Andrew Partan writes:

 > Until people figure out real ways of making DMARC work with forwrders
 > & mailing lists (see ietf-...@ietf.org for one place discussions
 > are going on), I think it useful to have more work-around hacks out
 > there so that people can experiment with them to see which ones
 > more-or-less work in different situations.

That's what they said about Reply-To munging, too.

If people want to implement them themselves and try them out, heck,
I've been wrong before and I'll be wrong again.  But I don't think
*Mailman* should proactively implement RFC violations unless there's a
clear and present danger, and then the violations should try to be
minimal.[1]

DMARC, since it causes denial of service to third parties, is such a
clear and present danger.  Here I interpret "minimal" to mean "try to
avoid to adding to the set of RFC violations out there."  I know it's
tempting to imply that yahoo.com is an invalid domain, but it's not at
all necessary given that substituting the list-post address is what
Yahoo itself suggests.  The original user is easily replied to via the
Reply-To hack.

Footnotes: 
[1]  Retroactive implementation, such as "Reply-To munging", may be
appropriate in response to customer demand.



------------------------------------------------------
Mailman-Users mailing list Mailman-Users@python.org
https://mail.python.org/mailman/listinfo/mailman-users
Mailman FAQ: http://wiki.list.org/x/AgA3
Security Policy: http://wiki.list.org/x/QIA9
Searchable Archives: http://www.mail-archive.com/mailman-users%40python.org/
Unsubscribe: 
https://mail.python.org/mailman/options/mailman-users/archive%40jab.org

Reply via email to