On Sat, 6 Aug 2005, Dave Crocker wrote:
Dkim needs to state clearly what it IS intended for. If this does not include end-user use then dkim does not have an obligation to "prove" it.
That does not compute. Can you elaborate what you mean by no obligation to prove it? -- William Leibzon Elan Networks william(_at_)elan(_dot_)net
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | Re: MASS/DKIM BOF Summary, Dave Crocker |
|---|---|
| Next by Date: | Re: Replay attacks and ISP business models, John R Levine |
| Previous by Thread: | Re: MASS/DKIM BOF Summary, Dave Crocker |
| Next by Thread: | [ietf-dkim] On per-user-keying, Jon Callas |
| Indexes: | [Date] [Thread] [Top] [All Lists] |