HTML VersionForward to a FriendPrint this E-mail
Advertisement
advertising




September 22, 2004
Will Anyone Own Authentication?

Authentication. For e-mail providers and Internet engineers, it's the next big thing in the battle against spam. But while everyone seems to agree on the need to link e-mail addresses to real people and institutions, there isn't much agreement on how best to do it, as evidenced by a dust-up between two industry heavyweights last week.

The idea behind e-mail authentication is to create a system that would electronically track the origins of e-mail messages. Under the current e-mail protocols, it's ridiculously easy to fake the "from" information in an e-mail message, which allows spammers to mislabel their messages with impunity. Rather than try to pick those forged messages out of the ether, an authentication scheme would allow service providers to identify legitimate messages, passing them along to recipients without putting them through an anti-spam gauntlet.

All of the major e-mail providers are working on some form of authentication technology, and the Federal Trade Commission last week finalized plans to hold an authentication "summit" in November.

But in order for an authentication system to work, a majority of e-mail providers will need be on the same technological page -- a goal that may have suffered a blow last week when America Online publicly announced that it wouldn't be using an authentication scheme championed by Microsoft Corp.

Microsoft has developed a technology called Sender ID that links e-mail addresses to Internet protocol numbers, which are much more difficult to forge. But Microsoft's patent application, released last week, could exacerbate existing concerns in the e-mail community about the technology being the sole property of the software giant. Shortly after the patent request emerged, AOL said it wouldn't be using the protocol.

All of this sets the stage for a fairly rancorous meeting when all the major players gather at the FTC forum in Washington on Nov. 9, but observers say the AOL-Microsoft flap won't stop the inexorable drive toward authentication.

"I think we aren't moving backwards. The ruckus around Sender ID was basically short-circuiting what a lot of us saw as an unfortunate turn toward a more proprietary approach," said Ray Everett-Church, counsel for the Coalition Against Unsolicited Commercial Email. "Sooner or later people were going to realize that putting everything in the basket of a bunch of intellectual property licensed to you by Microsoft is not the best solution."

Everett-Church also works for a company called ePrivacy Group that is backing an open-source authentication standard.

For its part, Microsoft says the latest iteration of Sender ID can coexist with other authentication standards, regardless of whether companies like AOL adopt the proprietary technology.

--David McGuire, washingtonpost.com Staff Writer

Spam Hunt

Digital investigators who track down spammers as a hobby may soon get paid for their work under a plan cautiously endorsed by the nation's top consumer advocacy agency.

Last week, the FTC said offering cash rewards for people who sniff out spammers could help ease the volume of junk e-mail. The commission took up the issue at the behest of Congress, which is examining ways to add more teeth to the first federal anti-spam law passed late last year.

But the FTC added that a spam bounty program should reward only whistle-blowers inside or those close to spam operations who could provide detailed evidence that would lead to the operations being shut down. The commission said such rewards would have to be in the $100,000 to $250,000 range, or at least lucrative enough to overcome the benefits would-be whistleblowers would likely reap from being part of a spam operation.

Nextel Redialing Its Deal?

Mobile-phone firm Nextel Communications is looking to sweeten the deal it received from federal regulators this summer for vacating a swath of airwaves to reduce interference between the company's cellular towers and policy and fire radio systems around the country.

Last week, the Reston, Va.-based company pressed the Federal Communications Commission to revamp its controversial decision giving Nextel $3.25 billion worth of new airwaves in exchange for turning in its old ones and underwriting the costs of moving fire and police communications. Nextel has yet to accept the deal, and now wants an additional $700 million in concessions from the FCC.

Verizon Wireless, the nation's largest cellular provider, vigorously opposed Nextel's airwave swap and is lobbying Congress to consider requiring the FCC to hold an auction for the new airwaves Nextel wants, then use the proceeds to solve the interference problems quickly.

--Brian Krebs, washingtonpost.com Staff Writer

Advertisement
Get your news just the way you like it. Add your favorite columnists and topics to a washingtonpost.com newsletter delivered to your in-box each morning. It's a free and easy way to make sure you never miss a thing. Personalize your e-mail today and enjoy customized articles tomorrow.

STAYING SAFE ONLINE
Computer Naivete Costs a Bundle
A comment from my daughter marked the start of a large headache, one that launched an odyssey that has taken $800 and roughly 48 man-hours over nearly three weeks to end. – By Kathleen Day
A Digital Doctor Treats Computer Contamination
Take Care to Guard Your Windows
Computer Users Need a Good Backup Plan
Skepticism Is the Message for E-Mail
When to Leave What Closed
Geek Speak

More News and Features
AT THE FCC
In Cellular Towers' Shadows, Anxiety (Post, Sept. 20)

COPYRIGHT IN THE DIGITAL AGE
Napster Receives New Life as Public Firm (Associated Press, Sept. 18)

SECURITY WATCH
Symantec: Viruses Aimed at Microsoft Rise Sharply (Reuters, Sept. 20)

E-VOTING UPDATE
Pentagon Restricts Overseas Voters (Associated Press, Sept. 21)

GOVERNMENT IT
Microsoft to Share Source Code With Governments (Post, Sept. 21)

MORE RESOURCES FOR PROTECTING YOUR COMPUTER

How to Avoid the Latest 'MyDoom' Worm (July 26, 2004)

How to Remove the 'Sasser' Worm (May 11, 2004)

Don't Pass on the Patches (April 19, 2004)

Fine-Tuning Your Firewall (April 5, 2004)

How to Deal With Spyware (March 28, 2004)

Is Your Computer Infected With Phatbot? (March 17, 2004)

Cybersecurity and You: Five Tips Every Consumer Should Know (May 16, 2003)

A Cybersecurity Primer: Links and Resources for Computer Users


spacer
Tech Policy E-Letter Archive
More Stories

spacer
Tech Policy Section
spacer
Main Page
spacer
Cybercrime
spacer
Cybersecurity
spacer
Digital Rights/Piracy
spacer
E-Politics
spacer
FCC / Telecom Policy
spacer
Government IT
spacer
Internet Governance / ICANN
spacer
Internet Taxes
spacer
Privacy
spacer
Spam
spacer

spacer
Politics
spacer
Politics and Campaigns News
spacer
Terry Neal: Talking Points
spacer
Dan Froomkin: White House Briefing
spacer
Howard Kurtz: Media Notes
spacer
Stephen Barr: Federal Diary
spacer
National Security
spacer
Bush Administration
spacer
Supreme Court
spacer
Federal Page
spacer
Editorials/Op-Eds

Advertisement

E-Mail Newsletter Services
To sign up for additional newsletters or get help, visit the E-mail Preferences Page.
•   To unsubscribe, visit the E-mail Preferences Page (do not reply to this e-mail).
•   For feedback, send mail to [EMAIL PROTECTED].
•   For advertising information, send mail to [EMAIL PROTECTED].
•   To subscribe to the print edition of The Washington Post newspaper, click here.

    Privacy Policy

© 2004 The Washington Post Company


Forward To Friendwashingtonpost.comPrint this e-mail

Reply via email to