ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] Review of draft-fenton-dkim-threats-01

2005-10-30 06:28:14

----- Original Message -----
From: "Eric Rescorla" <ekr(_at_)networkresonance(_dot_)com>
To: "Earl Hood" <earl(_at_)earlhood(_dot_)com>


"Exact" domain spoofing.  I.e. There is a desire to at least deal
with cases to avoid unauthorized use of an exact domain.  Look-alike
attacks are a much more difficult problem since human factors are
more involved.

Right, but the important question is whether the benefit of
reducing exact domain spoofing is of much value.

Maybe I miss the point here, but why question it?  If a process can detect
an irregularity in a transaction regardless on the abstract intentions of
the sender, then this is a major positive step in the right direction.

--
Hector Santos, Santronics Software, Inc.
http://www.santronics.com


_______________________________________________
ietf-dkim mailing list
http://dkim.org