Tony Hansen wrote:
I'm tempted to say: if the mailing list is going to do *anything* to the
message other than act as a simple reflector, it *must* strip out any
existing dkim signature. What it does after that is up to the mailing list.
This has been my view, too, but I'm starting to see some plausible benefit in at
least permitting co-existence.
So, I still believe that the safest policy is the old list rule we established:
you break it, you own it.
But recent discussions makes additional scenarios just too tantalizing to
prohibit. (And too complex to pursue right now.)
d/
--
Dave Crocker
Brandenburg InternetWorking
<http://bbiw.net>
_______________________________________________
ietf-dkim mailing list
http://dkim.org