----- Original Message -----
From: "Eric Rescorla" <ekr(_at_)networkresonance(_dot_)com>
To: "Earl Hood" <earl(_at_)earlhood(_dot_)com>
"Exact" domain spoofing. I.e. There is a desire to at least deal
with cases to avoid unauthorized use of an exact domain. Look-alike
attacks are a much more difficult problem since human factors are
more involved.
Right, but the important question is whether the benefit of
reducing exact domain spoofing is of much value.
Maybe I miss the point here, but why question it? If a process can detect
an irregularity in a transaction regardless on the abstract intentions of
the sender, then this is a major positive step in the right direction.
--
Hector Santos, Santronics Software, Inc.
http://www.santronics.com
_______________________________________________
ietf-dkim mailing list
http://dkim.org