Am 28.06.2016 um 15:30 schrieb Sidney Markowitz:
You are right that social engineering can't be stopped by technology. The
company should have procedures in place that provide the flexibility that CEO
seems to need but will still prevent the fraud even in the face of successful
social engineering. But there is no reason the mail setup has to allow spoofed
headers From the company domain

if things only would be that easy
____________________________

blacklist_from *@your-bank.tld
whitelist_auth *@your-bank.tld

in theory that would stop any forgery, in real life i had to revert this after a big payment service using proper SPF then sent their newsletters with a external service, envelope of the external service but From header matching the blacklist_from preventing hit whitelist_auth
____________________________

in fact to make such things working without breaking mailing-lists and what not else one would be required to use a dedicated subdomain for business-email which never is used outside the own network and *then* you can easily block any message with envelope or from-header touching your MX

but that would also require that the users understand "THIS address MUST NOT be used for anything then submission mail and use THIS email adress for mailing-lists and other things"

one can now come with "DKIM exists" - then look how often the DKIM check failed in the past up to become T_DKIM_INVALID as a testing rule because of too much false positives

https://bz.apache.org/SpamAssassin/show_bug.cgi?id=6462

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to