Hi folks, I put together a document (pdf attached) that outlines the current state of email authentication and then motivates by illustrating how DKIM replay looks. I follow up with an example of how the DARA technique that we propose in I-D draft-chuang-replay-resistant-arc <https://datatracker.ietf.org/doc/draft-chuang-replay-resistant-arc/>, looks like with the replay attack. If folks think this is useful, I can fold them into the problem statement document draft-chuang-dkim-replay-problem <https://datatracker.ietf.org/doc/draft-chuang-dkim-replay-problem/>. -Wei
Email Authentication Examples (DKIM WG_dmarc.org).pdf
Description: Adobe PDF document
_______________________________________________ Ietf-dkim mailing list [email protected] https://www.ietf.org/mailman/listinfo/ietf-dkim
