"The way they use DKIM" is still a bit vague.  What context are you referring 
to here?  What would be an appropriate venue for those discussions that you 
find acceptable?  This list doesn't quite seem appropriate either. 

-- 
Alex Brotman
Sr. Engineer, Anti-Abuse & Messaging Policy
Comcast
 

> -----Original Message-----
> From: Michael Thomas <[email protected]>
> Sent: Sunday, January 26, 2025 7:10 PM
> To: [email protected]
> Subject: [Ietf-dkim] Re: The "back scatter" problem
> 
> 
> On 1/26/25 4:03 PM, Richard Clayton wrote:
> > In message <[email protected]>, Michael
> > Thomas <[email protected]> writes
> >
> > >    There is another serious structural problem which is that nobody
> > >in
> > >    the mailbox community wants to talk about their operational
> > >    experience and the way they use DKIM
> >
> > this is Not True ... there are some limitations (annotating the Y axis
> > for example -- as I think I mentioned before)
> >
> > what do you perceive that you are unaware of ?
> 
> Not that I've been able to find. If you say MAAWG, that isn't helpful since 
> you
> have to be a member (= $$).
> 
> Mike
> 
> _______________________________________________
> Ietf-dkim mailing list -- [email protected] To unsubscribe send an email to 
> ietf-
> [email protected]
_______________________________________________
Ietf-dkim mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to