As I said in this space last week, spam has grown to dominate legitimate e-mail to such an extent that leaders of the computer industry might actually be forced to make significant changes to the worldwide e-mail system as early as this year.
There’s no agreement as yet on what the new standard will be, however.
I examined the three leading proposals that offer systemic e-mail changes. My findings? None of the changes would eliminate spam completely. But one of them would make an excellent first step.
A Problem That’s Grown Worse Year After Year
A basic flaw that has haunted e-mail since its very beginnings is that it’s trivially easy for anyone to make any e-mail message look like it came from any e-mail address.
Spammers use this fact to falsify the From lines of their unsolicited bulk e-mails. This means you can’t simply block a few “bad” addresses to filter out spam.
In addition, computer users are suffering from a new wave of “phishing” e-mails. These messages falsely claim to come from financial institutions and instruct innocent people to “re-enter” their credit-card numbers and passwords — at look-alike sites that are controlled by criminals.
Each of the proposed e-mail fixes would require better identification of who the “sender” of an e-mail message is.
The Contenders for a Systemic E-Mail Fix
The following three proposals, in order from least to most effective, represent various ways to alter the sender-recipient relationship:
• SPF.Sender Policy Framework is currently an “Internet-draft” that’s being considered by international standards bodies. It would require the owners of domain names to publish the IP addresses of their outbound mail servers. Any message from, say, PayPal.com that didn’t come from one of PayPal’s published IP addresses would be assumed by any receiving server to be a fake that should be discarded.
SPF would still allow forgery, however. Malicious hackers could set up a new domain name at a new, temporary IP address. E-mail messages with a From line saying, for example, “PayPal.com” would pass right through an SPF test. All the hackers would have to do is set the unseen Bounce address of the messages to their own IP address, which they’d abandon as soon as it had done its job.
“That is correct,” responded Meng Weng Wong, a chief proponent of SPF and the founder of Pobox.com, when I asked him about this. “SPF solves part of the puzzle. The scenario you describe needs to be solved using other technologies, such as Yahoo’s DomainKeys or Caller ID.”
• Caller ID for E-Mail.The so-called Caller ID scheme is the brainchild of Microsoft Corp. Its proposal would examine the domain name in the visible From address of an e-mail message. This domain would be queried to see if it held an “E-Mail Policy Document.” This document, a file up to 2048 bytes in length, would be written in XML format and would, like SPF, specify a list of legitimate IP addresses for outgoing mail.
Caller ID, however, would demand changes to the installed software of most portable devices that send mail from outside a corporate network. It would also require updates for mailing list services, forwarding services, e-greeting sites, outsourced e-mail providers, and users of personal domain names who send their e-mail through a separate ISP account. This would certainly slow the adoption of the scheme.
• DomainKeys.Yahoo.com, one of the world’s largest e-mail services, is the chief advocate of DomainKeys. This proposal envisions that legitimate e-mail senders will digitally sign their outgoing messages. The signature would ensure that no one could modify the From line or the body of a message in transit without the receiving e-mail software detecting the tampering.
The owner of a domain name would post a “public key,” which would be checked by any mail server that received a message purporting to be from that domain. If the key lined up with the signature of the message, the receiver would be assured that the mail, in fact, did originate from a sender at that entity.
To implement the RSA-style encryption required by DomainKeys, bulk e-mail senders would have to install a new signing module and corporate mail servers would optionally have to begin checking incoming e-mail for validity. Consumer ISPs, such as Verizon and Qwest, would sign all outgoing mail and check all incoming mail on behalf of their legitimate subscribers, so end users wouldn’t have to understand any technical details.
Calculating a digital signature for an entire e-mail message consumes a lot of processing power. So mass senders could calculate just a 128-bit “hash,” which is easy.
What These Standards Would and Would Not Do
“The first question to ask about all three of them is what problem they’re trying to solve,” says John Levine, the co-chair of the Antispam Research Group, a committee of the Internet Research Task Force of the IAB. “It’s not ‘spam,’ for any normal definition of spam.”
That’s true. The new schemes would merely make it more likely that an e-mail message with a certain domain name in its address, such as Qwest.net, would actually have some connection to someone at that domain name. This wouldn’t end spam — but it wouldmake the sources of it much easier to track and therefore filter out.
This alone would help to identify at least 65% of spam. This is the percentage that Spamhaus.org, a major antispam service, says is now being sent from PCs infected with “Trojan horse” programs that relay unsolicited bulk e-mail for spammers.
“The spam [from Qwest subscribers] will all say it’s coming from Qwest.net, which is something,” Levine agrees.
Signing All Mail As a Much-Needed Step
If positive identification of senders is to be the first step in stopping spam, many computer experts feel that digital signatures, such as those required by the DomainKeys proposal, are the way to go.
“The one [proposal] I like the best, but that will probably take the longest to implement, is DomainKeys,” says Eric Allman, the CTO of Sendmail.com, a provider of e-mail software to 70% of the Fortune 1000. Signed-mail proposals, he feels, best lend themselves to “reputation services” that can say which senders are spammers and which are legitimate businesses.
As a result, Sendmail is working with Yahoo to test the DomainKeys spec, but the company has also endorsed Microsoft’s Caller ID plan.
Even if DomainKeys is adopted, a great deal of spam will continue because some spammers are perfectly happy to identify themselves. Many well-known corporations have been caught spamming — they call it “communicating our advantages to potential customers” — and only negative reactions from recipients limit the flow.
Conclusion
Until the U.S. and other countries ban spam as a theft of services, as the European Union did last year, sender-identification plans such as DomainKeys look promising. At the least, they’ll help you sort bulk mail broadcasters into the “good guys” and the “bad guys.”
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2020
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Anticipating The Coming Wave Of AI Enhanced PCs
FEATURE | By Rob Enderle,
September 05, 2020
The Critical Nature Of IBM’s NLP (Natural Language Processing) Effort
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
August 14, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.