> On 15 Dec 2022, at 00:46, Grant Taylor > <gtaylor=40tnetconsulting....@dmarc.ietf.org> wrote: > > On 12/14/22 11:10 AM, Evan Burke wrote: >> It doesn't. Most of the accounts are caught before sending. All it takes is >> one to slip through the anti-spam detections and then go send millions of >> replay spam messages or more - even if that account is shut down quickly >> after sending. > > What would happen if the ESPs DKIM implementation got, possibly a LOT, more > complex in that key pairs used to sign outgoing email from clients with keys > specific to each client? > > That way if ~> when the ESP needed to cancel a client's service, the ESP > could also withdraw the client's public key in the ESP's zone(s) thereby > breaking the DKIM signature by rendering it unvalidatable. I'd think that > this would largely comedown to a TTL issue on the DKIM's public key record in > DNS and implementation complexity. > > What am I failing to take into account?
Operational overhead. laura -- The Delivery Experts Laura Atkins Word to the Wise la...@wordtothewise.com Email Delivery Blog: http://wordtothewise.com/blog
_______________________________________________ Ietf-dkim mailing list Ietf-dkim@ietf.org https://www.ietf.org/mailman/listinfo/ietf-dkim