ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] DKIM Interoperability Event notes

2007-11-08 15:23:06
On Thu, 8 Nov 2007, Hector Santos wrote:
It is clearly a threat entry point allowing anyone to try to create a DKIM signature and all they have to do is add t=y with the hope the receiver will ignore all fail validations.

There was no discussion on this point.

How can an attacker add t=y to a signature? That only exists in keys and policies.
_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html