1 / 7

Signing Email Messages Identified Internet Mail

Technical solution is not the solution alone. All technical solutions have as a goal to verify the source of an email messageIs the sender authorized to send mail from the proposed sender address?Be able to trace verified messagesBe able to reject messages early in pathBut, this is only one thir

brosh
Download Presentation

Signing Email Messages Identified Internet Mail

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Signing Email Messages Identified Internet Mail Patrik Fltstrm Consulting Engineer, Cisco Systems Inc. Member, Internet Architecture Board

    2. Technical solution is not the solution alone All technical solutions have as a goal to verify the source of an email message Is the sender authorized to send mail from the proposed sender address? Be able to trace verified messages Be able to reject messages early in path But, this is only one third of the puzzle: Legislation Technical solutions Action Cooperation is the solution Meetings like this

    3. Problems with email delivery

    4. Goals for Identified Internet Mail Provide tools to identify and block spoofed email Preserve the positive aspects of email Anyone can send to anyone, without introduction Senders can be anonymous to the extent they are now Ability to send mail independent of location Messages should not fail verification in case of inconsequential modifications Accommodate common mailing-list behavior Use existing trust hierarchies Inclusive of large and small domains Easier to deploy rapidlyprocesses are already defined Support mechanisms that evaluate reliability of message senders

    5. Authentication/Authorization Model

    6. Identified Internet Mail Explained

More Related