No matter which way you wish to preach this David, and ignore all
comments, the protocol inconsistency issues in the WG documents are
clearly present and make it very difficult to employ DKIM with any of
the WG proposed methods.
Any current DKIM-CORE deployment cited is not used by itself but
rather augmented with proprietary methods, special host to host
arrangements and non-standard solutions.
Resolving the inconsistency with the working WG documents would be
much welcome. Ignoring it, just continue a status quo of lack of wide
understanding and usefulness for DKIM from SMALL to LARGE MTAs.
--
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html