ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] Output summary

2011-04-28 10:29:04


On 4/28/2011 8:17 AM, Barry Leiba wrote:
On the other hand, maybe we can make all that clearer in a revision of
the Overview doc... start that document with a section about
architecture.  I haven't read it in a while: perhaps it already has
this issue laid out clearly.


In:

   <http://dkim.org/specs/rfc5585.html>, Figure 1

there are separate modules for verification, assessment, signing practices and 
filtering.  The text discusses these in terms of what they are for.

If anyone feels that the diagram or the accompanying text needs changing, we 
can 
of course do that.

The one change that I would make to the diagram is what we did for the later, 
Deployment document (RFC 5863):

    <http://tools.ietf.org/rfc/rfc5863.txt>, Figure 1

which adds a box around the core DKIM service portion of the overall service, 
to 
distinguish what functions are inside vs. outside of DKIM Signing.

At this point, I'm not hopeful that more explanation or clearer diagrams will 
help folks who do not yet see the difference between a component and a system, 
or a protocol specification and a software specification.

d/
-- 


   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

<Prev in Thread] Current Thread [Next in Thread>