, this approach may have the "redundancy" flaw in that spam
   sites have to be repeatedly identified by diverse users.

economics of databases and servers

   Hopefully all the mechanisms described above are economically
   self-sufficient, and users (either end users or internet providers)
   would pay for the value-added services.

   The current internet supports a Domain Name Server system without
   serious economic problems (although it is currently subject to some
   controversy over its administration). Hence similar Member Name
   Servers could probably be created without scaling or architecture
   problems. In some ways they would be similar to the web search engines
   that continually query sites to update their searchable databases.

   Hopefully internet providers will see the statistics databases and
   complaint databases as useful cost-saving automations of services that
   they already have to perform anyway in currently time-consuming human
   interactions. Internet providers already presumably do not wish to
   deal with rogue sites, and the system might be a more automated means
   of identifying and unplugging them. Upstream sites are motivated to
   keep accurate statistics on downstream sites, and downstream sites are
   motivated to keep accurate statistics so they aren't unplugged by
   upstream ones. Also, note that users that require the most database
   processing time are likely to be spammers and are likely to be kicked
   off the system.

   There may be economic incentives such that user demand can be
   leveraged into building it. I.e. certain providers who make the
   development investment (time, code, meetings, etc.) might advertise as
   being part of the "spam free network" and charge a small premium. A
   provider may even find "spamfree" service not only covers the cost of
   overhead, but is lucrative in the face of high demand.

   In some cases, the data that is used for an SRN is already available
   and being archived. For example, most sites already log information
   about past mail transactions, just not in a way that is accessable to
   some kind of protocol or query. Also, informal databases of spammer IP
   addresses are available. As noted, the informal approach of "complaint
   escalations" to upstream providers is already considered a basic
   aspect of Internet culture. This SRN proposal in many ways merely
   suggests ways of rearranging and formalizing procedures and protocols
   that are already in place.

   Obviously, all of the above will require more processing time and
   storage than the current system. IMHO I don't see this as a liability,
   because the current system is proving to be increasingly dysfunctional
   at larger scales, and cycles and disk space are in relative abundance.
   Moreover, the processing time currently associated with mail is
   negligible. There's a lot of room for additional processing while
   still perserving the near-instantaneous-transmission of email. Delays
   of a few seconds are certainly tolerable if the new system really
   provides improved "signal-to-noise" features it is designed to
   support.

   The above ideas vary significantly in terms of difficulty of
   implementation; some can be readily implemented in existing software
   (such as local statistics tracking), others would require significant
   additional independent development efforts. (The system does not
   require every feature be implemented simultaneously to provide
   benefits.) I do not expect any to be implemented quickly; my
   experience suggests that people will tend to resist modifying internet
   software or cooperate to create and implement new software and
   approaches to deal with what is now regarded chiefly as a "social
   problem", doing so only when all other alternatives have been
   exhausted.

   Current mail and Usenet programs currently have very strong degrees of
   inertia due to their widespread use, justifiably so. Changes should
   not be considered lightly. But on the other hand, I think their
   current architecture is revealing itself increasingly at times to be a
   "weak reed to stand on". Billions of email messages are transmitted
   over the Internet with increasingly important contents, and I wonder
   if the informality of current systems continues to be appropriate or
   the best that can be achieved.

free speech, privacy, censorship

   Issues of free speech, privacy, and censorship, barely resolved in the
   government arena, are probably the reason for the dramatic angst that
   typically accompanies any proposal for modification of a communication
   or identification system, particularly related to the internet, which
   contains a very politically active and charged community.

   Hopefully users will not see the statistics databases as Orwellian.
   Statistics such as total bytes sent, total number of addresses sent to
   (not the particular addresses themselves) etc. do not seem at all like
   privacy violations.

   This proposal is offered with the idea that nothing in it interferes
   with free speech or privacy. The right of free speech does not apply
   to anyone who wishes to be heard against the preferences of a
   particular audience. However, a SRN system could be manipulated to
   negative ends. The design I have arrived at has been specifically,
   painstakingly sculpted and crafted to be resistant to "single points
   of failure" or individual tyrannies.

   However, there are always certain hypothetical pathological situations
   in which virtually any technology would fail. This system does not
   seek to solve all problems, but instead only to be more appealing to
   users than the current system is. That is, it can only be fairly
   judged against the existing system and not some hypothetical, possibly
   impossible idealization.

conclusion

   The SRN system creates a sort of Caller ID mechanism by which
   recipients of mail have more flexibility in rejecting messages
   according to their own criteria, and invents a dynamic network
   connectivity based on potentially "rogue" sites. It will be opposed by
   spammers but I hope the larger internet community can see it as
   enhancing, and organize and cooperate enough to implement it or
   something similar.

   The system as proposed has been designed with the current
   idiosyncracies of the internet in mind. It does not require
   significant new technologies such as microcurrency, universal
   identification, etc. although those could be integrated within it with
   positive results. It is a highly distributed system that might scale
   better than even existing technologies. It may become more necessary
   if the current system continues to scale poorly relative to spam.

   The system permits a sort of global information system on rogue users.
   Instead of every victim independently, inefficiently attempting to
   deal with the same problem, the system collects complaints, and
   ideally users could leverage off of each other's knowledge about rogue
   users.

   Ideally the SRN system described above would not be overly difficult
   to implement, and if done so, would significantly change the dynamics
   of the mail network to make spam far less viable. Obviously the
   overall system will fail if there are too many rogue sites that behave
   in pernicious ways (one can ask the question whether anything would
   function in such a scenario), but the expectation is that if the
   majority of sites are not corrupt, the SRN will be effectively
   self-policing in a dynamic, proactive, and responsive manner.

   I propose these ideas only because I suspect they have the potential
   to ultimately save time and effort after setup costs have been
   overcome. If aspects of the SRN prove in practice to be too complex,
   they should be discarded. However, some internet providers, especially
   large ones, have found that spam prevention is a costly,
   time-consuming, and attention-intensive process. No study exists about
   the actual magnitude of the expense, but possibly even a complex
   system could be superior.

   If the network eventually became free of spam, administrators might be
   tempted to turn off the SRN features. However, to my mind this would
   be like taking down a dike because the water is contained. The SRN is
   analogous to an immune system that must be engaged and active to
   prevent infections.

   If effective, by its intentionally general-purpose design, the SRN may
   be useful for areas other than mail such as Usenet, or perhaps in the
   best case, if proven to the satisfaction of the overall internet
   community, even low-level internet connectivity, maybe eliminating
   most denial-of-service attacks.


See also:

Usenet2 - new spamfree form of Usenet
www.usenet2.org

Qmail - new replacement for sendmail by Dan Bernstein
www.qmail.org

CAUCE - Coalition against unsolicited commercial email
www.cauce.org

Boycott SPAM - software, rogue site lists, etc.
spam.abuse.net/spam

------------------------------

Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 2--Cu Digest Header Info (unchanged since 13 April, 1998)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

     SUBSCRIBE CU-DIGEST
Send the message to:   cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

         In ITALY: ZERO! BBS: +39-11-6507540

  UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
    Web-accessible from: http://www.etext.org/CuD/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #10.24
************************************