On 08/Feb/12 07:42, Murray S. Kucherawy wrote:
> 
> Still in WGLC until Friday.  Have at it.

*Abstract*

The abstract says "end users can use these methods", which may be
somewhat misleading.  How about "and conceivably even end users", or
equivalent English text?

*Generating and Handling Unsolicited Abuse Reports*

I'd suggest the leading paragraph be more similar to that of Section
9, instead of:

 The following advice is offered for the case of reports that are not
 solicited:

For example:

 There are cases where no sending parties have requested reports,
 possibly because they did not know how to apply, or didn't care.

*Generating Automatic Authentication Failure Reports*

Barry's advice on numbering is missing.

Paragraph 2 seems to be overly restrictive.  IMHO, it suffices to say
that the report "MUST NOT be sent automatically".  That way, a
generator can still produce its data for local debugging or manual
forwarding.

I'm unable to understand the first sentence of paragraph 3.  Reports
have to be new messages irrespectively of whether the original message
was accepted or rejected.

_______________________________________________
marf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/marf

Reply via email to