On 5/4/11 3:29 PM, Dave CROCKER wrote:
>
>
> On 5/4/2011 1:23 AM, Rolf E. Sonneveld wrote:
>> But then DKIM is only authenticating the d= and we should no longer 
>> position
>> DKIM as being 'effective in defending against the fraudulent use of 
>> origin
>> addresses'.
>
>
> Besides your rather unusual sense of software architecture, 

This comment is not very constructive, especially as it lacks any 
information about /what/ it is, that is unusual.

> your above statement seems to indicate a failure to attend to 
> differences between rfc4871 and rfc4871bis.
>
> Which documentation makes your above claims?

Both documents refer to rfc4686, albeit only in the Informative 
References section. rfc4871 refers to rfc4686 only in section 8, 
rfc4871bis in section 8 as well as in section 1.1.

Please provide us some pointers regarding the differences between 
rfc4871 and rfc4871bis in relation to the above statement.

/rolf
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to