John L wrote:
I think a more fundamental question is who the consumers of SSP
information
are. I think that everybody agrees that DKIM receivers are an important
constituent, but are they the only ones? It doesn't seem very hard to
envision other consumers.
Usage scenarios would be very helpful. As Dave noted, if people can
throw stuff into a protocol because it might be useful for something
nobody actually plans to do, you end up with terminal bloat.
Please don't shoot the messanger: I'm just asking. It's a fairly common
occurrance
that a successful protocol will have many more uses/consumers than was
originally envisioned.
Especially in the case of spam, it's not very clear what the mutations
will be so it's
worth questioning, IMO.
Mike
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html