----- Original Message ----- From: "Scott Kitterman" <[EMAIL PROTECTED]> To: "DKIM List" <[email protected]>
> On Wed, 30 Aug 2006 00:38:30 +0100 Stephen Farrell > <[EMAIL PROTECTED]> wrote: > >> Does anyone have a real example of such an outfit and their >> specific requirements? Not doubting they exist, but it'd be >> nice to see as realistic an example as John posted. > > I think it's difficult to respond to this the way John did. I > think my last note to him about providers not supporting NS > delegation is a partial answer to your question. Its not difficult to show. But it was difficult to understand what was the point behind the question. That there exist companies outsource their services vs companies that do not? There are millions of domains who do not use NS to share their services. So I fail to understand the point. If you view it as a 3rd party concept, the problem is that it was not in the eyes of the verifier (2822.From, d= were the same). The only person that said it was 3rd party was the human. Too me, it was a great example about the lack of trust one will have with such mail coming their way - a spammer hiding behind others signing for them. An open DKIM relay! Which is exactly what most of us (the world, maybe not this WG) are trying to stop - the 3rd party masquerades! -- Hector Santos, Santronics Software, Inc. http://www.santronics.com _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html
