Sunday, Nov 29, 2015 5:53 PM Jim Fenton wrote: > But, in > general, that information is essential to identifying spoofed header > fields: it's by tracing the chain of "from" addresses in Received header > fields that one can determine that someone is attempting to do something > fraudulent.
Can you cite a real-world example of a case where you did something like this recently, and explain how you were able to do what you claim, above, is possible using just the header fields in the message? -- Sent from Whiteout Mail - https://whiteout.io My PGP key: https://keys.whiteout.io/[email protected]
pgp2g6d0bWCP5.pgp
Description: PGP signature
_______________________________________________ Shutup mailing list [email protected] https://www.ietf.org/mailman/listinfo/shutup
