<div dir="ltr">Hi Richard,<div><br></div><div style>thanks for sharing the document, my comment is only on the "network based blocking" :</div><div style>1. In some cases<span style="color:rgb(0,0,0);font-size:1em"> the intermediary is totally transparent in the network but it </span>needs to give a message to the end-point that the resource is blocked which complicate the protocol. however it is possible and was done on large scale<br>
</div><div style>2. there is symmetric and asymmetric filtering techniques. up to my knowledge the asymmetric filtering technique is less complex and can be used on large scale ISP. please see my blog about "<font color="#2c2b2b"><span style="font-size:12px;line-height:18px">Internet filtering in Saudi Arabia" : <a href="http://www.hany.org/?p=517">http://www.hany.org/?p=517</a></span></font></div>
<div style><br></div><div style>I will read the remaining and feed you back if i have any comment</div><div style> </div><div style>Best Regards,<br></div><div style><br></div><div style>Hany</div><div style><br></div><div>
<br></div></div><div class="gmail_extra"><br><br><div class="gmail_quote">On Mon, Oct 21, 2013 at 9:39 PM, Richard Barnes <span dir="ltr"><<a href="mailto:rlb@ipv.sx" target="_blank">rlb@ipv.sx</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">Dear colleagues,<div><br></div><div>I've been working with the Internet Architecture Board on a document that describes technical considerations regarding the blocking and filtering Internet services. Since I know there are several experts on the topic in this community, I thought I would forward it in case anyone had comments.</div>
<div><br></div><div>The document can be found at: <a href="http://tools.ietf.org/html/draft-iab-filtering-considerations-04" target="_blank">http://tools.ietf.org/html/draft-iab-filtering-considerations-04</a></div><div>
<br></div><div>Abstract:</div>
<div><br></div><div><div> The Internet is structured to be an open communications medium. This</div><div> openness is one of the key underpinnings of Internet innovation, but</div><div> it can also allow communications that may be viewed as undesirable by</div>
<div> certain parties. Thus, as the Internet has grown, so have mechanisms</div><div> to limit the extent and impact of abusive or objectionable</div><div> communications. Recently, there has been an increasing emphasis on</div>
<div> "blocking" and "filtering," the active prevention of such</div><div> communications. This document examines several technical approaches</div><div> to Internet blocking and filtering in terms of their alignment with</div>
<div> the overall Internet architecture. In general, the approach to</div><div> blocking and filtering that is most coherent with the Internet</div><div> architecture is to inform endpoints about potentially undesirable</div>
<div> services, so that the communicants can avoid engaging in abusive or</div><div> objectionable communications.</div><div><br></div><div>Please send feedback to me, the co-editors (on the CC), or the IAB (<a href="mailto:iab@iab.org" target="_blank"><span>iab@iab.org</span></a>, who will be ultimately responsible for publication or not).</div>
<div><br></div><div>Thank you very much,</div><div><br></div><div>--Richard</div></div><div><p><br></p></div></div>
<br>_______________________________________________<br>
Menog mailing list<br>
<a href="mailto:Menog@lists.menog.org">Menog@lists.menog.org</a><br>
<a href="http://lists.menog.org/mailman/listinfo/menog" target="_blank">http://lists.menog.org/mailman/listinfo/menog</a><br>
<br></blockquote></div><br></div>