Bill,
Bill(_dot_)Oxley(_at_)cox(_dot_)com wrote:
The hacker does not need access to my zone, he just attaches a lookalike
header yes " And to have *any* rule that allows bypass of defense
based upon the receipt of a header from outside your control is
extremely dangerous." But folks will do it anyway
By "lookalike" do you mean social engineering with a related name string, such
as citibank.com vs. c1t1bank.com, or do you mean something else.
If something else, please elaborate.
On the other hand, if you mean the name confusion thing, I would guess that that
is entirely out of the scope for this working group, since it really pertains to
reputation mechanisms, associations between domain names and brands, etc.
d/
--
Dave Crocker
Brandenburg InternetWorking
<http://bbiw.net>
_______________________________________________
ietf-dkim mailing list
http://dkim.org