John L wrote:

Reflection attacks?  How would a few TXT queries make that happen?

It would be the queries themselves I would be worried about. Suppose someone blasts a message to thousands of domains that has many addresses in the From: line. All of sudden all of those domains are under attack.

Perhaps some careful wording about how this is handled can get us around that? I don't know.
_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to