On Jun 1, 2009, at 9:08 AM, Jeff Macdonald wrote:
On Mon, Jun 1, 2009 at 12:04 PM, Dave CROCKER <dhc(_at_)dcrocker(_dot_)net>
wrote:
Steve Atkins wrote:
We're not doing anything particularly clever with DKIM identities,
though, just using them as a key to a domain based whitelist to
enable some automated handling of inbound email (FBL handling,
primarily) and enabling rendering email with risky renderers (html,
pdf) by default
uhhh. hmmmm...
that doesn't qualify as clever?
well, ok, maybe not /particularly/ clever, but still...
Steve, what do your dkim identities look like?
"example.com". We don't pay any attention to any details
beyond "is this domain on our whitelist?". If it's validly
signed, and it's on the domain whitelist, then we treat
it just the same as mail received from an IP on the IP
whitelist. (Which is to say that we trust the content not
to be hostile, and that's about it.)
Cheers,
Steve
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html