On Jun 7, 2014, at 5:26 PM, Dave Crocker via dmarc-discuss 
<dmarc-discuss@dmarc.org> wrote:

> On 6/7/2014 5:15 PM, Scott Kitterman via dmarc-discuss wrote:
>> Maybe I lost context, but I thought the claim that was being disputed and 
>> needed assessment was if p=reject was affecting the rate of phishing 
>> attempts.  
>> It would seem to me that for that question, a comparison of before/after 
>> p=reject data would yield some interesting information.
> 
> 
> ahh.  ok.  sort of.
> 
> That does get at attempts via the protected path, namely rfc5322.from
> field domain.
> 
> However it doesn't permit measuring other aveneues of attack spoofing
> the dmarc-using organization.
> 
> A claim that attackers will use work-arounds creates a desire for
> measuring use of work-arounds...
> 


But the claim is that these workarounds will mainly happen after you do DMARC 
p=reject. This data is coming in a not too distant future now.

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
dmarc-discuss mailing list
dmarc-discuss@dmarc.org
http://www.dmarc.org/mailman/listinfo/dmarc-discuss

NOTE: Participating in this list means you agree to the DMARC Note Well terms 
(http://www.dmarc.org/note_well.html)

Reply via email to