On 11/20/2022 1:07 PM, Jim Fenton wrote:
b) This assumes that the attackers (replayers) only have access to the messages at delivery, and don’t operate their own MTAs. This is of course not a good assumption.
Yes, that occurred to me. As of now, it seems clear we will find no magic bullet. That means that an array of techniques is likely needed, in the hope that each provides some benefit.
I'd class this one as 'some' benefit. No idea how much. d/ -- Dave Crocker Brandenburg InternetWorking bbiw.net mast:@dcrocker@mastodon.social _______________________________________________ Ietf-dkim mailing list Ietf-dkim@ietf.org https://www.ietf.org/mailman/listinfo/ietf-dkim