> , while it gets no where near real
> authentication, the ability to write a pair of rules that say 
>
>       * if the message comes to "[EMAIL PROTECTED]", and
>       isn't from an address in the "bigbank.com" domain, it is
>       trash and can be discarded, and
>       
>       * if the message appears to come from the "bigbank.com"
>       and isn't addressed to [EMAIL PROTECTED]", then it
>       is trash and can be discarded.
>
> turns out to be a powerful tool that is not easily defeated and
> that does not require multiple handshakes between recipient and
> putative sender.
I've been using it for years, and entirely agree.

Keith


_______________________________________________
Ietf mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/ietf

Reply via email to