Sender authentication
•Various schemes
•Make sure that mail comes from the right place, given the (claimed) sender
–e.g. my mail comes from a Princeton IP address
•Works okay, but
–Complicated in presence of forwarding etc.
–Doesn’t address spambots on stolen machines