On 5/28/2014 3:45 PM, Franck Martin wrote: > Before one can move to p=reject, it needs to take control of all the email > streams.
OK. Thanks for the clarification. The examples you provide are for third parties that have a business relationship with the domain owner. The interesting challenge is when a random user sends legitimate mail from an un-associated third party. d/ -- Dave Crocker Brandenburg InternetWorking bbiw.net _______________________________________________ dmarc mailing list dmarc@ietf.org https://www.ietf.org/mailman/listinfo/dmarc