On Tue, 11 Mar 2008, Dave Crocker wrote:
<t>The core of the Internet Mail architecture does not impose any
security requirements or functions on the end-to-end or hop-by-hop
components. For example, it does not require participant authentication
and does not attempt to prevent data disclosure.</t>
Client-server hops do have security requirements: message submission (RFC
5068) and message store access (RFC 3501).
Tony.
--
f.anthony.n.finch <dot(_at_)dotat(_dot_)at> http://dotat.at/
BISCAY FITZROY: SOUTHWESTERLY 5 TO 7 BUT VARIABLE 4 IN SOUTH. VERY ROUGH OR
HIGH. RAIN OR SHOWERS. MODERATE OR GOOD, OCCASIONALLY POOR.