Talk:Email authentication: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>David MacQuigg
No edit summary
imported>David MacQuigg
mNo edit summary
Line 1: Line 1:
{{subpages}}
{{subpages}}
The challenge in this article is to introduce a subtopic that has a huge amount of detail without overwhelming the non-expert reader.  We can do that by keeping the focus narrow, relying on a parent topic to establish a conceptual framework and terminology for the discussion, and subtopics to offload much of the detail.  We will include just those details that are needed for a coherent presentation of this topic, or that are interesting enough to outweigh the burden of including them.
The challenge in this article is to introduce a subtopic that has a huge amount of detail without overwhelming the non-expert reader.  We can do that by keeping the focus narrow, relying on a parent topic to establish a conceptual framework and terminology for the discussion, and subtopics to offload much of the detail.  In this article we will include just those details that are needed for a coherent presentation of the topic, or that are interesting enough to outweigh the burden of including them.


There are several authoritative references (RFCs) on each of the authentication methods.  There are also Wikipedia articles that may be more readable than the RFCs.  In this article, we will try to avoid the "written by committee" style, where every contributor gets to squeeze in a few facts that he considers important.  The subtopics on each authentication method will be a better place for more detail.
There are several authoritative references (RFCs) on authentication methods.  There are also Wikipedia articles that may be more readable than the RFCs.  In this article, we will try to avoid the "written by committee" style, where every contributor gets to squeeze in a few facts that he considers important.  The subtopics on each authentication method will be a better place for more detail.


Terminology is a challenge.  Should we use the same terms the experts use (MTA, Reverse Path, etc.) or terms that are more meaningful to non-experts (Mail Relay, Return Address, etc.)?  We have chosen the latter, because our articles are intended for non-experts.  Experts will have no trouble understanding what we mean, as long as we avoid mis-using any of their special terminology.  We will capitalize terms that we intend to have a special meaning (e.g. Relay instead of relay).
Terminology is a challenge.  Should we use the same terms the experts use (MTA, Reverse Path, etc.) or terms that are more meaningful to non-experts (Mail Relay, Return Address, etc.)?  We have chosen the latter, because our articles are intended for non-experts.  Experts will have no trouble understanding what we mean, as long as we avoid mis-using any of their special terminology.  We will capitalize terms that we intend to have a special meaning (e.g. Relay instead of relay).

Revision as of 14:06, 25 November 2008

This article is a stub and thus not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
To learn how to update the categories for this article, see here. To update categories, edit the metadata template.
 Definition Brief overview of methods used to authenticate the sender of an email. [d] [e]
Checklist and Archives
 Workgroup category Computers [Please add or review categories]
 Talk Archive none  English language variant American English

The challenge in this article is to introduce a subtopic that has a huge amount of detail without overwhelming the non-expert reader. We can do that by keeping the focus narrow, relying on a parent topic to establish a conceptual framework and terminology for the discussion, and subtopics to offload much of the detail. In this article we will include just those details that are needed for a coherent presentation of the topic, or that are interesting enough to outweigh the burden of including them.

There are several authoritative references (RFCs) on authentication methods. There are also Wikipedia articles that may be more readable than the RFCs. In this article, we will try to avoid the "written by committee" style, where every contributor gets to squeeze in a few facts that he considers important. The subtopics on each authentication method will be a better place for more detail.

Terminology is a challenge. Should we use the same terms the experts use (MTA, Reverse Path, etc.) or terms that are more meaningful to non-experts (Mail Relay, Return Address, etc.)? We have chosen the latter, because our articles are intended for non-experts. Experts will have no trouble understanding what we mean, as long as we avoid mis-using any of their special terminology. We will capitalize terms that we intend to have a special meaning (e.g. Relay instead of relay).

Planned Additional Subtopics

  SPF
  SenderID
  DKIM
  CSV