Delivery-Date: Wed, 04 Feb 2015 22:53:11 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.8 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD,URIBL_BLOCKED autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 6288A1E0BF0
	for <archiver@seul.org>; Wed,  4 Feb 2015 22:53:09 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 991CB33A54;
	Thu,  5 Feb 2015 03:53:06 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id EFF3E33A22
 for <tor-talk@lists.torproject.org>; Thu,  5 Feb 2015 03:53:02 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 56DKMM1F3lce for <tor-talk@lists.torproject.org>;
 Thu,  5 Feb 2015 03:53:02 +0000 (UTC)
Received: from fencepost.gnu.org (fencepost.gnu.org [IPv6:2001:4830:134:3::e])
 (using TLSv1 with cipher AES256-SHA (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id C69BD33A21
 for <tor-talk@lists.torproject.org>; Thu,  5 Feb 2015 03:52:59 +0000 (UTC)
Received: from ol168-138.fibertel.com.ar ([24.232.138.168]:33450
 helo=raiz.hellekin.gnu)
 by fencepost.gnu.org with esmtpsa (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:16)
 (Exim 4.71) (envelope-from <hellekin@gnu.org>) id 1YJDUu-0001XK-FQ
 for tor-talk@lists.torproject.org; Wed, 04 Feb 2015 22:52:56 -0500
Message-ID: <54D2E90C.6040608@gnu.org>
Date: Thu, 05 Feb 2015 00:52:44 -0300
From: hellekin <hellekin@gnu.org>
Organization: https://gnu.org/consensus
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
 rv:31.0) Gecko/20100101 Icedove/31.4.0
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <CAD2Ti2_Ue-ThxcHDs7H8sgoh_e+kvuBdh2a7EU60pawLNz5sTA@mail.gmail.com>
 <CAKrUFkhiyjAhx-Sxrvu5yrwu-LNw7eCTqQsaBVrJwPjAf2E43A@mail.gmail.com>
In-Reply-To: <CAKrUFkhiyjAhx-Sxrvu5yrwu-LNw7eCTqQsaBVrJwPjAf2E43A@mail.gmail.com>
Subject: Re: [tor-talk] REAL-ID Internet Access Coming Soon
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 02/05/2015 12:15 AM, Max Bond wrote:
> What are you proposing we do?
> 
*** You can help push the P2PNames Internet Draft through IETF to ensure
that there's at least a standard technical support for
censorship-resistant alternatives to global naming on the Internet.
We've been on it for more than a year now.

Please review the draft[0] and send your comments for inclusion in the
upcoming revision due for next week (you may also join #peer on Freenode
IRC).  So far we've reached consensus from the developers of GNUnet,
Tor, I2P, and Namecoin, and are all working together for technical
recognition of these alternate naming approaches sealed in Internet
history by IESG and IANA.

Although the approach is technical, the struggle is highly political:
IETF has cold feet using an existing mechanism (RFC6761) to tell IANA to
reserve TLDs for peer-to-peer name systems that obviously consider
centralized management of names a non-technical, bureaucratic obsolescence.

If you're on Twitter, use the #P2PNames hashtag.  If you're on DNSOP or
DNS Privacy lists, or any relevant WG of IETF, please hum.

==
hk

[0]
http://datatracker.ietf.org/doc/draft-grothoff-iesg-special-use-p2p-names/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=0ZIA
-----END PGP SIGNATURE-----
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

