Re: How IETF treats contributors

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> From: "Olaf M. Kolkman" 

> I'd like to expand on what Dean said: "Credit and attribution is about
> intellectual honesty [ and _courtesy_ ] not about copyright law".

Ok, but in the case at hand, 

  - None of the versions of Mr. Danish's proposal that I've seen
     credited Mr. Vixie's document or some others than preceded Mr.
     Danish's work.  I think that was due to ignornance and disinterest
     instead of malice, but it does reduce Mr. Danish's standing to 
     more credit than he already receives.

  - Mr. Danish's proposal was always an obvious non-starter for various
     reasons, including the requirement for defining new DNS RR types
     before it could be deployed or even tested.

  - Mr. Vixie's proposal is a lot closer to what I understand of the
     current MARID mechanisms than Mr. Danish's proposal.

  - It is ironic or something that few people who are openly concerned
     about credit for their work have enviable reputations.  They tend
     to be inventors of such as IPv8.

  - As far as solving the spam problem is concerned, RMX, SPF, the
     commercial proposals, the MARID proposals, and all other sender
     authentication mechanisms are more like IPv8 than IPv6.  Squashing
     the current modes of spam forgery will have just as much effect
     as the squashing years ago of the forgery of 8-digit user names
     @aol.com.  The new anti-forgery mechanisms are more general than
     the old regular expressions, but sender forgery is not a required
     aspect of spam.  Some large spammers have long been using domain
     names that they register, use for literally a few days, and
     discard.  For example, some time ago I grew bored with accumulating
     the domain names of one such operation in
     http://www.rhyolite.com/anti-spam/bin/group.cgi?group=151
     Some of the domain names of smaller (in counts of names) operations
     are in http://www.rhyolite.com/anti-spam/bin/group.cgi?group=197
     http://www.rhyolite.com/anti-spam/bin/group.cgi?group=30
     http://www.rhyolite.com/anti-spam/bin/group.cgi?group=140 and
     http://www.rhyolite.com/anti-spam/bin/group.cgi?group=165
     Spammers can deploy sender authentication mechanisms far faster
     than their victims.

  - This thread has the wrong subject.  It should be more like
    "How some would-be contributors treat the IETF."


Vernon Schryver    vjs@xxxxxxxxxxxx

_______________________________________________

Ietf@xxxxxxxx
https://www1.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]