ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] dkim usage examples

2009-01-30 13:53:54
On Fri, Jan 30, 2009 at 11:56 PM, J.D. Falk
<jdfalk-lists(_at_)cybernothing(_dot_)org> wrote:
Al Iverson wrote:
Not bad questions, but ones that I don't really have answers for. I
could tell you what I *want* out of authentication, but that leads us
to things like *cough* disposition instructions for bad mail and
things like ADSP. Instead of going there, I'd like to learn more about

Well .. my daughter wants to bring every mutt she sees on the streets
home. My wife has something different to say.

Rather similar situation here, I guess?  :)

how what is more or less nearing consensus, and how it is actually
desired to be used by ISPs.

The consensus amongst ISPs is to wait and see what the mail coming in looks
like, and then develop reputation algorithms based on that.

The rough consensus seems to be to look at d= and let the sender
figure out what they want to do with the i= they publish

--srs
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html