James A. Donald wrote:
In order for [DKIM] to actually be any use, the
recipient needs to verify the signature and do
something on the basis of that signature -
presumably whitelist email that genuinely comes from
well known domains.
Unfortunately, the MTA cannot reliably do
James A. Donald wrote:
In order for [DKIM] to actually be any use, ...
Anne Lynn Wheeler wrote:
so what if an isp only signs email where ...
etc, etc.
You know, we've already had all these arguments on the DKIM mailing
list about a hundred times.
It's true, just about everything that
| Have you seen the technique used at http://www.griddatasecurity.com ? Sounds
| a lot like your original idea.
Nah - more clever than what I had (which was meant for an age when you
couldn't carry any computation with you, and things you interacted with
on a day by day basis didn't have
* James A. Donald:
DOS is now a major problem - every business, online
games, money movers, banks, porno sites, casinos, now
comes under DOS attack from extortionists.
How do Hamiltonian paths protect against the H.R.4411 attack?
(Part of the DoS problem online casinos face is that due to
Hey does anyone have a good link for the various equivalencies
(or inequivalencies) for modular arithmetic?
I realize some will only apply to certain moduli, especially primes.
I'm basically wanting to find some good algorithms for certain
simple computations, like f(x) = ax + b (mod n), or the
--
Florian Weimer wrote:
How do Hamiltonian paths protect against the H.R.4411
attack?
H.R.4411 is not a DoS attack.
(Part of the DoS problem online casinos face is that
due to their activity, which was illegal before, they
are extremely reluctant to approach law enforcement
about