On Mon 14/Apr/2025 19:01:35 +0200 Wei Chuang wrote:
Instead I think we need a better way that can describe the originator, when a message was forwarded and when a participant tries to spoof the forwarding description.  DKIM2 does this.  With that we can more easily see abusive scenarios like replay where some message intended for one recipient was sent to many others in an inauthentic way.


Why didn't the practice of signing by user name, as in i=john....@example.com, catch on? Would personal responsibility have played a role? Will it now?


Best
Ale
--




_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to