ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] dkim usage examples

2009-01-30 12:15:52
On Fri, Jan 30, 2009 at 10:55 AM, Dave CROCKER <dhc(_at_)dcrocker(_dot_)net> 
wrote:


Al Iverson wrote:

    Also, I wish somebody smarter than me would take a
shot at a PPT for dummies like me, showing a few examples of how a
receiver would like to use DKIM.


Can you describe particular usage examples you would like to see explained?

I'm not asking you to give the details, but rather describe what the details
should explain.

Off the top of my head...
.
Use cases for i= and d=, and what an ISP would care to do with that
data, if they could do anything they wanted to.

What the restrictions are on i= and d= (and other fields/configuration
options I might not be thinking of). What has to match the PRA, if
anything, what can contain a sub-level identifier, etc.

Best,
Al

-- 
Al Iverson on Spam and Deliverability, see http://www.spamresource.com
News, stats, info, and commentary on blacklists: http://www.dnsbl.com
My personal website: http://www.aliverson.com   --   Chicago, IL, USA
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html