I would agree with your statement if you put the word "deployers" between DKIM and MUST.
> -----Original Message----- > Unfortunately, the norm is not to make these checks because only DKIM > invites the possible exploit. DKIM MUST accept the role of preventing the > exploit it invites. _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html