Reputation Discussion Panels: Seeking a Common Understanding Dave Crocker Brandenburg Internet Working bbiw.net MAAWG / S.F. 2006 Dave Crocker Brandenburg.

Slides:



Advertisements
Similar presentations
Fighting Abuse with Trust: Enhancing the paradigm Dave Crocker Trusted Domain Project (trusteddomain.org) Brandenburg InternetWorking (bbiw.net) FCC ~
Advertisements

© 2012 Eloqua, Inc. Confidential 1 Deliverability and IP Warming Overview and Implementation Using Eloqua.
Basic Communication on the Internet:
Registration Tutorial Frequently Asked Questions and Answers Trouble Shooting Tips.
Track-able Bulk Management System. Agenda: Why TBMS? Track-able Bulk Management System (TBMS) TBMS Flow Benefits.
RNT Spam Filtering Michael Del Valle. Briggs & Stratton Michael Del Valle In business 100 years- worlds largest small engine manufacturer Using RNT since.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Deliverability How We Get You to the Inbox. +98 % Our Deliverability routinely ranks in the high 90s. There’s another way of saying this: We Get Your.
MarketFirst Deliverability Server Overview The Deliverability Problem Bounce Management Authentication & Reputation 1 Advanced Deliverability 3 Screenshots.
Are You Spamming Your Clients? June 17, Introductions  Doug Ladendorf Manager of Marketing Databases & CRM Mayer Brown LLP  1,600 Attorneys 
Dynamic Marketing Dan Ogdon, Director of Marketing - Swiftpage April 2008.
How Will Authentication Reduce Global Spam? OECD Anti-Spam Task Force Pusan – September, 2004 Dave Crocker Brandenburg InternetWorking OECD Anti-Spam Task.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
D. CrockerIntroduction to BATV 1 MIPA Bounce Address Tag Validation (BATV) “Was use of the bounce address authorized?” D. Crocker Brandenburg InternetWorking.
Netiquette Rules.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Spam and . Spam Spam is unwanted usually meant to sell something to the recipient. If a business or organization with which you are affiliated.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Spam Sonia Jahid University of Illinois Fall 2007.
OCR Functional Skills Keywords Use the right keywords To do this you need to know what it is you are searching for! – For example, you might want to search.
Visit for Marketing and Deliverability Tips, Tools, & Trainingwww. Delivered.com IP REPUTATION & DOMAIN REPUTATION HOW.
COEN 351 Non-Repudiation. A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false.
1 New : Create your own message starting from scratch 2 New From Template: add professionally designed templates provided exclusively by Gorilla Contact.
DomainKeys Identified Mail (DKIM) D. Crocker ~ bbiw.net dkim.org  Consortium spec Derived from Yahoo DomainKeys and Cisco Identified Internet Mail  IETF.
DomainKeys Identified Mail (DKIM) D. Crocker Brandenburg InternetWorking mipassoc.org/mass  Derived from Yahoo DomainKeys and Cisco.
Francesco Gennai, Francesco [dot] Gennai [at] isti [dot] cnr [dot] it Alba Shahin, Alba [dot] Shahin [at] isti [dot] cnr [dot] it 1 IST-CNR / CNIPA --
Visit for Marketing and Deliverability Tips, Tools, & Trainingwww. Delivered.com.
Pilot project proposal: AffiL Affiliated domain names for trust Dave Crocker Brandenburg InternetWorking bbiw.net
Responsible Targeting Chapter One. Content from The Essential Guide to Web Strategy for Entrepreneurs unless otherwise noted Chapter One Opt-in.
GOT SPAM? Spam is the unsolicited or undesired bulk electronic messages. Spam usually contains pornography, viruses, phishing attacks, scams, trojans,
The Internet as a Communications Tool. Communication is Key “I’ll pay more for a man’s ability to express himself than for any other quality he might.
© 2007 Convio, Inc. Implementation of Yahoo DomainKeys Bill Pease, Chief Scientist Convio.
Sending Mark Kruger Coldfusionmuse.com Cfwebtools.com.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Reporting Phishing Incidents Heather Kimley June 13, 2012.
1 ITGS - introduction A computer may have: a direct connection to a net (cable); or remote access (modem). Connect network to other network through: cables.
DNS-based Message-Transit Authentication Techniques D. Crocker Brandenburg InternetWorking D. Crocker Brandenburg InternetWorking.
Authentications INBOX Authentication Panel San Jose, CA – 2004 Dave Crocker Brandenburg InternetWorking INBOX Authentication Panel San Jose, CA –
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Certified Server Validation (CSV) “ An MTA is talking to me directly. Are they OK?” D. Crocker Brandenburg InternetWorking mipassoc.org/csv 10/8/2015 6:36.
A Trust Overlay for Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
Outlook 2007 basics. Create an account An account must be created before sending/receiving . Follow these steps to create an account:
CAN SPAM and Your Marketing Best Practices for Senders By Lars Helgeson Cooler .
A Retrospective on Future Anti-Spam Standards Internet Society of China Beijing – September, 2004 Dave Crocker Brandenburg InternetWorking
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
Deliverability Making it to the inbox
COEN 351 Non-Repudiation. A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false.
Detecting Phishing in s Srikanth Palla Ram Dantu University of North Texas, Denton.
Etiquette. Spam  spam, also known as junk or unsolicited bulk (UBE), is a subset of electronic spam involving nearly identical.
 Left Side  Mail/Contacts/Tasks  Labeled Folders  Contacts – “IM” Feature  Right Side  s.
I SPCon 2003 – Evaluating Spam Control SolutionsBrandendenburg.com / 1 Points of Control UA = User Agent MTA = Message Transfer Agent o =originator.
Serving the Public. Regulating the Profession. CANADA’S ANTI-SPAM LEGISLATION (CASL) Training for Chapters Based on Guidelines for Chapters First published.
Discussion of OCP/SMTP profile and some Use cases Presented by Abbie Barbir
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
Intelligent, simple and reliable verification on the cloud.
Deliverability and IP Warming
Unit 3 Section 6.4: Internet Security
What are the steps to stop spam s on Yahoo?
Fix Yahoo Mail Box Error 550 Call for Help
Social Media And Global Computing Sending
Domain-based Authentication, Reporting, and Conformance
Deliverability Tips Gwynne Dixon
Text Mining Application Programming Chapter 9 Text Categorization
Dark Arts of Deliverability
Presentation transcript:

