Mark Lentczner wrote:
draft-ietf-marid-mailfrom-00
Thanks, it's almost ready, and it covers the mandatory case
(empty Return-Path) of HELO checks in SPF1. I like it very
much. Six typos and other observations:
Line 363 (typo)
<< to determine the list hosts that they allow to use their domain name
to determine the list of hosts that they allow to use their domain
Line 415 (policy violation)
<< Tests against some other identity may also be used to override the
<< test against the "Mail From" identity.
Line 455 (designated open relays can be used with spf2.0/mfrom)
<< However, the use of open MTA relays on the Internet has long been
<< noted as a security problem. Most sites do not run open relays and
<< many refuse e-mail from known open relays.
Line 465 (typo)
<< published SPF records must authorized any MTAs
published SPF records must authorize any MTAs
Line 472 (typo)
<< Internal MTAs then do not perform the authorization test To
Internal MTAs then do not perform the authorization test. To
Line 507 ff. (deficits of "exp" are a matter of protocol)
<< The explanation may contain URLs that may be malicious, and/or
<< offensive or misleading text.
Bye, Frank