"The way they use DKIM" is still a bit vague. What context are you referring to here? What would be an appropriate venue for those discussions that you find acceptable? This list doesn't quite seem appropriate either.
-- Alex Brotman Sr. Engineer, Anti-Abuse & Messaging Policy Comcast > -----Original Message----- > From: Michael Thomas <[email protected]> > Sent: Sunday, January 26, 2025 7:10 PM > To: [email protected] > Subject: [Ietf-dkim] Re: The "back scatter" problem > > > On 1/26/25 4:03 PM, Richard Clayton wrote: > > In message <[email protected]>, Michael > > Thomas <[email protected]> writes > > > > > There is another serious structural problem which is that nobody > > >in > > > the mailbox community wants to talk about their operational > > > experience and the way they use DKIM > > > > this is Not True ... there are some limitations (annotating the Y axis > > for example -- as I think I mentioned before) > > > > what do you perceive that you are unaware of ? > > Not that I've been able to find. If you say MAAWG, that isn't helpful since > you > have to be a member (= $$). > > Mike > > _______________________________________________ > Ietf-dkim mailing list -- [email protected] To unsubscribe send an email to > ietf- > [email protected] _______________________________________________ Ietf-dkim mailing list -- [email protected] To unsubscribe send an email to [email protected]
