ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] Re: reductio ad hominem

2007-12-07 14:51:31
Dave Crocker wrote:


Jim Fenton wrote:
Some domains don't sanction the use of outside services to send mail
"from" their domain, and have terms of use requiring the use of their
domain's own mail servers to send mail. This is becoming increasingly
commonplace in the corporate world.  If you want to forward a news
article, you're welcome to do so using your personal email address.


Hence my asking during the meeting whether we weren't seeking to have
random receiving services enforce contractual issues that are internal
to the owner of the domain.

It makes enormously good sense for us to seek to rein in rogue
independent third parties that have no relationship to the domain owner.

However to ask random recipients to enforce internal policies of the
domain owner seems considerably beyond what is reasonable for an
Internet scale protocol service.

It isn't the internal policy that we're seeking to enforce.  It's that,
as a result of the fact that the internal policies are set up a
particular way, that makes it possible to detect other unauthorized uses
of the domain more directly.  We may end up "enforcing" (your term, not
mine) internal policies in the process, but that's a side effect.

-Jim


d/
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

<Prev in Thread] Current Thread [Next in Thread>