Ah, sigh, one more.
Michael Thomas wrote in
<94158f8a-1578-4d52-8f9f-15635579f...@mtcc.com>:
|On 3/26/25 11:13 AM, Alessandro Vesely wrote:
|>> If you want to do forensics you can check more, but that's all that a
|>> receiver is likely to care about.
|>
|> It ought to be not very hard to c
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
In message , Allen Robinson writes
>DKIM2 is an authentication mechanism. I think it would be difficult to
>justify an authentication protocol dictating how systems should handle
>messages that do not pass authentication checks. Local policy may inde
On 3/27/25 10:59 AM, Steffen Nurpmeso wrote:
Michael Thomas wrote in
<94158f8a-1578-4d52-8f9f-15635579f...@mtcc.com>:
|For all of the changes, I'd think that the right thing to do is run spam
|filters on the changed text with the reputation (if any) of the modifier
|in mind. Obviousl