-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Julian Mehnle wrote:
Werner Koch wrote:
The goal of PKA is much simpler: Authenticate the From: header and
allow the MUA or MTA to detected spoofed messages this way.
The ability to do an opportunistic encryption using the PKA framework
is just a very welcome side-effect.
It is exactly that side-effect of opportunistic encryption that SPF aims
to support.
Oops, please read that as "opportunistic authentication". But that's not
all that different.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFEM8hYwL7PKlBZWjsRAn9YAKCIsQPyGnlsU9OSh5T4MNpWpMonhQCfeOGx
hnjEHXKVpAS8emYIiUvT+4c=
=Gkh2
-----END PGP SIGNATURE-----
-------
Sender Policy Framework: http://www.openspf.org/
Archives at http://archives.listbox.com/spf-discuss/current/
To unsubscribe, change your address, or temporarily deactivate your
subscription,
please go to
http://v2.listbox.com/member/?listname=spf-discuss(_at_)v2(_dot_)listbox(_dot_)com