亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? draft-danisch-dns-rr-smtp-03.txt

?? 非常好的dns解析軟件
?? TXT
?? 第 1 頁(yè) / 共 5 頁(yè)
字號(hào):
INTERNET-DRAFT                                           Hadmut DanischCategory: Experimental                                         Oct 2003Expires: Apr 1, 2004 The RMX DNS RR and method for lightweight SMTP sender authorization                   draft-danisch-dns-rr-smtp-03.txtStatus of this Memo   This document is an Internet-Draft and is subject to all provisions   of Section 10 of RFC2026.   Internet-Drafts are working documents of the Internet Engineering   Task Force (IETF), its areas, and its working groups.  Note that   other groups may also distribute working documents as Internet-   Drafts.   Internet-Drafts are draft documents valid for a maximum of six   months and may be updated, replaced, or obsoleted by other   documents at any time.  It is inappropriate to use Internet-Drafts   as reference material or to cite them other than as "work in   progress."   The list of current Internet-Drafts can be accessed at   http://www.ietf.org/1id-abstracts.html   The list of Internet-Draft Shadow Directories can be accessed at   http://www.ietf.org/shadow.htmlAbstract   This memo introduces a new authorization scheme for SMTP e-mail   transport. It is designed to be a simple and robust protection   against e-mail fraud, spam and worms. It is based solely on   organisational security mechanisms and does not require but still   allow use of cryptography. This memo also focuses on security and   privacy problems and requirements in context of spam defense. In   contrast to prior versions of the draft a new RR type is not   required anymore.Hadmut Danisch                Experimental                      [Page 1]INTERNET-DRAFT                 DNS RMX RR                       Oct 2003                           Table of Contents1.  General Issues . . . . . . . . . . . . . . . . . . . . . . . . .   42.  Problem and threat description . . . . . . . . . . . . . . . . .   4    2.1.  Mail sender forgery  . . . . . . . . . . . . . . . . . . .   4          2.1.1  Definition of sender forgery  . . . . . . . . . . .   4          2.1.2  Spam  . . . . . . . . . . . . . . . . . . . . . . .   5          2.1.3  E-Mail Worms  . . . . . . . . . . . . . . . . . . .   5          2.1.4  E-Mail spoofing and fraud . . . . . . . . . . . . .   5    2.2.  Indirect damage caused by forgery  . . . . . . . . . . . .   6    2.3.  Technical problem analysis . . . . . . . . . . . . . . . .   6    2.4.  Shortcomings of cryptographical approaches . . . . . . . .   73.  A DNS based sender address verification  . . . . . . . . . . . .   7    3.1.  Overview . . . . . . . . . . . . . . . . . . . . . . . . .   7    3.2.  Envelope vs. header sender address . . . . . . . . . . . .   9    3.3.  Domain part vs. full sender address  . . . . . . . . . . .   94.  Mapping of E-Mail addresses to DNS names . . . . . . . . . . . .  10    4.1.  Domain part only . . . . . . . . . . . . . . . . . . . . .  10    4.2.  Full address . . . . . . . . . . . . . . . . . . . . . . .  11    4.3.  Empty address  . . . . . . . . . . . . . . . . . . . . . .  115.  Mandatory entry types and their syntax . . . . . . . . . . . . .  11    5.1.  Overall structure  . . . . . . . . . . . . . . . . . . . .  11    5.2.  Unused . . . . . . . . . . . . . . . . . . . . . . . . . .  