On Sep 11, 2006, at 8:04 AM, Thomas A. Fine wrote:

With SSP, I can only receive mail that looks ALMOST like it is from one of my orgs. This is huge. This gives the user layer the ability to quickly, accurately, and precisely differentiate between fake and real messages. That's what SSP accomplishes.

When a strong email-address policy assertion that disrupts the use of common services might block exact spoofs. SSP does not differentiate "real" messages.

As far as what happens in the user layer, no specification can control that. We can certainly predict that a significant number of people will still fall for look-alike domains.

An association with a retrained email-address will curtail look-alike attacks and clarify which messages are "real." For this, the signing domain must offer an assurance that the email-address is valid as well.

But this is vastly different than people falling for the exact valid email address they were expecting.

Deploying just this mechanism will likely provide a minor impact upon the spoofing success rate. It may however have a major impact upon the delivery rate of valid messages.

What are we here for if we aren't here to fix that?

To offer a comprehensive solution that offers genuine protection without impairing email delivery.

-Doug

_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to