On 7/8/2011 6:48 AM, Murray S. Kucherawy wrote:
>> If DKIM is not intended to give added credance to messages, then what on
>> earth is its purpose at all.
>
> That question is answered numerous times in the draft, namely the Abstract 
> and Sections 1, 1.2, 1.5, 2.5, 2.7, 3.9, 3.11, 6.3, and 8.15 (and other parts 
> of 8).


Perhaps I'm missing something basic that makes clear the value of this thread?

Hashing and re-hashing first principles of DKIM hardly seems useful, at this 
stage.  If someone has trouble understanding the specification, this forum is 
not intended for tutorials, particularly not tutorials that constantly repeat 
first principles.

d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to