I would agree with your statement if you put the word "deployers" between DKIM 
and MUST.

> -----Original Message-----
> Unfortunately, the norm is not to make these checks because only DKIM
> invites the possible exploit.  DKIM MUST accept the role of preventing the
> exploit it invites.


_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to