Dave CROCKER wrote:
We need to be careful that we distinguish between scenarios that are
reasonable
to include in any mechanism that requires end-to-end perfection, versus other
legitimate scenarios that are not subject to such tight controls.
+1
It SHOULD|MUST also be reasonable to recognize and acknowledge the
conflicts between the two introduced by subjective incomplete
scenarios who are ignoring IETF written proposed draft standards that
was specifically designed to protected against these subjective
incomplete scenarios creating unreasonable and unexpected 3rd party
signatures.
The result - interoperability issues and unintentional victims.
--
HLS
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html