Re: [dmarc-ietf] Modeling MLM behavior

2014-10-07 Thread Hector Santos
Hi Stephen, The 2006 DSAP DKIM Signature Authorization Protocol draft concentrated on the process boundary conditions (possible values for 1st and 3rd party conditions). Section 4.2 summaries the boundary conditions: http://tools.ietf.org/html/draft-santos-dkim-dsap-00#section-4.2 4.2.

Re: [dmarc-ietf] Modeling MLM behavior

2014-10-07 Thread Hector Santos
But I am a commercial MLS producer and there are some considerations when you integrate it into the mail system. I think we covered most of the concepts over the years. But it is just lost in tons of verbiage and repeating it is just going to be as confusing. I suggest to summarize it in a

Re: [dmarc-ietf] Modeling MLM behavior

2014-10-07 Thread Stephen J. Turnbull
Hector Santos writes: http://tools.ietf.org/html/draft-santos-dkim-dsap-00#section-4.2 Thank you for the URL. In the following, I do not mean to discuss the concrete proposal as if it were WG business (I don't believe it is). I'm trying to understand what model of Internet mail system

Re: [dmarc-ietf] documenting x-original-from usage

2014-10-07 Thread Dave Crocker
On 10/7/2014 2:23 PM, Tim Draegen wrote: 'cause it would have taken longer to ask Dave to do it minutes vs. infinity, most probably. so yeah and thanks. d/ -- Dave Crocker Brandenburg InternetWorking bbiw.net ___ dmarc mailing list dmarc@ietf.org

Re: [dmarc-ietf] Modeling MLM behavior

2014-10-07 Thread Murray S. Kucherawy
On Tue, Oct 7, 2014 at 1:41 PM, Tim Draegen t...@eudaemon.net wrote: The intention is to have something in place -- the MLM model -- that can be used to quickly identify issues that are related to DMARC interoperability with any given piece of MLM software. I read Alessandro's model as a way