Perhaps it can help to turn this around, and make the technical details be 
derivative of functional need.

That is:  What kinds of questions and answers would signer and assessor like to 
share, which DKIM could help with?  What kinds of roles and analyses would be 
good to facilitate?

d/

Al Iverson wrote:
> On Fri, Jan 30, 2009 at 10:55 AM, Dave CROCKER <d...@dcrocker.net> wrote:
>>
>> Al Iverson wrote:
>>>     Also, I wish somebody smarter than me would take a
>>> shot at a PPT for dummies like me, showing a few examples of how a
>>> receiver would like to use DKIM.
>>
>> Can you describe particular usage examples you would like to see explained?
>>
>> I'm not asking you to give the details, but rather describe what the details
>> should explain.
> 
> Off the top of my head...
> .
> Use cases for i= and d=, and what an ISP would care to do with that
> data, if they could do anything they wanted to.
> 
> What the restrictions are on i= and d= (and other fields/configuration
> options I might not be thinking of). What has to match the PRA, if
> anything, what can contain a sub-level identifier, etc.
> 
> Best,
> Al
> 

-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to