User:David MacQuigg/Sandbox/Email authentication: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>David MacQuigg
No edit summary
imported>David MacQuigg
No edit summary
Line 9: Line 9:
  6) secrecy (hidden communication)
  6) secrecy (hidden communication)


Email authentication methods focus primarily on authentication, but also meet other requirements on this list.  A digital signature method like [[ verifying content can be generated only by someone having the private part of the encryption key, so the signer is automatically authenticated.
Solving the spam problem (spamming, phishing and other bulk mail scams)
requires that we address issues 1 and 4.  The others are irrelevant.
 
 
Email authentication methods focus primarily on authentication, but also meet other requirements on this list.  A digital signature like that in the [[DomainKeys Identified Mail|DKIM]] method, can be generated only by someone having the private part of the key, so the signer is automatically authenticated. DKIM satisfies requirements 1 and 2, but nothing else.


Email authentication methods fall into two categories.  Methods like SPF, SenderID, and CSV rely on the fact that certain IP addresses are firmly under the control of a sender (an individual or organization identified by its domain name).  Methods like DKIM rely on a digital signature verifying the entire message and most of its headers.  Both depend on the security of [[Domain Name System|DNS]]. The assumption is that only the domain owner has access to the DNS records under his name.   
Email authentication methods fall into two categories.  Methods like SPF, SenderID, and CSV rely on the fact that certain IP addresses are firmly under the control of a sender (an individual or organization identified by its domain name).  Methods like DKIM rely on a digital signature verifying the entire message and most of its headers.  Both depend on the security of [[Domain Name System|DNS]]. The assumption is that only the domain owner has access to the DNS records under his name.   


With IP-based methods, the sender publishes in DNS the IP addresses authorized to use his domain name.  With signature-based methods, the sender publishes a public key.  IP methods can be very efficient, rejecting an entire session without transferring any messages. End-to-end signature methods can be very secure, even with an un-trusted Forwarder in the middle.
With IP-based methods, the sender publishes in DNS the IP addresses authorized to use his domain name.  With signature-based methods, the sender publishes a public key.  IP methods can be very efficient, rejecting an entire session without transferring any messages. End-to-end signature methods can be very secure, even with an un-trusted Forwarder in the middle.

Revision as of 19:26, 13 October 2009

This article is a subtopic in a group of articles under Email system. We assume the reader understands the parent article, its terminology, and the roles of different agents in the system.

Secure communications via email may require:

1) authentication of the source (sender's identity)
2) verification of content (digital signature)
3) confidentiality of content (encryption)
4) originality (no duplicates)
5) timely delivery (no unexpected delays)
6) secrecy (hidden communication)

Solving the spam problem (spamming, phishing and other bulk mail scams) requires that we address issues 1 and 4. The others are irrelevant.


Email authentication methods focus primarily on authentication, but also meet other requirements on this list. A digital signature like that in the DKIM method, can be generated only by someone having the private part of the key, so the signer is automatically authenticated. DKIM satisfies requirements 1 and 2, but nothing else.

Email authentication methods fall into two categories. Methods like SPF, SenderID, and CSV rely on the fact that certain IP addresses are firmly under the control of a sender (an individual or organization identified by its domain name). Methods like DKIM rely on a digital signature verifying the entire message and most of its headers. Both depend on the security of DNS. The assumption is that only the domain owner has access to the DNS records under his name.

With IP-based methods, the sender publishes in DNS the IP addresses authorized to use his domain name. With signature-based methods, the sender publishes a public key. IP methods can be very efficient, rejecting an entire session without transferring any messages. End-to-end signature methods can be very secure, even with an un-trusted Forwarder in the middle.