[51394] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Paul's Mailfrom (Was: IETF SMTP Working Group Proposal at

daemon@ATHENA.MIT.EDU (JC Dill)
Mon Aug 26 20:20:05 2002

Date: Mon, 26 Aug 2002 17:18:38 -0700
To: nanog@merit.edu
From: JC Dill <nanog@vo.cnchost.com>
In-Reply-To: <15722.42674.873831.754791@world.std.com>
Errors-To: owner-nanog-outgoing@merit.edu


On 03:07 PM 8/26/02, Barry Shein wrote:
 >Let me throw out the following to show how blind the technical
 >community has been:
 >
 >  There is no RFC or other public standards document which even attempts
 >  to define spam or explain, in a careful and professional manner,
 >  why it is a bad thing.
 >
 >(before you say the obvious, that's not what RFCs are for, read, e.g.,
 >RFC 2964)

I guess you haven't read RFC 3098 yet then.

http://www.geektools.com/rfc/rfc3098.txt

         How to Advertise Responsibly Using E-Mail and Newsgroups
                             or - how NOT to
                     $$$$$  MAKE ENEMIES FAST!  $$$$$

Table of Contents

    1.  Introduction ..............................................  2
    2.  Image and Perception of the Advertiser.....................  4
    3.  Collateral Damage .........................................  5
    4.  Caveat Mercator ...........................................  5
    5.  Targeting the Audience ....................................  7
    6.  Reaching the audience .....................................  8
        A.   Dedicated website or web page ........................  8
        B.   "Shared" Advertising website .........................  9
        C.   Netnews and E-Mailing list group postings ............ 10
        D.   Compiled E-Mail Lists ................................ 11
    7.  Opt-In Mailing Lists ...................................... 12
        A. Privacy ................................................ 13
        B. Integrity .............................................. 13
        C. Protection ............................................. 16
    8.  Irresponsible Behavior .................................... 16
    9.  Responsible Behavior ...................................... 17
    10. Security Considerations ................................... 19
    Appendices .................................................... 20
      A.1  The classic Pyramid .................................... 20
      A.2  What about Ponzi? ...................................... 22
      A.3  So all multi-levels are evil? .......................... 22
      B.1  Why Web Privacy? ....................................... 23


home help back first fref pref prev next nref lref last post