On Sun, Nov 2, 2014 at 6:28 AM, Scott Kitterman skl...@kitterman.com
wrote:
On Sunday, November 02, 2014 01:42:49 Murray S. Kucherawy wrote:
...
As was done with the DKIM deployment RFCs, the same has been done for
DMARC. It seems neither DKIM nor DMARC follow the path of least
Douglas Otis writes:
After all, DMARC permits the weakest authorization as a basis for
acceptance, so it would be misleading to describe DMARC results as
having been *authenticated*.
Well, no, it isn't necessarily misleading. According to RFC 4949,
authentication = identification +