Talk:Email spoofing

From Wikipedia, the free encyclopedia
Jump to: navigation, search
          This article is of interest to the following WikiProjects:
WikiProject Computing (Rated Start-class)
WikiProject icon This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 ???  This article has not yet received a rating on the project's importance scale.
 
WikiProject Computer science (Rated Start-class, Low-importance)
WikiProject icon This article is within the scope of WikiProject Computer science, a collaborative effort to improve the coverage of Computer science related articles on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 Low  This article has been rated as Low-importance on the project's importance scale.
 
WikiProject Computer Security / Computing  (Rated Start-class, Mid-importance)
WikiProject icon This article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 Mid  This article has been rated as Mid-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing.
 

DKIM is unclear=[edit]

The article says that DKIM is a method to prevent email spoofing (fake return address), but the wikipage on DKIM says "DKIM signatures do not encompass the message envelope, which holds the return-path and message recipients." This indicates to me that DKIM does not offer any protection against spoofing. Please clarify. — Preceding unsigned comment added by 76.126.56.33 (talk) 04:07, 25 August 2013 (UTC)

Removal of content[edit]

I have reverted, again, removal of large slabs of content. If an editor considers that they should not be included in the article then please discuss it here, providing reasons for that view. Removal of significant content without proper discussion is considered vandalism and could result in a block. TerriersFan 03:42, 12 December 2006 (UTC)

It's not relevant to email spoofing[edit]

That content is about spoofing TCP sessions in general, so it belongs in another article. The person who made those reverts was actually improving the article. As you say, some discussion would have helped you understand the motive, but it wasn't vandalism even if done without discussion. Wholesale reverts are fine, and are not vandalism; they're being bold. Please assume good faith; it isn't helpful to make accusations of vandalism against users who have acted in good faith.

--82.40.166.183 12:16, 15 December 2006 (UTC)

I agree. The vast majority of this content has nothing to do with email spoofing. It is about TCP/IP, a much more low-level topic. Superm401 - Talk 18:08, 19 January 2007 (UTC)

How to solve this problem should be listed in the article.[edit]

Methods of resolving the problem once it appears should be listed in the article. Thanks. Softlavender (talk) 10:31, 10 December 2008 (UTC)

Legality[edit]

A discussion of legality would be interesting, I believe it's not illegal unless there is an attempt to obtain sensitive information. I won't add this to the article since I'm not sure. Wolfmankurd (talk) 02:39, 6 January 2009 (UTC)

Methods?[edit]

how is this done? The article mentions tools, but does not specify any. Sephiroth storm (talk) 04:23, 16 August 2009 (UTC)

Email hoaxes[edit]

email hoax redirects here, but an email hoax doesn't necessarily use spoofing. Andrewa (talk) 18:34, 3 August 2010 (UTC)

This article is misleading and should be rewritten.[edit]

As this article is currently written it makes a false impression that e-mail spoofing involves some kind of "hacking". In reality it's not different from writting a false return address on the snail mail letter. There is no protection or authentication of any kind, the SMTP servers accept any valid address.--90.179.235.249 (talk) 04:15, 9 April 2011 (UTC)

Consequences?[edit]

I was looking to see what the consequences of spoofing might be. e.g. what security problems could arise from having been spoofed. But could not find any details in this article.

If anyone knows, can you please add them to this article.

Spoof victim 18.04.11Lynnefn (talk) 15:02, 18 April 2011 (UTC)

I agree! If a worm is responsible for stealing addresses from an on line address book, please give a hint of the names or categories of the worms, or if they are typically removed by anti-virus software. Poor Alice, in the example, seems to need to take action to stop the spoofing, but what action should Alice take? Should poor Alice be changing her mail password, or do something else? That would make this article more complete and clearer. Prairieplant (talk) 08:05, 11 June 2013 (UTC)

Seems to equate email spoofing with phishing[edit]

email spoofing is no doubt used in phishing but phishing is far from an "explicit descriptor" of email spoofing. Vyroglyph (talk) 22:10, 19 April 2011 (UTC)

I was hoping this article would answer my question[edit]

The article says, "User1 triggers an e-mail address spoofing worm, and the worm finds the addresses user2@efgh.com, user3@ijkl.com and user4@mnop.com within the users e-mail address book."

User1 has those email addresses in his book? Now I received an email from one of my email addresses, and it said the email had been sent from me to other users in my address book for that email address. At the time it was sent, I was on a library computer which had given a message that it wasn't secure, but I interpreted this as being like when the man in charge of such things said something like, "That's a message which is trying to get us to pay for something we don't need to pay for."

He ran a scan after I told him what happened and never found anything wrong. I haven't found anything either (even though I opened the email on my own computer). I did, however, find the email in the sent folder of the address it was supposedly sent from.

Perhaps this is an example of something the article should cover.Vchimpanzee · talk · contributions · 19:30, 10 August 2011 (UTC)

why do month old delighted adds still show up on CL ?[edit]

i heve never seen this problem before, i delighted a couple of adds on may 7 2013 and low and behold, there still there? go into > all for sale <> put in atv <> and go to page 6 or may 7. im not shure who is doing this, but it needs to stop. by the way, there are people that work for CL that just arnt nice. Im sorry to say this, but it is true, they just do not care for the person that is in the right. i have 6 adds up on may 7 and i don't know how or why they are there. you tell me CL ? (THANK YOU FOR YOUR TIME)— — Preceding unsigned comment added by 65.129.19.136 (talk) 16:02, 7 June 2013 (UTC)