On Mon, Apr 10, 2023 at 9:55 AM Murray S. Kucherawy <superu...@gmail.com> wrote:
> On Mon, Apr 10, 2023 at 8:15 AM John Levine <jo...@taugh.com> wrote: > >> > For certain >> >constrained but hopefully reasonable scenarios of mailing list >> >modifications, we might be able to distinguish the sources of content. >> >> People have been suggesting this forwver, but it really doesn't scale. >> There are a lot more list hosts with a lot more configurations that >> any of us have individually ever seen. In many cases they add or >> rewrite MIME parts which is extremely hard to unwind enough to see if >> a DKIM signature would have been valid. >> > > I have to agree. For as many times as this notion has been proposed, it's > never been given serious consideration, and this is the reason: We can't > possibly describe all the MLM mutations that exist, even if the mechansim > for doing so is made extensible. > > I think the one thing we haven't discussed is: Could the 80-20 rule apply > here? > +1 > That is, if we start off with something like what > draft-kucherawy-dkim-transform proposed (or even a trivial subset of it), > might it make enough of a dent to get us through this stalemate, and then > we can figure out what to do with the rest of it? > +1 I think that's a good start or some subset. -Wei > > -MSK, participating > _______________________________________________ > dmarc mailing list > dmarc@ietf.org > https://www.ietf.org/mailman/listinfo/dmarc >
smime.p7s
Description: S/MIME Cryptographic Signature
_______________________________________________ dmarc mailing list dmarc@ietf.org https://www.ietf.org/mailman/listinfo/dmarc