On 5/4/11 3:29 PM, Dave CROCKER wrote: > > > On 5/4/2011 1:23 AM, Rolf E. Sonneveld wrote: >> But then DKIM is only authenticating the d= and we should no longer >> position >> DKIM as being 'effective in defending against the fraudulent use of >> origin >> addresses'. > > > Besides your rather unusual sense of software architecture,
This comment is not very constructive, especially as it lacks any information about /what/ it is, that is unusual. > your above statement seems to indicate a failure to attend to > differences between rfc4871 and rfc4871bis. > > Which documentation makes your above claims? Both documents refer to rfc4686, albeit only in the Informative References section. rfc4871 refers to rfc4686 only in section 8, rfc4871bis in section 8 as well as in section 1.1. Please provide us some pointers regarding the differences between rfc4871 and rfc4871bis in relation to the above statement. /rolf _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html