This
document is an expanded version of the public meeting reports,
with additional information relating to detailed discussion and
outputs. |
1. Attendees
2. Bridging the Bridges
2.1 Objectives of Session
This meeting set out to examine activities in the US and Europe to
establish Bridge-CAs for the purpose of cross recognition of security
certificates and to identify what is needed to enable cross Atlantic cross
certification of certificates.
2.2 Introduction
Mike Lambert, Director of the Messaging Forum, introduced
the meeting with a brief introduction to The Open Group, the Messaging
Forum and the objectives of the meeting (which arose out of a meeting in
April 2004 in Brussels, Belgium, to consider activities in Europe).
2.3 The European Bridge-CA Project
Charles Blauner, from Deutsche Bank, gave an overview of the
business objectives
and overall architecture of the European Bridge-CA.
The European Bridge-CA is a private partnership between a number of
European companies, mostly in Germany, to address the problems associated
with interoperability among PKIs and applications, without a hierarchical
structure and without n:n cross certification.
Stephan Wappler, from Noventum Consulting, went into a little
more technical detail about the way that the service operates and the
current capabilities. He explained hoe the European Bridge-CA addressed
the 4 major requirements of a bridge infrastructure:
- Generation of trust relationships (Trsutworth exchnage of
certificates)
- Access on participants and/or user certificates (Directory service)
- Validation of certificates (Validation service)
- Generation of a contractual framework
2.4 The US Federal Bridge-CA
Judith Spencer from GSA, and chair of the Federal Industry Credentialing Committee,
presented the current state
of play with the US Federal Bridge-CA. This covered the background to
the Federal Bridge-CA, the architecture and a growing list of cross
certified organizations. The presentation introduced a group that is
already working on Transatlantic issues, the Transatlantic Secure
Collaboration Program (TSCP) - see link below, and included a list of
issues that need to be addressed:
- Compound mapping variance - Different degrees of compatibility
- Undocumented practices - Accepted or de-facto standards within
specific communities
- Compatibility of relying parties - Technical incompatibility
- Use of constraints - Limiting name form or path length
- Liability
- Incompatible governance structures
Finally, Bill Burr, from NIST, presented his view of Bridge-to-Bridge
International Cross Certification issues. He talked about the future
of the Federal PKI, and some FIPS that define a common policy framework,
plus the transition to stronger encryption. His list of
cross-certification issues includes:
- Legal and general certificate framework
- How many certificates? Can we include digital signature and
non-repudiation in the same certificate?
- Strategy for 2048-bit keys and 256-bit hashes
- Naming & name constraints
- Directories
- Path discovery
- Scalable validation and status
2.5 Discussion
Time permitted only a limited discussion. In summary
- There was a willingness on all sides to address the issues raised
- In many respects, the most significant communication challenge
appears to be between commercial and defense initiatives in Europe
2.6 Outputs
- A list of potential barriers to International Cross Recognition.
2.7 Next Steps
Between July 2004 and the meeting in New Orleans meeting in October
2004, research will be carried out to determine
- Whether the list of issues from this meeting is complete
- The extent to which other groups are already working on issues
identified
There will be a follow-up session during the October 2004 meeting to
review the results of this research and plan future activities within the
Forum.
Ref |
Action |
On Whom |
Due Date |
04.07.01 |
Generate list of potential barriers to cross recognition of
certificates |
Russ Chung |
6-Aug-04 |
04.07.02 |
Review list of barriers and provide information regarding any
existing activities to address |
All |
30-Sep-04 |
04.07.03 |
Make contact with TSCP and map activities onto list of barriers |
Mike Lambert |
31-Aug-04 |
3. S/MIME Gateway Certification
3.1 Objective of Meeting
- Examine how vendors and customers can get value from the S/MIME Gateway
Certification program
- Plan the next version of the S/MIME Gateway Profile
3.2 Summary
On Monday July 19th 2004, the S/Mime Gateway Certification program was
launched. Certificates were presented to representatives of BT Syntegra and
Tumbleweed Communications in respect of certified products. In addition,
NetIQ and ZixCorp both issues statements of commitment to future
participation in the program.
 Luke
Lucas and Joe Nakai of BT Syntegra receive their certificate from Allen
Brown, President of The Open Group and Elliot Stone, Executive Director of
MHDC
 Jim
Normandin of Tumbleweed Communications receives his certificate
The meeting on Wednesday July 21st opened with Mike Lambert,
Director of the Messaging Forum, giving a brief Introduction
to the S/Mime Gateway Certification program, focusing on the value of
the program to customers.
