On Fri, Jan 30, 2009 at 10:55 AM, Dave CROCKER <d...@dcrocker.net> wrote:
>
>
> Al Iverson wrote:
>>
>>     Also, I wish somebody smarter than me would take a
>> shot at a PPT for dummies like me, showing a few examples of how a
>> receiver would like to use DKIM.
>
>
> Can you describe particular usage examples you would like to see explained?
>
> I'm not asking you to give the details, but rather describe what the details
> should explain.

Off the top of my head...
.
Use cases for i= and d=, and what an ISP would care to do with that
data, if they could do anything they wanted to.

What the restrictions are on i= and d= (and other fields/configuration
options I might not be thinking of). What has to match the PRA, if
anything, what can contain a sub-level identifier, etc.

Best,
Al

-- 
Al Iverson on Spam and Deliverability, see http://www.spamresource.com
News, stats, info, and commentary on blacklists: http://www.dnsbl.com
My personal website: http://www.aliverson.com   --   Chicago, IL, USA
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to