The thing that I'm skeptical about is that an automaton can be
to do this sort of analysis with any sort of accuracy. We're talking
a potential flood of reports coming in, I assume, so I doubt we're
to be putting out job reqs for "DKIM Signature Breakage Analysis
There were far too many breakages even with tools and hunches that
difficult to figure out, and even then there were lots of mysteries.
And of course, there's an open question about what you do with this
forensic data... it can be gamed, after all. So if there's any
bad guys to game it, it probably will be.
I wasn't thinking of wide activation necessarily, it might be
something that, eg, just MAAWG members and implementors might
selective enable over an interop testing period.
NOTE WELL: This list operates according to