Dave CROCKER wrote:
> 
> On 4/15/2011 12:10 PM, Murray S. Kucherawy wrote:
>> All of that discussion belongs in the deployment document or some unwritten 
>> specs about policy or reputation (which is all semantics), not in the base 
>> specification (which is all syntax).
> 
> 
> +1
> 
> It's more fun to re-fight old battles that are out of scope for the current 
> work, but it's not nearly as productive.

This is not fun.

It is 100% in scope. An authorized signer is a natural identity of the 
DKIM consideration, implementation, deployment and a major efficacy 
and durability factor.

The surreal aversion to include this identity in section 2.3 needs to 
be explained based on the dearth of technical merits as an DKIM 
dentity.  That is not have been done, and doing so would be a 
productive time well spent.

The intentional neglect for excluding a valuable DKIM identity 
component is not an acceptable engineering solution.

-- 
HLS


_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to