On 2/10/23 10:23 AM, Wei Chuang wrote:
Hi all,
I've posted an updated version of the
draft-chuang-dkim-replay-problem-01
<https://datatracker.ietf.org/doc/draft-chuang-dkim-replay-problem/01/>
draft. It cleans up a lot from the -00 rough draft state so hopefully
it's more clear. It builds a case that spammers are exploiting DKIM
through replay, identifies conflicting scenarios, and outlines a
solution space.
-Wei
PS Many, many thanks goes to Dave Crocker for his editorial advice.
_______________________________________________
Ietf-dkim mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-dkim
| In addition to being DKIM authenticated via the spoofed DKIM signature
I'm pretty sure that spoofed is wrong here? It's the originating
domain's signature signed by their signers, still right? That's not
spoofing.
Mike
_______________________________________________
Ietf-dkim mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-dkim