Certified Server Validation


Certified Server Validation is a technical method of email authentication intended to fight spam. Its focus is the SMTP HELO-identity of mail transfer agents.
CSV was designed to address the problems of MARID and the ASRG, as defined in detail as the intent of Lightweight MTA Authentication Protocol in an expired .
As of January 3, 2007, all Internet Drafts have expired and the mailing list has been closed down since there had been no traffic for 6 months.

Principles of operation

CSV considers two questions at the start of each SMTP session:
CSV answers these questions as follows: to validate an SMTP session from an unknown sending SMTP client using CSV, the receiving SMTP server:
  1. Obtains the remote IP address of the TCP connection.
  2. Extracts the domain name from the HELO command sent by the SMTP client.
  3. Queries DNS to confirm the domain name is authorized for use by the IP.
  4. Asks a reputable Accreditation Service if it has a good reputation.
  5. Determines the level of trust to give to the sending SMTP client, based on the results of and
If the level of trust is high enough, process all email from that session in the traditional manner, delivering or forwarding without the need for further validation. If the level of trust is too low, return an error showing the reason for not trusting the sending SMTP client. If the level of trust is in between, document the result in a header in each email delivered or forwarded, and/or perform additional checks.
If the answers to both of the questions at the top of this article are 'Yes', then receivers can expect the email received to be email they want. Mail sources are motivated to make the answers yes, and it's easy for them to do so. CSV is designed to be efficient and elegant, and in this respect it certainly beats SPF's
coverage of HELO identities.
Client SMTP Authorization was a proposed mechanism whereby a domain admin can advertise which mail servers are legitimate originators of mail from his/her domain.
This is done by providing appropriate SRV RRs in the DNS infrastructure.