On 5/25/2011 9:59 AM, John Levine wrote:
>> The idea is to anticipate any unknown signature breaker.
>
> I'm pretty sure that's specifically out of scope.
>
> And I promise that whatever you do, short of wrapping the whole
> message in opaque armor, I can come up with something that will
> break it.

One might have a goal of attempting to be robust against all forms of potential 
breakage.

That's not likely to be the goal of this sort of exercise.  Rather, it will be 
to choose a set of particular types of breakage, ignoring others.  For an 
effort 
like that, it is not meaningful to come up with additional types of breakage, 
since there is no attempt to cover such additional examples.

d/

-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to