ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] The URL to my paper describing the DKIM policy options

2006-07-28 15:13:21

On 28 Jul 2006, at 12:12 PM, Scott Kitterman wrote:

On Friday 28 July 2006 14:23, John Levine wrote:
Yes and what is another customer of the ISP submits mail using my From.
in virtually all cases today there is nothing to prevent that.

If you give your keys to untrustworthy third parties, all bets are
off.  No amount of extra protocol goop is going to change that.

Yes. Absolutely. I meant this to be a comment about pre- requisites, not
something that could be solved in protocol.

Thanks for the clarification.

        Jon

_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html