ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-11 11:56:48
3. From = Alice(_at_)example(_dot_)com  i=mallet(_at_)example(_dot_)com 
d=example.com.

3a. From = support(_at_)example(_dot_)com i=alice(_at_)example(_dot_)com 
d=example.com

How in the world in an automaton supposed to guess that 3. is bogus and 
3a. is not?

A point that could use more emphasis is that effective use of DKIM 
is essentially a collaboration between senders and receivers who don't 
know each other except by the mail they exchange.  The best strategy for a 
sender is to figure out what its mail streams are, and put consistent 
signatures on each stream, so receivers can most easily sort them.  Rather 
than trying to invent ever more complex ways for receivers to read 
senders' minds, it would be more productive to provide advice to senders 
so that it's not necessary.

Regards,
John Levine, johnl(_at_)iecc(_dot_)com, Primary Perpetrator of "The Internet 
for Dummies",
Please consider the environment before reading this e-mail. http://jl.ly
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

<Prev in Thread] Current Thread [Next in Thread>