Search results
Jump to navigation
Jump to search
Page title matches
- ...ks to alleviate these problems by identifying the source. To be useful in email authentication, an identity must have three characteristics. It must be unique, verifiable ...can too easily forge the name of a reputable domain. That is the problem email authentication methods seek to avoid.5 KB (822 words) - 02:42, 3 February 2010
- 2 KB (223 words) - 07:09, 4 November 2009
- 107 bytes (15 words) - 21:44, 24 November 2008
- 399 bytes (51 words) - 10:42, 10 December 2009
- 1 KB (163 words) - 02:30, 3 February 2010
Page text matches
- The authentication failures that occur in some popular IP-based [[Email authentication]] methods when a forwarder is involved.163 bytes (20 words) - 07:13, 4 November 2009
- An [[Email authentication|authentication method]] that verifies the purported sender's address by sen171 bytes (21 words) - 02:56, 7 December 2009
- {{r|Email authentication}}216 bytes (30 words) - 18:50, 29 October 2009
- [[Email authentication]] method that became a basis of [[Sender Policy Framework|SPF]] and [[Sende141 bytes (18 words) - 17:55, 29 October 2009
- [[Email authentication]] method that became a basis of [[Sender Policy Framework|SPF]] and [[Sende141 bytes (18 words) - 17:56, 29 October 2009
- {{r|Email authentication}}193 bytes (22 words) - 18:49, 29 October 2009
- {{r|Email authentication}}274 bytes (33 words) - 18:58, 29 October 2009
- {{r|Email authentication}}179 bytes (21 words) - 18:47, 29 October 2009
- [[Email authentication]] method that verifies the hostname of an [[Simple Mail Transfer Protocol |197 bytes (23 words) - 05:06, 26 October 2009
- {{r|Email authentication}}541 bytes (71 words) - 18:46, 29 October 2009
- [[Email authentication]] method that verifies a domain name found by a reverse DNS query on the tr157 bytes (22 words) - 18:22, 28 October 2009
- [[Email authentication]] method that uses a [[Digital signature | digital signature]] to verify th157 bytes (20 words) - 10:59, 12 October 2009
- [[Email authentication]] method that verifies the domain name in a "purported" address with the se156 bytes (20 words) - 05:01, 26 October 2009
- Email authentication method that seeks to correlate the domain name in a "purported" address wit158 bytes (22 words) - 18:43, 29 August 2009
- '''Designated Mailers Protocol''' (DMP) is an email authentication method developed by Gordon Fecyk. It became a basis for the two most commo221 bytes (32 words) - 10:34, 10 December 2009
- '''Definition:''' Email authentication method that seeks to correlate the domain name in a "purported" address wit '''Sender ID''' is an email authentication method that seeks to correlate the domain name in a "purported" address wit1 KB (209 words) - 19:11, 29 August 2009
- [[Email authentication]] method that verifies the domain name in the envelope return address again165 bytes (21 words) - 05:00, 26 October 2009
- {{r|Email authentication}}296 bytes (46 words) - 04:55, 26 October 2009
- {{r|Email authentication}}770 bytes (118 words) - 02:45, 7 December 2009
- {{r|Email authentication}}2 KB (205 words) - 12:38, 5 November 2009
- {{r|Email authentication}}945 bytes (149 words) - 14:36, 1 October 2009
- {{r|Email authentication}}1 KB (160 words) - 15:15, 26 September 2009
- ...neral text information the domain owner would like to publish, including [[Email authentication|authentication records]] for the domain's [[Email system|mail transmitters] === Email authentication ===3 KB (510 words) - 18:05, 28 October 2009
- ...ts in the system. The reader should also be familiar with the basics of [[Email authentication]] and with the article on [[Reverse DNS]]. '''Forward-Confirmed reverse DNS''' (FCrDNS) is an email authentication method that uses the [[IP address|source IP address]] in a [[TCP]] connecti3 KB (562 words) - 17:04, 28 October 2009
- {{r|Email authentication}}707 bytes (110 words) - 18:33, 29 October 2009
- '''Definition:''' Email authentication method that verifies the hostname of a client requesting an SMTP session as1 KB (154 words) - 19:58, 29 August 2009
- {{r|Email authentication}}820 bytes (125 words) - 07:26, 4 November 2009
- ...ks to alleviate these problems by identifying the source. To be useful in email authentication, an identity must have three characteristics. It must be unique, verifiable ...can too easily forge the name of a reputable domain. That is the problem email authentication methods seek to avoid.5 KB (822 words) - 02:42, 3 February 2010
- ...In this discussion, we will assume the reader understands the basics of [[Email authentication]] and the roles of different agents in the [[Email system]], as illustrated4 KB (610 words) - 17:28, 5 November 2009
- {{seealso|Email authentication}} for an overview and terminology. DomainKeys Identified Mail (DKIM) is an [[email authentication]] method using a [[digital signature]] added to the [[Email message headers7 KB (1,137 words) - 05:56, 11 December 2009
- {{seealso|Email authentication}} for a general overview and terminology. ...ress]] in a [[TCP]] connection to verify the domain name in the envelope [[Email authentication|Return Address]] with every message. A Pass result provides strong assuranc8 KB (1,236 words) - 20:27, 9 December 2009
- ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...an incoming message has been forwarded. If the MDA runs the most common [[Email authentication|authentication]] checks on the incoming message, it may be rejected as a fo11 KB (1,671 words) - 06:06, 29 August 2013
- ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...an incoming message has been forwarded. If the MDA runs the most common [[Email authentication|authentication]] checks on the incoming message, it may be rejected as a fo11 KB (1,673 words) - 06:07, 29 August 2013
- ...who care about their reputation should protect their name by publishing [[Email authentication|authentication records]] in DNS (the [[Domain Name System]]). Agents who o15 KB (2,320 words) - 18:53, 26 December 2010
- '''Reverse MX''' (RMX) is an email authentication method developed by Hadmut Danisch. It became a basis for the two most com41 KB (6,790 words) - 03:36, 17 October 2013
- ...someone else's account for fun and profit, and an attacker who can defeat email authentication might create a bogus but verifiable message that would hugely embarrass the32 KB (4,913 words) - 14:38, 18 March 2024
- ...someone else's account for fun and profit, and an attacker who can defeat email authentication might create a bogus but verifiable message that would hugely embarrass the32 KB (4,916 words) - 05:49, 8 April 2024