On Oct 21, 2010, at 11:01 AM, Steve Atkins wrote:
> On Oct 21, 2010, at 9:53 AM, Murray S. Kucherawy wrote:
>>
>>
>> Take a tour through the eleven parts of Section 7 of RFC5451, and then
>> Appendices A and C. They provide all kinds of warnings about
>> misinterpreting the data provided, whi
-1.
This is not a LAYER violation. DKIM is a protocol for RFC
822/2822/5322 data to:
a) verify a message signature, and/or
b) create a message signature.
In order to do either requires INPUT that MUST be valid for the
protocol to be fundamentally correct with its OUTPUT.
Therefore it
On Oct 21, 2010, at 9:53 AM, Murray S. Kucherawy wrote:
>
>
> Take a tour through the eleven parts of Section 7 of RFC5451, and then
> Appendices A and C. They provide all kinds of warnings about misinterpreting
> the data provided, which amounts to pretty firm implementation advice, and
> i
> -Original Message-
> From: John R. Levine [mailto:jo...@iecc.com]
> Sent: Thursday, October 21, 2010 9:07 AM
> To: Murray S. Kucherawy
> Cc: ietf-dkim@mipassoc.org
> Subject: More on layer violations
>
> Having pondered the layer thing some more, it occurs to me that we have
> several de
Having pondered the layer thing some more, it occurs to me that we have
several decades of practice with software that validates the format of
mail messages to a greater or lesser extent, with the emphasis on lesser.
Different software depends on different bits of the message to be correct,
whi