In article <CAOXFXsuLdsZgA-uJEDApRgW6bmzx5cORbiy=2km9tnxhjqb...@mail.gmail.com> 
you write:
>-=-=-=-=-=-
>
>If a sender's IP is in SPF, so SPF passes; and the applied DKIM signature
>is successfully decrypted, so DKIM passes; what good is checking alignment
>and rejecting a message?

The short answer is that bad guys can publish SPF and DKIM just as
well as good guys.  Anecdotally, it appears that bad guys are better
at it than good guys.

The point of DMARC is not just that a message is authenticated, but
that it is authenticated by the same domain that's on the From: line,
which makes it highly likely that the message is actually from who it
appears to be from, rather than from some random crook with an SPF
record and a DKIM signer.

There are certainly plenty of ways that DMARC can do unfortunate
things but in this case it's working as intended.

_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to