On May 3, 2010, at 11:06 AM, MH Michael Hammer (5304) wrote: > And it is easy enough to do "F2F" in a manner that does not break the > authentication-based service.
How? -- Brett _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html
