hector wrote:

> Whats odd about all this is that it perpetuates the key differences in
> understanding the purpose of DKIM.  If its for a  domain to assert a
> responsibility for the message, then based on these discussions it is
> only up to a point or the next hop where that responsibility is
> downgraded or rescinded.  As the next hop, be it a relay or list server,
> could take over the responsibility, the chain of trust is presumed
> here.  Hop to Hop, Point to Point, relay to relay, finally the the MDA
> and the user.  This is an fundamental idea that allowed internet email
> and the delivery system to work, but there was never a presumption that
> middle ware will be altering the originality of the mail.   Passthru
> mail was fundamentally sacred and this was covered by US laws to be
> frank.  It's been challenged over the years, but there is still a taboo
> to mess around with it.  List Servers were the exception for the most
> part and  that was covering tagging the subject, adding footers or some
> HTML framing, etc,  all making it much harder for new mail integrity
> technology.

Very good point; thanks for discerning the difference.  At its core, I 
think, this is the all-too-common battle between the Platonic Ideal of Email 
and the reality.

In this reality, intermediaries change messages.  Sounds like a few folks on 
this list don't want messages to undergo drastic changes when passing 
through intermediaries, and thus are arguing against any attempt to use DKIM 
to "legitimize" what they view, Quixotically, as illegitimate behavior.  But 
DKIM /will/ be applied in situations where intermediaries change messages, 
because that is a reality of email today.

I'd agree that it's necessary to tilt at a few windmills from time to time 
as a reminder of what the collective ideals might once have been, but this 
particular windmill was rebuilt as a pea soup restaurant decades ago.

-- 
J.D. Falk
Return Path Inc
http://www.returnpath.net/
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to