Perhaps it can help to turn this around, and make the technical details be derivative of functional need.
That is: What kinds of questions and answers would signer and assessor like to share, which DKIM could help with? What kinds of roles and analyses would be good to facilitate? d/ Al Iverson wrote: > On Fri, Jan 30, 2009 at 10:55 AM, Dave CROCKER <d...@dcrocker.net> wrote: >> >> Al Iverson wrote: >>> Also, I wish somebody smarter than me would take a >>> shot at a PPT for dummies like me, showing a few examples of how a >>> receiver would like to use DKIM. >> >> Can you describe particular usage examples you would like to see explained? >> >> I'm not asking you to give the details, but rather describe what the details >> should explain. > > Off the top of my head... > . > Use cases for i= and d=, and what an ISP would care to do with that > data, if they could do anything they wanted to. > > What the restrictions are on i= and d= (and other fields/configuration > options I might not be thinking of). What has to match the PRA, if > anything, what can contain a sub-level identifier, etc. > > Best, > Al > -- Dave Crocker Brandenburg InternetWorking bbiw.net _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html