On Tue, Aug 8, 2023 at 7:17 AM Scott Kitterman <ietf-d...@kitterman.com>
wrote:

> That's true of all indirect mail flows.  It's not a distinguishing feature
> of the attack.
>

Quite right, making this harder to pin down.

But, to Alessandro's point, I do think the description in the document is
accurate.

-MSK
_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to