Participating here: On Mon, Mar 24, 2025 at 12:24 PM Richard Clayton <[email protected]> wrote:
> >What I'm less clear on is how one identifies a legitimate mutation or a > >legitimate list, versus a participating attacker claiming to be one of > >those things. > > you cannot determine "legitimate" in a protocol ... what DKIM2 does is > allow you, having determined that badness has occurred, to be sure which > entity was responsible for that badness and set a reputation (or a > block) accordingly > Is the determination of "badness" left entirely as an exercise to the implementer/operator, or do you imagine we will be able to offer some guidance here? -MSK
_______________________________________________ Ietf-dkim mailing list -- [email protected] To unsubscribe send an email to [email protected]
