Hi Gang

https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail

Quote:

"DomainKeys Identified Mail (DKIM) is an email authentication method
designed to detect forged sender addresses in email (email spoofing), a
technique often used in phishing and email spam."

A couple of days ago, I observed an email which looked like:

evelope-sender: nore...@scamdomain.tld

Valid SPF Entry published for the sending IP in scamdomain.tld

From: "Support" <supp...@victimdomain.tld>
To: "Joe Victim" <j.vic...@victimdomain.tld>
Subject: Please log in to to our fake login site!
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=scamdomain.tld;
 s=default;h=From:Subject:.... etc...

default._domainkey.scamdomain.tld published a valid public key.

SPF => Valid!
DKIM => Valid!

How is DKIM supposed to prevent spoofing of the From: header if the
attacker is able to supply the DNS entry in which to look up the public
key used to sign the From: Header?

DMARC Policy?

Mit freundlichen Grüssen

-Benoît Panizzon-
-- 
I m p r o W a r e   A G    -    Leiter Commerce Kunden
______________________________________________________

Zurlindenstrasse 29             Tel  +41 61 826 93 00
CH-4133 Pratteln                Fax  +41 61 826 93 01
Schweiz                         Web  http://www.imp.ch
______________________________________________________
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to