9. The Protocol MUST NOT be required to be invoked if a
valid first party signatures is found.
I would like to changed my vote to remove this requirement.
I still think it is independent concept, but I would suggest that the
semantics be changed or keep as is but with some additional hindsight as to
why it might be useful.
Suggestion (just an example, I won't quibble with wordsmithing)
9. The Protocol MUST allow to be invoked before the verification
process takes place.
[INFORMATIONAL NOTE:]
There are policies that can be satisfied by the DKIM-verifier
prior to any verification of signatures is required.
Some implementations might find this design is more
efficient and offers scalability considerations.
--
Hector Santos, Santronics Software, Inc.
http://www.santronics.com
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html