Feeds

Email authentication gaining steam

Sender ID and DomainKeys pushed at anti-spam summit

The Power of One eBook: Top reasons to choose HP BladeSystem

A host of software companies, security firms and internet service providers met in Chicago on Wednesday to urge corporations and bulk message senders to adopt email authentication technologies.

The technologies, known as Sender ID and DomainKeys, aim to allow email recipients to positively identify the sender of an email message and hold the promise of giving service providers the tools they need to effectively end spam and phishing attacks.

Yahoo!, the creator of DomainKeys, receives about a billion messages a day signed with the technology though Yahoo! Mail, the company said. Meanwhile, more than 2.4m domains are publishing the additional domain information required for Sender ID, up from 20,000 two years ago, according to Microsoft, which has spearheaded the Sender ID initiative. In total, more than 35 per cent of email is authenticated in some way and 21 per cent of Fortune 500 companies publish Sender ID records, according to Microsoft.

Considering that both authentication technologies modify current email practices in some way, that's solid progress, said Craig Spiezle, director of the technology care and safety group at Microsoft and the chairman of Wednesday's Email Authentication Summit.

"This process is a 747 in mid-flight," Spiezle said "You want to make these modifications to the infrastructure but you don't want to bring it down. The whole goal here is minimal cost and effort."

The summit marks the passage of a two year deadline promised by Bill Gates in January 2004, by which spam would cease to be a problem for internet users. While Microsoft has missed the target, if the boosterism represented by the summit continues to work and adoption grows, then internet service providers will have credible tools to help significantly reduce the amount of spam appearing in customer inboxes.

"This is like the telephone problem - no one wants to have the first one," said Eric Allman, chief science officer for email server software maker Sendmail. "But we are seeing a lot of people who want some sort of technology to solve the spam problem."

The summit also marks the comeback for Sender ID and an evolutionary step for DomainKeys. About 18 months ago, Microsoft's efforts to push forward the standard almost came to naught, when the Internet Engineering Task Force (IETF), the net's technical standards body, rejected the company's proposal over patent issues. Domain Keys, supported by Yahoo!, is in the process of being merged into another technology proposed by Cisco Systems, to create DomainKeys Identified Mail.

Email authentication does not solve the problem of unsolicited commercial email but provides a tool to end the spoofing of the sender's address, making the consequences of sending bulk email a reality for spammers.

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.