Upon connecting to a NewNet server, your machine will be scanned for insecure proxy servers. Do not connect to a NewNet server if you do not consent to this scan. It is necessary to prevent network abuse.
1. Servers must be approved by the machine or site administrator before being compiled, run, or linked to NewNet.
2. Server admins must keep their server and conf files up-to-date with current newnet standards. This is especially important during these early stages of development since we cannot see how well certain modifications we make as a group will function on the network as a whole until everyone is running the updated server code.
3. Servers will have non-abusive IRC operators. /kill should only be used in extreme situations (flood/clone bots, ghosted users, hung clients only when user@*domain matches.) The main server admins (admins with conf file/machine access) will be responsible for choosing people they trust and that have a knowledge of the duties of an irc oper. Abuse of operator proveleges by any server operator is grounds for link removal. /squit should not be used unless a server needs to be re-routed and the person sending the /squit remote-connects it where it is supposed to go. At no time should /squit be used if the admins of the /squit server are active and can do the routing themselves. At all times /squit and /kill should be commented so all opers know why the action occurred. If you think someone may need to /msg to ask why you killed a user, think of a better comment. A good rule of thumb is, when in doubt..don't.
4. /wallops is not to be used as an operator discussion channel, it is
meant to notify opers and interested (+w) users of changing network conditions.
/wallops eskimo will be going down for an upgrade in 5 minutes, expect a
netsplit and netjoin in a few.
5. Links for servers will be judged on the following criteria:
b. machine/link speed and stability. If your link is saturated, the server won't do well because it won't have enough bandwidth to keep up with the rest of the network. Memory is also a concern, a hub server takes up more RAM than a leaf, and also more network bandwidth.
c. attitude and abuse level of operators on the server. If you are the server admin, it is your responsibility to see that the operators on your server follow this policy.
d. server configuration and admin knowledge. Not saying you have to know everything there is to know about the server config and unix, but a server that is configured properly and is running the most current version stands a much better chance of getting an H: line.
6. Servers should not be hacked except by the group working on the protocol updates. All servers need to require identd authorization to connect, even for their own hosts. Identd is widespread enough (they even have it for windoze, etc) that this will not be a problem. I am working on the code right now so the connection problems with identd will be fixed.
7. IRC operators must be willing to help users to the extent needed to maintain a trouble-free, good-natured net. This does not mean opers have to hold users' hands and walk them through everything, but at least point them to a good source of information.
8. Bots are allowed on NewNet, but not to the point of being abusive. Any takeover, clone, flood, or annoybots should be /killed and the user's account K: lined from the server they were using. We may also want to discuss global K: lines for this type of user. Non-abusive bots are not to be killed. 4 or more connections from a single user@host are considered abusive bots and should be K: lined.
9. When a user is K: lined, email them and tell them why. At the server admins' discression, a K: lined user can be allowed back on newnet. For clonebots or abusive behavior, cc: mail to root@theuser's domain or provider and firstname.lastname@example.org.
NewNet users are limited to three clients per login. The number three was chosen as an effective way to prevent users from using multiple logins to flood other users off. Simply limiting three logins per user@hostname is no longer efficient. Shell accounts, bnc's, and the ability for Windows PCs to manipulate their ident responses at will has made the past policy unusable. Since it is impossible for us to personally verify the identity of each user logging in, the following policy will be used as a method for controlling user logins. Unless registered in our shell provider database, each IP will be limited to 3 connects. If registered in our shell provider database, users will be limited to three logins per ident within the shell provider's IP range. This is to defeat users who load multiple clones using different vhosts the shell provider has. Should the login limit be exceeded, the 4th and all subsequent logins will be automatically killed, until they have 3 or less logins. For a shell provider to be listed in our shell provider database, the following conditions must be met:
1. The shell provider must be a registered corporation, licensed business, or a reputable (well known) shell provider.
2. The shell provider must have a working ident that does not allow the user to lie about their ident, have a publically available abuse policy, and be responsive to abuse complaints.
