Re: [ietf-dkim] DKIM Interoperability Event notes2007-11-08 15:23:06On Thu, 8 Nov 2007, Hector Santos wrote: It is clearly a threat entry point allowing anyone to try to create a DKIM signature and all they have to do is add t=y with the hope the receiver will ignore all fail validations. There was no discussion on this point.How can an attacker add t=y to a signature? That only exists in keys and policies. _______________________________________________NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html
|
|