On 7/8/2011 6:48 AM, Murray S. Kucherawy wrote: >> If DKIM is not intended to give added credance to messages, then what on >> earth is its purpose at all. > > That question is answered numerous times in the draft, namely the Abstract > and Sections 1, 1.2, 1.5, 2.5, 2.7, 3.9, 3.11, 6.3, and 8.15 (and other parts > of 8).
Perhaps I'm missing something basic that makes clear the value of this thread? Hashing and re-hashing first principles of DKIM hardly seems useful, at this stage. If someone has trouble understanding the specification, this forum is not intended for tutorials, particularly not tutorials that constantly repeat first principles. d/ -- Dave Crocker Brandenburg InternetWorking bbiw.net _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html