On 2/10/23 10:23 AM, Wei Chuang wrote:
Hi all,
I've posted an updated version of the draft-chuang-dkim-replay-problem-01 <https://datatracker.ietf.org/doc/draft-chuang-dkim-replay-problem/01/> draft.  It cleans up a lot from the -00 rough draft state so hopefully it's more clear.  It builds a case that spammers are exploiting DKIM through replay, identifies conflicting scenarios, and outlines a solution space.

-Wei

PS Many, many thanks goes to Dave Crocker for his editorial advice.

_______________________________________________
Ietf-dkim mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-dkim


| In addition to being DKIM authenticated via the spoofed DKIM signature

I'm pretty sure that spoofed is wrong here? It's the originating domain's signature signed by their signers, still right? That's not spoofing.

Mike
_______________________________________________
Ietf-dkim mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to