On 28 Jul 2006, at 12:12 PM, Scott Kitterman wrote:
On Friday 28 July 2006 14:23, John Levine wrote:
Yes and what is another customer of the ISP submits mail using my
From.
in virtually all cases today there is nothing to prevent that.
If you give your keys to untrustworthy third parties, all bets are
off. No amount of extra protocol goop is going to change that.
Yes. Absolutely. I meant this to be a comment about pre-
requisites, not
something that could be solved in protocol.
Thanks for the clarification.
Jon
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html