On 10/06/2014 04:43, Ted Lemon wrote: > On Jun 9, 2014, at 12:32 PM, Eliot Lear <l...@cisco.com> wrote: >> But does adding a header solve the problem? Not unless it is signed AND I >> believe the signature. And then I had better be willing to spend the >> processing time to sort out your good customers from your bad customers. I >> might do that if you're at a very big mail service provider, in which case I >> probably get very little spam, anyway. I probably won't do that if you're >> Joe's small time ISP, unless there is some scaling feature not yet deployed >> today. > > Bingo.
So, there are some more components of the threat analysis and the solution requirements. That's good, but I thought we were discussing whether to document the use cases. Brian _______________________________________________ ietf-privacy mailing list ietf-privacy@ietf.org https://www.ietf.org/mailman/listinfo/ietf-privacy