12    5.3.  IPv4 and IPv6 address ranges . . . . . . . . . . . . . . .  12    5.4.  DNS Hostname . . . . . . . . . . . . . . . . . . . . . . .  13          5.4.1  Road warriors and DynDNS entries  . . . . . . . . .  13    5.5.  APL Reference  . . . . . . . . . . . . . . . . . . . . . .  14    5.6.  Domain Member  . . . . . . . . . . . . . . . . . . . . . .  14    5.7.  Full Address Query . . . . . . . . . . . . . . . . . . . .  15    5.8.  DNS mapped authorization . . . . . . . . . . . . . . . . .  15    5.9.  RMX reference  . . . . . . . . . . . . . . . . . . . . . .  166.  Optional and experimental entry types  . . . . . . . . . . . . .  16    6.1.  TLS fingerprint  . . . . . . . . . . . . . . . . . . . . .  16    6.2.  TLS and LDAP . . . . . . . . . . . . . . . . . . . . . . .  16    6.3.  PGP or S/MIME signature  . . . . . . . . . . . . . . . . .  16    6.4.  Transparent Challenge/Response . . . . . . . . . . . . . .  17    6.5.  SASL Challenge/Response  . . . . . . . . . . . . . . . . .  177.  Encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . .  17    7.1.  Alternative encoding as TXT records  . . . . . . . . . . .  17    7.2.  RMX Records  . . . . . . . . . . . . . . . . . . . . . . .  17          7.2.1  Overall structure . . . . . . . . . . . . . . . . .  18          7.2.2  Record encoding . . . . . . . . . . . . . . . . . .  18          7.2.3  Encoding of IPv4 and IPv6 address ranges  . . . . .  18          7.2.4  Encoding of DNS . . . . . . . . . . . . . . . . . .  18          7.2.5  Encoding of unused and full query . . . . . . . . .  19          7.2.6  Additional Records  . . . . . . . . . . . . . . . .  198.  Message Headers  . . . . . . . . . . . . . . . . . . . . . . . .  19Hadmut Danisch                Experimental                      [Page 2]INTERNET-DRAFT                 DNS RMX RR                       Oct 20039.  SMTP error messages  . . . . . . . . . . . . . . . . . . . . . .  2010.  Message relaying and forwarding . . . . . . . . . . . . . . . .  20    10.1.  Problem description . . . . . . . . . . . . . . . . . . .  20    10.2.  Trusted relaying/forwarding . . . . . . . . . . . . . . .  21    10.3.  Untrusted relaying/forwarding . . . . . . . . . . . . . .  2111.  Security Considerations . . . . . . . . . . . . . . . . . . . .  22    11.1.  Draft specific considerations . . . . . . . . . . . . . .  22          11.1.1  Authentication strength  . . . . . . . . . . . . .  22          11.1.2  Where Authentication and Authorization end . . . .  22          11.1.3  Vulnerability of DNS . . . . . . . . . . . . . . .  23          11.1.4  Sneaking RMX attack?   . . . . . . . . . . . . . .  25          11.1.5  Open SMTP relays . . . . . . . . . . . . . . . . .  25          11.1.6  Unforged Spam  . . . . . . . . . . . . . . . . . .  25          11.1.7  Reliability of Whois Entries . . . . . . . . . . .  26          11.1.8  Hazards for Freedom of Speech  . . . . . . . . . .  26    11.2.  General Considerations about spam defense . . . . . . . .  27          11.2.1  Action vs. reaction  . . . . . . . . . . . . . . .  27          11.2.2  Content based Denial of Service attacks  . . . . .  2712.  Privacy Considerations  . . . . . . . . . . . . . . . . . . . .  28    12.1.  Draft specific considerations . . . . . . . . . . . . . .  28          12.1.1  No content leaking . . . . . . . . . . . . . . . .  