Sunday, Nov 29, 2015 5:53 PM Jim Fenton wrote:
> But, in
> general, that information is essential to identifying spoofed header
> fields: it's by tracing the chain of "from" addresses in Received header
> fields that one can determine that someone is attempting to do something
> fraudulent.

Can you cite a real-world example of a case where you did something like this 
recently, and explain how you were able to do what you claim, above, is 
possible using just the header fields in the message?


--
Sent from Whiteout Mail - https://whiteout.io

My PGP key: https://keys.whiteout.io/[email protected]

Attachment: pgp2g6d0bWCP5.pgp
Description: PGP signature

_______________________________________________
Shutup mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/shutup

Reply via email to