Hi Brett,

[feel free to follow up off-list]

At 12:36 27-05-10, Brett McDowell wrote:
>It would probably help me if you folks could send me questions 
>(probably off-list as I'm not sure how relevant this is to the WG 
>scope) that I can use as a guide for exactly how to wrangle our data 
>into a publishable state.  I've been thinking about how to present 
>our experience but that might not align exactly with what folks 
>want/need to know.  So I'd appreciate specific questions (think 
>"database query" and/or "FAQ") that I could work from.

This is most likely unrelated to the discussion about the mailing 
list draft.  You mentioned some numbers about ADSP lookups.  Can you 
provide a breakdown (unique IP addresses, etc)?  This question is 
framed incorrectly as I don't know about phishing attempts for your 
case and your infrastructure.  Is there any correlation between 
phishing patterns and the lookups?  What's the picture like when you 
take the top receivers out of the mix?

What level of DKIM breakage are you seeing?  Can you break it down by 
mail stream?  What's it like when you are acting as receiver?

Regards,
-sm 

_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to