On 7/8/2011 6:48 AM, Murray S. Kucherawy wrote:
If DKIM is not intended to give added credance to messages, then what on
earth is its purpose at all.
That question is answered numerous times in the draft, namely the Abstract
and Sections 1, 1.2, 1.5, 2.5, 2.7, 3.9, 3.11, 6.3, and 8.15 (and other parts
of 8).
Perhaps I'm missing something basic that makes clear the value of this thread?
Hashing and re-hashing first principles of DKIM hardly seems useful, at this
stage. If someone has trouble understanding the specification, this forum is
not intended for tutorials, particularly not tutorials that constantly repeat
first principles.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html