On Tue, 05 Apr 2011 11:33:10 +0100, Rolf E. Sonneveld
<R(_dot_)E(_dot_)Sonneveld(_at_)sonnection(_dot_)nl> wrote:
Ad 2. To give some examples of use profiles:
* of course, the first thing that comes to mind is to use DKIM as
mechanism to build reputation services on. For this use profile
not many restrictions will be required, but restrictions like MUST
NOT or SHOULD NOT use l= can be part of that spec. Such a spec
could also give some guidance re. the use of i=
and lost more examples snipped
It seems to me that we're constantly mixing the possible uses of DKIM
with the core specification of DKIM. By differentiating the two, 4871bis
can be finished and DKIM can start to bear fruit.
Which suggests that future use profiles may need tag hooks to hang their
features on, and so if there is some underused existing tag (such as i=)
already in the spec, then it is better left there to facilitate such
future profiles.
--
Charles H. Lindsey ---------At Home, doing my own thing------------------------
Tel: +44 161 436 6131
Web: http://www.cs.man.ac.uk/~chl
Email: chl(_at_)clerew(_dot_)man(_dot_)ac(_dot_)uk Snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9 Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html