Post by Shmuel (Seymour J.) MetzIn this scheme, and taking INN as an example, newsfeeds(5), and its
reciprocal incoming.conf(5), serve two purposes: they remedy the
fact that Netnews currently lack autodiscovery (contrary to the P2P
networks mentioned above), and they code (in a crude, but working,
fashion) the "trust" relationship between the peers.
There's more than trust involved in current news routing; there's
also the ability, e. g., for specific servers to carry only specific
groups,
First of all, newsgroups doesn't matter that much. They're just
tags, which are immutable once the message is posted, and, quite
often than not, are incomplete or misleading. (And this thread
is a good example of that.) Would I run my own NNTP "server",
I'd make it "track" a number of selected individuals, and all
the threads they've been participating in, whatever are the
newsgroups.
Unfortunately, NNTP doesn't make this task all that easy.
Post by Shmuel (Seymour J.) Metzand to announce what they carry.
AIUI, NNTP only provides for a way to know if a newsgroup is
created on the "server", not whether it's actually carried
(i. e., subscribed to on one or more of the peers) or not.
Post by Shmuel (Seymour J.) MetzWith a sound use of digital signatures (and implementing the
relevant WoT, or re-using the OpenPGP one), we can lay the control
over what's trustworthy and what's not straight to the hands of the
user.
I don't see how.
Isn't it trivial to make a whitelist of public keys of all the
people one wants to receive mail from? It's much less an issue
than providing a way for a stranger (or one who has lost his or
her private key) to communicate, while still stopping abuse.
Post by Shmuel (Seymour J.) MetzLet's first assume that "autodiscovery" is in place. Now, Alice
chooses a "relay" (there may be both free of charge and paid ones),
and her agent puts (into the distributed hash table, or DHT) a
(digitally-signed) "pointer" record that all her mail should be
delivered to that relay.
How do you authenticate a message from a stranger?
If the stranger's public key isn't reachable via my own WoT, and
if it wasn't used to sign any "public" messages I may find, then
I have no way to authenticate it.
Post by Shmuel (Seymour J.) MetzWith SMTP there's an unforgeable source IP address that I can filter
on.
Not quite, at least since the time various Webmails became
widespread. For privacy concerns, they're quite likely to
"hide" the IP of the HTTP client used to submit the message.
Also, the IP in question may be autoconfigured, or "leased" via
DHCPv6 or DHCP, or it may be an IPv4 address of the NAT'ting
router, just as well. Thus, only the network prefix could be
obtained (more or less) reliably from the message's headers.
Tor could be used to anonymize IP, too, but its default is to
block traffic to TCP port 25. (Which doesn't quite help if
there was a "transit Webmail" at TCP port 80 or 443, though.)
Post by Shmuel (Seymour J.) MetzIt makes sense for the Bob's letter to mention a few of his previous
messages (sent to Alice) in the header.
Not if there are no previous messages.
Obviously.
Post by Shmuel (Seymour J.) MetzBoth GNUnet and Freenet (IIRC) implement an HTTP interface, so that
an ordinary Web browser can be used to connect to the network.
Exactly what I want to avoid.
HTTP is a quite decent file transfer protocol, and "speaking" it
isn't a problem. (Not anymore, and arguably much less, than
speaking FTP, for instance.) My guess is that one can access
these networks with, say, GNU Wget or aria2, too.
Post by Shmuel (Seymour J.) MetzAnd what exactly it's for?
The audit trail in e-mail is intended for diagnostic purposes,
Yes, but as I've said before, any complex routing doesn't make
much sense for e-mail anymore, and there isn't much "diagnostic"
that could be obtained in the "two MTA's" case other than that
already recorded in the logs of those MTA's.
Don't we already have some complex routing running on the
network level? Why repeat it a few levels higher?
Post by Shmuel (Seymour J.) Metzbut in practice it is used for spam filtering as well.
Essentially, that means that instead of relying on almost
unforgeable TCP/IP "peer" (address, port) pair, one decides to
rely on the Received: headers, as added by the "third party"
(= transit MTA's.)
Post by Shmuel (Seymour J.) MetzI don't see why one may need to care /how/ the letter has reached
its destination if it's a valid and wanted one.
There's no automated way to tell that a message is a validated and
wanted one, so you have to rely on heuristics. Deep filtering is one
useful heuristic.
We can design a system for /reliable/ (something that the
present e-mail doesn't quite offer) delivery between
pairwise-trusted peers. It's up to the user then to decide
whose messages he wants to be delivered to him or her.
Post by Shmuel (Seymour J.) Metzonly a partial solution.
Partial solutions are all we have.
Ultimately, yes.
Post by Shmuel (Seymour J.) MetzIn addition to the difficulty of developing a new infrastructure that
retains the functionality of the existing infrastructure, there's
also the problem of transition.
Yes, at least to some extent.
Though it was my understanding that opting for social networking
sites, GenX has pretty much forsaken e-mail. (My guess is that
they didn't notice that part of the functionality has vanished
meanwhile.)
--
FSF associate member #7257 http://sf-day.org/