Feeds

MS takes fight to the spammers

Moots verifiable email ID

  • alert
  • submit to reddit

Providing a secure and efficient Helpdesk

At the RSA Conference last week, Bill Gates mapped out Microsoft's proposals for tackling spam. Of note are the company's Co-ordinated Spam Reduction Initiative (CSRI) and a technical proposal for email that's likened by many to the phone industry's caller-ID system.

CSRI includes a roadmap for policy and technology infrastructure changes that will allow the introduction of a caller ID approach that takes aim at the rampant practice of sending email with forged 'From' addresses, commonly called spoofing.

Microsoft describes CSRI as a mechanism for legitimate senders of mail to help ensure their domain name is not being abused by a spammer.

Caller ID consists of two key steps: senders of email publish the IP addresses of their outgoing mail servers in DNS in an email policy document; and the email software at the receiving end of a message queries DNS for the email policy and determines the "purported responsible domain" of the message. By comparing the information in DNS to ensure it matches the information on the originating mail it offers a way of preventing spoofing.

The proposal is currently in draft-for-comment form, posted at www.microsoft.com/spam, and the company is inviting industry-wide input and scrutiny.

The caller ID concept has been in development at Microsoft for about a year and is one of several proposals that have been considered within the industry for some time.

Caller ID will be deployed in Hotmail, and Microsoft is also working with others such as Brightmail to test the spec. It recognises that Caller ID won't cure spam on its own, but will serve as a deterrent.

© Copyright 2004 News IS

News IS is a weekly newsletter published by Rethink Research, a London-based publishing and consulting firm. News IS covers the news announcements, business transactions and financial statements of the top 150 or so IT vendors, along with other news of interest to the modern senior IT manager working within data centre technologies. Subscription details here.

Related stories

Gates 'optimistic' on security
Gates parades Windows security advances
We'll kill spam in two years - Gates
Microsoft declares war on spam

The Register RSA coverage in full

New hybrid storage solutions

More from The Register

next story
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
TorrentLocker unpicked: Crypto coding shocker defeats extortionists
Lousy XOR opens door into which victims can shove a foot
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.