28          12.1.2  Message reception and sender domain  . . . . . . .  28          12.1.3  Network structure  . . . . . . . . . . . . . . . .  29          12.1.4  Owner information distribution . . . . . . . . . .  29    12.2.  General Considerations about spam defense . . . . . . . .  29          12.2.1  Content leaking of content filters . . . . . . . .  29          12.2.2  Black- and Whitelists  . . . . . . . . . . . . . .  3013.  Deployment Considerations . . . . . . . . . . . . . . . . . . .  30    13.1.  Compatibility . . . . . . . . . . . . . . . . . . . . . .  30          13.1.1  Compatibility with old mail receivers  . . . . . .  30          13.1.2  Compatibility with old mail senders  . . . . . . .  30          13.1.3  Compatibility with old DNS clients . . . . . . . .  30          13.1.4  Compatibility with old DNS servers . . . . . . . .  30    13.2.  Enforcement policy  . . . . . . . . . . . . . . . . . . .  3114.  General considerations about fighting spam  . . . . . . . . . .  31    14.1.  The economical problem  . . . . . . . . . . . . . . . . .  31    14.2.  The POP problem . . . . . . . . . . . . . . . . . . . . .  32    14.3.  The network structure problem . . . . . . . . . . . . . .  33    14.4.  The mentality problem . . . . . . . . . . . . . . . . . .  33    14.5.  The identity problem  . . . . . . . . . . . . . . . . . .  33    14.6.  The multi-legislation problem . . . . . . . . . . . . . .  34Implementation and further Information . . . . . . . . . . . . . . .  34References . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  34Draft History  . . . . . . . . . . . . . . . . . . . . . . . . . . .  35Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . .  35Hadmut Danisch                Experimental                      [Page 3]INTERNET-DRAFT                 DNS RMX RR                       Oct 20031.  General Issues   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in   this document are to be interpreted as described in RFC 2119 [1].2.  Problem and threat description2.1.  Mail sender forgery   The amount of e-mails with forged sender addresses has dramatically   increased. As a consequence, damages and annoyances caused by such   e-mails increased as well. In the majority of examined e-mails the   domain name of the envelope sender address was forged, and the e-   mail was sent from an IP address which does not belong to a network   used by the actual owner of the domain.2.1.1.  Definition of sender forgery   As discussions, comments to prior versions of this draft, and   different approaches to stop forgery showed, different perceptions   of "mail forgery" exist. For example, there are mechanisms to   verify e-mail addresses for mailing lists, web servers, or to stop   spam, which do send a message with a random number to the given   address and expect the user to send a reply. Here, someone is   considered to be allowed to use a particular e-mail address, if and   only if he is able to receive informations sent to this address,   and is able to reply to such a message. While this definition   appears to be quite plausible and natural, it can't be used for a   simple technical solution. Sending back a challenge and expecting a   reply is simply too much overhead and time delay, and not every   authorized sender is able or willing to reply (e.g. because he went   offline or is not a human).   