On 5/28/2014 3:45 PM, Franck Martin wrote:
> Before one can move to p=reject, it needs to take control of all the email 
> streams.


OK.  Thanks for the clarification.

The examples you provide are for third parties that have a business
relationship with the domain owner.

The interesting challenge is when a random user sends legitimate mail
from an un-associated third party.

d/

-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net

_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to