On 7/6/2011 11:34 AM, Murray S. Kucherawy wrote:
As Pete has pointed out -- and has he's adamant about -- the signer can't
attack... that is, DKIM can't do anything about "attacks" by the signer.
And that's as Charles's text itself points out. So I'd be
The signer can attack the receiver, of course.
The signer cannot attack the DKIM mechanism. Attacking the mechanism has to do
with working around the mechanism. Semantically, that is only meaningful as
done by independent third-parties. Not a principal in the use of the mechanism.
Interesting side note: Given the reference to Postel's Law being
not-such-a-good-idea-after-all,
Postel's law is generally misapplied from what he intended.
It is mis-used as an excuse for sloppy and overly permissive specification and
for inaccurate implementation, neither of which were what Jon intended.
He was attempting to cover only those cases in which reasonable specifications
are subject to some variance in interpretation, resulting in a degree of
difference in implementation.
As such, it's a dandy rule.
Anyway, with a few nitty edits from me as well, here's the current 8.15 for
-15 for everyone's consideration. I concur with Barry with respect to the
DISCUSS complaint about who's attacking what.
+1
Also, the second paragraph
already alludes to the fact that multiple From: fields is a problem
regardless of whether or not one of them is signed. I think it covers the
bases and flows nicely.
+1
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html