| 
        
          |  |  
          | 
              
              
                | Recent Activities |  
                | 
 
 
                    
                      | 
 Spam – Controlling
                          Unsolicited Bulk Email |  |  
                | 
 Spam is a social abuse of Internet messaging services.
                    Technical solutions must follow social consensus about the
                    nature and boundaries of these abuses. To date, no effort
                    to control spam has had widespread, long-term effectiveness.
                    However it is already clear that spam is here to stay and
                    that we must seek to control it, rather than eliminate it.
                    Further many different control mechanisms are needed, including
                    legal, technical and operational. Community Discussion  
                    
                      | Fighting Abuse with Trust |  |  
                      | Email Trust Does Not
                        Look for Miscreants |  |  
                      | The Truth About: Trust
                        and DKIM |  |  
                      | Trust in
                        Email Begins with Authentication | 
                          Discussion of an email trust model,
                            and comparison of common authentication methods used
                            as the basis for trust. Written for MAAWG.  |  
                      | DKIM's SSP
                        Effort -- Is there a role for MAAWG? |  |  
                      | Reputation
                        Discussion Panels: Seeking a Common Understanding |  |  
                      | A Trust Overlay
                        for Email Operations: DKIM and Beyond |  |  
                      | Challenges
                        in Anti-Spam Efforts |  |  
                      | DNS-based
                        Message-Transit Authentication Techniques |  |  
                      | Adapting
                        Global Email for Controlling Spam | 
                          
                            IPSJ Magazine — Special
                              issue on Anti-Spam, Vol.46, No.7, pp.741-746, July
                              2005  »  Japanese pdf  / English  pdf 
                              
                                | Notice
                                    for the use of the Japanese version:
                                    The copyright of this material is retained
                                    by the Information Processing Society
                                    of Japan (IPSJ). This material is published
                                    on this web page with the agreement of
                                    the author(s) and the IPSJ. Please be
                                    complied with Copyright Law of Japan
                                    and the  »  Code
                                    of Ethics of IPSJ if any users wish
                                    to reproduce, make derivative work, distribute
                                    or make available to the public any part
                                    or whole thereof. All Rights Reserved,
                                    Copyright (C) Information Processing
                                    Society of Japan. Comments are welcome.
                                    Mail to address  »  Publication
                                    Section, please.  |  |  
                      | System Aspects
                        of Spam Control |  |  
                      | Authentication
                        Approaches | 
                          
                            APCauce/Apricot,
                              Kyoto, Feb. 2005 »  ppt
                            Handling Service
                              Support: CSV & BATV   »  html, pdf, ppt |  
                      | Spamming Anti-Spam
                        Solution Space |  |  
                      | How Will Authentication
                        Reduce Global Spam? |  |  
                      | A Retrospective
                        on Future Anti-Spam Standards |  |  
                      | INBOX Conference | 
                          
                            Email Authentications,
                              
                              San Jose, CA – 2004   »  ppt
                            Email Success Failure  »  ppt |  
                      | China
                        Anti-Spam Workshop | 
                          
                            Taking Common
                              Action Against Spam, Internet Society of China,
                              Keynote, Apr. 2004, Beijing  »  ppt
                            Trip
                              Report on the Chinese efforts to fight spam |  
                      | Spam: Ready,
                        Fire, Aim |  |  
                      | A Letters
                        to the Editor "conversation" on spam control,
                        in  »  Technology
                        Review |  |  
                      | Holistic Evaluation |  |  |    
                | 
 Technical  
                    
                      | DOmain
                        SEcurity TAgging (DOSETA) | 
                          
                            Core mechanism draft-crocker-doseta-core  »  html, txt
                            MIMEAUTH — Signing a MIME
                              objectdraft-crocker-doseta-mimeauth                                                                                                                                                                                                                                                               »  html, txt
 |  
                      | Trust
                        and Brands | 
                          Clarifies the benefit of DKIM and
                            suggests a use with well-known brands |  
                      | DKIM
                        Enhancement
                        & Support | 
                          
                            RFC
                              4871 DomainKeys Identified Mail (DKIM) Signatures
                              -- Erratadkim–rfc4871–errata–06  »   html, txt
                            DKIM Service Overview,
                              RFC 5585 »  pdf, html, txt
                            DomainKeys Identified
                              Mail (DKIM) Development, Deployment and Operationsdraft-ietf-dkim-deployment-07  »  pdf, html, txt
 |  
                      | Affiliations
                        List (AffiL) project | 
                          Authentication-based
                            validation of membership (affiliation) in a published
                            group list. |  
                      | Proposal
                        for a Pilot Project: Using DKIM to Create a Email Trust Channel
 |  |  
                      | DNS
                        Scoped Data Through Attribute Leaves | 
                          With the DNS leading-underscore
                            naming construct, the choice of valid RRs is limited
                            to a defined set. It defines a scope-constrained
                            attribute space for the containing domain name.  |  
                      | Email
                        Submission Operations: Access and Accountability Requirements |  |  
                      | Bounce
                        Address Tag Validation (BATV) | 
                          Using a public convention for adding
                            signature information to RFC2821.MailFrom addresses,
                            including a localized, storage-friendly hash method:  |  
                      | Registration-based
                        Validation |  |  
                      | Technical Considerations
                        for Spam Control | 
                          