Ken Beer in Implementing
the S/MIME Gateway Specification addressed the reason why gateway
encryption products are needed, how they work and defined a set of
"Implementation Best Practices". In explaining the testing that
was needed to achieve certification, he indicated that the testing was
repeatable by customers during deployment.
Discussion points:
Q (Russ Chung): Are we supporting Gateway to Desktop S/MIME.
A: No (not yet) but included in the model for completeness. The demand for this will grow over time. Still protects users in sending domain from having to know about security.
Q (Russ Chung): Are commercial CAs currently issuing domain specifications.
A: No, but you can get an INDIVIDUAL certificate for address domain-authority. The program may generate a market for domain certificates.
Q (Dean Sepstrup): We may have made the overall problem worse, by introducing a solution that is not interoperable with desktop-to-desktop encryption mechanisms.
There then followed an inconclusive discussion about domain signatures, that was continued at various points in subsequent sessions.
Luke Lucas in SMG
Implementation presented a case study of deployment of a SMG for a very
large US manufacturer, and also presented a set of Best Practices.
Discussion points:
Q (Ben Littauer): Was testing rigorous enough, if it only took 1 day?
A (Ken Beer): Yes it was sufficiently comprehensive, but there will be cases that were not tested.
Q (Russ Chung): Should we include deliberately bad data in the tests.
Building on these presentations, Ben Littauer led a discussion to
initiate work on the next version of the S/Mime Gateway specification.
Maintenance Release
Mike Lambert: We probably will need a maintenance release in mid 2005 to
address experiences from v1 of the program.
Certificate
Revocation
Ken
Beer: Certificate revocation.
Russ
Chung: This is not as important as for user certificates. Domains don't
change as often as users.
Ben
Littauer: Urgency not great because of simplicity of key management in
version 1.
Automated
Key Exchange
Ben
Littauer: We need improved key exchange for scaleability. (e.g. Ability to
access keys from directories). 200 customers is about the limit of
sustainable maintenance without automation, if for example cert expires
annually. (Current best practice)
Ken Beer: Dual keys. (Signature and Encryption)
Ben
Littauer: What are the semantics of a domain signature key.
Claudia
Boldmann: Does this allow the organisation to authenticate itself?
Stephan
Wappler: Legally all it means is that the message passed through the
gateway.
Ben
Littaue: This may be valuable in an anti-Spam context.
John
Thielens: Why would people add a signature in the first place.
Initially
to aid traceability, buy later could add additional semantics.
The
technical question relates to the whole architecture of the e-mail system
rather than simply the signature. One technical feature could be to define
a way to define the policy.
Michael Burdeos:
You want a way to advertise the behavior of the domain gateway has passed
through.
John
Thielens: Liability for sending PHI in the clear lies with sender, so it
does not matter whether the receiver trusts the sender.
Stephan
Wappler: We need to solve the issue relating to mail relaying. Stuff must
go through the mail gateway to get encrypted. Means SSL or VPN link for
mobile.
SMG
to Desktop/Desktop to SMG
Dean
Fleury: Capability to do SMG to desktop/individual.
Dean
Sepstrup I agree that this is important.
Ken
Beer: Would Sa gateway that re-encrypts for internal transmission work?
Ben:
This introduces key discovery/PKI issues.
Jon
Callas: Two issues. How do we find the certificate/how do we know that it
is valid. There are solutions built into existing products that may meet
this objective, but are not SMTP based.
Stephan
Wappler: This needs to be based on standards. We need to work out how to
do this with existing standards for interoperability.
Dean
Sepstrup: (Clarifying). We need to identify the problem and work out how
to address it with the appropriate standards.
Two
issues:
(1)
Clients can probably already handle domain encrypted e-mail. (But would
generate an error message because e-mail address on cert would not match
originator).
(2)
Clients cannot currently encrypt mail to send to domain gateway.
Agreed
that this is a priority item.
Testing
Earlier
in the session Jon Callas asked a question about the availability of a
third party testing service (possibly based on a reference
implementation). Mike Lambert had explain the original rationale to use
per-to-peer testing for version1, but recognizing that the willingness to
participate will diminish over time.
Agreed
that we should investigate the practicality of The Open Group establishing
a standing testing service.
Issues
-
Selection
of the reference implementation
-
Resources
Suggestion:
Raise the price of certification to cover the costs.
