On 5/10/2010 2:28 PM, J.D. Falk wrote:
I think we could write normative language for what MLM software MUST NOT do
if it wants to pass DKIM-signed messages through unscathed.
Seems an odd thing to make normative, since all that is entailed is not
breaking
the signature, and the details of what goes into a signature are in the base
DKIM signing spec.
This actually winds up arguing for not worrying about the subtleties or
niceties
of normative language and instead just trying to provide discussion that is
largely tutorial.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html