On 7/6/2011 11:34 AM, Murray S. Kucherawy wrote:
>> As Pete has pointed out -- and has he's adamant about -- the signer can't
>> attack... that is, DKIM can't do anything about "attacks" by the signer.
>> And that's as Charles's text itself points out.  So I'd be

The signer can attack the receiver, of course.

The signer cannot attack the DKIM mechanism.  Attacking the mechanism has to do 
with working around the mechanism.  Semantically, that is only meaningful as 
done by independent third-parties.  Not a principal in the use of the mechanism.


> Interesting side note: Given the reference to Postel's Law being
> not-such-a-good-idea-after-all,

Postel's law is generally misapplied from what he intended.

It is mis-used as an excuse for sloppy and overly permissive specification and 
for inaccurate implementation, neither of which were what Jon intended.

He was attempting to cover only those cases in which reasonable specifications 
are subject to some variance in interpretation, resulting in a degree of 
difference in implementation.

As such, it's a dandy rule.


> Anyway, with a few nitty edits from me as well, here's the current 8.15 for
> -15 for everyone's consideration.  I concur with Barry with respect to the
> DISCUSS complaint about who's attacking what.

+1


> Also, the second paragraph
> already alludes to the fact that multiple From: fields is a problem
> regardless of whether or not one of them is signed.  I think it covers the
> bases and flows nicely.

+1

d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to