It appears that Murray S. Kucherawy  <[email protected]> said:
>Were I implementing such a thing, I'd probably have a list of overrides
>that map names to DMARC records.  For every name in the tree walk I'm going
>to try, I'd check that list first for an override, and use that if one is
>found.

As we all know, some organizations have an unfortunate habit of publishing
DMARC policies that don't match their sending policies because "it's more
secure."

If you have a set of override DMARC records, you can use them to fix
broken policies with p= and broken authority boundaries with psd=, using
one simple hack.

R's,
John

_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to