3. From = Alice(_at_)example(_dot_)com i=mallet(_at_)example(_dot_)com
d=example.com.
3a. From = support(_at_)example(_dot_)com i=alice(_at_)example(_dot_)com
d=example.com
How in the world in an automaton supposed to guess that 3. is bogus and
3a. is not?
A point that could use more emphasis is that effective use of DKIM
is essentially a collaboration between senders and receivers who don't
know each other except by the mail they exchange. The best strategy for a
sender is to figure out what its mail streams are, and put consistent
signatures on each stream, so receivers can most easily sort them. Rather
than trying to invent ever more complex ways for receivers to read
senders' minds, it would be more productive to provide advice to senders
so that it's not necessary.
Regards,
John Levine, johnl(_at_)iecc(_dot_)com, Primary Perpetrator of "The Internet
for Dummies",
Please consider the environment before reading this e-mail. http://jl.ly
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html