On Mon, Apr 10, 2023 at 9:55 AM Murray S. Kucherawy <superu...@gmail.com>
wrote:

> On Mon, Apr 10, 2023 at 8:15 AM John Levine <jo...@taugh.com> wrote:
>
>> > For certain
>> >constrained but hopefully reasonable scenarios of mailing list
>> >modifications, we might be able to distinguish the sources of content.
>>
>> People have been suggesting this forwver, but it really doesn't scale.
>> There are a lot more list hosts with a lot more configurations that
>> any of us have individually ever seen. In many cases they add or
>> rewrite MIME parts which is extremely hard to unwind enough to see if
>> a DKIM signature would have been valid.
>>
>
> I have to agree.  For as many times as this notion has been proposed, it's
> never been given serious consideration, and this is the reason: We can't
> possibly describe all the MLM mutations that exist, even if the mechansim
> for doing so is made extensible.
>
> I think the one thing we haven't discussed is: Could the 80-20 rule apply
> here?
>

+1


> That is, if we start off with something like what
> draft-kucherawy-dkim-transform proposed (or even a trivial subset of it),
> might it make enough of a dent to get us through this stalemate, and then
> we can figure out what to do with the rest of it?
>

+1 I think that's a good start or some subset.
-Wei


>
> -MSK, participating
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to