On Wednesday 09 August 2006 16:53, Michael Thomas wrote:
Scott ---
Scott -- I think it's both explicit and specific in other requirements
that the protocol
must publish that data, and some of those are MUST strength. I really
don't see why
we need to restate that here.
That and I don't think there is any explicit or implicit proscription
here on when the
protocol ought not be invoked. The restriction on was forcing new
behavior for a
DKIM verifier, not on how the protocol could be used.
OK. You've spent a lot more time with the document than I have. I'll accept
that.
I'll keep an eye on it when we get to design.
Scott K
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html