Abstract
With the increasing popularity of the Internet, unsolicited electronic mail (spam) has become a major concern. It fills up user’s mailboxes, clogs mail relays, wastes postmaster time, and creates inconveniences for sites that have been used as a relay. This seems to be a growing problem, and without appropriate countermeasures, spam messages could eventually undermine the usability of e-mail. In this paper, we propose a cooperative spam-avoidance strategy based on the concept of restricting, at the network border and mail relay level, the mail sending function through properly authorized mail gateways registered as proper new Resource Records in the DNS System. If accepted and enforced by the largest number possible of network and mail administrators on the Internet, this strategy may result in a substantial reduction of the worldwide e-mail spam phenomenon.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Fallows, D.: Spam: How it is hurting email and degrading life on the internet. Technical report, Pew Internet and American Life Project (2003)
Mockapetris, P.: Domain names – implementation and specifications. IETF RFC 1035 (1987)
Eastlake, D.: Domain Name System Security Extensions. IETF RFC 2535 (1999)
Vixie, P., et al.: Secret Key Transaction Authentication for DNS (TSIG). IETF RFC 2845 (2000)
Delany, M.: Domain-based Email Authentication Using Public-Keys Advertised in the DNS (DomainKeys). IETF Draft (May 2004)
Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139–147. Springer, Heidelberg (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Palmieri, F., Fiore, U. (2005). Introducing Public E-Mail Gateways: An Effective Hardening Strategy Against Spam. In: Lu, X., Zhao, W. (eds) Networking and Mobile Computing. ICCNMC 2005. Lecture Notes in Computer Science, vol 3619. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11534310_65
Download citation
DOI: https://doi.org/10.1007/11534310_65
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28102-3
Online ISBN: 978-3-540-31868-2
eBook Packages: Computer ScienceComputer Science (R0)