[ietf-dkim] Not exactly not a threat analysis
moore at cs.utk.edu
Tue Aug 23 10:27:33 PDT 2005
John R Levine wrote:
>>>Right. The context is who signed it.
>>That's not sufficient unless signers who (re)transmit messages are
>>clearly distinguishable from signers who author content.
> You keep saying that, I keep pointing out that you're wrong. I guess
> we're done.
no, you keep claiming that I'm wrong, while misrepresenting what I'm
proposing. I don't think you're convincing anyone.
More information about the ietf-dkim