ietf-dkim
[Top] [All Lists]

RE: [ietf-dkim] Collection of use cases for SSP requirements

2006-11-16 23:12:38
Read the next line, there is a possible outcome that an authentication 
mechanism could return, but DKIM does not support this. 

-----Original Message-----
From: John Levine [mailto:johnl(_at_)iecc(_dot_)com] 
Sent: Friday, November 17, 2006 12:45 AM
To: ietf-dkim(_at_)mipassoc(_dot_)org
Cc: Hallam-Baker, Phillip
Subject: Re: [ietf-dkim] Collection of use cases for SSP requirements

FOR DKIM BASE:
We have three possible outcomes: Definitely Genuine, Definitely Fake 
and Undetermined

How can dkim-base tell that something is definitely fake?

R's,
John



_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html