Question

In: Computer Science

MTAs are unauthenticated. What effect would requiring user authentication to send email have on the email...

MTAs are unauthenticated. What effect would requiring user authentication to send email have on the email system?

Solutions

Expert Solution

Email authentication a set of methods that receiving email servers use to ensure that emails are not forged. Authenticating an email verifies that the email message actually came from the sender listed in the “from” field in the email header, and that the email wasn’t changed by someone while it was in transit.

Email providers use email authentication to protect users from spam, phishing scams, and other malicious emails.

Most authentication information is transmitted in the email message header. The person reading the email usually doesn’t see the authentication information. So, authenticating your emails has no impact on the quality of your email content.

Simple Mail Transfer Protocol (SMTP), the basic email sending protocol, doesn’t include any authentication mechanisms.

So, SPF, DKIM, and DMARC standards were developed to enhance the security of SMTP. We’ll cover these standards in detail a little further on. For now, just know that you need to use all three of them to get a fully functioning email authentication system.

How email authentication works?

  1. An organization or domain owner establishes rules for authenticating emails sent from all of its sending domains.
  2. The organization configures its sending email servers and email infrastructure to implement these rules.
  3. The email authentication rules are published in the DNS records (Domain Name System records) for each sending domain.
  4. Receiving mail servers authenticate emails from an email sender according to the authentication rules the sending domain has published.
  5. Receiving email servers handle emails according to the authentication results to correctly deliver, quarantine, or reject emails.

Related Solutions

Compare different methods of user authentication methods (One-Way authentication & Two-way authentication), such as the pros...
Compare different methods of user authentication methods (One-Way authentication & Two-way authentication), such as the pros and cons within each strategy and the necessary circumstances.
What runs in user mode             A.        Email reader             B.      
What runs in user mode             A.        Email reader             B.        Web browser             C.        User Interface Program             D.        Music Player             E.            Operating system             F.         Device drivers Choose one the following             a.         a and e             b.         a b,c,d             c.         a,f             d.         e,d             e.         f,b 2)         Choose which are parameters of a process table entry             A.        Process ID             B.            Program Counter             C.        Stack Pointer             D.        User ID             E.        ...
How do i send random numbers in my Amazon SES email? What is the code for...
How do i send random numbers in my Amazon SES email? What is the code for it and where would it go Lambda or SES? Please provide step by step instructions
Consider an employee using their computer to send and retrieve email at their workplace. Only Ethernet...
Consider an employee using their computer to send and retrieve email at their workplace. Only Ethernet networks are used for physical connectivity, but the mail server is located on a separate network. The employee’s network and the mail server’s network are connected by a single router which also has a connection to the Internet via the workplace’s ISP. Explain how the employees email client sends and receives emails using the email server, indicating any protocols involved and where any encapsulation/decapsulation...
A drug that amplifies the effect of bradykinin would have what effect? What diseases could it...
A drug that amplifies the effect of bradykinin would have what effect? What diseases could it be prescribed to treat?
What effect would the magnification of the eyepiece have on resolution?
What effect would the magnification of the eyepiece have on resolution?
A start-up firm as developed a new email app that allows the user to decide what...
A start-up firm as developed a new email app that allows the user to decide what mail gets into their mail box. This company doesn't have a lot of start-up capital and they are funded by a Venture Capital firm that wants an expected 18% return. They are going to use the Agile model and release various versions of their app overtime as they see what works. There 3- year start up plan includes: Initial Development Expenses of $100,000 per...
What are confounding variables, and what effect do they have on assessing cause-and-effect relationships? When would...
What are confounding variables, and what effect do they have on assessing cause-and-effect relationships? When would you prefer median to mean as a measure of central tendency? Why don’t we just sum the deviations from the mean to measure dispersion of a variable? When is it legitimate to use the empirical rule? How would you go about identifying outliers in your data?What would you do if you found an outlier?
what effect would each of the following have on the value of the firm? (a) A...
what effect would each of the following have on the value of the firm? (a) A new advertising campaign increases the sales of the firm substantially. (b) A new competitor enters the market. (c) The production department achieves a technological breakthrough that reduces production costs. (d) The firm is required to install pollution - control equipment. (e) The workforce votes to unionize. (f) The rate of interest rises. (g) The rate of inflation changes.
What effect would the retrenchment strategy have on City Hospital’s objectives?
What effect would the retrenchment strategy have on City Hospital’s objectives?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT