On Tue, 11 Mar 2008, Dave Crocker wrote:
>
>      <t>The core of the Internet Mail architecture does not impose any
> security requirements or functions on the end-to-end or hop-by-hop
> components. For example, it does not require participant authentication
> and does not attempt to prevent data disclosure.</t>

Client-server hops do have security requirements: message submission (RFC
5068) and message store access (RFC 3501).

Tony.
-- 
f.anthony.n.finch  <[EMAIL PROTECTED]>  http://dotat.at/
BISCAY FITZROY: SOUTHWESTERLY 5 TO 7 BUT VARIABLE 4 IN SOUTH. VERY ROUGH OR
HIGH. RAIN OR SHOWERS. MODERATE OR GOOD, OCCASIONALLY POOR.

Reply via email to