On 03/20/2013 15:04, Carl S. Gutekunst wrote:

Interesting use case? Scary use case? Or Carl just demonstrating his grasp of the obvious?

(Of course the outbound mail servers or firewall are the correct place to detect and block forwarding. But this trick would find people who are bypassing the outbound mail servers, or perhaps detect a flaw in the output policy rules.)

Second point first - sure you need to enforce policies such that you avoid critical problems in the first place. But in order to assess those problems you first need data - and DMARC is a very useful new source for that kind of data. I'm not sure anybody is effectively communicating the story around DMARC as data source - understandably, since first you need to address basic adoption.

I think there are a lot of interesting and productive use cases like this for information security functions, just as there are for performance management of your ESPs, useful debugging data for messaging operations, etc etc. I talk about those three branches in broad strokes when I get the chance, but people tend to glaze over until I focus on just one or two concrete points about blocking phishing.

I think that in the coming year we'll see a lot more case studies about people using the data DMARC provides in ways similar to what you outlined.

--Steve.
_______________________________________________
dmarc-discuss mailing list
[email protected]
http://www.dmarc.org/mailman/listinfo/dmarc-discuss

NOTE: Participating in this list means you agree to the DMARC Note Well terms 
(http://www.dmarc.org/note_well.html)

Reply via email to