On May 3, 2010, at 11:06 AM, MH Michael Hammer (5304) wrote:
And it is easy enough to do "F2F" in a manner that does not break the
authentication-based service.
How?
-- Brett
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html