On 11/20/2022 1:07 PM, Jim Fenton wrote:
b) This assumes that the attackers (replayers) only have access to the messages 
at delivery, and don’t operate their own MTAs. This is of course not a good 
assumption.

Yes, that occurred to me.  As of now, it seems clear we will find no magic bullet.  That means that an array of techniques is likely needed, in the hope that each provides some benefit.

I'd class this one as 'some' benefit.  No idea how much.

d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
mast:@[email protected]

_______________________________________________
Ietf-dkim mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to