On 1/27/25 1:35 PM, Steffen Nurpmeso wrote:
Michael Thomas wrote in
<[email protected]>:
|On 1/27/25 12:38 PM, Brotman, Alex wrote:
|> Sorry, support for which arguments? I'm not trying to be obtuse, \
|> just trying to see if we can point you toward the information you seek.
|
|Papers, reports, really anything from mailbox providers and/or filter
|providers that detail how DKIM is being used in production. As one of
|the original designers, it's been pretty frustrating to not know how
|it's being used and what difference it actually makes. Any revamp would
|benefit from everybody here knowing whether and how it's making a
|difference, and what its deficiencies are. And more to the point: why
|it's deficient. I've seen a lot of assertions on that front which are
|actually not true.
|
|About the only thing I've managed to find is:
|
|https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-hu\
|.pdf
|
|but it's just a couple of researchers who aren't attached to any mailbox
|provider as far as I know.
Are you talking about l=?
No.
Mike
_______________________________________________
Ietf-dkim mailing list -- [email protected]
To unsubscribe send an email to [email protected]