Reputation Discussion Panels: Seeking a Common Understanding Dave Crocker Brandenburg Internet Working bbiw.net MAAWG / S.F Dave Crocker Brandenburg Internet Working bbiw.net MAAWG / S.F. 2006

2 2 D. CrockerApricot 2006 / Trust Overlay Adding a “Trust Overlay” :Sender/Operator Assessment Service Reputation:Sender/Operator Assessment Service Administrative Domain ok not ok MessageMessage Filter ID / Signer Evaluation Other Tests Mailbox Reputation: Internal Lists ID / Signature Verification

3 3 D. CrockerApricot 2006 / Trust Overlay Negotiating “What is Spam?” (Per message, per author, per operator) Originators  Sent by other people  Sent without an unsubscribe  Violates CAN SPAM  Porn  For “not-real” products Reputation Services  Sent to scraped lists  Not properly bounce handled  Users complain about  Sent without a valid unsubscribe  Violates CAN SPAM Originators  Sent by other people  Sent without an unsubscribe  Violates CAN SPAM  Porn  For “not-real” products Reputation Services  Sent to scraped lists  Not properly bounce handled  Users complain about  Sent without a valid unsubscribe  Violates CAN SPAM Recipients  Unsolicited bulk  Generates users complaints  Mail I don’t want  Mail I didn’t ask for  Has spam “characteristics”  Hits non-existent users  “Bad” URLs that users have complained about  Invalid HELOs, HTML, etc / Apologies to Laura Atkins

4 4 D. CrockerApricot 2006 / Trust Overlay Panel #1: Receiver-side  Charles Stiles / AOL  Jamie de Guerre / Cloudmark  Miles Libbey / Yahoo!  April Lorenzen / Mailcruncher  Charles Stiles / AOL  Jamie de Guerre / Cloudmark  Miles Libbey / Yahoo!  April Lorenzen / Mailcruncher

5 5 D. CrockerApricot 2006 / Trust Overlay Priming the Pump: Some Questions  Users/Operators  What do they need and want?  What do they NOT want?  Where to put controls  How much reliance on third-party services?  How much with the receiving operator?  How much with the end user?  Timing  What is needed now?  What might be needed long-term ?  Users/Operators  What do they need and want?  What do they NOT want?  Where to put controls  How much reliance on third-party services?  How much with the receiving operator?  How much with the end user?  Timing  What is needed now?  What might be needed long-term ?

6 6 D. CrockerApricot 2006 / Trust Overlay Panel #2: Receiver-Side  Tara Natanson / Constant Contact  Jordan Cohen / Epsilon Interactive  Richard Gingras / Goodmail Systems  Doug Warren / Habeas  Patrick Peterson / IronPort  Anne Mitchell / ISIPP  George Bilbrey / Return Path  Tara Natanson / Constant Contact  Jordan Cohen / Epsilon Interactive  Richard Gingras / Goodmail Systems  Doug Warren / Habeas  Patrick Peterson / IronPort  Anne Mitchell / ISIPP  George Bilbrey / Return Path