J D Falk wrote:
Sounds like there'll need to be a whole bunch of statements about how
this header is only as secure as your existing email infrastructure, and
if your network is totally pwned then this header will probably be pwned
too.
Essentially, that's what it boils down to: a more precise Introduction
and a more lengthy Security Considerations, and then a number of lesser
tweaks throughout the document.
_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html