On Sep 12, 2006, at 9:41 AM, Thomas A. Fine wrote:

Without SSP, users have two opportunities for making mistakes in verifying their mail. They can fail to notice that it is unsigned, or they can fail to notice that it is from a wrong domain.

SSP that blocks unsigned messages still offers a large opportunity to get this wrong. Phish commonly avoid using the exact domain to avoid being filtered. You are assuming visual examination of a domain is a reliable, but it is not. There are still too many being fooled to curtail this criminal activity. The majority of users only see the Display name without additional clicks. We are also entering an era where it is also likely that the character repertoire being used is unknown.

With SSP, users only have to look for the wrong domain, because they should never see the unsigned mail.

Unsigned email might be block unless the email-address domain wants access to common services, or wants reliable delivery, or the verifying domain does not block based upon this policy. Will this blocking strategy lead to legal obligations of blocking these messages?

Maybe someone who's an expert in human factors can relate this to statistical decrease in errors by the user. My feeling is that the less a user has to worry about, the more likely they are going to successfully examine their message and determine it's origin.

Provide the user a strong trustworthy annotation that:
a) the email-address within the message matches the one in their address-book,
 b) and that this email-address has been asserted valid with DKIM.

This strategy does not require providers to block any message, grandma to get out her magnifying glass, or junior to reconfigure grandma's the client to use 14 point font, not display translated ACE labels or display names and to post next to her display terminal the exact spelling of her important transactional email domains.

-Doug




_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to