Hector Santos:
What was the advantage of SSP with look-alike domains?
To find large unproductive ratholes? Neither DKIM or SSP claim
to have any direct effect on look-alike domain names, and
there's nothing in our
DKIM_BASE allows a recipient to distinguish mail from the bank from
look-alike mail that pretends to be from the bank. That information
comes in the form of the signing domain.
SSP has an advantage when we assume that criminals are stupid enough
to keep sending forged mail. It has no advantage with look-alike
attacks. Guess what criminals will do.
hmmmmmmmmm, unless I didn't follow you right, I fail to see the distinction
or your point.
I get mail that pretends to be from my bank. The SSP says the mail
is 100% pure non-forged. However, the DKIM-BASE signing domain is
not in my list of trusted signing domains. I get a warning that
this mail could be sent by a party that I have no relationip with.
This may be a revolutionary concept to some, but a widely used
application called ssh has been using such tricks for 10 years.
Its approach to opportunistic authentication is not perfect for
purists, but it works for real people.
Having gone in circles twice, I think this is a good time to step
out of this thread.
Wietse
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html