User:David MacQuigg/Sender ID: Difference between revisions
imported>David MacQuigg (New page: {{seealso|Email authentication}} for a general overview and terminology. {{TOC|right}} '''Definition:''' Email authentication method that verifies the domain name in a "purported" sender a...) |
imported>David MacQuigg |
||
(3 intermediate revisions by the same user not shown) | |||
Line 3: | Line 3: | ||
'''Definition:''' Email authentication method that verifies the domain name in a "purported" sender address. | '''Definition:''' Email authentication method that verifies the domain name in a "purported" sender address. | ||
'''Sender ID''' is an email authentication method that | '''Sender ID''' is an email authentication method that uses the [[IP address|source IP address]] in a [[TCP]] connection to verify the domain name in a Purported Responsible Address (PRA). A Pass result provides strong assurance that the message came from a transmitter authorized by the domain owner. A Fail result allows immediate rejection of the message, while the transmitter is still connected, and before transferring any data. | ||
This method is very similar to [[Sender Policy Framework|SPF]], except that the PRA is used instead of the envelope Return Address. In simple cases, the PRA is the address that appears in the "From" header of the message. In cases where forwarding has occurred, there may be various "Resent" and "Sender" headers. Sender ID uses a complex patented algorithm to determine which of these headers to use in selecting the PRA. | |||
Like SPF, the domain in the PRA is verified by doing a [[DNS]] query for an SPF record under the domain name. If the IP address is listed in that record, the result is Pass. Thus Sender ID security depends on the security of Internet IP addresses and of the Domain Name System. | |||
Like SPF, Sender ID prevents the "replay" abuse possible with [[Email authentication|signature]] methods like [[DKIM]], because the verified domain owner can be held responsible for high-volume replication of a message. | |||
=== Limitations === | === Limitations === | ||
Sender seeks to avoid the [[Email forwarding problem|forwarding problem]] by using the Forwarder's domain instead of the original domain | |||
|--- Sender's Network ---| |--------- Recipient's Network --------| | |--- Sender's Network ---| |--------- Recipient's Network --------| | ||
Line 25: | Line 20: | ||
/ Border / | / Border / | ||
/ / | / / | ||
------ DNS ------- | ------ DNS ------- | ||
=== How it works === | === How it works === | ||
==== Explanatory notes ==== | ==== Explanatory notes ==== | ||
=== Bibliography === | === Bibliography === | ||
RFC-4406 (2006), "Sender ID: Authenticating E-Mail", J. Lyon, M. Wong, http://tools.ietf.org/html/rfc4406. Microsoft's variation on SPF. | RFC-4406 (2006), "Sender ID: Authenticating E-Mail", J. Lyon, M. Wong, http://tools.ietf.org/html/rfc4406. Microsoft's variation on SPF.<br /> | ||
RFC-4405 (2006), "SMTP Service Extension for Indicating the Responsible Submitter of an E-Mail Message", E. Allman, H. Katz, http://tools.ietf.org/html/rfc4405. Solution to forwarding problem. | RFC-4405 (2006), "SMTP Service Extension for Indicating the Responsible Submitter of an E-Mail Message", E. Allman, H. Katz, http://tools.ietf.org/html/rfc4405. Solution to forwarding problem.<br /> | ||
RFC-4407 (2006), "Purported Responsible Address in E-Mail Messages", J. Lyon, http://tools.ietf.org/html/rfc4407. Key difference with SPF. | RFC-4407 (2006), "Purported Responsible Address in E-Mail Messages", J. Lyon, http://tools.ietf.org/html/rfc4407. Key difference with SPF.<br /> | ||
{{r|http://www.microsoft.com/mscorp/safety/technologies/senderid/default.mspx Sender ID Home Page}} - Microsoft website | {{r|http://www.microsoft.com/mscorp/safety/technologies/senderid/default.mspx Sender ID Home Page}} - Microsoft website<br /> | ||
{{r|http://tools.ietf.org/html/rfc4408 RFC-4408}} - "Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1", M. Wong, W. Schlitt, 2006. | {{r|http://tools.ietf.org/html/rfc4408 RFC-4408}} - "Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1", M. Wong, W. Schlitt, 2006. | ||
{{r|http://www.openspf.org Sender Policy Framework}} - project website | {{r|http://www.openspf.org Sender Policy Framework}} - project website | ||
{{r|http://www.openspf.org/SRS Sender Rewriting Scheme}} - website for SRS | {{r|http://www.openspf.org/SRS Sender Rewriting Scheme}} - website for SRS |
Latest revision as of 20:42, 23 October 2009
- See also: Email authentication for a general overview and terminology.
Definition: Email authentication method that verifies the domain name in a "purported" sender address.
Sender ID is an email authentication method that uses the source IP address in a TCP connection to verify the domain name in a Purported Responsible Address (PRA). A Pass result provides strong assurance that the message came from a transmitter authorized by the domain owner. A Fail result allows immediate rejection of the message, while the transmitter is still connected, and before transferring any data.
This method is very similar to SPF, except that the PRA is used instead of the envelope Return Address. In simple cases, the PRA is the address that appears in the "From" header of the message. In cases where forwarding has occurred, there may be various "Resent" and "Sender" headers. Sender ID uses a complex patented algorithm to determine which of these headers to use in selecting the PRA.
Like SPF, the domain in the PRA is verified by doing a DNS query for an SPF record under the domain name. If the IP address is listed in that record, the result is Pass. Thus Sender ID security depends on the security of Internet IP addresses and of the Domain Name System.
Like SPF, Sender ID prevents the "replay" abuse possible with signature methods like DKIM, because the verified domain owner can be held responsible for high-volume replication of a message.
Limitations
Sender seeks to avoid the forwarding problem by using the Forwarder's domain instead of the original domain
|--- Sender's Network ---| |--------- Recipient's Network --------| / Author ==> MSA/Transmitter --> / --> Receiver/Forwarder ~~> MDA ==> Recipient / / / / Border / / / ------ DNS -------
How it works
Explanatory notes
Bibliography
RFC-4406 (2006), "Sender ID: Authenticating E-Mail", J. Lyon, M. Wong, http://tools.ietf.org/html/rfc4406. Microsoft's variation on SPF.
RFC-4405 (2006), "SMTP Service Extension for Indicating the Responsible Submitter of an E-Mail Message", E. Allman, H. Katz, http://tools.ietf.org/html/rfc4405. Solution to forwarding problem.
RFC-4407 (2006), "Purported Responsible Address in E-Mail Messages", J. Lyon, http://tools.ietf.org/html/rfc4407. Key difference with SPF.
- [Sender ID Home Page] [r]: Add brief definition or description - Microsoft website
- [RFC-4408] [r]: Add brief definition or description - "Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1", M. Wong, W. Schlitt, 2006.
- [Sender Policy Framework] [r]: Add brief definition or description - project website
- [Sender Rewriting Scheme] [r]: Add brief definition or description - website for SRS