On Monday, August 09, 2010 04:11:57 pm John R. Levine wrote:
Why do you simplify handling of list mail to sorting and filtering,
ignoring two other important list handling activities:
1. reading mail
2. responding to mail
Well, OK. Can you offer some non-hypothetical situations where you would
read or respond to list mail differently if there were extra assurance on
identity of the list contributor?
Or to put it another way, if someone has put an S/MIME signature on a
messsage sent through a list, does that affect the way you respond?
It's not at all clear to me that the answer to that question is in any way
related to the work of the working group. What would we design differently if
the answer was yes (or no)?
Scott K
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html