On 6/18/2020 10:16 PM, Jim Fenton wrote:
On 6/18/20 7:35 PM, Dave Crocker wrote:
vulnerability?
Yes. When bad actors (your choice of words) can work around an aspect of
the specification that is depended upon to enable differential handling
by a receiving filtering engine (again your choice of words), that is a
vulnerability.


Thanks for explaining what vulnerability means, but my question was meant to prod you to explain what vulnerability you claim is there.

I've looked over your postings of the last few days and somehow I'm not seeing that described.

d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to