On 1/27/25 1:35 PM, Steffen Nurpmeso wrote:
Michael Thomas wrote in
  <[email protected]>:
  |On 1/27/25 12:38 PM, Brotman, Alex wrote:
  |> Sorry, support for which arguments?  I'm not trying to be obtuse, \
  |> just trying to see if we can point you toward the information you seek.
  |
  |Papers, reports, really anything from mailbox providers and/or filter
  |providers that detail how DKIM is being used in production. As one of
  |the original designers, it's been pretty frustrating to not know how
  |it's being used and what difference it actually makes. Any revamp would
  |benefit from everybody here knowing whether and how it's making a
  |difference, and what its deficiencies are. And more to the point: why
  |it's deficient. I've seen a lot of assertions on that front which are
  |actually not true.
  |
  |About the only thing I've managed to find is:
  |
  |https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-hu\
  |.pdf
  |
  |but it's just a couple of researchers who aren't attached to any mailbox
  |provider as far as I know.

Are you talking about l=?

No.

Mike

_______________________________________________
Ietf-dkim mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to