サイトマップ | 連絡先 | IAjapan TOP
IAjapan 財団法人インターネット協会
有害情報対策ポータルサイト 迷惑メール対策編
  • 一般利用者の皆様へ
  • メール管理者の皆様へ
  • 関連情報
  • サイト紹介


2.4. Anti-Phishing

DMARC is designed to prevent bad actors from sending mail that claims
to come from legitimate senders, particularly senders of
transactional email (official mail that is about business
transactions). One of the primary uses of this kind of spoofed mail
is phishing (enticing users to provide information by pretending to
be the legitimate service requesting the information). Thus, DMARC
is significantly informed by ongoing efforts to enact large-scale,
Internet-wide anti-phishing measures.

2.4. フィッシング対策


Although DMARC can only be used to combat specific forms of exact-
domain spoofing directly, the DMARC mechanism has been found to be
useful in the creation of reliable and defensible message streams.


DMARC does not attempt to solve all problems with spoofed or
otherwise fraudulent email. In particular, it does not address the
use of visually similar domain names (“cousin domains”) or abuse of
the RFC5322.From human-readable .


3. Terminology and Definitions

This section defines terms used in the rest of the document.

The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”,
document are to be interpreted as described in [KEYWORDS].

3. 用語と定義


「なければならない(MUST)」、「してはならない(MUST NOT)」、「…の必要がある(REQUIRED)」、「(当然)…するものとする(SHALL)」、「(当然)…しないものとする(SHALL NOT)」、「…すべきである(SHOULD)」、「…すべきではない(SHOULD NOT)」、「…が推奨される(RECOMMENDED)」、「…してもよい(MAY)」、「…を選択してもよい(OPTIONAL)」は、[KEYWORDS]に記載されるよう解釈する。

Readers are encouraged to be familiar with the contents of
[EMAIL-ARCH]. In particular, that document defines various roles in
the messaging infrastructure that can appear the same or separate in
various contexts. For example, a Domain Owner could, via the
messaging security mechanisms on which DMARC is based, delegate the
ability to send mail as the Domain Owner to a third party with
another role. This document does not address the distinctions among
such roles; the reader is encouraged to become familiar with that
material before continuing.


The following terms are also used:

Authenticated Identifiers: Domain-level identifiers that are
validated using authentication technologies are referred to as
“Authenticated Identifiers”. See Section 4.1 for details about
the supported mechanisms.

Author Domain: The domain name of the apparent author, as extracted
from the RFC5322.From field.




[Page 7]


リンク・転載・引用・ロゴ使用について | プライバシーポリシー | IAjapanについて | 連絡先