© 2007 Convio, Inc. Implementation of Yahoo DomainKeys Bill Pease, Chief Scientist Convio.

Slides:



Advertisements
Similar presentations
1 Eloqua Providing Industry-Leading Management Tools May 2009.
Advertisements

Eloqua Providing Industry-Leading Management Tools.
Outlook 2010 Quick Guide Table of Contents: Overview of client, Sending/Receiving , Using the address book………..……… Sent Items……………………………………………………………………………………………..…..8.
marketing. o is directly marketing a commercial message to a group of people using . o every sent to a potential or current customer.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Deliverability How We Get You to the Inbox. +98 % Our Deliverability routinely ranks in the high 90s. There’s another way of saying this: We Get Your.
Are You Spamming Your Clients? June 17, Introductions  Doug Ladendorf Manager of Marketing Databases & CRM Mayer Brown LLP  1,600 Attorneys 
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
DomainKeys Identified Mail (DKIM): Introduction and Overview Eric Allman Chief Science Officer Sendmail, Inc.
© 2008 Convio, Inc. The Anatomy of Delivery Bill Pease, Chief Scientist Convio.
Lesson 7: Business, , & Personal Information Management
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Reporting Module for Gateway Yvonne Yao. Recap: What is the Gateway? Web-base system Create, schedule, send mailings Statistics collected and presented.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Homework #5 Solutions Brian A. LaMacchia Portions © , Brian A. LaMacchia. This material is provided without.
Using the Engaging Networks tools Ghazal Vaghedi Toronto February 21, 2012 #12ENCONF.
Broadcast service Core tools. Agenda 1.Introduction – tool and its main features 2.Setting up and sending a simple broadcast 3.Achieving.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
A – Promotion Marketing PE: Understand the use of direct marketing to attract attention and to build brand. PI: Explain the nature of marketing.
Using Microsoft Outlook: Basics. Objectives Guided Tour of Outlook –Identification –Views Basics –Contacts –Folders –Web Access Q&A.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
1 Outlook Live Live Messenger SkyDrive Office Live Live Spaces Live Groups.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Identity Based Sender Authentication for Spam Mitigation Sufian Hameed (FAST-NUCES) Tobias Kloht (University of Goetingen) Xiaoming Fu (University.
NEXTPREV “MailCherry is a very valuable and user friendly marketing tool. It is undoubtly a product with great "value for money"!” Semi Psilogianni, Brand.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Sending Mark Kruger Coldfusionmuse.com Cfwebtools.com.
1 The Business Case for DomainKeys Identified Mail.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Masud Hasan Secue VS Hushmail Project 2.
Chapter 6: Packet Filtering
Canada’s Anti Spam Legislation. What is CASL? CASL was intended to combat negative online behaviour  spam  phishing  malware  spyware  It will create.
Encryption Cisco Ironport using Click here to begin Press the ‘F5’ Key to Begin.
Name: Ryan Lugg Form: 10B . How can businesses make use of . (P) can be a very useful tool, it can be very cost effective and efficient.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
A Trust Overlay for Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Using . Creating and Sending Messages The Inbox view serves as Outlook’s interface Click the Inbox icon in the Outlook Bar or Folder List.
Outlook 2007 basics. Create an account An account must be created before sending/receiving . Follow these steps to create an account:
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
Microsoft ® Outlook 2000 Managing and Integrating Outlook Components.
Outlook Web App Crash course. Outlook Agenda Login Login Reset Password Reset Password Getting Started in Outlook Web App Getting Started in Outlook Web.
EVON TAN KA VUN THECLA JOSEPH NOR FAEEZA ISMALI JESSICCA TOKIROI.
Region 5 Portal Registration Guide 1 Portal Registration: A Quick Start Guide 12/31/08 Aum Sri Sai Ram Sathya Sai Baba Centers of North Central Region.
RUCUS - IETF 71 1 Lessons Learned From IETF Antispam Work Jim Fenton.
Teach Yourself Windows 98 Module 5: Working with and Using Newsgroups.
Managing Your Inbox. Flagging Messages Message requires a specific response or action from the recipient Flagging draws attention to your request Quick.
 Left Side  Mail/Contacts/Tasks  Labeled Folders  Contacts – “IM” Feature  Right Side  s.
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
ACCOUNT ADMINISTRATION. Objectives In this session you will learn how to: –Create Business Units. –Create new users and manage security settings. –Configure.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Why to Register Multiple Domain Name Extensions for Your Website?
Copyright netCORE Solutions netCORE CEO Unveils The Secret to Gmail Inbox Delivery.
Yahoo! Mail We gave Google some good press so we’ll use Yahoo! mail as our example for web s. If you don’t have an account Yahoo! will provide.
Intelligent, simple and reliable verification on the cloud.
Windows Vista Configuration MCTS : Productivity Applications.
Sender Reputation in a Large Webmail Service by Bradley Taylor (2006) Presented by : Manoj Kumar & Harsha Vardhana.
3.06 Understand the use of direct marketing to attract attention and to build brand.
Sender ID: An Overview for Registrars ICANN Vancouver December 1, 2005
CS3015 Beacon Module 4 Messenger & Setting Preferences
How to get 90% in boxing through s is the foundation of the social web. It is the essential — and frequently the main — channel for speaking.
3.06 Understand the use of direct marketing to attract attention and to build brand.
3.06 Understand the use of direct marketing to attract attention and to build brand.
3.06 Understand the use of direct marketing to attract attention and to build brand.
Gmail Password Recovery
3.06 Understand the use of direct marketing to attract attention and to build brand.
Presentation transcript:

