decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
FTC Deadline Sept. 30 for Comments on Email Authentication
Sunday, September 26 2004 @ 07:29 PM EDT

I just noticed that September 30 is the deadline to submit written comments or requests to participate in the Federal Trade Commission-National Institute of Standards and Technology's "Email Authentication Summit."

I was sure some of you might like to know about this, if you didn't already. Now that Sender ID is dead and MARID is too, as far as the IETF is concerned, it doesn't mean that it won't crop up elsewhere. And I am guessing the FTC may not be informed about the Sender ID/GPL incompatibility issue.

Here's a sample of some of the issues they would like information on, taken from the Federal Register Notice:

7. Whether any of the proposed authentication standards would have to be an open standard (i.e., a standard with specifications that are public).

8. Whether any of the proposed authentication standards are proprietary and/or patented.

9. Whether any of the proposed authentication standards would require the use of goods or services protected by intellectual property laws.

22. Whether any of the proposed authentication standards would impact the ability of consumers to engage in anonymous political speech.

23. Whether any safeguards are necessary to ensure that the adoption of an industry-wide authentication standard does not run afoul of the antitrust laws.

The full text of the Federal Register Notice, with all the questions, can be obtained here. [PDF] So, here is the press release, or the meat of it anyway, with directions on how to provide written comments or send a request to participate. Note you can use email or snail mail, but there are special instructions for snail mail.

*************************

For Release: September 15, 2004

FTC, NIST to Host E-mail Authentication Summit

Adoption of Technology Could Help Thwart Spam

The Federal Trade Commission and National Institute of Standards and Technology (NIST) will co-host a two-day “summit” November 9-10 to explore the development and deployment of technology that could reduce spam. The E-mail Authentication Summit will focus on challenges in the development, testing, evaluation, and deployment of domain-level authentication systems.

A Federal Register Notice to be published today notes that the FTC’s National Do Not E-mail Registry Report to Congress stated that “significant security, enforcement, practical and technical challenges rendered a registry an ineffective solution to the spam problem.” The report identified domain-level authentication as a promising technology that would enable Internet Service Providers (ISPs) and others to better filter spam, and would provide law enforcers a tool to locate and identify spammers.

The Notice states that the Simple Mail Transfer Protocol (SMTP) currently in use for e-mail allows spammers to use techniques like “spoofing,” open relays, open proxies, and “zombie drones” to remain anonymous, evade spam filters, and elude law enforcers. “To remove this cloak of anonymity, ISPs and others involved with the e-mail system have proposed domain-level authentication systems that would enable a receiving mail server to verify that an e-mail message actually came from the sender’s purported domain,” the notice says.

The FTC is seeking public comment on:

* Whether any of the proposed authentication standards (either alone or in conjunction with other existing technologies) would result in a significant decrease in the amount of spam received by consumers;

* Whether ISPs that do not participate in an authentication regime would face any challenges providing e-mail services. If so, what types of challenges these ISPs would face and whether these challenges would in any way prevent them from continuing to be able to provide e-mail services;

* Whether an Internet-wide authentication system could be adopted within a reasonable amount of time. Description of industry and standard-setting efforts, whether there is an implementation schedule in place and, if so, the time frames of the implementation schedule;

and 27 other questions listed in the Federal Register Notice that will be discussed or addressed at the summit.

Parties who wish to participate in the Summit must send a statement to the FTC and NIST setting forth their expertise in, or knowledge of, the issues by September 30, 2004. The FTC and NIST will select participants who submitted timely responses that demonstrate expertise in or knowledge of the issues, and whose participation would promote the representation of a balance of interests at the Summit.

The Commission vote to publish the Federal Register Notice was 4-0-1 with Commissioner Jon Leibowitz not participating.

Written comments should be identified as “E-mail Authentication Summit-Comments,” and written requests to participate in the E-mail Authentication Summit should be identified as “E-mail Authentication Summit-Request to Participate.”

