ietf-dkim
[Top] [All Lists]

[ietf-dkim] Issue: Requirement #9 - Protocol must not be required to be invoked ...

2006-08-08 18:33:21
 9.  The Protocol MUST NOT be required to be invoked if a
     valid first  party signatures is found.

I would like to changed my vote to remove this requirement.

I still think it is independent concept, but I would suggest that the
semantics be changed or keep as is but with some additional hindsight as to
why it might be useful.

Suggestion (just an example, I won't quibble with wordsmithing)

  9. The Protocol MUST allow to be invoked before the verification
     process takes place.

     [INFORMATIONAL NOTE:]

     There are policies that can be satisfied by the DKIM-verifier
     prior to any verification of signatures is required.
     Some implementations might find this design is more
     efficient and offers scalability considerations.


--
Hector Santos, Santronics Software, Inc.
http://www.santronics.com





_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html