On 5/4/2011 1:23 AM, Rolf E. Sonneveld wrote: > But then DKIM is only authenticating the d= and we should no longer position > DKIM as being 'effective in defending against the fraudulent use of origin > addresses'.
Besides your rather unusual sense of software architecture, your above statement seems to indicate a failure to attend to differences between rfc4871 and rfc4871bis. Which documentation makes your above claims? d/ -- Dave Crocker Brandenburg InternetWorking bbiw.net _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html