ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] Straw poll results

2010-08-09 17:05:08

On Aug 9, 2010, at 1:26 PM, Scott Kitterman wrote:

On Monday, August 09, 2010 04:11:57 pm John R. Levine wrote:
Why do you simplify handling of list mail to sorting and filtering,
ignoring two other important list handling activities:

1. reading mail
2. responding to mail

Well, OK.  Can you offer some non-hypothetical situations where you would
read or respond to list mail differently if there were extra assurance on
identity of the list contributor?

Or to put it another way, if someone has put an S/MIME signature on a
messsage sent through a list, does that affect the way you respond?

It's not at all clear to me that the answer to that question is in any way 
related to the work of the working group.  What would we design differently 
if 
the answer was yes (or no)?

If a recipients handling of an inbound email from a mailing list varies
depending on whether you can authenticate the original author (the
From field) or not, then there may be some value in helping mailing
lists tunnel authentication through in a way that allows you to
authenticate the original author.

If it doesn't, there isn't.

If none of the members of this list would handle an inbound email from
a mailing list depending on whether they can authenticate the original
author or not, nor point at a concrete example of people ding so, that
would suggest it's not a common requirement. Which would suggest it's
not worth considering how to support it for DKIM, which seems to be at
least tangentially related to what we're doing here.

Cheers,
  Steve


_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html