                            
                          
                            
                              3rd AP Net Abuse Workshop, Busan  »  ppt |  
                      | Unsolicited
                        Bulk Email: Mechanisms for Control |  |  |  
                |  |  
                | 
 Developing a profile for email service to
                    match the business quality document exchange capabilities
                    provided by telephone-based facsimile  
                    
                      | IFAX service
                        of ENUM |  |  
                      | SMTP Service Extension
                        for Content Negotiation |  |  
                      | Browsefax Integration |  |  |  
                |  |  
                | 
                    
                      | Email Privacy Efforts |  |  
                      | History of Internet Mail | A round of problematic
                          media activity triggered a request that I produce
                          a "personal" history
                          of Internet mail during the 1970s. The result was: 
                          
                            A history of e-mail: Collaboration, innovation
                              and the birth of a system, The Washington Post,
                              20 March 2012; Local
                              copy / Post
                              original The community activity surrounding this has resulted
                          in a nascent website: Here is the background that prompted the invitation
                          to do my article: A followup analysis: |  
                      | Internet
                        Mail Architecture | Formal specification of the current
                          email service.  |  
                      | Opinion:
                        Is It Time to Replace SMTP? | 
                          
                            IPJ Magazine, Vol.10, No.2, June
                              2007   »  html, cisco  |  
                      | Augmented
                          BNF (ABNF)  | No, this isn't really email, but
                          it grew out of the RFC733/RFC822 work and I don't
                          have a better category, on this page... 
                          
                            Minor revision, to prepare for elevation
                              to Draft Standard, draft-crocker-abnf-rfc2234bis-00,
                              9 Mar 05  »  html, txt |  
                      | Scope and Structure of
                        Internet Mail Addresses |  |  
                      | Mandatory MIME Security
                        Considered Harmful |  |  
                      | The
                        impact email work done at The Rand Corporation in the
                        mid-1970’s |  |  |  
                | 
                    
                      | 
 
                          
                            | 
 Instant Messaging
                                and Presence |  
 |  |  
                | 
                    
                      | Common Presence
                        and Instant Messaging (CPIM) |  |  |  
                |  |  
                | 
                    
                      | Navigating
                        RFCs: Internet Technology Document Suites
 | What is the set of current documents with
                          the technical details of a particular service?  
                          Answering
                            this question can be daunting, especially when
                            the service has a long history, filled with formal
                            changes, enhancements, errata notes and esoteric
                            lore. This Document
                            Suite wiki provides a home
                            for collaborative, on-going efforts at recording
                            such information about popular Internet capabilities.
                            An Internet service is described by a collection
                            of specification and support documents, along with
                            informal commentary to guide development, deployment,
                            operations and use. This collection forms a Technology
                            Document Suite. |  
                      | RFC
                        Editor Proposal: Executive Summary |  |  
                      | Nomcom
                        Enhancements: Improving the IETF leadership selection
                        process | 
                          draft-crocker-ietf-nomcom-process |  
                      | IETF
                        Outcomes Wiki | 
                          Developed a public wiki for community
                            assessment of standards produced by the IETF |  
                      | 2009
                        ISOC Postel Award to CSNet | 
                          At IETF-75 in Stockholm, on 29 July
                            2009, ISOC gave the Postel Award to CSNet,
                            "the research networking effort that during
                            the early 1980s provided the critical bridge from
                            the original research undertaken through the ARPANET
                            to the modern Internet." |  
                      | BBC4
                        Radio, Today Programme 3-part series: Online Crime  Mine was the final
                          segment. | 
                          
                             Cybercrime, Guillaume
                              Lovet, Fortinet, 27 Dec 2006  »  mp3
                              audio
                            Spam, Richard Cox, The
                              Spamhaus Project , 28 Dec 2006  »  mp3
                              audio
                            Thoughts on the Future of
                              the Internet, Dave Crocker, BBIW,29
                              Dec 2006  »  pdf
                              text,  »  mp3
                              audio 
                              Prediction realized:  »  Beating
                                Traffic By Joining the Network,
                                Washington Post, Mar 2008. |  
                      | Media
                        Format Choices for RFCs |  |  
                      | Preserve and Enhance:
                        Balancing Goals for the Internet |  |  
                      | Ruling
                        the Root: Internet Governance and the Taming of Cyberspace. | 
                          Milton L. Mueller's ostensible analysis
                            of name and number assignment processes for the Internet: 
                          
                            My review of it The Internet
                              Protocol Journal - Volume 5, Number 4, Cisco, January,
                              2003  »  html
                            Mueller response and my follow-up The
                              Internet Protocol Journal - Volume 6, Number 1,
                              Cisco  »  html  |  
                      | The Debate Over Internet
                        Governance:  A Snapshot in the Year 2000 | 
                          Interview with Berkman Center for
                            Internet and Society, 2000  »  html |  |  
                | 
 |  |  |