This is a personal attempt at describing a two-stage sequence of producing
DKIM capabilities, to permit the earliest possible deployment of a basic
service,
This is a very well thought out plan.
I note though that it sites as features (a) the authentication of a DKIM
identity and (b) the use of SSP to handle unsigned mail. There is also the
issue of (c) the use of SSP to determine the types of DKIM identities that
are acceptable.
--
Arvel
_______________________________________________
ietf-dkim mailing list
http://dkim.org