The thing that I'm skeptical about is that an automaton can be
programmed
to do this sort of analysis with any sort of accuracy. We're talking
about
a potential flood of reports coming in, I assume, so I doubt we're
all going
to be putting out job reqs for "DKIM Signature Breakage Analysis
Engineer".
There were far too many breakages even with tools and hunches that
were very
difficult to figure out, and even then there were lots of mysteries.
And of course, there's an open question about what you do with this
sort of
forensic data... it can be gamed, after all. So if there's any
advantage for
bad guys to game it, it probably will be.
I wasn't thinking of wide activation necessarily, it might be
something that, eg, just MAAWG members and implementors might
selective enable over an interop testing period.
Mark.
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html