-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

In message <cal0qlwzc0pd7h-g_xvaaledrqjmceyquzcaf5mjqne+vapf...@mail.gma
il.com>, Murray S. Kucherawy <superu...@gmail.com> writes

>What I'm less clear on is how one identifies a legitimate mutation or a
>legitimate list, versus a participating attacker claiming to be one of
>those things.

you cannot determine "legitimate" in a protocol ... what DKIM2 does is
allow you, having determined that badness has occurred, to be sure which
entity was responsible for that badness and set a reputation (or a
block) accordingly

- -- 
richard                                                  Richard Clayton

Those who would give up essential Liberty, to purchase a        Benjamin
little temporary Safety, deserve neither Liberty nor Safety.    Franklin

-----BEGIN PGP SIGNATURE-----
Version: PGPsdk version 1.7.1

iQA/AwUBZ+Gw8WHfC/FfW545EQJAIwCffDfoX2MtyeawLno/ZdxN15j68H8AniCD
w5LIW4xTRfHnET+QcU8kAUKD
=G6x9
-----END PGP SIGNATURE-----

_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to