On Friday, February 03, 2012 01:58:11 PM Murray S. Kucherawy wrote: > The mechanisms described in this memo are primarily intended for use > in generating reports to aid implementers of [DKIM] and [ADSP] and > other related protocols in development and debugging. They are not > intended for prolonged forensic use. However, such uses are possible > by ADMDs that want to keep a close watch for fraud or infrastructure > problems.
I probably missed a discussion about this sometime, but why isn't this intended for prolonged forensic use? The applications of ARF I've seen that's exactly what they are for. Scott K _______________________________________________ marf mailing list [email protected] https://www.ietf.org/mailman/listinfo/marf
