On 5/4/11 3:29 PM, Dave CROCKER wrote:
On 5/4/2011 1:23 AM, Rolf E. Sonneveld wrote:
But then DKIM is only authenticating the d= and we should no longer
position
DKIM as being 'effective in defending against the fraudulent use of
origin
addresses'.
Besides your rather unusual sense of software architecture,
This comment is not very constructive, especially as it lacks any
information about /what/ it is, that is unusual.
your above statement seems to indicate a failure to attend to
differences between rfc4871 and rfc4871bis.
Which documentation makes your above claims?
Both documents refer to rfc4686, albeit only in the Informative
References section. rfc4871 refers to rfc4686 only in section 8,
rfc4871bis in section 8 as well as in section 1.1.
Please provide us some pointers regarding the differences between
rfc4871 and rfc4871bis in relation to the above statement.
/rolf
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html