John C Klensin wrote:
--On Saturday, June 09, 2007 20:00 +0000 John Levine <johnl@xxxxxxxx>
wrote:
Side note: on Unix, will cron be forced to authenticate to
send emails at 2 am? :-)
Perhaps a sentence or two clarifying that this only applies to
SMTP and SUBMIT would be in order
But there are a large number of SOHO and consumer boxes, designed for
use as firewalls, etc., which are capable of sending out mail via SMTP
containing their logs. They are not multi-user, are presumably
difficult to compromise by virus or worm, and are typically configured
only to send mail to SMTP servers they protect and hence presumably
trust. Given the prohibitions in this document, where are those devices
left? Am I correct in assuming that this document would intend to
prohibit those devices as non-conforming?
No.
If the devices (or cron, or whatever) are indeed sending valid mail by virtue
of having been configured properly and not having been compromised, then it
sounds to me as if the mail is very much authentic (and authenticated.)
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
_______________________________________________
Ietf@xxxxxxxx
https://www1.ietf.org/mailman/listinfo/ietf