ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] on the scope and necessity of threat analysis

2005-08-13 10:46:16
I think you're still stating this somewhat in terms of DKIM when you refer to "sending policy" because the notion of sending policy is heavily tied to certain assumptions about implementation.

Agreed.

Why not simply say that you want recipients to be able to know that a particular message content that purports to be from an author in your domain was written or authorized by that author, that the content of the message is as it was written, and that the transmission of the message to the recipient was authorized?

Yes, this is a much less DKIM'ish way of saying it.  I like it.

--
Arvel


_______________________________________________
ietf-dkim mailing list
ietf-dkim(_at_)mipassoc(_dot_)org
http://mipassoc.org/mailman/listinfo/ietf-dkim