On 10/06/2014 04:43, Ted Lemon wrote:
> On Jun 9, 2014, at 12:32 PM, Eliot Lear <l...@cisco.com> wrote:
>> But does adding a header solve the problem?  Not unless it is signed AND I 
>> believe the signature.  And then I had better be willing to spend the 
>> processing time to sort out your good customers from your bad customers.  I 
>> might do that if you're at a very big mail service provider, in which case I 
>> probably get very little spam, anyway.  I probably won't do that if you're 
>> Joe's small time ISP, unless there is some scaling feature not yet deployed 
>> today.
> 
> Bingo.

So, there are some more components of the threat analysis and the solution
requirements. That's good, but I thought we were discussing whether
to document the use cases.

   Brian

_______________________________________________
Int-area mailing list
Int-area@ietf.org
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to