On Fri, Feb 10, 2023 at 1:33 PM Michael Thomas <m...@mtcc.com> wrote:
> > On 2/10/23 10:23 AM, Wei Chuang wrote: > > Hi all, > I've posted an updated version of the draft-chuang-dkim-replay-problem-01 > <https://datatracker.ietf.org/doc/draft-chuang-dkim-replay-problem/01/> > draft. It cleans up a lot from the -00 rough draft state so hopefully it's > more clear. It builds a case that spammers are exploiting DKIM through > replay, identifies conflicting scenarios, and outlines a solution space. > > -Wei > > PS Many, many thanks goes to Dave Crocker for his editorial advice. > > _______________________________________________ > Ietf-dkim mailing > listIetf-dkim@ietf.orghttps://www.ietf.org/mailman/listinfo/ietf-dkim > > > | In addition to being DKIM authenticated via the spoofed DKIM signature > > > I'm pretty sure that spoofed is wrong here? It's the originating domain's > signature signed by their signers, still right? That's not spoofing. > To be honest I was wondering about that word choice myself. I can change that in the next rev. -Wei > Mike > > _______________________________________________ > Ietf-dkim mailing list > Ietf-dkim@ietf.org > https://www.ietf.org/mailman/listinfo/ietf-dkim >
smime.p7s
Description: S/MIME Cryptographic Signature
_______________________________________________ Ietf-dkim mailing list Ietf-dkim@ietf.org https://www.ietf.org/mailman/listinfo/ietf-dkim