{"id":6615,"date":"2006-11-03T13:30:41","date_gmt":"2006-11-03T12:30:41","guid":{"rendered":"https:\/\/destinationcyber.com\/?p=6615"},"modified":"2006-11-03T13:30:41","modified_gmt":"2006-11-03T12:30:41","slug":"microsoft-place-sous-licence-open-specification-promise-sa-technologie-sender-id-framework","status":"publish","type":"post","link":"https:\/\/destinationcyber.com\/?p=6615","title":{"rendered":"Microsoft place sous licence Open Specification Promise sa technologie Sender ID Framework"},"content":{"rendered":"<p>Microsoft place sous licence Open Specification Promise sa technologie Sender ID Framework, un m\u00e9canisme d&rsquo;authentification des mails pour lutter contre les pourriels.<\/p>\n<p>En promettant de ne pas poursuivre quiconque utiliserait cette norme, l&rsquo;\u00e9diteur veut en \u00e9tendre l&rsquo;utilisation et promouvoir son interop\u00e9rabilit\u00e9.<\/p>\n<p>Quelques lignes pour inscrire dans les serveurs de noms de domaine les adresses IP des machines attach\u00e9es \u00e0 un serveur de mails et reconna\u00eetre ainsi l&rsquo;adresse de l&rsquo;exp\u00e9diteur comme valide.<\/p>\n<p>Un argument de simplicit\u00e9 oppos\u00e9 \u00e0 d&rsquo;autres solutions, comme Domain Keys utilis\u00e9e par Yahoo!<\/p>\n<p>Plus lourd, ce m\u00e9canisme offre une meilleure identification des abus en cas d&rsquo;usurpation d&rsquo;adresse.<\/p>\n<p>Mettre en place des techniques au niveau des serveurs DNS, ou des syst\u00e8mes de signature de mails revient \u00e0 r\u00e9glementer Internet, ce qui n&rsquo;est pas souhaitable car cela exclurait une partie de la population.<\/p>\n<p>Fanch<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft place sous licence Open Specification Promise sa technologie Sender ID Framework, un m\u00e9canisme d&rsquo;authentification des mails pour lutter contre les pourriels. En promettant de ne pas poursuivre quiconque utiliserait cette norme, l&rsquo;\u00e9diteur veut en \u00e9tendre l&rsquo;utilisation et promouvoir son interop\u00e9rabilit\u00e9. Quelques lignes pour inscrire dans les serveurs de noms de domaine les adresses IP [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_citadela_custom_class":"","footnotes":""},"categories":[15],"tags":[],"class_list":["post-6615","post","type-post","status-publish","format-standard","hentry","category-securite"],"_links":{"self":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/6615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6615"}],"version-history":[{"count":0,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/6615\/revisions"}],"wp:attachment":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6615"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6615"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}