On 11/10/2022 4:54 AM, Laura Atkins wrote:
There are a couple of characteristics that stand out.
A few of the posting here have provided substantive details about the nature of a replay attack. Not just the overall concept but some detail about the means and methods.
Whatever draft(s) move toward eventual wg publication, I encourage having at least one include this kind of detail, if only to make clear what scenarios the proffered protection mechanisms are seeking to work against.
d/ -- Dave Crocker Brandenburg InternetWorking bbiw.net mast:@[email protected] _______________________________________________ Ietf-dkim mailing list [email protected] https://www.ietf.org/mailman/listinfo/ietf-dkim
