On Fri, Jan 30, 2009 at 10:55 AM, Dave CROCKER <d...@dcrocker.net> wrote: > > > Al Iverson wrote: >> >> Also, I wish somebody smarter than me would take a >> shot at a PPT for dummies like me, showing a few examples of how a >> receiver would like to use DKIM. > > > Can you describe particular usage examples you would like to see explained? > > I'm not asking you to give the details, but rather describe what the details > should explain.
Off the top of my head... . Use cases for i= and d=, and what an ISP would care to do with that data, if they could do anything they wanted to. What the restrictions are on i= and d= (and other fields/configuration options I might not be thinking of). What has to match the PRA, if anything, what can contain a sub-level identifier, etc. Best, Al -- Al Iverson on Spam and Deliverability, see http://www.spamresource.com News, stats, info, and commentary on blacklists: http://www.dnsbl.com My personal website: http://www.aliverson.com -- Chicago, IL, USA _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html