Suggestion:
Investigate partnership with sendmail.
Encryption
algorithms
Should
we revisit list of mandated encryption algorithms. Not yet.
SMG
Capability Protocol
Michael Burdeos:
It would be useful to have an SMG - SMG automated handshake to advertise
capabilities. (Extensible).
Five work items were identified which need to be addressed in version 2
of the program:
- Automated Key exchange
- Signatures
- SMG to Desktop
- SMG capabilities protocol
- Testing service
In each case, the process to be followed is
- Define the problem
- Solicit proposals
- Select the approach we would like to take
3.3 Outputs
- List of work items for version 2 of the S/Mime Gateway Profile &
certification program
3.4 Next Steps
- Each of the potential work items will be investigated and short
problem statements produced.
- These problem statements will be reviewed at the next meeting (In
new Orleans in October 2004
Ref |
Action |
On Whom |
Due Date |
04.07.04 |
Identify volunteer to develop problem statement re: Automated
key exchange |
Forum |
31-Aug-04 |
04.07.05 |
Identify volunteer to develop problem statement re: Domain
signatures |
Forum |
31-Aug-04 |
04.07.06 |
Problem statement - SMG to Desktop |
Russ Chung |
30-Sep-04 |
04.07.07 |
Problem statement - SMG capabilities protocol |
Mike Burdeos |
30-Sep-04 |
04.07.08 |
Plan for 3rd party testing service |
Mike Lambert |
30-Sep-04 |
04.07.12 |
Contact sendmail to discuss partnering on SMG Testing Service |
Mike Lambert |
30-Sep-04 |
4. Canning Spam
4.1 Objective of Meeting
- Better understand the industry view of the problem caused by Spam
- Examine various techniques that are being used to manage Spam
- Find out what other groups are doing
- In depth examination of the Sender-ID proposal
- Plan future work on Spam within the Messaging Forum
4.2 Summary
4.2.1 The Open Group Spam Survey
Mike Lambert introduced the meeting and presented the results of The
Open Group Spam Survey, carried out to establish a baseline for
decisions on future work. The major findings were:
- Spam is a major problem to most organizations
- Most organizations believe that managing Spam is their
responsibility, but want ISPs to do more
- False positives are a concern to most organizations
- There is little expectation that legislation will have a significant impact
- Reliable authentication of the sender or sending organization of e-mail is the highest priority capability
- The ability to segment e-mail by content type is also seen as important
4.2.2 Key Distribution in DNS
Dale Johnson, from Johnson Consulting, acted as moderator for
the remainder of the meeting.
In a presentation that bridges between the earlier session on S/MIME
Gateway Certification and managing Spam, John Thielens, of
Tumbleweed, addressed the topic of Key
Distribution in DNS, describing a proposal that is currently under
consideration by the IETF MARID working group. This stimulated a lengthy
discussion about the role of domain signatures later in the meeting.
The MARID group is currently focusing on SPF quickly; key
distribution will be addressed later.
Discussion Points:
Q: There is a validity time for DNS .. how does this impact expiry date for a domain key.
Q: Is there a single signature key for all purposes?
Q: Is DNS too much of a target for hacking.
A: DNS security is probably good enough. MARID thinks that is the case.
Q (Ben Littauer): Raw key material is easy. Automated distribution system required some form of PKI to distribute trust. The existing SMG process introduces security through the intervening manual step.
A: Domain keys/Identified mail is deliberately weak. Encryption is deliberately not precluded.
Suggestion: Consider extent to which manual intervention is required. Policy for which certificates to install automatically.
Q: Ben Littauer: Way to overcome restriction is for DNS to contain a certificate rather than simply key material.
A: It needs to be small enough (<512 bytes) so that it is not a performance bottleneck.
Suggestion: It could be the URL of the certificate.
Relevant IETF specifications can be found at:
- RFC 1035 How to use the .TXT record
- RFC 2782 How to use the .SRV record
Q (Dale Johnson): How long before the spammer gets this information.
A: Even if the keys proposal is no good for addressing Spam, if it helps us with key distribution then it is good.
4.2.3 Existing Spam Protection Mechanisms
Dean Richardson from MessageGate described the range of techniques
currently being used in products to assess whether an incoming message is
likely to be Spam and announced an initiative to work on mechanisms for
real-time abuse reporting between ISPs (to be done in collaboration with
the IRTF).
