Michael Thomas wrote:
Yeah, definitely a security considerations if anything. But isn't this pretty much covered by the overall "don't trust what you don't trust" part of the security considerations already?
Probably. But this is really about pedagogy on the point, and coming at something this basic a couple of different way and maybe hitting the reader over the head is probably worth the effort. d/ -- Dave Crocker Brandenburg InternetWorking bbiw.net _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html