Barry Leiba wrote: > We've had a bit of discussion in this thread (and elsewhere) about > this, but I need to get a clear view of consensus. Doug agrees with > Hector's note, below, and Dave and Murray do not. I'd like to hear > from others within the next few days, about whether you think we > should make the change Hector requests or not. I need to get a sense > of whether there's significant support for it. Again, please keep > arguments to a minimum, so it's clearer to me what the consensus is -- > we've had the arguments going for a while now. > > Barry, as chair
BTW Barry, the proposal I made was this: http://mipassoc.org/pipermail/ietf-dkim/2011q2/016282.html Repeated here for those without editor URL launching support or disabled. ---------------------- >> Murray wrote: >> You want AUID and RFC5322.From added to the Output Requirements >> section explicitly. BTW, while RFC5322.From will satisfy requirements, I am proposing a new ODID identity (RFC5322.From.domain) since that is whats already extracted by APIs in order to do the current ADSP support. I proposes the following: 3.x Originating Domain Identity (ODID) The ODID is the domain part of the From: address. This identity MAY be considered as an output communicated to an advanced Identity Assessor module. INFORMATIVE IMPLEMENTATION NOTE: The ODID and SDID are inputs for the optional Checking Signing Practices component as described in the DKIM Service Architecture [RFC5585] 3.9. Output Requirements For each signature that verifies successfully or produces a TEMPFAIL result, the output of a DKIM verifier module MUST include the set of: o The domain name, taken from the "d=" signature tag; and o The result of the verification attempt for that signature. | Optional output are: | | o The Agent or User Identity (AUID) taken from "i=", if any. | | o The Originating Domain Identity (ODID). Verifier output | MAY consider ODID when no signatures or invalid signatures | are found. The output MAY include other signature properties or result meta- data, including PERMFAILed or otherwise ignored signatures, for use by modules that consume those results. See Section 6.1 for discussion of signature validation result codes. You might be able to figure out better text. ----------------- -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html