ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-14 18:55:06
Wietse Venema wrote:
Hector Santos:
This is exactly the same problem that the industry evolved to over the past two decades and what has brought us together here. The problem is dealing with the legacy market of old SMTP systems and how the bad guys use this to gain entry into systems. If that wasn't the problem then we would have FULL control of all anonymous transactions.

Indeed. The evolutionary approach does not work. It has saddled us
up with a series of legacy systems that we need to cope with.

Instead, we need to get things right the first time. Therefore we
need to discourage deployment until we have achieved the complete
and perfect solution.  After that point has been reached, the world
will be perfect forever and nothing will ever need to be changed.

Of course, that is silly so I don't know why you brought it up.

Nonetheless, there is nothing wrong with having a "Getting right the first time" approach to design. Its a QA thing, not an ABSOLUTE and if you do some research, you will find this old mantra is once again growing in engineering, management and QA circles. The goal? To minimize duplicity of rework, potential problems for you and customers and hence cost.

We are not talking about DAY 1 of the Internet here. But 35+ years, and we have enough knowledge and insight to know today that if you can recognize the creation of a potential problem, then it would be neglectful if a) you didn't bring it up and b) if you continue to pursue such a course to allow it to happen.

--
HLS


_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html