On 9/13/10 1:03 PM, McDowell, Brett wrote:
I actually thought there was a fair degree of deployments where some ESP's
DKIM-sign mail on behalf of their clients, by means of key management much as
you outlined above. No?
DKIM is in the security area, so it would be surprising to find
documents describing the ad hoc methods used to exchange DKIM private
key information. There is no draft describing the methods used to
establish third-party DKIM privileges. It seems such would actually be
describing bad practices since the current situation creates a myriad
number of security exposures.
-Doug
_______________________________________________
dkim-ops mailing list
dkim-ops(_at_)mipassoc(_dot_)org
http://mipassoc.org/mailman/listinfo/dkim-ops