R: R: R: [jdev] about spim techniques

Ian Paterson ian.paterson at clientside.co.uk
Sun Aug 28 05:45:09 CDT 2005


Hi,

I just posted on this subject to the Standards-JIG list because IMHO we
need new JEPs.

- Ian


> -----Original Message-----
> From: jdev-bounces at jabber.org 
> [mailto:jdev-bounces at jabber.org] On Behalf Of Ian Paterson
> Sent: 28 August 2005 11:40
> To: 'Jabber software development list'
> Subject: [jdev] [Standards-JIG] anti-spim techniques
> 
> 
> Ensuring SPIM will not be worthwhile, even with a network of 
> 'zombie' client or server machines, clearly needs multiple 
> measures. IMHO we need to move forward ASAP with some of the 
> good ideas that Tijl, Sander and others were putting forward 
> on the JDEV list yesterday. (I've tried to summarise them here.)
> 
> 
> Has Sander (or anyone else), got some time to write a first 
> draft of a new generally-useful 'Bot-Proof Challenges' JEP? 
> This could include inband delivery of images and CPU 
> challenges (e.g. find a string where the least significant 
> bits of the hash have a specific value).
> 
> The first application of that new 'building block' protocol 
> could be another new JEP that either extends or replaces 
> JEP-0077 (In-Band Registration).
> 
> I'd also like to see a procedure and protocol JEP that allows 
> a client to complain about the SPIM it is receiving (both to 
> its own server and to the sending server). This JEP might 
> also make use of the Bot-Proof Challenges to exonerate people 
> and to create a barrier against malicious multiple reporting.
> 
> If despite our other efforts we find people are still 
> bothered by SPIM, then clients could use the Bot-Proof 
> Challenges (with JEP-0155?) to verify each new correspondant, 
> who is not on the roster, is human.
> 
> 
> Server Implementors and Administrators have a lot more weapons against
> SPIM:
> - Dialback
> - Karma
> - Invite-only and/or out-of-band registration
> - Outgoing message filtering?
> - IP blocking
> (If admins don't use some or all of these approaches then I 
> agree they should be accountable for any SPIM their users send.)
> 
> Once enough clients implement e2e encryption then people 
> could insist that all correspondants use it, making SPIM far 
> more CPU-expensive.
> 
> 
> As I am confident we will be able to mitigate the SPIM 
> problem to the extent that:
> 
> 1. People do not need to block all messages from people not 
> on their rosters. 2. All public servers are free to 
> interconnect (as long as they have a domain cert from a JSF 
> approved authority and do not appear on the authority's black list).
> 
> As Sander mentioned, the JSF-approved certificate agreement 
> should legally disallow SPIM and provide tough penalty 
> clauses for clear abuses. (These agreements would probably 
> need to be drawn up under the laws of countries that are not 
> friendly to spammers.)
> 
> 
> > what will happen if a CA gets blacklisted?
> 
> Any certs it issues after the blacklisting are invalid. Certs 
> issued before *may* become invalid later if their owners 
> abuse (another CA could be appointed to handle that).
> 
> > providers even might want to send email over XMPP... ;-)
> 
> Seriously, I do expect email SPAM will motivate most people 
> to switch from email to offline IM delivery within the next 
> few years (as long as we minimise SPIM and improve our 
> offline message handling implementations).
> 
> > The call to Google to open their network now, today, is not very 
> > realistic, because we have a lot of work to do first.
> 
> Yes.
> 
> - Ian
> 
> _______________________________________________
> jdev mailing list
> jdev at jabber.org
> http://mail.jabber.org/mailman/listinfo/jdev
> 




More information about the JDev mailing list