Matthew Elvey
2015-06-09 14:57:32 UTC
So, at�http://www.opm.gov/news/latest-news/announcements/�(Archived at�https://archive.is/QfKtg), it's written:
"Beginning June 8 and continuing through June 19, OPM will be sending
notifications to approximately 4 million individuals whose Personally
Identifiable Information was potentially compromised in this incident.
*The email will come from�*****@csid.com*�and it will contain
information regarding credit monitoring and identity theft protection
services being provided to those Federal employees impacted by the
data breach."
This is an unfortunately example of people who should understand
security mis-training millions of people to trust an email just because
of the email address it purports to be from. �This would be slightly
less bad if there was a good SPF policy attempting to protect mail from
***@csid.com. Unfortunately, �this is CSID.com's SPF record:
csid.com: �v=spf1 include:spf.protection.outlook.com *include:csid.us*
ip4:23.253.114.50 ip4:23.253.114.76 ip4:23.253.114.72 ip4:23.253.114.90
ip4:23.253.114.33 -all
And,��this is CSID.US's SPF record:
csid.us: � v=spf1 *include:csid.us include:csid.com* ip4:23.253.114.50
ip4:23.253.114.76 ip4:23.253.114.72 ip4:23.253.114.90
ip4:23.253.114.33 -all
They're infinitely recursive. �(The latter is self-recursive too!) � Of
course they fail when record testing tools (e.g.
http://www.kitterman.com/spf/validate.html) are used.
Sad state of affairs.
--
Matthew Elvey
-------------------------------------------
Sender Policy Framework: http://www.openspf.net [http://www.openspf.net]
Modify Your Subscription: http://www.listbox.com/member/ [http://www.listbox.com/member/]
Archives: https://www.listbox.com/member/archive/735/=now
RSS Feed: https://www.listbox.com/member/archive/rss/735/26474917-be2d5805
Modify Your Subscription: https://www.listbox.com/member/?member_id=26474917&id_secret=26474917-7cf048aa
Unsubscribe Now: https://www.listbox.com/unsubscribe/?member_id=26474917&id_secret=26474917-41890383&post_id=20150609105741:DDF573D4-0EB7-11E5-A468-AC28A864E0F8
Powered by Listbox: http://www.listbox.com
"Beginning June 8 and continuing through June 19, OPM will be sending
notifications to approximately 4 million individuals whose Personally
Identifiable Information was potentially compromised in this incident.
*The email will come from�*****@csid.com*�and it will contain
information regarding credit monitoring and identity theft protection
services being provided to those Federal employees impacted by the
data breach."
This is an unfortunately example of people who should understand
security mis-training millions of people to trust an email just because
of the email address it purports to be from. �This would be slightly
less bad if there was a good SPF policy attempting to protect mail from
***@csid.com. Unfortunately, �this is CSID.com's SPF record:
csid.com: �v=spf1 include:spf.protection.outlook.com *include:csid.us*
ip4:23.253.114.50 ip4:23.253.114.76 ip4:23.253.114.72 ip4:23.253.114.90
ip4:23.253.114.33 -all
And,��this is CSID.US's SPF record:
csid.us: � v=spf1 *include:csid.us include:csid.com* ip4:23.253.114.50
ip4:23.253.114.76 ip4:23.253.114.72 ip4:23.253.114.90
ip4:23.253.114.33 -all
They're infinitely recursive. �(The latter is self-recursive too!) � Of
course they fail when record testing tools (e.g.
http://www.kitterman.com/spf/validate.html) are used.
Sad state of affairs.
--
Matthew Elvey
-------------------------------------------
Sender Policy Framework: http://www.openspf.net [http://www.openspf.net]
Modify Your Subscription: http://www.listbox.com/member/ [http://www.listbox.com/member/]
Archives: https://www.listbox.com/member/archive/735/=now
RSS Feed: https://www.listbox.com/member/archive/rss/735/26474917-be2d5805
Modify Your Subscription: https://www.listbox.com/member/?member_id=26474917&id_secret=26474917-7cf048aa
Unsubscribe Now: https://www.listbox.com/unsubscribe/?member_id=26474917&id_secret=26474917-41890383&post_id=20150609105741:DDF573D4-0EB7-11E5-A468-AC28A864E0F8
Powered by Listbox: http://www.listbox.com