3. The shell provider must be on a dedicated connection. Because of the impossibility of tracking changing IP numbers, static IPs are required. Dialups, DSL and cable modems are not permitted.
To be added to the shell provider list, the admin of the shell server needs to fill out the following form (or email the following information to email@example.com).
The newnet-shell-provider list will be open to all IRCops and Admins who are listed as Security Admins (people with access to add/remove shell providers from GuardBot's list). A poll will be taken of the list's members, and an application will be approved or denied. The above guidelines are just that, guidelines, and exceptions may be made with the approval of the Security Admins.
If a shell provider is found to have lied, misled, or later changed it's policies not in accordance with our rules, they will be removed from our list.
The Dark Side
Any powerful technology seems to bring with it a dark side. The technology to split the atom brought nuclear energy and nuclear bombs. Biotechnology has provided new cures for life threatening and disfiguring disease, it has also allowed the development of new lethal pathogens for germ warfare.
The Internet has the ability to bring people from distant regions of our plant together to share ideas and culture. It allows instant access to huge volumes of information all around the globe. It allows us to see art in a museum in Paris. We can see pictures of Europa direct from NASA within hours of their arrival from a distant spacecraft passing by Jupiter.
Unfortunately, some individuals have found the Internet to be yet another means to exploit people, and this is most grievous when it involves children. The distribution of child pornography is the darkest side of the net. It is an issue we must address.
Using oper privileges to attempt to ban someone trading child pornography over the net is largely ineffective because the individuals change nicks, ident, IP addresses, IRC servers, and even providers to avoid such bans. Even if we were successful at getting them off this net with that stratedgy, they would just go to another net with less effective controls and they would still be out in the community at large where they represent a direct physical threat to children. Additionally, if we allow oper privileges to be used in this way, then anyone that has a bone to pick with someone will claim child pornography was the reason they were banned. We have already seen this with one group of individuals who have been using child pornography as an excuse to further a hate agenda.
The proper response to this problem is to involve law enforcement by providing them with the information necessary to investigate and prosecute these people. This not only gets these individuals off of NewNet and the Internet altogther, but it also gets them off the streets so that they cease to be a physical threat to children.
Just prior to writing this, I met with US Customs, the law enforcement agency responsible for enforcement of laws relating to the importation and distribution of child pornography within the United States. I've come away with this with some information that I hope will be useful.
From past discussions on the NewNet mailing list, it is apparent to me that some people don't even know what child pornography is. Every picture of a naked kid does not constitute child pornography. Probably a good place to start is with the definitions in the applicable statutes. The following is quoted from material provided to me by US Customs:
Among the statutes applicable to child pornography are the following statutes amended as of September 30, 1996:
any visual depiction, including any photograph, film, video, picture, or computer or computer-generated image or picture, whether made or produced by electronic, mechanical, or other means, where--
What is Child Pornography
The federal statutes dealing with and defining child pornography are the Child Protection Act, Title 18 United States Code, sectiosn 2251-2255. Section 2252 of this law forbids knowingly transporting, shipping, or receiving child pornography through interstate or foreign commerce by computer or the mails, or reproducing the child pornography for that purpose. The principal elements in this case are:
Child erotica is a broader and more encompassing term than child pornography. Child erotica can be defined as any material relating to children, fantasy writings, diaries, ordinary photographs of children, psychological books on pedophilia, drawings, etc. Generally, possession and distribution of these items does not constitute a violation of the law.
Legally defined, the written word is never child pornography. Writings may fall within the realm of "child erotica" and may be unlawful under the obscenity statutes, but are never child pornography.
US Customs is the agency responsible for enforcement of laws relating to child pornography. Special agent Kristina S. Laidler has agreed to be a point of contact to accept reports of this nature. Naturally the more detailed information we can provide to Customs, the more effective they can be at dealing with this problem.
Information to include if at all possible:
Special Agent Kristina S. Laidler
[ Servers | Services | Policies | Support | Chat ]