ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-06 06:44:30
On Tue, 05 Apr 2011 11:33:10 +0100, Rolf E. Sonneveld  
<R(_dot_)E(_dot_)Sonneveld(_at_)sonnection(_dot_)nl> wrote:


Ad 2. To give some examples of use profiles:

    * of course, the first thing that comes to mind is to use DKIM as
      mechanism to build reputation services on. For this use profile
      not many restrictions will be required, but restrictions like MUST
      NOT or SHOULD NOT use l= can be part of that spec. Such a spec
      could also give some guidance re. the use of i=

and lost more examples snipped


It seems to me that we're constantly mixing the possible uses of DKIM
with the core specification of DKIM. By differentiating the two, 4871bis
can be finished and DKIM can start to bear fruit.

Which suggests that future use profiles may need tag hooks to hang their  
features on, and so if there is some underused existing tag (such as i=)  
already in the spec, then it is better left there to facilitate such  
future profiles.


-- 
Charles H. Lindsey ---------At Home, doing my own thing------------------------
Tel: +44 161 436 6131                       
   Web: http://www.cs.man.ac.uk/~chl
Email: chl(_at_)clerew(_dot_)man(_dot_)ac(_dot_)uk      Snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9      Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

<Prev in Thread] Current Thread [Next in Thread>