ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-05-28 21:03:29
On 5/28/10 2:24 PM, Rolf E. Sonneveld wrote:
Dave CROCKER wrote:
   
On 5/28/2010 12:07 PM, Jeff Macdonald wrote:
     
But I'd like to see if I understand the difference your are trying to
highlight between a manually maintained list and a self published
list.
       
There is a key semantic difference which, I believe, makes for a key 
difference
in utility.

In a manually maintained list, there is an independent assessment of what 
domain
names are worth worrying about.  (The independence is from the owner of the
domain.  The assessment might be by a third part or it might be by the 
recipient.)
     
Before going forward talking about 'manually maintained lists' can
someone define what that is? What exactly are we talking about, how does
it operate, by whom, involved parties etc.?
   
Dave has well defined the difference between ADSP assertions and 
manually created lists of authentication acceptance criteria.  In the 
latter case, a domain is unable to react.  For manually generated lists, 
these represent a reaction to domains being flooded with phishing 
attempts.  As with the course of rivers changing over time, this often 
happens by getting wider.  If ADSP were easier to use without being 
disruptive, restrictive ADSP assertions would be more common.

-Doug
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

<Prev in Thread] Current Thread [Next in Thread>