E-Mail Authentication Primer: First in 3-Part Series on E-Mail Authentication - Page 3

Benefits of e-mail authentication

Everyone has their own slant on the topic of e-mail authentication, but the bottom line is that it is good for everyone who cares about e-mail as a legitimate communication medium. It's good for senders because it allows them to take clear responsibility for the e-mail they send, and it helps detect some types of forged e-mail claiming to come from their domains. From a sender's perspective, the most immediate benefits of e-mail authentication today are the ability to reduce the incidence of certain types of forgeries and maintain their customers' confidence in their e-mail (and in their company as a whole).

It's good for recipients because it provides validated identities for which behavioral data, or reputation, can be collected. It also makes it easier for recipients to detect e-mail forgeries, which often come in the form of spoofing or phishing scams. For e-mail that is successfully authenticated, recipients have a verifiable identity for which they can build a reputation by collecting things such as incidence of bad addresses and complaint data from their customers. They can also augment their private reputation data by consulting with third-party reputation engines that monitor other aspects of sender behavior.

If authentication is your driver's license, reputation is like your driving record: ISPs and other e-mail recipients can consult it to determine your delivery-much in the same way an insurance company would check your driving record to determine your rates. Reputation data provides a model of a sender's behavior that, over time, becomes a fairly reliable predictor of future behavior. Thus, although spammers can also authenticate their mail, their bad reputations would rapidly ensure a negative impact on their future delivery.

It's also good for recipients because they can have greater confidence that authenticated e-mail in their inboxes truly originates from the designated sender (that is, the designated sender is not forged). Recipients will also tend to have fewer legitimate messages that get lost in spam filters and fewer spam messages in their inboxes. They may also have a better experience in cases where authenticated mail from senders with good reputations gets special benefits (such as working links and images).

E-mail authentication is good for the industry in general. The E-mail Sender and Provider Coalition (ESPC) requires that its members-who represent a significant portion of the major ESPs-support e-mail authentication. In March 2008, the Messaging Anti-Abuse Working Group (MAAWG) published a white paper entitled "Trust in E-mail Begins with Authentication", as well as a Sender Best Communications Practices document which strongly recommends that senders "adopt e-mail authentication for all types of messaging."

Many senders also want to know how authenticated e-mail can help their delivery rates. This is a much more difficult question to answer. Because authenticated e-mail can help recipients filter out forged e-mail, and thus prevent some kinds of spoofing and phishing attacks, some recipients are already providing some small, positive weight in their filtering mechanisms for successfully authenticated e-mail. The effect is still fairly minor today, but most major ISPs are already supporting one or more authentication types. The weight given to authentication results will likely increase as authentication becomes more prevalent and as recipients build up their reputation databases for authenticated senders.


It's important to note, though, that authentication alone is not a silver bullet. Just because you are authorized to send mail for a particular domain does not automatically mean that you are sending permission-based e-mail or that you're not generating complaints from your recipients. The real long-term benefit of authentication is that it provides a verifiable identity to which recipients can attach reputation data. It's the incorporation of that reputation data-that is, of the actual behavior of that verified identity over time-which should help stem the flood of spam, while enabling the vast majority of legitimate e-mails to be safely delivered to their intended recipients.

Editor's Note: This was Ellen's first installment of her three-part series on e-mail authentication, where she shared a comprehensive, high-level overview of e-mail authentication. In Part 2, Ellen delves into the functionality and implementation details of Sender Policy Framework (SPF) and Sender ID authentication. In Part 3, Ellen delves into the functionality and technical details of Domain Keys Identified Mail (DKIM).

/images/stories/heads/knowledge_center/siegel_ellen70x70.jpg Ellen Siegel is Director of Technology and Standards at Constant Contact. With more than 20 years of experience in online communication technologies, Ellen works to define and drive the adoption of industry best practices and standards to help fight spam, support legitimate e-mail, and enable Constant Contact to serve the growing needs of small businesses and organizations.

Ellen is a board member and technical committee co-chair for the E-mail Sender and Provider Coalition (ESPC) and an active member of the Messaging Anti-Abuse Working Group (MAAWG). She can be reached at [email protected].