Re: why IPv6 isn't ready for prime time, SMTP edition
On 3/29/2014 12:59 PM, Jimmy Hess wrote:
*Postage schemes as proposed with end users email clients 'attaching postage' simply not workable Not in IPv4. Not in IPv6. Not in IPng Not in any conceivable future version of IP.
And I insist that we are all wasting our time trying to make SMTP and its supporting protocols (and their kin under IPX/SPC, Sperrylink, UUCP, et alia) are not at the transport layer and nothing at the transport layer is responsible for nor rich with solutions for their problems. IF the overriding problem is due to an inability to identify and authenticate the identification of the sender, then let us work on establishing a protocol for identifying the sender and authenticating the identification of the sender and permitting the receiver to accept or deny acceptance of traffic by reference to that identification. -- Requiescas in pace o email Two identifying characteristics of System Administrators: Ex turpi causa non oritur actio Infallibility, and the ability to learn from their mistakes. (Adapted from Stephen Pinker)
Although that's useful for some situations it's a not at the heart of the spam problem, or is just one small facet at best. People you don't know, like perhaps me right now, will send you email which isn't spam, and which presumably you're ok with receiving. So, it's not the overriding problem with spam. On March 29, 2014 at 18:58 LarrySheldon@cox.net (Larry Sheldon) wrote:
On 3/29/2014 12:59 PM, Jimmy Hess wrote:
*Postage schemes as proposed with end users email clients 'attaching postage' simply not workable Not in IPv4. Not in IPv6. Not in IPng Not in any conceivable future version of IP.
And I insist that we are all wasting our time trying to make SMTP and its supporting protocols (and their kin under IPX/SPC, Sperrylink, UUCP, et alia) are not at the transport layer and nothing at the transport layer is responsible for nor rich with solutions for their problems.
IF the overriding problem is due to an inability to identify and authenticate the identification of the sender, then let us work on establishing a protocol for identifying the sender and authenticating the identification of the sender and permitting the receiver to accept or deny acceptance of traffic by reference to that identification.
-- Requiescas in pace o email Two identifying characteristics of System Administrators: Ex turpi causa non oritur actio Infallibility, and the ability to learn from their mistakes. (Adapted from Stephen Pinker)
-- -Barry Shein The World | bzs@TheWorld.com | http://www.TheWorld.com Purveyors to the Trade | Voice: 800-THE-WRLD | Dial-Up: US, PR, Canada Software Tool & Die | Public Access Internet | SINCE 1989 *oo*
IF the overriding problem is due to an inability to identify and authenticate the identification of the sender, then let us work on establishing a protocol for identifying the sender and authenticating the identification of the sender and permitting the receiver to accept or deny acceptance of traffic by reference to that identification.
We've got DKIM, SPF, S/MIME, and PGP. What more do you want? R's, John
Sent from my BlackBerry 10 smartphone on the Rogers network. Original Message From: John Levine Sent: Saturday, March 29, 2014 11:35 PM To: nanog@nanog.org Subject: Re: why IPv6 isn't ready for prime time, SMTP edition
IF the overriding problem is due to an inability to identify and authenticate the identification of the sender, then let us work on establishing a protocol for identifying the sender and authenticating the identification of the sender and permitting the receiver to accept or deny acceptance of traffic by reference to that identification.
We've got DKIM, SPF, S/MIME, and PGP. What more do you want? R's, John
participants (4)
-
Barry Shein
-
hammani.b@gmail.com
-
John Levine
-
Larry Sheldon