Email Authentication Series

This is part 8 of an 8 part series on Email Authentication, to go to part one click here. Conclusion As spam and online threats continue to plague user inboxes, Internet and email providers will continue to aggressively take steps to protect their users by implementing the latest technologies and standards available. Email authentication is part […]

Continue Reading

This is part 7 of an 8 part series on Email Authentication, to go to part one click here. ISP Adoption of Email Authentication As stated earlier, there has been no general adoption of one specific email authentication standard by the ISP and receiving communities. Additionally, ISPs generally have not been forthcoming about what authentication methods […]

Continue Reading

This is part 6 of an 8 part series on Email Authentication, to go to part one click here. DomainKeys Identifed Mail (DKIM) DomainKeys Identified Mail (DKIM) is the successor to Yahoo DomainKeys. Being very similar in functionality to DomainKeys, DKIM has additionally adopted aspects from Cisco’s Identified Internet Mail standard (IIM), and the result […]

Continue Reading

This is part 5 of an 8 part series on Email Authentication, to go to part one click here. DomainKeys DomainKeys is a domain-level authentication standard that uses public/private key encryption, DNS, and multiple policies to prove the legitimacy and contents of an email message. It verifies the domain used in the “from” or “sender” header. […]

Continue Reading

This is part 4 of an 8 part series on Email Authentication, to go to part one click here. Sender ID Framework (Sender ID) Very similar to SPF version 1 is SPF 2.0, more commonly known as Sender ID. Sender ID works on the same principles as SPF, with the exception that it not only has […]

Continue Reading

This is part 3 of an 8 part series on Email Authentication, to go to part one click here. Sender Policy Framework (SPF) For purposes of clarification, the term SPF used in this section refers to SPFv1 or SPF Classic. SPF 2.0 will be discussed in the next section under Sender ID. Sender Policy Framework (SPF) […]

Continue Reading

This is part 2 of an 8 part series on Email Authentication, to go to part one click here. A Brief History of Email Authentication Meng Weng Wong and Sender Policy Framework The concept of email authentication – validating sender email either by IP address or encryption – dates back as far as 1997. Multiple specifications […]

Continue Reading

Introduction The objective of this paper is to provide a brief overview and description of the most commonly used email authentication practices and methodologies. It is not exhaustive in nature, and does not cover every aspect of every technology in use today. It does, however, cover the main topics and points of discussion with regard […]

Continue Reading

Customers Who Trust in SocketLabs

You’re in good company when working with SocketLabs. Here are some companies who have also trusted SocketLabs.

Why SocketLabs?

What Our Customers Are Saying!