ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] 5 outstanding issues with the threat review

2006-03-15 12:12:04
That's more of an issue of SSP, right? It's with SSP that you'd
like to subdivide the policy

Mm, I see your point, but I don't know that we want SSP changing the key record, and that's where I'm thinking this would go ("This key is used for Really Serious Stuff"; "This key is used for Frivolous User Stuff"). I'm not sure how to move that to SSP.

Barry

--
Barry Leiba, Pervasive Computing Technology  
(leiba(_at_)watson(_dot_)ibm(_dot_)com)
http://www.research.ibm.com/people/l/leiba
http://www.research.ibm.com/spam
_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html