{"id":2125,"date":"2006-04-20T00:00:00","date_gmt":"2006-04-20T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/20\/e-mail-authentication-gaining\/"},"modified":"2021-12-30T11:40:43","modified_gmt":"2021-12-30T11:40:43","slug":"e-mail-authentication-gaining","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/20\/e-mail-authentication-gaining\/","title":{"rendered":"E-mail authentication gaining"},"content":{"rendered":"<p>A host of software companies, security firms and Internet service providers met in Chicago to urge corporations and bulk message senders to adopt e-mail authentication technologies.  The technologies, known as Sender ID and DomainKeys, aim to allow e-mail recipients to positively identify the sender of an e-mail message and hold the promise of giving service providers the tools they need to effectively end spam and phishing attacks.  Yahoo!, the creator of DomainKeys, receives about a billion messages a day signed with the technology though Yahoo!  Meanwhile, more than 2.4 million domains are publishing the additional domain information required for Sender ID, up from 20,000 two years ago, according to Microsoft, which has spearheaded the Sender ID initiative.  In total, more than 35 percent of e-mail is authenticated in some way and 21 percent of Fortune 500 companies publish Sender ID records, according to Microsoft.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Considering that both authentication technologies modify current e-mail practices in some way, that&#8217;s solid progress, said Craig Spiezle, director of the technology care and safety group at Microsoft and the chairman of Wednesday&#8217;s E-mail Authentication Summit.<\/p>\n<p>&#8220;This is like the telephone problem&#8211;no one wants to have the first one,&#8221; said Eric Allman, chief science officer for e-mail server software maker Sendmail.<\/p>\n<p>E-mail authentication does not solve the problem of unsolicited commercial e-mail but provides a tool to end the spoofing of the sender&#8217;s address, making the consequences of sending bulk e-mail a reality for spammers.  The two major proposals solve the problem in different ways.  In fact, early studies of junk mail in 2004 found that nearly a sixth used the Sender Policy Framework, the predecessor to Sender ID, to appear legitimate.  However, as more legitimate domains are adopting the technologies, companies are developing reputation systems to evaluate which domains are considered &#8220;spammy&#8221; and which deliver content that people want in their inboxes.<\/p>\n<p>&#8220;Authentication is a really big building block in terms of making a more intelligent determination of what is spam and what is not,&#8221; said Ken Schneider, chief archtect for Symantec and former chief technology officer e-mail security provider Brightmail.<\/p>\n<p>http:\/\/www.securityfocus.com\/news\/11388?ref=rss<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2125","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2125"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2125\/revisions"}],"predecessor-version":[{"id":4612,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2125\/revisions\/4612"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}