Perhaps it can help to turn this around, and make the technical details be
derivative of functional need.
That is: What kinds of questions and answers would signer and assessor like to
share, which DKIM could help with? What kinds of roles and analyses would be
good to facilitate?
d/
Al Iverson wrote:
On Fri, Jan 30, 2009 at 10:55 AM, Dave CROCKER <dhc(_at_)dcrocker(_dot_)net>
wrote:
Al Iverson wrote:
Also, I wish somebody smarter than me would take a
shot at a PPT for dummies like me, showing a few examples of how a
receiver would like to use DKIM.
Can you describe particular usage examples you would like to see explained?
I'm not asking you to give the details, but rather describe what the details
should explain.
Off the top of my head...
.
Use cases for i= and d=, and what an ISP would care to do with that
data, if they could do anything they wanted to.
What the restrictions are on i= and d= (and other fields/configuration
options I might not be thinking of). What has to match the PRA, if
anything, what can contain a sub-level identifier, etc.
Best,
Al
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html