ietf-mxcomp
[Top] [All Lists]

Re: sender vs author, channel vs object, designated sender vs crypto signatures

2004-03-18 09:29:29

On Thu, Mar 18, 2004 at 11:20:22AM -0500, Meng Weng Wong wrote:
| 
| 5) By "appropriate", I mean "engineering tradeoffs that require the
|    least amount of total work to preserve existing desired functionality
|    and inhibit undesired illegitimate spoofing."  I assume that some of
|    this work may have to be done by operators of newsletters, forwarder
|    services, senders of web-generated email, etc.

5) By "appropriate", I mean "engineering tradeoffs that require the
   least amount of total work to preserve existing desired functionality
   and effectively inhibit undesired illegitimate spoofing in accordance
   with a deterministic algorithm which can be clearly specified for
   senders, intermediaries, and recipients such that conformance to an
   authentication/accountability standard can be objectively
   established and the gray areas moved into the domain of accreditation,
   reputation, and local policy."


<Prev in Thread] Current Thread [Next in Thread>