On Tue, Aug 8, 2023 at 9:25 AM Alessandro Vesely <ves...@tana.it> wrote:
> On Tue 08/Aug/2023 14:47:37 +0000 Murray S. Kucherawy wrote: > > On Tue, Aug 8, 2023 at 7:17 AM Scott Kitterman <ietf-d...@kitterman.com> > wrote: > > > >> That's true of all indirect mail flows. It's not a distinguishing > feature > >> of the attack. > > > > Quite right, making this harder to pin down. > > > > But, to Alessandro's point, I do think the description in the document is > > accurate. > > Agreed, except for narrating an actual case. However widespread, there > are > people like me who never recognized a replay attack. > What do you mean by "narrating an actual case"? Section 1.1 does contain a narrative of how one executes the attack. Are you talking about a narration of how one detects the attack, as distinct from a typical indirect mail flow? -MSK
_______________________________________________ Ietf-dkim mailing list Ietf-dkim@ietf.org https://www.ietf.org/mailman/listinfo/ietf-dkim