-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 In message <cal0qlwzc0pd7h-g_xvaaledrqjmceyquzcaf5mjqne+vapf...@mail.gma il.com>, Murray S. Kucherawy <superu...@gmail.com> writes
>What I'm less clear on is how one identifies a legitimate mutation or a >legitimate list, versus a participating attacker claiming to be one of >those things. you cannot determine "legitimate" in a protocol ... what DKIM2 does is allow you, having determined that badness has occurred, to be sure which entity was responsible for that badness and set a reputation (or a block) accordingly - -- richard Richard Clayton Those who would give up essential Liberty, to purchase a Benjamin little temporary Safety, deserve neither Liberty nor Safety. Franklin -----BEGIN PGP SIGNATURE----- Version: PGPsdk version 1.7.1 iQA/AwUBZ+Gw8WHfC/FfW545EQJAIwCffDfoX2MtyeawLno/ZdxN15j68H8AniCD w5LIW4xTRfHnET+QcU8kAUKD =G6x9 -----END PGP SIGNATURE----- _______________________________________________ Ietf-dkim mailing list -- ietf-dkim@ietf.org To unsubscribe send an email to ietf-dkim-le...@ietf.org