© 2007 Convio, Inc. Implementation of Yahoo DomainKeys Bill Pease, Chief Scientist Convio

© 2007 Convio, Inc.2 What is Yahoo DomainKeys (YDK)? ■ An authentication standard developed and promoted by Yahoo ■ Used to verify the identity of senders so that Yahoo can: ▶ Provide its subscribers with a “safer” inbox by separating authorized by a brand from phishing attacks spoofing a brand ▶ Improve its spam filtering systems by reliably identifying senders and using each sender’s mail reputation to make delivery decisions ■ For more information ▶ ▶

© 2007 Convio, Inc.3 Why Implement DomainKeys? ■ Yahoo provides valuable delivery benefits to publishers that support YDK: ▶ Higher probability of delivery to inbox, rather than diversion to bulk mail folder ▶ Feedback loop of subscribers that report a message as spam  Automated removal of complainants reduces spam complaint rate at Yahoo  Lower complaint rate results in fewer delivery barriers ■ Yahoo educates its subscribers to trust from senders that are verified by YDK ▶ Adds trust icon to verified

© 2007 Convio, Inc.4 What does YDK implementation involve? ■ Simple addition of a TXT record to the DNS zone for each domain your organization uses to send from Convio ▶ Identify list of “From” addresses used in Convio ▶ Add Convio’s public key TXT record to each domain and sub- domain’s DNS ▶ See instructions at ■ IF your DNS hosting provider does not support TXT records: ▶ Switch to a provider that does support established internet standards for sender verification  dyndns.com  UltraDNS.com ▶ DNS hosting is a separable commodity service – your organization does not need to switch its website host, host, etc.

© 2007 Convio, Inc.5 What happens if an organization does not support YDK? ■ Convio will sign your with its public key in order to obtain Yahoo delivery benefits for your organization ▶ This requires replacing your domain’s address with a Convio domain address – at Yahoo only ■ There will be some changes in how your address is displayed at Yahoo ▶ Your “From Name” will remain unchanged, but your “From Address” will be changed: From: “Defenders of Wildlife” -> From “Defenders of Wildlife” Reply-To: Defenders of Wildlife” ▶ Yahoo will promote trust in the sender by adding its YDK security icon ▶ See appendix for screenshots

© 2007 Convio, Inc.6 FAQs - 1 ■ Won’t this eliminate my brand identity at Yahoo? ▶ No – the primary means by which brand identity is conveyed in the Yahoo UI (the sender’s From Name) remains unchanged. In fact, Yahoo will promote trust in the sender of any YDK compliant ■ What about recipients that reply to – won’t these go to Convio? ▶ No – replies will continue to be directed to whatever Reply-To address a client has specified. Bounce messages will continue to be processed automatically by Convio.

© 2007 Convio, Inc.7 FAQs - 2 ■ My organization uses multiple providers. Won’t designating Convio as an authorized sender in our DNS records damage the delivery of sent by our other providers? ▶ No – Partial support for sender verification is better than no support at all. No significant recipient domains are punishing publishers who only authorize some of their sending domains in their DNS record, especially compared to publishers who fail to support sender verification entirely. ▶ Some recipient domains do provide additional delivery benefits to publishers that completely define the set of domains authorized to send in their name, because such domains make it possible to unambiguously separate authorized from unauthorized senders.

© 2007 Convio, Inc.8 Appendix Screenshots Illustrating Impact of Client Support for YDK on Display at Yahoo Yahoo Mail & Yahoo Classic Variations based on whether client supports YDK in its DNS

© 2007 Convio, Inc.9 Trust promotion of sender in From line: Yahoo DomainKey icon added and explained as “This sender is DomainKeys verified” Yahoo Mail Inbox (1a) IF Client supports YDK: No Change to Inbox Trust Promotion of Sender in Preview

© 2007 Convio, Inc.10 In preview pane: Trust promotion of sender with YDK icon From line will be modified: “Defenders of Wildlife” -> “Defenders of Wildlife” Yahoo Mail Inbox (1b) IF Client does not support YDK: No Change to Inbox Changes in Preview Pane

© 2007 Convio, Inc.11 Yahoo Mail Full Message View (2a) IF Client supports YDK: Trust Promotion of Sender Trust promotion of sender with YDK icon

© 2007 Convio, Inc.12 From line of message will be modified: “Defenders of Wildlife” -> “Defenders of Wildlife” Yahoo Mail Full Message View (2b) IF Client does not support YDK: Trust Promotion of Sender Change to From Line Trust promotion of sender with YDK icon

© 2007 Convio, Inc.13 The sender field displays a client’s “From Name,” not from “ Address.” There will be no change whether or not a client supports YDK. Yahoo Classic (3a&b) IF Client supports YDK or IF Client does not support YDK: No Change to Inbox

© 2007 Convio, Inc.14 Trust promotion text is added below From field: From: “ASPCA” -> From: “ASPCA” Yahoo! DomainKeys has confirmed that this message was sent by aspca.org. Yahoo Classic Message View (4a) IF Client supports YDK: Trust Promotion of Sender in Message View

© 2007 Convio, Inc.15 Change to From line and addition of trust promotion text: From: “ASPCA” -> From: “ASPCA” Yahoo! DomainKeys has confirmed that this message was sent by convio.net. Yahoo Classic Message View (4b) IF Client does not support YDK: Change to From Line Trust Promotion of Sender