On Tue, 11 Mar 2008, Dave Crocker wrote: > > <t>The core of the Internet Mail architecture does not impose any > security requirements or functions on the end-to-end or hop-by-hop > components. For example, it does not require participant authentication > and does not attempt to prevent data disclosure.</t>
Client-server hops do have security requirements: message submission (RFC 5068) and message store access (RFC 3501). Tony. -- f.anthony.n.finch <[EMAIL PROTECTED]> http://dotat.at/ BISCAY FITZROY: SOUTHWESTERLY 5 TO 7 BUT VARIABLE 4 IN SOUTH. VERY ROUGH OR HIGH. RAIN OR SHOWERS. MODERATE OR GOOD, OCCASIONALLY POOR.
