ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] The URL to my paper describing the DKIM policy options

2006-07-28 12:28:55
On Friday 28 July 2006 14:23, John Levine wrote:
Yes and what is another customer of the ISP submits mail using my From. 
in virtually all cases today there is nothing to prevent that.

If you give your keys to untrustworthy third parties, all bets are
off.  No amount of extra protocol goop is going to change that.

Yes.  Absolutely.  I meant this to be a comment about pre-requisites, not 
something that could be solved in protocol.

Scott K
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html