On 5/4/2011 1:23 AM, Rolf E. Sonneveld wrote:
> But then DKIM is only authenticating the d= and we should no longer position
> DKIM as being 'effective in defending against the fraudulent use of origin
> addresses'.


Besides your rather unusual sense of software architecture, your above 
statement 
seems to indicate a failure to attend to differences between rfc4871 and 
rfc4871bis.

Which documentation makes your above claims?

d/

-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to