Within the scope of this memo, sender forgery means that the   initiator of an e-mail transfer (which is the original sender in   contrast to relays) uses a sender address which he was not   authorized to use. Being authorized to use an address means that   the owner (administrator) of the internet domain has given   permission, i.e. agrees with the use of the address by that   particular sender. This memo will cover both the permission of the   full e-mail address and the domain part only for simplicity.   Within context of Internet and SMTP, the sender address usually   occurs twice, once as the envelope sender address in SMTP, and once   as the address given in the RFC822 mail header. While the following   considerations apply to both addresses in principle, it is   important to stress that both addresses have distinct semantics andHadmut Danisch                Experimental                      [Page 4]INTERNET-DRAFT                 DNS RMX RR                       Oct 2003   are not neccessarily the same. The envelope address identifies the   initiator of the transport, while the header identifies the author   of the message content. Since this memo deals with the message   transport only and completely ignores the message content, the   method should naturally be applied to the envelope sender address.2.1.2.  Spam   A common and well known problem is the dramatic increase of   unsolicited e-mail, commonly called "spam". Again, the majority of   examined e-mails had forged sender addresses.  The abused domains   were mainly those of common webmailers as hotmail or yahoo, or   well-known companies.   Unfortunately, there is no accurate definition of spam availabe   yet, and neither are the concise technical criterions to filter or   block spam with technical mechanisms. There are efforts to design   content based filters, but these filters are expensive in   calculation time (and sometimes money), and they do not reliably   provide predictable results. Usually they give false positives   and/or require user interaction. Content filters in general suffer   from a design problem described later in this memo.  Therefore,   this proposal does not use the content based approach to block   spam.   As analysis of spam messages showed, most of spam messages were   sent with forged envelope sender addresses. This has mainly three   reasons.  The first reason is, that spam senders usually do not   want to be contacted by e-mail. The second reason is, that they do   not want to be blacklisted easily. The third reason is, that spam   is or is going to be unlawful in many countries, and the sender   does not want to reveal his identity. Therefore, spam is considered   to be a special case of sender forgery.2.1.3.  E-Mail Worms   Another example of sender forgery is the reproduction of e-mail   worms. Most worms do choose random sender addresses, e.g.  using   the addresses found in mailboxes on the infected system. In most   cases analyzed by the author, the e-mails sent by the reproduction   process can also be categorized as forged, since the infected   system would under normal circumstances not be authorized to send   e-mails with such e-mail addresses. So forgery does not require a   malicious human to be directly involved. This memo covers any kind   of e-mail sender address forgery, included those generated by   malicious software.2.1.4.  