----- Original Message ----- > From: "Dave Crocker" <[email protected]> > To: "Franck Martin" <[email protected]> > Cc: [email protected] > Sent: Wednesday, May 28, 2014 3:48:39 PM > Subject: Re: [dmarc-ietf] Solution for DMARC disruption of normal email use > while still offering its normal > protection > > On 5/28/2014 3:45 PM, Franck Martin wrote: > > Before one can move to p=reject, it needs to take control of all the email > > streams. > > > OK. Thanks for the clarification.
You are welcome > > The examples you provide are for third parties that have a business > relationship with the domain owner. > > The interesting challenge is when a random user sends legitimate mail > from an un-associated third party. > In many cases the domain owner IT department does not know an employee decided to use/contract someone to send emails... This case is not too far from the one Jim pointed to, and amount to detect and then inform the third party to pick from a set of possible solutions. _______________________________________________ dmarc mailing list [email protected] https://www.ietf.org/mailman/listinfo/dmarc
