modest proposals for modest proposals for modest
play

Modest Proposals for Modest Proposals for Modest Proposals for - PowerPoint PPT Presentation

Modest Proposals for Modest Proposals for Modest Proposals for Modest Proposals for Modest Proposals for Modest Proposals for Modest Proposals for Modest Proposals for Modest Proposals for Modest Proposals for Modest Proposals for Modest


  1. Modest Proposals for Modest Proposals for Modest Proposals for Modest Proposals for Modest Proposals for Modest Proposals for Modest Proposals for Modest Proposals for Modest Proposals for Modest Proposals for Modest Proposals for Modest Proposals for Layered Email Authentication Layered Email Authentication Layered Email Authentication Layered Email Authentication Layered Email Authentication Layered Email Authentication Layered Email Authentication Layered Email Authentication Layered Email Authentication Layered Email Authentication Layered Email Authentication Layered Email Authentication APCAUCE/APRICOT – Kyoto 2005 APCAUCE/APRICOT – Kyoto 2005 D. Crocker dcrocker@bbiw.net D. Crocker dcrocker@bbiw.net Brandenburg InternetWorking bbiw.net Brandenburg InternetWorking bbiw.net

  2. Complicated! ! Email is… … Email is Complicated! Email is… .forward forward . MUA MUA MUA MUA MSA MSA MSA MSA MTA MTA MTA MTA MDA MDA MDA MDA MSA MSA MSA MSA MTA MTA MTA MTA MUA MUA MUA MUA MSA MSA MSA MSA MDA MDA MDA MDA MSA MSA MSA MSA Peer Peer MTA MTA MTA MTA MTA MTA List List MTA MTA MTA MTA MTA MTA List List List List List List MTA MTA Peer Peer MTA MTA MTA MTA MTA MTA MTA MTA MTA MTA MDA MDA MDA MDA MDA MDA MTA MTA MTA MTA MDA MDA Mail Agents Mail Agents MDA MDA MTA MTA MTA MTA MDA MDA MDA MDA MDA MDA MDA MDA MDA MDA MDA MDA MDA MDA MUA MUA = User = User MSA = Submission = Submission MSA MTA = Transfer = Transfer MTA MUA MUA MUA MUA MUA MUA MUA MUA MUA MUA MUA MUA MUA MUA MUA MUA MDA = Delivery MDA = Delivery D. Crocker 2 APCauce/Apricot – Kyoto, 2005 2

  3. Email Actors/Participants Email Actors/Participants Email Actors/Participants Email Actors/Participants Email Actors/Participants Email Actors/Participants Email Actors/Participants Email Actors/Participants Email Actors/Participants Email Actors/Participants Email Actors/Participants Email Actors/Participants ! Which actor/participant is ! Which actor/participant is being evaluated? being evaluated? ! Which actor/participant is ! Which actor/participant is Recipient Recipient Recipient Recipient Recipient Recipient Recipient Recipient Originator Originator Originator Originator Originator Originator Originator Originator vouching for them? vouching for them? Delivery Delivery Delivery Delivery Delivery Delivery Delivery Delivery Sender Sender Sender Sender Sender Sender Sender Sender Agent Agent Agent Agent Agent Agent Agent Agent Relay Relay Relay Relay Relay Relay Relay Relay Relay Relay Relay Relay Relay Relay Relay Relay Bounce Bounce Bounce Bounce Bounce Bounce Bounce Bounce D. Crocker 3 APCauce/Apricot – Kyoto, 2005 3

