The IP address of the SMTP client can be found within an ASN to uncover
a network provider. Helos might verify, which may then also identify a
domain used by a network provider's customer. Of course the host names
within the reverse PTR may also verify as well. Identifying the network
provider
--On 18. februar 2007 03:10 -0800 Douglas Otis [EMAIL PROTECTED] wrote:
The IP address of the SMTP client can be found within an ASN to uncover
a network provider. Helos might verify, which may then also identify a
domain used by a network provider's customer. Of course the host names
On second thought, I know that you know this field well enough that I
*must* have misunderstood your message.
Could you please restate your missive in such a way that it's clear:
- What problem you think the IETF can help solve
- What action you think the IETF should take to solve it?
I'm
On Sun, 18 Feb 2007, Harald Tveit Alvestrand wrote:
If this was effective, blacklists would have solved the spam problem.
They are 90% effective which I think is pretty good. You can't expect to
eliminate spam, so using 100% effectiveness as a criterion for solving
the spam problem is
On Sun, 2007-02-18 at 12:51 +0100, Harald Tveit Alvestrand wrote:
On second thought, I know that you know this field well enough that I
*must* have misunderstood your message.
Could you please restate your missive in such a way that it's clear:
- What problem you think the IETF can help
Dan,
We are discussing the case of the authenticator providing a different
identity to the peer and the server here. Sam raised that issue.
Earlier Vidya described the problem you raise below: that of an
authenticator (or an entity in the middle) providing the wrong identity,
but the same
My guidebook says 6 months.
This is a PRIVATE message. If you are not the intended recipient, please
delete without
At 06:29 PM 2/18/2007, Janet P Gunn wrote:
My guidebook says 6 months.
Feel free to argue with the US State Dept.. :-)
Mike
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf
On Sat, Feb 17, 2007 at 11:43:38PM -0800, Narayanan, Vidya wrote:
Yes, the problem of an authenticator providing different identities to
the peer and the server is the typical channel binding problem and can
be detected by simply doing a protected exchange of the identity between
the peer and
On Sun, 18 Feb 2007, Michael StJohns wrote:
At 06:29 PM 2/18/2007, Janet P Gunn wrote:
My guidebook says 6 months.
Feel free to argue with the US State Dept.. :-)
I don't think it's the US State Dept you will need to argue with but
rather the officials in Prague Airport..
--
Pekka
Hi Yoshi,
-Original Message-
From: Yoshihiro Ohba [mailto:[EMAIL PROTECTED]
Sent: Sunday, February 18, 2007 7:26 PM
To: Narayanan, Vidya
Cc: Dondeti, Lakshminath; Sam Hartman;
[EMAIL PROTECTED]; Dan Harkins; ietf@ietf.org
Subject: Re: comments on
11 matches
Mail list logo