Discussion points:
Q: Should ISPs block port 25. i.e. Inhibit SMTP.
A: For many ISPs this is perfectly acceptable. For others, this may be troublesome (marketing problem).
Q: Should ISPs turn off machines that have a zombie?
A: This would be a significant marketing cost for ISPs.
4.2.4 Client SMTP Validation
In a presentation entitled The
value of RBLs/Client SMTP Validation, Doug Otis from MAPS
described the evolution of Real-Time Block Lists and introduced the Client
SMTP Validation (CSV) and Bounce Address Tag Validation proposals which
have been submitted to the IETF MARID working group.
John Leslie from John Leslie Consulting, provided more technical
detail about the benefits of Client
Server Validation and how it would work.
4.2.5 Keynote: So Many Good Ideas, So Little Co-operation
Nathaniel Borenstein, from IBM/Lotus, opened the second day of
the meeting with a provocative keynote entitled So
Many Good Ideas. So Little Co-operation. Describing the broad range of
measures under consideration, the key message was there is no simple
solution to Spam; addressing Spam will require a long term commitment, a
willingness to co-operate and agreement on standards.
Discussion point:
Q: The presentation called for international harmonization of
legislative approached to Spam. Is that practical?
A: At a recent ITU meeting, there was general agreement on this topic.
Only Russia failed to participate.
4.2.6 Microsoft Position
Craig Spiezle, from Microsoft in a presentation entitled Canning
Spam, the Good, the Bad and the Ugly outlined the work of the Safety
Technology and Strategy Group in Microsoft in addressing Spam. He
discussed the 3Ps of Spam control: Proof, Prevention and Protection
and briefly introduced the concept of Sender-ID. He identified some of the
groups that Microsoft is working with, including the Anti-Spam Technology
Alliance (ASTA).
4.2.7 The work of Other Groups
There then followed a number of short presentation describing the work
of other groups in addressing Spam.
- Ken Beer, from Tumbleweed, spoke about the Anti-Phishing
Working Group, and industry association focused on the elimination
of identity theft and fraud arising from email spoofing.
- John Levine, from Taughannock Networks, and chair of the IRTF/ASWG
described the IRTF's Anti-Spam
Working Group. In the presentation he called for more
experimentation to test the likely effectiveness of proposals such as
CSV and Sender-ID and identified a potential joint activity with The
Open Group to "help stamp out broken mail software". The
active sub-groups of ASRG are addressing:
- Abuse reporting
- Filtering standards
- Best current practices
- Identity, Authentication, Reputation (IAR)
- Peter Soltez, from PAS-COM in a presentation entitled Managing
Spam and Related Policies introduced a position paper on Spam
produced by the IEEE_USA Committee on Communications and Information
Policy. His conclusions were
- The “cocktail” solution appears to be the most effective in fighting spam.
- Start in the USA and then work w/Int’l groups and individual countries to aid in reducing spam
- Set up legislation to allow monetary damages and disconnection of domestic & international spammers and their cohorts.
- Define new standards for e-mail on the internet
- Work on newer and better e-mail clients that enforce a “standard” for opt-out, keys, verification and other required formats.
4.2.8 Reputational Services
Des Cahill, from Habeas talked about The
Role of eMail Reputational Services building on the experience of
Habeas in introducing such a service. In closing he declared a willingness
to talk to others about the right solution and summarized his
presentation:
- Email reputation services are necessary
- War on spam is a cold war
- Authentication standards are not enough
- The right ERS system has yet to be offered to the industry yet
4.2.9 Domain Signatures
At this point, Nathaniel Borenstein led a discussion on the use
of digital signatures at the domain and provided information about a BOF
he is planning at the upcoming IETF meeting in August 2004. The objective
is the creation of a charter for a working group to develop extensions to
SMTP/SMIME to:
- Convey the existence of signature
- Identity and provide the public key of the orginator
- Define what in the message is signed
- Define how to deliver signature with message
Definitely not in scope are
- Address based authentication --> left to MARID
- Rating and reputation services
The timescale is aggressive and the process needs to be automated.
Discussion Points:
Will this be based on S/MIME?
Nathaniel Borenstein: There is no presumption either way. S/MIME may be too heavyweight.
S/MIME is likely to be the starting point, but it will be necessary to remove
functionality until it looks like what we want.
Jon Thielens: If S/MIME is not used, we may end up re-inventing lots of the mechanisms.