  4. What we will cover What we will cover What we will cover What we will cover What we will cover What we will cover What we will cover What we will cover What we will cover What we will cover What we will cover What we will cover Proposals Challenge Proposals Challenge " Path Registration Path Registration Path Registration Path Registration " Path Registration Path Registration Path Registration Path Registration " Different email actors Different email actors Different email actors Different email actors " Different email actors Different email actors Different email actors Different email actors Meng Wong Meng Wong # SPF # Each might create problems # SPF # Each might create problems # Sender-ID # Sender-ID # Each might prevent problems # Each might prevent problems " Crypto Message Authentication Crypto Message Authentication Crypto Message Authentication Crypto Message Authentication " Crypto Message Authentication Crypto Message Authentication Crypto Message Authentication Crypto Message Authentication Jim Fenton Jim Fenton " Goal Goal Goal Goal " Goal Goal Goal Goal # Identified Internet Mail (IIM) # Identified Internet Mail (IIM) # Identify actors # DomainKeys # Identify actors # DomainKeys # Evaluate their legitimacy " Handling Service Support Handling Service Support Handling Service Support Handling Service Support # Evaluate their legitimacy " Handling Service Support Handling Service Support Handling Service Support Handling Service Support Dave Crocker Dave Crocker # Decide whether to trust their # Decide whether to trust their # Certified Server Validation (CSV) # Certified Server Validation (CSV) message traffic message traffic # Bounce Address Tag Validation # Bounce Address Tag Validation (BATV) (BATV) D. Crocker 4 APCauce/Apricot – Kyoto, 2005 4

  5. Universal spam solution rebuttal Universal spam solution rebuttal Universal spam solution rebuttal Universal spam solution rebuttal Universal spam solution rebuttal Universal spam solution rebuttal Universal spam solution rebuttal Universal spam solution rebuttal Universal spam solution rebuttal Universal spam solution rebuttal Universal spam solution rebuttal Universal spam solution rebuttal Checkbox form-letter for responding to spam solutions proposals. Checkbox form-letter for responding to spam solutions proposals. See: See: > > > > <http://craphound.com/spamsolutions.txt > > > > <http://craphound.com/spamsolutions.txt > > > > <http://craphound.com/spamsolutions.txt Your post advocates a Your post advocates a Your post advocates a Your post advocates a Your post advocates a Your post advocates a Your post advocates a Your post advocates a ( ) technical ( ) legislative ( ) market ( ) technical ( ) legislative ( ) market ( ) technical ( ) legislative ( ) market ( ) technical ( ) legislative ( ) market- ( ) technical ( ) legislative ( ) market ( ) technical ( ) legislative ( ) market - - - -based ( ) vigilante - based ( ) vigilante based ( ) vigilante based ( ) vigilante based ( ) vigilante based ( ) vigilante ( ) technical ( ) legislative ( ) market ( ) technical ( ) legislative ( ) market - - based ( ) vigilante based ( ) vigilante ( ) technical ( ) legislative ( ) market ( ) technical ( ) legislative ( ) market ( ) technical ( ) legislative ( ) market- ( ) technical ( ) legislative ( ) market - - -based ( ) vigilante based ( ) vigilante based ( ) vigilante based ( ) vigilante approach to fighting spam. approach to fighting spam. approach to fighting spam. approach to fighting spam. approach to fighting spam. approach to fighting spam. approach to fighting spam. approach to fighting spam. Your idea will not work. Here is why it won't work. Your idea will not work. Here is why it won't work. Your idea will not work. Here is why it won't work. Your idea will not work. Here is why it won't work. Your idea will not work. Here is why it won't work. Your idea will not work. Here is why it won't work. Your idea will not work. Here is why it won't work. Your idea will not work. Here is why it won't work. (One or more of the following may apply to your particular idea, (One or more of the following may apply to your particular idea, (One or more of the following may apply to your particular idea, (One or more of the following may apply to your particular idea, and it and it and it and it (One or more of the following may apply to your particular idea, (One or more of the following may apply to your particular idea, (One or more of the following may apply to your particular idea, (One or more of the following may apply to your particular idea, and it and it and it and it may have other flaws which used to vary from state to state befo may have other flaws which used to vary from state to state befo may have other flaws which used to vary from state to state befo may have other flaws which used to vary from state to state before a re a re a re a may have other flaws which used to vary from state to state befo may have other flaws which used to vary from state to state befo may have other flaws which used to vary from state to state befo may have other flaws which used to vary from state to state before a re a re a re a bad federal law was passed.)… bad federal law was passed.) bad federal law was passed.) bad federal law was passed.) … … … bad federal law was passed.)… bad federal law was passed.) bad federal law was passed.) bad federal law was passed.) … … … D. Crocker 5 APCauce/Apricot – Kyoto, 2005 5

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend