Barry Leiba wrote:
> We've had a bit of discussion in this thread (and elsewhere) about
> this, but I need to get a clear view of consensus.  Doug agrees with
> Hector's note, below, and Dave and Murray do not.  I'd like to hear
> from others within the next few days, about whether you think we
> should make the change Hector requests or not.  I need to get a sense
> of whether there's significant support for it.  Again, please keep
> arguments to a minimum, so it's clearer to me what the consensus is --
> we've had the arguments going for a while now.
> 
> Barry, as chair

BTW Barry,  the proposal I made was this:

    http://mipassoc.org/pipermail/ietf-dkim/2011q2/016282.html

Repeated here for those without editor URL launching support or disabled.

                  ----------------------
>> Murray wrote:
>> You want AUID and RFC5322.From added to the Output Requirements 
>> section explicitly.  

BTW, while RFC5322.From will satisfy requirements, I am proposing a
new ODID identity (RFC5322.From.domain) since that is whats already
extracted by APIs in order to do the current ADSP support.

I proposes the following:

3.x  Originating Domain Identity (ODID)

     The ODID is the domain part of the From: address.  This identity
     MAY be considered as an output communicated to an advanced
     Identity Assessor module.

        INFORMATIVE IMPLEMENTATION NOTE:

        The ODID and SDID are inputs for the optional
        Checking Signing Practices component as described
        in the DKIM Service Architecture [RFC5585]

3.9.  Output Requirements

     For each signature that verifies successfully or produces a TEMPFAIL
     result, the output of a DKIM verifier module MUST include the set of:

     o  The domain name, taken from the "d=" signature tag; and

     o  The result of the verification attempt for that signature.

|  Optional output are:
|
|  o  The Agent or User Identity (AUID) taken from "i=", if any.
|
|  o  The Originating Domain Identity (ODID). Verifier output
|     MAY consider ODID when no signatures or invalid signatures
|     are found.

     The output MAY include other signature properties or result meta-
     data, including PERMFAILed or otherwise ignored signatures, for use
     by modules that consume those results.

     See Section 6.1 for discussion of signature validation result codes.

You might be able to figure out better text.
                           -----------------

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to