> On 1 Aug 2017, at 00:02, Jim Fenton <fen...@bluepopcorn.net> wrote:
> 
> Section 7, additional consideration: The "untrusted content"
> consideration talks about malicious code, but attackers could also send
> counterfeit reports that look real in an effort to confuse the report
> recipient. Should valid DKIM signatures from the reporting domain be
> required on TLSRPT messages?

+1

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to