On Mon, 11 Apr 2011 16:53:34 +0100, John R. Levine <johnl(_at_)iecc(_dot_)com>
wrote:
3. From = Alice(_at_)example(_dot_)com i=mallet(_at_)example(_dot_)com
d=example.com.
3a. From = support(_at_)example(_dot_)com i=alice(_at_)example(_dot_)com
d=example.com
How in the world in an automaton supposed to guess that 3. is bogus and
3a. is not?
It isn't supposed to (unless some future son-of-DKIM tells us how). But
humans can usually spot the difference between a personal address and a
role address and act accordingly, of even code their private
implementations to do so.
--
Charles H. Lindsey ---------At Home, doing my own thing------------------------
Tel: +44 161 436 6131
Web: http://www.cs.man.ac.uk/~chl
Email: chl(_at_)clerew(_dot_)man(_dot_)ac(_dot_)uk Snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9 Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html