[Chapter-delegates] Proposed law to ban Skype in Russia?

Fred Baker fred at cisco.com
Wed Aug 19 08:14:58 PDT 2009


To my way of thinking, the Internet is the contiguous domain that uses  
IP. It includes and interconnects quite a variety of networks,  
including service provider backbones, large edge networks including  
corporate networks and residential broadband networks using  
technologies like DSL, Cable Modem, and WiFi/WiMax, and so on. There  
are also other IP networks that are not connected to the Internet or  
which are tunnel overlays on the Internet. A simple test for whether  
you are connected to the Internet would be whether you can elicit a  
DNS response from one of the DNS Root Servers.

 From the beginning, there have been what were called "Acceptable Use  
Profiles", which are contractual obligations to use the services of  
the particular providers one contracts with in a manner consistent  
with their purpose. Originally, when it was strictly a research  
network, this was about "doing research". Early residential broadband  
networks often precluded the use of VPNs or the offering of services  
(web servers etc) over their networks, and provided "business-grade"  
services for folks who wanted to do those things - I have such an  
arrangement for my home. If you want to learn about them, http://www.google.com/search?q=Acceptable+Use+Profile 
.

For corporate networks, acceptable use is generally built into a  
corporation's code of business conduct. When at work, one is supposed  
to be working for the benefit of the company, and the company isn't  
supportive of pornography, the generation of attacks on corporate  
assets, other employees, or other people, and so on.

Network administrations, including those companies that we call "ISPs"  
and their enterprise counterparts, have since the beginning provided  
mechanisms to enforce those AUPs and COBCs. The simplest and most  
widely used is the NAT firewall; if you have a lock on your front  
door, you understand the logic implicitly. Not that the firewall has  
great value as a security solution - it provides simple prophylactic  
protection of a company's bandwidth, but it doesn't protect against  
attacks that originate inside the company. But it does define a  
boundary, that which a network administrator can call "mine to manage".

They also routinely block attacks and prevent unauthorized access to  
information, and have since the beginning. Good grief; where did the  
concept of an access control list (http://en.wikipedia.org/wiki/Access_control_list 
) come from?

Let me share a war story. When the SOBIG.F virus hit the network in  
2003, I woke up one morning to find 6608 emails in my mail queue,  
which with a relatively few exceptions were all virus-generated. Cisco  
tells me that the only difference between that day and every other day  
is that nowadays the percentage of junk traffic is higher. Such a  
thing costs the corporation money, if nothing else for disk space to  
store my email until I download it and for my time deleting it. If you  
believe that your wallet is yours and nobody else has any business  
with their hand in your pocket, you understand a corporation's  
viewpoint on their economics. Service providers have the same problem  
in a different form - my wife used to use a hotmail address and  
switched to my ISP's mail service when her in-box filled with  
objectionable mail, and hotmail lost a customer. So, yes, we authorize  
the services we use to prevent the delivery of classes of traffic that  
are generally harmful to us and our assets - we in fact require them  
to economically.

Where this discussion gets difficult is the general class of things  
that might be called "state policy". Nobody I know of is in favor of  
child pornography; that said, the remedy to block it currently in use  
in the UK worries me immensely. There is an arbiter that identifies  
content that should be blocked/logged/whatever (on http, that is by  
URL), who provides identifying information to the ISP. There is no  
legal audit trail outside that corporation, as anyone who accesses the  
data is by definition violating the law. Hence, content that the  
arbiter finds objectionable is blocked, and there is no guarantee that  
it actually has anything to do with child pornography. Understand that  
I am not commenting on the UK arbiter, who as far as I know is  
completely on the up-and-up and likely maintains an *internal* audit  
trail regarding what they think they are blocking. But they are in a  
very interesting position of power, and human history tells me that  
independent auditability is a good thing. The same technology could be  
used to block anything that the arbiter doesn't like - the Federalist  
papers, Al-Q'ada, negative comments on government officials, positive  
comments on public officials that the arbiter disagrees with,  
statements by one religious group or another, and so on.

And of course the "state" policy might be a corporate policy - the  
origin of the Net Neutrality debate was a boardroom discussion between  
Google/Yahoo and Verizon/Bell South that happened in the newspaper  
using highly slanted articles that served more to polarize and confuse  
the discussion than to explain it. Which brings us back to Skype...

 From my perspective, it is all about what a customer purchased when  
they bought their service. Several ISPs refuse to block attacks; they  
state that their contract sells bandwidth and their user is using that  
product within his or her rights. The vast majority of networks do  
have some form of AUP/COBC, which as I said enables the administration  
to block traffic and leaves the definition of that traffic in the SP's  
hands. If the user bought a contract in which they agreed to not use  
certain applications (bit-torrent, skype, etc), the SP is within its  
rights to block such traffic. If the user bought a contract that  
limited such blocking to attacks, the SP has no place blocking  
applications - especially if it cannot definitively say that any given  
packet is being used by a given application.

On Aug 19, 2009, at 2:27 AM, Marcin Cieslak wrote:

> Narelle.Clark at csiro.au wrote:
>
>> The principle runs to the essential features of what the Internet
>> comprises. How it works.
>>
>> [Unfortunately right now I can't find that particular RFC - STD1/RFC
>> 1600 isn't helping(!), so I would appreciate someone else pointing it
>> out. Also, if these definitions aren't as clear as my memory recalls,
>> then they darn well should be, and we should be doing something about
>> that!]
>
> Whenever I am in doubt what the Internet is, my primary reference is
> Fred Baker :)
>
> When he is not available, I usually check
>
> RFC 1122 (Requirements for Internet Hosts -- Communication Layers)
> RFC 1123 (Requirements for Internet Hosts -- Application and Support)
> RFC 1812 (Requirements for IP Version 4 Routers)
>
> Those documents actually refer to further standards their clarify  
> (like
> basic IP and TCP RFCs).
>
> But those protocol do not say how much a crippled Internet  
> connectivity
> can be still to be called "the Internet". They describe the issue from
> the point of view of universal IP-level reachability.




More information about the Chapter-delegates mailing list