Hi folks,
I put together a document (pdf attached) that outlines the current state of
email authentication and then motivates by illustrating how DKIM replay
looks.  I follow up with an example of how the DARA technique that we
propose in I-D draft-chuang-replay-resistant-arc
<https://datatracker.ietf.org/doc/draft-chuang-replay-resistant-arc/>, looks
like with the replay attack.  If folks think this is useful, I can fold
them into the problem statement document draft-chuang-dkim-replay-problem
<https://datatracker.ietf.org/doc/draft-chuang-dkim-replay-problem/>.
-Wei

Attachment: Email Authentication Examples (DKIM WG_dmarc.org).pdf
Description: Adobe PDF document

_______________________________________________
Ietf-dkim mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to