On Thu, Jul 6, 2023 at 9:00 AM Marcello <[email protected]> wrote:
> Just to clarify, is it possible having this “bad” ARC header is skewing > the final spam score of the email when it hits the final email service > provider ? > Yes, it's possible. Or rather, it's impossible to know how the end receiver is or is not making use of the ARC results. > I don’t see anything in the RFC on how email services should use ARC in > relation to calculating the spam score of an email. > This is intentional. DKIM also isn't specific about how a passing or failing signature is to be interpreted, especially since DKIM can fail for lots of otherwise legitimate reasons, for example. > From my understanding It seems ARC will pass as long as the chains > integrity isn’t compromised *not* because of bad values in a header like > this correct? > That's the primary purpose of ARC as I understand it. It's meant to capture the authentication results of the message when it makes its first hop (e.g., to an MLM), and then preserve that result onward. It doesn't care much what the result was. -MSK, participating
_______________________________________________ dmarc mailing list [email protected] https://www.ietf.org/mailman/listinfo/dmarc
