We’re beyond working group last call, the time for this is long gone.

Seth, as Chair

-mobile


On Sat, Aug 17, 2024 at 15:22 Douglas Foster <
[email protected]> wrote:

> I suspect my experience is typical of many businesses:  The most common
> target of impersonation is my own domain, by both good and evil actors.
>
> The good guys feel free to impersonate me because they know that they are
> the good guys.  They assume that I will know that they are the good guys
> and will find a way to allow their traffic.
>
> The bad guys know that if they can successfully penetrate my defenses
> using my own domain, they will be trusted as insiders, and their attack
> will be more convincing.
>
> I am left with the challenge of distinguishing between the two.
>
> Neither RFC7489 nor DMARCbis speak to this problem.   Should it be in
> scope or  out of scope?
>
> Doug Foster
>
> _______________________________________________
> dmarc mailing list -- [email protected]
> To unsubscribe send an email to [email protected]
>
_______________________________________________
dmarc mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to