On Fri, 24 Jun 2011 17:58:19 +0100, Dave CROCKER <dhc(_at_)dcrocker(_dot_)net>
wrote:
Let's simplify this discussion:
Spammers do a variety of techniques to trick filters and users.
We should have the DKIM signing specification normatively require
checking
for every known technique, since we cannot be sure that any other part
of the
system will perform the necessary checks.
+100
But sadly the consensus of this WG was otherwise :-(
--
Charles H. Lindsey ---------At Home, doing my own thing------------------------
Tel: +44 161 436 6131
Web: http://www.cs.man.ac.uk/~chl
Email: chl(_at_)clerew(_dot_)man(_dot_)ac(_dot_)uk Snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9 Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html