>> An essential part of such exercise is to explain why the mitigation is
>> strategic. That is, why will it not be easy for attackers to work
>> around the SSP mechanism and achieve equivalent attack success.
>
>Modulo look-alike domains I guess?
Depending on the threat, there's all sorts of lik
Michael Thomas wrote:
Any sort of analysis needs to keep in mind that although SSP thwarts
a relatively narrow set of attacks in and of itself, it could well
be useful in conjunction with various phishing filtering heuristics,
reputation, and the like which are all outside of the scope
On Dec 14, 2007, at 10:10 AM, Michael Thomas wrote:
Steve Atkins wrote:
On Dec 14, 2007, at 9:32 AM, Stephen Farrell wrote:
Modulo look-alike domains I guess? (There's text in 4868, 4.2.1
about
that btw.) I don't think anything in SSP can mitigate that threat.
In that instance the thr
Steve Atkins wrote:
On Dec 14, 2007, at 9:32 AM, Stephen Farrell wrote:
Dave Crocker wrote:
Right. So let's explore what current problems specific functions in SSP
will mitigate.
Folks who are proponents of particular SSP features should document
specific threats and specific SSP feature(
On Dec 14, 2007, at 9:32 AM, Stephen Farrell wrote:
Dave Crocker wrote:
Right. So let's explore what current problems specific functions
in SSP
will mitigate.
Folks who are proponents of particular SSP features should document
specific threats and specific SSP feature(s) that will mitiga
Stephen Farrell wrote:
An essential part of such exercise is to explain why the mitigation is
strategic. That is, why will it not be easy for attackers to work
around the SSP mechanism and achieve equivalent attack success.
Modulo look-alike domains I guess? (There's text in 4868, 4.2.1 abou
Dave Crocker wrote:
> Right. So let's explore what current problems specific functions in SSP
> will mitigate.
>
> Folks who are proponents of particular SSP features should document
> specific threats and specific SSP feature(s) that will mitigate them.
I think that'd be useful.
Of course, p
Dave Crocker wrote:
Right. So let's explore what current problems specific functions in SSP
will mitigate.
Folks who are proponents of particular SSP features should document
specific threats and specific SSP feature(s) that will mitigate them.
An essential part of such exercise is to expl
Jim Fenton wrote:
Wietse Venema wrote:
What is the relevance of this for the current effort? I have nothing
against an SSP that says what mail if any a domain signs or sends.
Like many, I would use that to throw away some mail. But it would be
a mistake to position SSP as the solution for emai