ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] Broken signature analysis

2010-03-02 06:11:58
On Mon, 01 Mar 2010 17:34:23 -0000, Ian Eiloart 
<iane(_at_)sussex(_dot_)ac(_dot_)uk> wrote:

It's two claims, actually:

1. You need to remove A-R's that claim to be from you.
2. You don't need to remove A-R's that don't claim to be from you.

More precisely, I think, you need to remove A-R's that claim to be from  
you but that you know to be bogus.

It if genuinely was from you (possibly unlikely, but perhaps some  
complicated expansion of your own message to multiple lists which all just  
happened to occur on your own machine (possibly even breaking the earlier  
signature at each stage), then it is probably better to leave it.

-- 
Charles H. Lindsey ---------At Home, doing my own thing------------------------
Tel: +44 161 436 6131                       
   Web: http://www.cs.man.ac.uk/~chl
Email: chl(_at_)clerew(_dot_)man(_dot_)ac(_dot_)uk      Snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9      Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html