John L wrote:
Reflection attacks? How would a few TXT queries make that happen?
It would be the queries themselves I would be worried about. Suppose
someone blasts a message to thousands of domains that has many addresses
in the From: line. All of sudden all of those domains are under attack.
Perhaps some careful wording about how this is handled can get us around
that? I don't know.
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html