On Fri, 02 Mar 2007 21:01:18 -0000, Eliot Lear <lear(_at_)cisco(_dot_)com>
wrote:
Phillip,
To summarize some of this discussion, the chain of events is this:
- The VERIFIED address perhaps along with the message is used as input
to whatever reputation system there is. The reputation service will
return a value of ACCEPT or REJECT for each message.
- UNVERIFIED leads to a query to SSP. The results of the SSP query
along with the message will be fed to the reputation service to produce
a result of ACCEPT or REJECT.
However, you want to be able to provide the reputation/whatever service
with all the information which could be useful to it in reaching its
conclusion, and that could well include a further breakdown to the nature
of the UNVERIFIED.
--
Charles H. Lindsey ---------At Home, doing my own thing------------------------
Tel: +44 161 436 6131
Web: http://www.cs.man.ac.uk/~chl
Email: chl(_at_)clerew(_dot_)man(_dot_)ac(_dot_)uk Snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9 Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html