ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] dkim usage examples

2009-01-30 13:30:33
Al Iverson wrote:
Not bad questions, but ones that I don't really have answers for. I
could tell you what I *want* out of authentication, but that leads us
to things like *cough* disposition instructions for bad mail and
things like ADSP. Instead of going there, I'd like to learn more about
how what is more or less nearing consensus, and how it is actually
desired to be used by ISPs.

The consensus amongst ISPs is to wait and see what the mail coming in looks 
like, and then develop reputation algorithms based on that.

Way too much of the email industry has been waiting for years for someone 
else to tell them what to do.  We need more real-world experimentation.

-- 
J.D. Falk
Return Path Inc
http://www.returnpath.net/
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html