On Tue, Aug 8, 2023 at 9:25 AM Alessandro Vesely <ves...@tana.it> wrote:

> On Tue 08/Aug/2023 14:47:37 +0000 Murray S. Kucherawy wrote:
> > On Tue, Aug 8, 2023 at 7:17 AM Scott Kitterman <ietf-d...@kitterman.com>
> wrote:
> >
> >> That's true of all indirect mail flows.  It's not a distinguishing
> feature
> >> of the attack.
> >
> > Quite right, making this harder to pin down.
> >
> > But, to Alessandro's point, I do think the description in the document is
> > accurate.
>
> Agreed, except for narrating an actual case.  However widespread, there
> are
> people like me who never recognized a replay attack.
>

What do you mean by "narrating an actual case"?  Section 1.1 does contain a
narrative of how one executes the attack.

Are you talking about a narration of how one detects the attack, as
distinct from a typical indirect mail flow?

-MSK
_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to