Microsoft's undeclared patent claims on Sender ID technology is holding up adoption of the e-mail authentication specification
Published:
14 September 2004 y., Tuesday
Microsoft's undeclared patent claims on Sender ID technology is holding up adoption of the e-mail authentication specification, and it's not clear when the issue will be resolved.
The MTA Authorization Records in DNS (MARID) working group was supposed to conclude its discussion of Sender ID Friday and send it to the next stage of the Internet Engineering Task Force (IETF) standards adoption. But an e-mail from one of the chairmen over the weekend put an end to that.
Andrew Newton outlined four areas where some form of consensus within the community has been reached in regards to Sender ID so far: DNS name prefix, Sender Policy Framework (SPF)-specific record types, support for multiple authentication schemes and patent claims. But no mention was made as to when a final draft for Sender ID will move forward for adoption as a proposed standard.
Microsoft's patent claim centers on the combined use of two Internet drafts: draft-ietf-marid-core-03 (Sender ID) and draft-ietf-marid-pra-00 (the Purported Responsible Address [PRA] algorithm developed by Microsoft). The open source community says the license agreement protecting those patents violate the GPL (define). So to try and accommodate the needs of the open source community while still keeping Sender ID alive as a viable technology, Newton and Marshall Rose, the other MARID co-chair, floated a compromise measure to separate the PRA algorithm from Sender ID last week.
It's a compromise that lets those comfortable with Microsoft's license agreement continue to use Sender ID with the PRA check, while letting others develop their own authentication scheme for e-mails and still be able to use the core Sender ID specification.
Unfortunately, because of the unspecified nature of the patents, MARID working group members still weren't convinced that removing the algorithm would completely absolve users from the necessity of signing a license agreement. Also, deciding which authentication "check" to use caused a gridlock on any decision supporting the compromise.
Šaltinis:
internetnews.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.
The most popular articles
Software company announced new structure_ of it_s business.
more »
With Apple Computer's next iMac expected to be unveiled as soon as next week, Mac fan sites are buzzing with speculation over the design
more »
Like many of the major IT players, Veritas has stepped up its presence in China courtesy of a separate corporate entity in the country and a new development center
more »
China will improve its long-term mechanism to combat Internet pornography, according to a senior official of the Ministry of Information Industry here Thursday
more »
search.lt presents newest links
more »
Although Microsoft recommends that consumers turn on Automatic Update to get the latest version of Windows, the company is offering to let companies temporarily block such upgrades
more »
Benefits not enough to warrant a major shift in platform strategy, finds report
more »
HP is acquiring IT services provider Synstar for $297 million in cash to shore up its overseas presence as it battles IBM's Global Services division
more »
Cell phone makers plan to release so-called Wi-Fi phones ahead of schedule
more »
TCC Teleplex chief Dennis Novick says pay phones with high-speed Net connections in New York City are only the start of its plans
more »
New software modeling systems are breaking out of academia and making their way into Microsoft's product pipeline, the company's chairman said Thursday
more »