It appears that Murray S. Kucherawy <[email protected]> said: >Were I implementing such a thing, I'd probably have a list of overrides >that map names to DMARC records. For every name in the tree walk I'm going >to try, I'd check that list first for an override, and use that if one is >found.
As we all know, some organizations have an unfortunate habit of publishing DMARC policies that don't match their sending policies because "it's more secure." If you have a set of override DMARC records, you can use them to fix broken policies with p= and broken authority boundaries with psd=, using one simple hack. R's, John _______________________________________________ dmarc mailing list [email protected] https://www.ietf.org/mailman/listinfo/dmarc
