ietf
[Top] [All Lists]

Joint legal/technical anti-spam effort

2003-05-25 23:11:38

Below is an example of how technology and the law could work together,
with both camps bringing essential pieces of the puzzle to the table.

What should be most obvious from this exercise is that there needs to be
somebody willing to intermediate between the legislature and the
engineers. Otherwise, they will produce ineffective laws and we will
produce ineffective technologies, both in isolation.

Objectives:

  minimize the need for post-transfer spam detection

    - provide technical measures for refusing mail prior to transfer

    - provide legal backup for when the technical measures are ignored

  fundamental premise is preservation of property rights

    - my bandwidth/storage/cpu is my property

    - this extends into privacy realm; some users may choose to put
      up virtual "no trespassing" signs and those prohibitions
      should be protected under the same principles (gradeschool
      children, emergency-responder mailboxes, hermits, etc)

Technical measures:

  Short-Term

    - RCPT TO response codes signifying acceptance levels, EG:

    - 250 (default) what the law allows by default

    - 255 (stiff) no solicitations at all

    - 259 (extreme) no trespassing -- authorized senders only

    - 25x allows interoperability but other codes may be more useful,

    - especially considering different jurisdictions will likely need
      their own codes

    - organizations can set default as policy requires, or can allow
      users to set according to preference

  Medium-Term

    - improve accountability measures in email

    - possibile work areas include encouraging authentication, PTRs,
      TLS and certificates, etc.

  Long-Term

    - reinvention of mail transfer service

    - eg, recursive signatures of modernized "Received" headers allow
      path validation at any hop

    - global directory technologies for key retrieval and other uses

Legal Measures:

  Must be defined per-jurisdiction but some US examples might be:

  Definitions

    - define problem messages as any solicitation, such as for money
      or action (eg "click here")

    - some exceptions such as charities, government, others, MAYBE

    - violations after grace period (1 year?) subject to law

  Protection

    - default case, recent prior relationship is okay

    - recipients may always refuse (eg, stronger response codes)

    - recipients may opt-out even if a current relationship exists

    - no opt-in explicitly required but encouraged by penalties

  Penalties

    - recipient has private civil recourse

    - $500 per unlawful recipient, treble for willful violations

    - can file against beneficiary if invalid recipient

    - can file against bulk-mailer if response codes ignored

    - "loser pays" written into law to prevent abuses

    - state reserves felony penalties for egregious violators

    - bulk-mailers implicitly encouraged to use documented opt-ins

So who would the IETF community trust to take something like (better than)
this to their jurisdictional legislature(s) and asks for feedback?

<cynic>and have they made the right campaign contributions</cynic>

-- 
Eric A. Hall                                        http://www.ehsco.com/
Internet Core Protocols          http://www.oreilly.com/catalog/coreprot/




<Prev in Thread] Current Thread [Next in Thread>