In article <cahej_8nn+827kb+ttuyoezxouakzcyoeiznmwsy-fktquro...@mail.gmail.com> you write: >I suppose that an approach to building up an ARC reputation might be one >where over time a receiving site can compare indirect mail flow that is >purported to have X as an authenticated identifier with mail that comes >direct to the receiving site with X as an authenticated identifier. ...
I think it's more likely to be ad-hoc, does this source send mail that looks like mailing lists and the recipients don't flag or complain about it. R's, John PS: >This email and all data transmitted with it contains confidential and/or >proprietary information intended solely for the use of individual(s) >authorized to receive it. If you are not an intended and authorized >recipient you are hereby notified of any use, disclosure, copying or >distribution of the information included in this transmission is prohibited >and may be unlawful. Please immediately notify the sender by replying to >this email and then delete it from your system. Too late. _______________________________________________ dmarc mailing list dmarc@ietf.org https://www.ietf.org/mailman/listinfo/dmarc