On Sunday, June 08, 2014 7:22 AM [GMT+1=CET], David Woodhouse via dmarc-discuss 
wrote:

> On Sat, 2014-06-07 at 16:42 -0400, Larry Finch via dmarc-discuss
> wrote: 
> > 
> > DMARC really sounded good when it was first defined and spec’d. And
> > it DOES prevent spoofing a Yahoo or AOL address, but does nothing to
> > prevent spoofing a Yahoo or AOL user, (or Chase, Wells-Fargo, Bank
> > of America, etc) as my inbox has proven over the past few days.
> 
> For the banks, there's a much simpler solution anyway. Banks should be
> S/MIME-signing all their customer-facing outbound mail, and a customer
> should know with 100% certainty that if they get a mail which isn't
> S/MIME signed with the bank's certificate, it's a fake.
(...)
> Any bank *not* signing its direct-to-customer email should be
> prosecuted as an accessory to fraud which it is enabling by actively
> training its customers to succumb to phishing :)

Nice. And how is the bank supposed to get hold of all of his clients' public 
keys in order to S/MIME sign all the mail said bank sends to all his clients. 
Do you think that is doable, when many people do have an email address, but 
have not the faintest idea of what a public key is at all?

Hmm, I think I am missing something here, as I don't see how what you propose 
is doable at all, not even for banks with full staffed IT teams.

Regards,
J.Gomez

_______________________________________________
dmarc-discuss mailing list
dmarc-discuss@dmarc.org
http://www.dmarc.org/mailman/listinfo/dmarc-discuss

NOTE: Participating in this list means you agree to the DMARC Note Well terms 
(http://www.dmarc.org/note_well.html)

Reply via email to