At 8:13 AM 6/27/94, Dorian W Smith wrote:
> If you really need to know about your mail delivery you need X.400.
> X.400 and parts of X.500 (either implemented as X.500 or integrated
This is wrong.
It is a common error, but it is still an error. If the mail is traversing
uncontrolled paths, I believe that X.400 offers nothing different from what
is offered by SMTP.
To the extent that you are referring to X.509-based stuff, then we can also
cite PEM/PGP/RIPEM/... for Internet (SMTP/RFC822/MIME)-based authentication
and data integrity.
In other words, technical solutions exist for both camps. They just aren't
being used very heavily.
The question is not about the ability to record audit trails, modification
actions, or the like. It is about the ability to detect the occurrence of
these things, independent of the cooperation of the "attacker".
+1 408 246 8253 (fax: +1 408 249 6205)