E-Mail spoofing and fraudHadmut Danisch                Experimental                      [Page 5]INTERNET-DRAFT                 DNS RMX RR                       Oct 2003   Forging e-mail sender addresses for fraud or other kinds of   deception ("human engineering") has also dramatically increased.   There are many known cases where single or mass e-mails were sent   with wrong sender addresses, pretending to come from service   provider, software manufacturers etc., and asking the receiver to   install any software or patches, or to reply with any confidential   information. The Internet is becoming more and more a scene of   crime, and so are it's services, including e-mail. It is obvious   that crime based on e-mail is eased by the fact that SMTP allows   arbitrary sender address spoofing.2.2.  Indirect damage caused by forgery   As observed by the author, mass mails and worms with forged sender

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产麻豆9l精品三级站| 精品国产99国产精品| 97国产一区二区| 99re8在线精品视频免费播放| 国产精品99久久久久久有的能看| 久久国产夜色精品鲁鲁99| 久久99精品网久久| 国产一区二区精品久久91| 国产激情视频一区二区在线观看 | 色天天综合色天天久久| 欧美在线三级电影| 3751色影院一区二区三区| 欧美一级黄色片| 精品免费99久久| 国产精品日日摸夜夜摸av| 亚洲日本在线视频观看| 亚洲午夜精品一区二区三区他趣| 视频一区欧美精品| 极品少妇一区二区三区精品视频| 国产激情视频一区二区三区欧美| 99久久免费国产| 欧美亚男人的天堂| 日韩欧美国产wwwww| 国产日韩影视精品| 亚洲免费av网站| 日韩和欧美一区二区三区| 激情综合色播激情啊| 菠萝蜜视频在线观看一区| 日本韩国欧美一区| 欧美成人三级在线| 国产精品九色蝌蚪自拍| 亚洲综合色婷婷| 久久99久久久久| 成人免费精品视频| 欧美日韩视频在线一区二区| 精品久久久久久久久久久久久久久 | 日本一区二区在线不卡| 亚洲欧美日韩中文播放| 午夜精品福利视频网站| 国产激情一区二区三区| 91成人在线免费观看| 日韩一级片网站| 亚洲视频一二区| 蜜桃一区二区三区在线观看| voyeur盗摄精品| 欧美丰满少妇xxxbbb| 国产精品久久久久永久免费观看| 亚洲福利视频三区| 国产精品456| 欧美日韩精品系列| 中文字幕国产一区二区| 日本最新不卡在线| 99久久er热在这里只有精品66| 91精品国产一区二区| 日本一区二区三区免费乱视频| 五月婷婷综合激情| 成人国产精品免费网站| 欧美一级黄色片| 一区二区三区国产精品| 国产成人精品午夜视频免费| 欧美一级在线视频| 亚洲精品国产一区二区精华液| 国产一区二区精品在线观看| 欧美日韩国产另类一区| 国产精品久久三区| 欧美少妇性性性| 久久精品人人爽人人爽| 全部av―极品视觉盛宴亚洲| 一本色道a无线码一区v| 国产日韩精品一区二区三区| 蜜臀国产一区二区三区在线播放| 91福利在线导航| 国产精品理论在线观看| 国产一区二区三区在线观看免费| 欧美放荡的少妇| 成人影视亚洲图片在线| 884aa四虎影成人精品一区| 亚洲免费观看在线视频| 风流少妇一区二区| xvideos.蜜桃一区二区| 免费不卡在线视频| 3d动漫精品啪啪一区二区竹菊 | 国产综合色在线视频区| 欧美精品 国产精品| 亚洲国产欧美日韩另类综合| 91亚洲精品久久久蜜桃网站| 国产欧美日韩一区二区三区在线观看| 蜜乳av一区二区| 91精品国产综合久久精品性色| 一区二区三区美女| 色8久久精品久久久久久蜜| 中文字幕中文在线不卡住| 国产一区二区精品久久91| xvideos.蜜桃一区二区| 精品在线免费观看| 欧美成人vps| 韩国三级中文字幕hd久久精品| 精品久久人人做人人爱| 精品伊人久久久久7777人| 欧美videos大乳护士334| 美洲天堂一区二卡三卡四卡视频| 91精品国产综合久久福利 | 欧美视频一区二区三区| 亚洲综合图片区| 欧美日韩在线电影| 天天做天天摸天天爽国产一区| 欧美综合一区二区三区| 亚洲一区二区三区激情| 欧美日本韩国一区二区三区视频| 天天影视色香欲综合网老头| 欧美一区欧美二区| 久久精品国产一区二区三 | 美日韩一区二区| 26uuu精品一区二区| 福利电影一区二区三区| 亚洲欧美日韩国产一区二区三区 | 亚洲图片欧美色图| 欧美福利一区二区| 精品亚洲porn| 中文字幕 久热精品 视频在线| www.日韩大片| 亚洲伊人伊色伊影伊综合网| 制服丝袜亚洲色图| 激情亚洲综合在线| 国产精品国产三级国产三级人妇| 91视频免费看| 日韩av一区二区在线影视| 亚洲精品一区在线观看| 懂色av中文一区二区三区| 亚洲美女淫视频| 91.com在线观看| 国产精品 欧美精品| 依依成人综合视频| 日韩午夜激情电影| 成人教育av在线| 婷婷开心激情综合| 久久久99久久| 色欧美88888久久久久久影院| 日韩黄色小视频| 国产精品欧美一区喷水| 欧美日韩和欧美的一区二区| 精彩视频一区二区| 亚洲精品乱码久久久久久| 日韩一级片在线播放| 99精品久久99久久久久| 男女男精品视频网| 亚洲色图欧美激情| 日韩免费观看高清完整版| jlzzjlzz欧美大全| 蜜臀av在线播放一区二区三区| 中文字幕一区在线| 欧美一区二区三级| 色综合久久综合| 狠狠色丁香婷婷综合久久片| 亚洲男帅同性gay1069| 精品欧美一区二区久久| 在线观看一区日韩| 岛国av在线一区| 美国欧美日韩国产在线播放| 亚洲精品免费视频| 久久天堂av综合合色蜜桃网| 欧美视频自拍偷拍| 成人污污视频在线观看| 欧美aa在线视频| 亚洲黄色小视频| 国产欧美一区二区三区鸳鸯浴| 3d动漫精品啪啪1区2区免费| av电影天堂一区二区在线观看| 久久国产剧场电影| 亚州成人在线电影| 国产精品久久久久久久久搜平片| 欧美变态凌虐bdsm| 欧美高清视频在线高清观看mv色露露十八| 丁香激情综合国产| 国内精品嫩模私拍在线| 视频一区二区欧美| 亚洲国产综合视频在线观看| 国产精品第四页| 中文字幕免费观看一区| 精品免费国产一区二区三区四区| 欧美日韩一区二区三区在线看| 一本一道久久a久久精品综合蜜臀| 国产福利91精品一区| 免费不卡在线观看| 免费欧美日韩国产三级电影| 亚洲h在线观看| 亚洲一二三四久久| 一二三四社区欧美黄| 日韩伦理av电影| 亚洲视频一区在线| 国内不卡的二区三区中文字幕| 日产国产欧美视频一区精品| 午夜精品一区二区三区三上悠亚| 亚洲欧美色一区| 亚洲精品免费在线播放| 亚洲精品视频在线观看免费| 亚洲色图自拍偷拍美腿丝袜制服诱惑麻豆 | 国产亚洲成年网址在线观看| 精品国产乱码久久| 精品国产乱码久久久久久老虎 |