Sender ID: Authenticating E-Mail
draft-ietf-marid-core-03
Document | Type |
Expired Internet-Draft
(marid WG)
Expired & archived
|
|
---|---|---|---|
Author | Jim Lyon | ||
Last updated | 2015-10-14 (Latest revision 2004-08-18) | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | (None) | ||
Formats | |||
Additional resources | Mailing list discussion | ||
Stream | WG state | WG Document | |
Document shepherd | (None) | ||
IESG | IESG state | Expired (IESG: Dead) | |
Action Holders |
(None)
|
||
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | Ted Hardie | ||
Send notices to | mrose.ietf@lists.dbc.mtview.ca.us |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
Internet mail suffers from the fact that much unwanted mail is sent using spoofed addresses -- 'spoofed' in this case means the address is used without the permission of the domain owner. This document describes the following: mechanisms by which a domain owner can publish its set of outgoing MTAs, mechanisms by which SMTP servers can determine what email address is allegedly responsible for most proximately introducing a message into the Internet mail system, and whether that introduction is authorized by the owner of the domain contained in that email address. The specification is carefully tailored to ensure that the overwhelming majority of legitimate emailers, remailers and mailing list operators are already compliant.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)