This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/anti-abuse-wg@ripe.net/
[anti-abuse-wg] Working Group Charter
- Previous message (by thread): [anti-abuse-wg] Working Group Charter
- Next message (by thread): [anti-abuse-wg] Working Group Charter
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Brian Nisbet
brian.nisbet at heanet.ie
Fri May 30 15:00:05 CEST 2014
Michele, There is, or there is, bar really the paragraph we're still discussing. I'd like to thank both Sascha and Dave for their text so far: As the Internet has evolved, so has the scope and scale of network abuse. Unsolicited bulk email (spam) is often merely a symptom of deeper abuse such as viruses or botnets. Consequently the Anti-Spam Working Group has a wide scope, to include all relevant kinds of abuse. The technical details of spam and other abuse constantly vary, in terms of application channel and technique. Channel examples include SMTP, SIP, XMPP and HTTP. Examples of techniques range from buffer overrun to social engineering. Within scope are all systems and mechanisms, both technical and non-technical, that are used to create, control, and make money from, such abuse. While areas such as cybersquatting or hosting illegal content are not seen as a central part of the working group's remit, they are unquestionably bound up in other aspects of network abuse and, as such, may be areas of interest. The working group considers both technical and non-technical aspects of abuse, with the following goals: Produce and continue to update a BCP (Best Common Practice) document for ISPs similar in nature to RIPE-409 but covering a wider range of possible abusive behaviours. Provide advice (beyond that of the BCP) to relevant parties within the RIPE region such as ISPs, Governments and Law Enforcement Agencies on strategic and operational matters. Discuss and disseminate information on technical and non-technical methods of preventing or reducing network abuse. ***************** The core of the discussion at this point is over: "While areas such as cybersquatting or hosting illegal content are not seen as a central part of the working group's remit, they are unquestionably bound up in other aspects of network abuse and, as such, may be areas of interest." Brian Michele Neylon - Blacknight wrote the following on 30/05/2014 12:07: > Brian > > Is there a proposed updated text incorporating the feedback so far? > > Regards > > Michele > > > -- > Mr Michele Neylon > Blacknight Solutions > Hosting & Colocation, Domains > http://www.blacknight.co/ > http://blog.blacknight.com/ > http://www.technology.ie > Intl. +353 (0) 59 9183072 > Direct Dial: +353 (0)59 9183090 > Twitter: http://twitter.com/mneylon > ------------------------------- > Blacknight Internet Solutions Ltd, Unit 12A,Barrowside Business Park,Sleaty > Road,Graiguecullen,Carlow,Ireland Company No.: 370845 > >
- Previous message (by thread): [anti-abuse-wg] Working Group Charter
- Next message (by thread): [anti-abuse-wg] Working Group Charter
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]