
datatracker.ietf.org/doc/html/rfc1040
Preview meta tags from the datatracker.ietf.org website.
Linked Hostnames
3Search Engine Appearance
https://datatracker.ietf.org/doc/html/rfc1040
RFC 1040: Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures
Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures (RFC 1040, ; obsoleted by RFC 1113)
Bing
RFC 1040: Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures
https://datatracker.ietf.org/doc/html/rfc1040
Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures (RFC 1040, ; obsoleted by RFC 1113)
DuckDuckGo

RFC 1040: Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures
Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures (RFC 1040, ; obsoleted by RFC 1113)
General Meta Tags
8- titleRFC 1040 - Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures
- charsetutf-8
- X-UA-CompatibleIE=edge
- viewportwidth=device-width, initial-scale=1
- descriptionPrivacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures (RFC 1040, ; obsoleted by RFC 1113)
Open Graph Meta Tags
5- og:titleRFC 1040: Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures
- og:urlhttps://datatracker.ietf.org/doc/html/rfc1040
- og:site_nameIETF Datatracker
- og:descriptionThis RFC is the Outgrowth of a series of IAB Privacy Task Force meetings and of internal working papers distributed for those meetings. This memo defines message encipherment and authentication procedures, as the initial phase of an effort to provide privacy enhancement services for electronic mail transfer in the Internet. Detailed key management mechanisms to support these procedures will be defined in a subsequent RFC. As a goal of this initial phase, it is intended that the procedures defined here be compatible with a wide range of key management approaches, including both conventional (symmetric) and public-key (asymmetric) approaches for encryption of data encrypting keys. Use of conventional cryptography for message text encryption and/or integrity check computation is anticipated.
- og:typearticle
Link Tags
12- alternate/feed/document-changes/rfc1040/
- apple-touch-iconhttps://static.ietf.org/dt/12.43.1/ietf/images/ietf-logo-nor-180.png
- canonicalhttps://datatracker.ietf.org/doc/html/rfc1040
- iconhttps://static.ietf.org/dt/12.43.1/ietf/images/ietf-logo-nor-32.png
- iconhttps://static.ietf.org/dt/12.43.1/ietf/images/ietf-logo-nor-16.png
Emails
1- [email protected]?subject=rfc1040
Links
17- https://datatracker.ietf.org/doc/html/rfc1040
- https://datatracker.ietf.org/doc/html/rfc1113
- https://datatracker.ietf.org/doc/html/rfc821
- https://datatracker.ietf.org/doc/html/rfc822
- https://datatracker.ietf.org/doc/html/rfc822#section-3.1.1