Participating here:

On Mon, Mar 24, 2025 at 12:24 PM Richard Clayton <rich...@highwayman.com>
wrote:

> >What I'm less clear on is how one identifies a legitimate mutation or a
> >legitimate list, versus a participating attacker claiming to be one of
> >those things.
>
> you cannot determine "legitimate" in a protocol ... what DKIM2 does is
> allow you, having determined that badness has occurred, to be sure which
> entity was responsible for that badness and set a reputation (or a
> block) accordingly
>

Is the determination of "badness" left entirely as an exercise to the
implementer/operator, or do you imagine we will be able to offer some
guidance here?

-MSK
_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to