Nathaniel Borenstein: There may need to be a signature algorithm that copes with changes introduced by the mail infrastructure (e.g. added white space).
Ben Littauer: Creating a parallel track is probably not the right way to go. Preference would be to fix S/MIME not develop a
different version.
Jon Callas: The goals of domain keys and S/MIME are different. S/MIME
was not designed to protect the headers, focuses on the body content. New proposals are designed to protect the headers.
I would prefer to implement a new protocol, rather than having to modify an existing complex protocol.
It is not digital signature for guarantee of content, it is like a tamper-proof seal.
George Webb: Can anything from S/MIME be leveraged?
Jon Callas: Not sure I understand the question. We certainly don't need ASN.1.
The proposal specifically excludes a trust hierarchy.
Russ Chung: How do we prevent spoofing (of keys at DNS)?
Nathanial Borenstein: This will be as trustworthy as DNS. To go further,
means a reputation service.
John Thielens: Is this a point of attack?
Nathaniel Borenstein: DNS is known to be fairly insecure. Hopefully this is being addressed by DNS-sec. DNS security needs to be addressed independently of the domain keys.
John Thielens: We will need to define what parts of the headers actually become part of the e-mail "transaction.
Nathaniel Borenbstein: This must be linked to the category of things that the user is interested in.
Better and more standard trace headers would help traceability of e-mail.
Jon Callas: Introduced concept of body count to define exactly what is signed.
Domainkeys introduces a signature that survives intervening hops and
provides for sending domain to recipient validation.
Jon Callas: Remember there is no one thing that is going to solve the problem, so it doesn't matter if the approach is not perfect.
Nathaniel Borenstein: We are not looking at a mechanism that would protect high value transactions. If we make a signature that costs 5c to break, it would deter spammers.
Compute signature including SMTP recipient would address replay attacks.
Jon Callas: Sender-ID plus keys has more value than either proposal alone. They are complementary, not competition.
Sender-ID makes zombie networks less useful. It stops them forging well known domains.
Ben Littauer: There are at least three different groups architecting solutions.
One issue that did come out of the discussion was the plethora of
overlapping activities and the need for an "Association of
Associations" to provide some co-ordination and avoid the need for
all companies to be members of all associations.
4.2.10 Sender-ID/SPF
The final part of the meeting was devoted to the subject of Sender-ID. Meng
Weng Wong of Pobox.com with Craig Spielze and George Webb
of Microsoft, jointly presented an analysis of the Sender-ID proposal,
which represents the merging of 2 different approaches (SPF and
Caller-ID). The slides from this session are not available. There are
links below to additional information.
Sender ID is:
- A way for senders to protect their brand and domain names from spoofing and phishing
- A way for receivers to validate the origin of mail messages
- More input into spam filtering decision
- A foundation for the reliable use of domain names in accreditation and reputation systems and safelists
- The first major step industry can take together to stem the abuse of email
Sender ID is not:
- A silver bullet for eliminating spam (Spammers will register their own domains)
Sender-ID is a framework of three technical specifications
- Sender Policy Framework (SPF) .. a TXT record added to
the DNS that defines which IP addresses are permitted to originate
e-mail for a domain
- Purported Responsible Address (PRA) .. which describes how a
conforming Mail Transfer Agent (MTA) must respond when processing an
e-mail message in the presence or absence of an SPF record. Drives the
domain name from the message headers.
- Submitter Optimisation (SO) .. which defines a mechanism to
validate the sender information in the SMTP envelope to allow
rejection of e-mail before transmission of the message.
These three specifications will all be submitted to the IETF MARID
group for approval in August and are being deployed in products now.
Examples of useful SPF records
Domain.com TXT “v=spf1 -all” |
This domain never sends mail
|
Domain.com TXT “v=spf1 mx -all” |
Outbound mail boxes are those defined in MX
record(s) for inbound mail
|
Domain.com TXT "v=spf1 ip4:192.0.2.0/24 –all"
|
Specify by IP range |
The immediate tasks are
- Get people to publish SPF records
- Ensure that all e-mail use cases are covered (e.g. transactional
systems)
The presentation continued with illustrations of how different use
cases should take advantage of Sender-ID, including
- Ordinary mail submission
- Mailing list servers
- Mail forwarders
- Mobile users
- Guest eMail services
Since this material is under development, the contents of the
presentation are not available. The latest information may be found on the
two WEB sites listed below.
