So, you wish to specify that a security validation step rely on a
heuristic?
I have already said that I'm not in favor of "specifying" this.
"Acceptable" is left as an exercise for the reader.
The question is about validation robustness against change, and about the
contents of DKIM specifications, to deal with this question.
I do not understand the benefit of leaving such a major issue un-specified
within normative text, particularly when you seem to be relying on the
unspecified behavior to resolve the matter.
d/
--
Dave Crocker
Brandenburg InternetWorking
<http://bbiw.net>
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html