Please confine future comments about the beta releases to the beta list.

On Mon, 6 Aug 2007, Mark Martinec wrote:
> Why burdening senders with a SSP query when originator signature 
> verifies???

I used slightly too broad a stroke in describing this.  The case I need to 
cover in particular is unsigned messages, which weren't covered in the 
previous code.  We need to be able to tell if an unsigned message 
should have been signed.

Before that it was applying DomainKeys logic which stipulated that you 
would only go to a policy lookup when a message failed verification.

Also, the fact that I do an SSP evaluation (i.e. call the dkim_policy() 
function) doesn't always result in a DNS query.  To wit, step one of the 
algorithm laid out in section 4.4 of the draft says:

    1.  If a valid Originator Signature exists, the message is non-
        Suspicious, and the algorithm terminates.

There's no DNS involved in that test so running the algorithm on all 
messages, even those that succeed, is not a burden to the sender.

-MSK

-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >>  http://get.splunk.com/
_______________________________________________
dkim-milter-discuss mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/dkim-milter-discuss

Reply via email to