Jump to content

Certified Server Validation

From Wikipedia, the free encyclopedia

This is the current revision of this page, as edited by 58.233.28.16 (talk) at 08:08, 12 July 2023. The present address (URL) is a permanent link to this version.

(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

Certified Server Validation (CSV) is a technical method of email authentication intended to fight spam. Its focus is the SMTP HELO-identity of mail transfer agents.

Purpose

[edit]

CSV was designed to address the problems of MARID and the ASRG, as defined in detail as the intent of Lightweight MTA Authentication Protocol (LMAP) in an expired ASRG draft. As of January 3, 2007, all Internet Drafts have expired and the mailing list has been closed down since there had been no traffic for 6 months.

Principles of operation

[edit]

CSV considers two questions at the start of each SMTP session:

  • Does a domain's management authorize this MTA to be sending email?
  • Do reputable independent accreditation services consider that domain's policies and practices sufficient for controlling email abuse?

CSV answers these questions as follows: to validate an SMTP session from an unknown sending SMTP client using CSV, the receiving SMTP server:

  1. Obtains the remote IP address of the TCP connection.
  2. Extracts the domain name from the HELO command sent by the SMTP client.
  3. Queries DNS to confirm the domain name is authorized for use by the IP (CSA).
  4. Asks a reputable Accreditation Service if it has a good reputation (DNA).
  5. Determines the level of trust to give to the sending SMTP client, based on the results of (3) and (4)

If the level of trust is high enough, process all email from that session in the traditional manner, delivering or forwarding without the need for further validation.[1] If the level of trust is too low, return an error showing the reason for not trusting the sending SMTP client. If the level of trust is in between, document the result in a header in each email delivered or forwarded, and/or perform additional checks.

If the answers to both of the questions at the top of this article are 'Yes', then receivers can expect the email received to be email they want. Mail sources are motivated to make the answers yes, and it's easy for them to do so (unless their email flow is so toxic that no reputable independent accreditation service will vouch for them). CSV is designed to be efficient and elegant, and in this respect it certainly beats SPF's coverage of HELO identities.

Client SMTP Authorization (CSA) was a proposed mechanism whereby a domain admin can advertise which mail servers are legitimate originators of mail from his/her domain. This is done by providing appropriate SRV RRs in the DNS infrastructure.

References

[edit]
  1. ^ "Email Verifier Check - Verifying Emails With Expert Email Validation". Retrieved 2023-07-12.
[edit]