- 5
- 0
- 约5.5万字
- 约 33页
- 2018-01-25 发布于浙江
- 举报
Chapter 15 – Electronic Mail Security密码编码学与网络安全:原理与实践 第四版英文课件
RFC 4684 (Analysis of Threats Motivating DomainKeys Identified Mail) describes the problem space being addressed by DKIM in terms of the characteristics, capabilities, and location of potential attackers. It characterizes the range of attackers on a spectrum of three levels of threat: low end attackers who simply want to send email that a recipient does not want to receive, often with falsified sender addresses. At the next level are professional senders of bulk spam mail. The most sophisticated and financially motivated senders of messages are those who stand to receive substantial financial benefit, such as from an email-based fraud scheme. The RFC then lists a range of capabilities that an attacker might have in terms of where submitted, signed, volume, routing naming etc (see text). DKIM focuses primarily on attackers located outside of the administrative units of the claimed originator and the recipient. * DKIM is designed to provide an email authentication technique transparent to the end user. In essence, a users email message is signed by a private key of the administrative domain from which the email originates. The signature covers all of the content of the message and some of the RFC 5322 message headers. At the receiving end, the MDA can access the corresponding public key via a DNS and verify the signature, thus authenticating that the message comes from the claimed administrative domain. Thus, mail that originates from somewhere else but claims to come from a given domain will not pass the authentication test and can be rejected. This approach differs from that of S/MIME and PGP, which use the originators private key to sign the content of the message, for various pragmatic reasons (see text). Stallings Figure 18.10 shows a simple example of the operation of DKIM. An email message is generated by an email client program. The content of the message, plus selected RFC 5322 headers, is signed by the email provider using the providers private key. The si
您可能关注的文档
- Ch1.3 函数的性质 微积分课件.ppt
- Ch1.4 反函数与复合函数 微积分课件.ppt
- Ch1.5 初等函数 微积分课件.ppt
- Ch1.introduction 国际金融 教学课件.ppt
- CH1.要点 物理光学课件.ppt
- ch10 - 抽象类和接口 Java语言程序设计基础篇课件.ppt
- CH10 Statistical charts and tables Medical Statistics医学统计学 教学课件.ppt
- ch10 Fixed Assets and Intangible Assets 财务会计英文版课件.ppt
- Ch10 Hypothesis Testing, One Population Mean or Proportion 商务统计学概论(英文第四版)教学课件 Introduction to Business Statistics.ppt
- ch10 Time Series Data 《计量经济学导论》课件.ppt
- 数据流通利用设施发展研究白皮书_37页_1004kb.pptx
- 食品饮料行业深度报告_原奶价格周期向上_板块配置价值愈显_59页_2mb.pptx
- 风电2026年行业策略_国内需求稳升_出海加速_国内外盈利共振_34页_2mb.pptx
- 数读IPO系列_2025年沪深新股总结_36页_1mb.pptx
- 2026年投资展望系列之十二_股债之锚_2026通胀的温度_34页_1mb.pptx
- 家电行业资金面系列专题一_从业绩博弈到稀缺性溢价——家电板块估值重构与白电龙头新机遇_47页_3mb.pptx
- 医药行业2026年度医疗器械策略报告出海篇_破局内卷_向全球价值链中高端迈进_53页_2mb.pptx
- 出海概念股票池及主题指数_扬帆出海孕育的四个投资机遇_17页_1mb.pptx
- 交运行业2026年投资策略_航空盈利修复可期_航运绿色转型提速_45页_3mb.pptx
- 资本周期系列_从业绩变脸到价值修复_22页_697kb.pptx
原创力文档

文档评论(0)