On 08/Feb/12 07:42, Murray S. Kucherawy wrote: > > Still in WGLC until Friday. Have at it.
*Abstract* The abstract says "end users can use these methods", which may be somewhat misleading. How about "and conceivably even end users", or equivalent English text? *Generating and Handling Unsolicited Abuse Reports* I'd suggest the leading paragraph be more similar to that of Section 9, instead of: The following advice is offered for the case of reports that are not solicited: For example: There are cases where no sending parties have requested reports, possibly because they did not know how to apply, or didn't care. *Generating Automatic Authentication Failure Reports* Barry's advice on numbering is missing. Paragraph 2 seems to be overly restrictive. IMHO, it suffices to say that the report "MUST NOT be sent automatically". That way, a generator can still produce its data for local debugging or manual forwarding. I'm unable to understand the first sentence of paragraph 3. Reports have to be new messages irrespectively of whether the original message was accepted or rejected. _______________________________________________ marf mailing list [email protected] https://www.ietf.org/mailman/listinfo/marf
