On 11/20/2022 1:07 PM, Jim Fenton wrote:
b) This assumes that the attackers (replayers) only have access to the messages 
at delivery, and don’t operate their own MTAs. This is of course not a good 
assumption.

Yes, that occurred to me.  As of now, it seems clear we will find no magic bullet.  That means that an array of techniques is likely needed, in the hope that each provides some benefit.

I'd class this one as 'some' benefit.  No idea how much.

d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
mast:@dcrocker@mastodon.social

_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to