Written comments and requests to participate should be submitted to: Secretary, Federal Trade Commission, Room 159-H (Annex V), 600 Pennsylvania Ave., N.W., Washington, DC 20580. If submitting in paper form, parties must submit an original and three copies of each document. The FTC requests that any comment filed in paper form be sent by courier or overnight service, since U.S. postal mail in the Washington area and at the Commission is subject to delay due to heightened security precautions. In the alternative, parties may e-mail comments and requests to participate to authenticationsummit@ftc.gov. To ensure that the Commission considers an electronic comment, you must file it with the FTC at this e-mail address.

For further requirements concerning the filing of comments and requests to participate, please consult the Request for Comments and Requests to Participate sections of the Federal Register Notice for the E-mail Authentication Summit (linked to this news release on the FTC Web site: www.ftc.gov.


  


FTC Deadline Sept. 30 for Comments on Email Authentication | 50 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
Off-Topic Threads Here Please
Authored by: chrisbrown on Sunday, September 26 2004 @ 08:28 PM EDT
n/t

[ Reply to This | # ]

Compliments to PJ here, please
Authored by: josmith42 on Sunday, September 26 2004 @ 08:36 PM EDT

If you would like to compliment PJ on her writing style, her choice of topic, her humor, or anything else, put it in this thread.

I'll start. Great job as always, PJ.

---
Forty-two: the answer to the question of life, the universe, and everything.

[ Reply to This | # ]

Any point in an ordinary citizen making a comment?
Authored by: Totosplatz on Sunday, September 26 2004 @ 08:39 PM EDT

Who, or what kind of entity, is the usual respondent to these requests?

---
All the best to one and all.

[ Reply to This | # ]

Some Questions
Authored by: Anonymous on Sunday, September 26 2004 @ 10:24 PM EDT
Are you asking us to make this a letter writing campaign? I'm asking because I
want to be able to participate effectively and use this as an opprotunity to put
to some good use, these new found opensource ideas.

Should we prepare a stack of well written letters? Or should we flood them with
individual letters? Would a coordinated effort be more effective or do we use a
more loose model where we come here to get ideas and write our own letters? Or
should we all work on one big letter and send it to them, using collaberative
effort to forge a well written and well researched paper all in one place and
have everyone send an email saying we wrote this document and we're asking you
to read our collective voice we all signed?

[ Reply to This | # ]

I would like to know
Authored by: inode_buddha on Sunday, September 26 2004 @ 10:27 PM EDT
I would like to know, "What is the relationship between the FTC and the IETF, if any." ? (Let alone the ISO). Yes, I plan to write in because the governance of the net and its protocols is *not* the product of any one company or country. Of course, if one wishes to implement a "local standard", that is OK; one can also be marginalized into irrelevance that way.

Against the backdrop of certain "Free Trade" agreements and IP treaties, I think it is time to remind a few organizations about how things actually function.

I'll state up front, here and now, that I strongly support open standards for such purposes, with as little IP encumberance as possible. This can lead off into an entire other debate regarding the relative merits of "de-facto" vs. "de-jure" standards.

The particularly inflammatory questions for me are:

7. Whether any of the proposed authentication standards would have to be an open standard (i.e., a standard with specifications that are public).
8. Whether any of the proposed authentication standards are proprietary and/or patented.
9. Whether any of the proposed authentication standards would require the use of goods or services protected by intellectual property laws.

Now that I've cooled off a bit, I have to ask myself: "Just who do these plastic toys think they are?"

Well, I'm going to keep the flamebait and etc. out of my writing, but otherwise you can probably guess how my letter to the FTC will go.

---
"When we speak of free software, we are referring to freedom, not price." -- Richard M. Stallman

[ Reply to This | # ]

Not A Game Of 30 Questions
Authored by: TheElf on Monday, September 27 2004 @ 01:29 AM EDT
On page 3 of the PDF, which is page 55634 of the Federal Register, see the
paragraph directly above Question # 1 of the 30 Questions.

"Written comments may address the issues identified below and ANY OTHER
ISSUES in connection with the adoption and implementation of any of the proposed
authentication standards."

[ Reply to This | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )