The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January/February (2008 vol.12)
pp: 71-74
Barry Leiba , IBM T.J. Watson Research Center
ABSTRACT
Internet standards allow hardware and software from different sources to interoperate, and we can do virtually nothing on the internet without them. Here, Standards’ new department editor discusses Internet standards in general, giving a brief overview of why they’re necessary. He then delves into specific standards for email that aim to reduce spammers’ ability to lie about who sent an email message (spoofing) — the Sender Policy Framework, Sender ID, and Domain Keys Identified Mail.
INDEX TERMS
Sender Policy Framework, Sender ID, Domain Keys Identified Mail, spamming, spam, spoofing, email standards
CITATION
Barry Leiba, "An Introduction to Internet Standards", IEEE Internet Computing, vol.12, no. 1, pp. 71-74, January/February 2008, doi:10.1109/MIC.2008.2
REFERENCES
1. J. Klensin, ed., "Simple Mail Transfer Protocol," IETF RFC 2821, Apr. 2001; www.ietf.org/rfcrfc2821.txt.
2. P. Resnick, ed., "Internet Message Format," IETF RFC 2822, Apr. 2001; www.ietf.org/rfcrfc2822.txt.
3. M. Wong and W. Schlitt, "Sender Policy Framework (SPF) for Authorizing Use of Domains in E-MAIL, version 1," IETF RFC 4408, Apr. 2006; www.ietf.org/rfcrfc4408.txt.
4. J. Lyon and M. Wong, "Sender ID: Authenticating E-Mail," IETF RFC 4406, Apr. 2006; www.ietf.org/rfcrfc4406.txt.
5. E. Allman et al., "DomainKeys Identified Mail (DKIM)," IETF RFC 4871, May 2007; www.ietf.org/rfcrfc4871.txt.
6. J. Lyon, "Purported Responsible Address in E-Mail Messages," IETF RFC 4407, Apr. 2006; www.ietf.org/rfcrfc4407.txt.
7. E. Allman, M. Delany, and J. Fenton, "DKIM Sender Signing Practices," IETF Internet draft, work in progress, Nov. 2007; http://tools.ietf.org/wgdkim/.
25 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool