On May 3, 2010, at 11:06 AM, MH Michael Hammer (5304) wrote:

> And it is easy enough to do "F2F" in a manner that does not break the
> authentication-based service. 

How?

-- Brett


_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to