Any questions of clarification should go to Craig Spiezle craigspi@microsoft.com
Microsoft holds a patent for at least parts of "Sender-ID".
This does not cover the SPF-record.
A royalty-free license is available for inclusion of PRA checking in
commercial MTA products.
Discussion Points:
There is currently a potential problem for organizations
with a large number of mail servers (> 32).
Doug Otis: There is a risk of network melt-down, with frequent time-outs
while searching DNS.
Meng Wong: It is possible to create wierd SPF record that would cost
1000 accesses (hackers?). sendmail.net currently doing experiments with
SPF to examine performance implications.
Mike Lambert: Does the licensing model allow inclusion of PRA checking
in open source products (e.g. sendmail).
This is not believed to be a problem.
Meng Wong: It is not necessary for all products to implement SPF
checking in the same way. Some approaches may not require a license.
Margaret Olsen: SPF records were designed for SPF semantics. Now Sender-ID is different.
Meng Wong: This was experimental, it is probably not a real problem. We
need to educate many people and in doing so we will hit most of the people
who have already created SPF records.
4.2.11 SPF/Sender-ID Certification
Mike Lambert proposed a certification
program to help with the deployment of Sender-ID. Possible areas for
certification include
- SPF records (potentially with a link to a Reputation Service)
- MTA software
- Services that use MTA software
Discussion Points:
Craig Spiezle: Companies must not have to go to several places for
certification.
Additional idea: Certification of consultants able to support the
creation of SPF records.
Added value of SPF record validation: Prevents an accidentally broken
SPF record from impacting the behavior of the network.
4.3 Next Steps
All participants were invited to provide feedback to Craig Spiezle at
Microsoft regarding the Sender-ID materials on the Microsoft WEB site.
Mike Lambert and Meng Wong will develop proposals for SPF/Sender-ID
certification.
The Managers Guide to Coping with Spam to be revised to include
references to Sender-ID.
Ref |
Action |
On Whom |
Due Date |
04.07.09 |
Plan for revision of Managers Guide to Spam |
Forum |
31-Aug-04 |
04.07.10 |
Feedback on Microsoft Sender-ID documentation |
All attendees |
31-Aug-04 |
04.07.11 |
Develop proposal for SPF/Sender-ID certification |
Mike Lambert/
Meng Wong |
30-Sep-04 |
5. Consolidated Action List
Ref |
Action |
On Whom |
Due Date |
Status |
04.07.01 |
Generate list of potential barriers to cross recognition of
certificates |
Russ Chung |
6-Aug-04 |
|
04.07.02 |
Review list of barriers and provide information regarding any
existing activities to address |
All |
30-Sep-04 |
|
04.07.03 |
Make contact with TSCP and map activities onto list of barriers |
Mike Lambert |
31-Aug-04 |
|
04.07.04 |
Identify volunteer to develop problem statement re: Automated
key exchange |
Forum |
31-Aug-04 |
|
04.07.05 |
Identify volunteer to develop problem statement re: Domain
signatures |
Forum |
31-Aug-04 |
|
04.07.06 |
Problem statement - SMG to Desktop |
Russ Chung |
30-Sep-04 |
|
04.07.07 |
Problem statement - SMG capabilities protocol |
Mike Burdeos |
30-Sep-04 |
|
04.07.08 |
Plan for 3rd party testing service |
Mike Lambert |
30-Sep-04 |
|
04.07.09 |
Plan for revision of Managers Guide to Spam |
Forum |
31-Aug-04 |
|
04.07.10 |
Feedback on Microsoft Sender-ID documentation |
All attendees |
31-Aug-04 |
|
04.07.11 |
Develop proposal for SPF/Sender-ID certification |
Mike Lambert/
Meng Wong |
30-Sep-04 |
|
04.07.12 |
Contact sendmail to discuss partnering on SMG Testing Service |
Mike Lambert |
30-Sep-04 |
|
6. Future Meeting Schedule
Date |
Location |
Description of
Meeting |
29th July 2004 |
London |
EEMA Workshop on Instant Messaging (Messaging Forum members
invited) |
27th Sept 2004 |
Berlin |
Domain Gateway Certification |
19th-22nd Oct 2004 |
New Orleans |
Messaging Forum Working Meeting |
25th-28th Jan 2005 |
San Francisco |
Messaging Forum Conference |
26th-29th Apr 2005 |
Dublin |
Messaging Forum Conference (Joint stream with EEMA) |
7. Links
Additional information about Sender-ID
|