Simon Hanna writes:
> While in theory it would be possible to enforce permissions in core
> about who is allowed to call specific rest calls, this would
> require a lot of changes. I'm not sure we want to go this way.
Mailman is used in a lot of enterprises contexts, where the system
administr
On 05/22/2016 12:08 AM, Harshit Bansal wrote:
> Hi Simon,
> This is the discussion that I was referring to:
>
> Harshit Bansal writes:
>
> > I think the "Permissions Systems" would have nothing to do with the
> > core. It would be related to Postorius. We will have to create a style
> > model
Hi Simon,
This is the discussion that I was referring to:
Harshit Bansal writes:
> I think the "Permissions Systems" would have nothing to do with the
> core. It would be related to Postorius. We will have to create a style
> model separately in Postorius which would store the style name and t
>Hi,
>Earlier, while discussing the permission system for manging styles, it
>was
>decided that the permissions system should be enforced in the core
>rather
>than in the postorius since otherwise it can be bypassed(deliberately
>or
>undeliberately). But one thing that I think I forgot to discuss w
Hi,
Earlier, while discussing the permission system for manging styles, it was
decided that the permissions system should be enforced in the core rather
than in the postorius since otherwise it can be bypassed(deliberately or
undeliberately). But one thing that I think I forgot to discuss was that
Hi, all
This IETF work affects us all, so I'm reposting here so those with the
interest can participate.
"Indirect mail flows" includes but is not limited to mailing lists.
"DMARC" is the protocol which Yahoo! and AOL used to unsubscribe
thousands of innocent list members in April 2014. This Int