On 5/4/2011 1:23 AM, Rolf E. Sonneveld wrote:
But then DKIM is only authenticating the d= and we should no longer position
DKIM as being 'effective in defending against the fraudulent use of origin
addresses'.
Besides your rather unusual sense of software architecture, your above
statement
seems to indicate a failure to attend to differences between rfc4871 and
rfc4871bis.
Which documentation makes your above claims?
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html