On 9/7/2014 8:02 AM, Eliot Lear wrote: > Let's talk constraints for a moment. Does the problem get easier if we > say, “let's not even attempt to address transactional email”, and focus > exclusively on h2h? Also, is it a goal to completely do away with > spam? Is that a non-goal?
Eliot, I've no idea what characteristics of 'transactional mail' -- as compared with... personal mail, or ? -- worth distinguishing. So while it's a category that is often interesting to distinguish in email security and abuse discussions, what do you have in mind here, exactly? MTA-to-MTA (or, rather, Boundary MTA to Boundary MTA) is almost certainly an interesting distinction from author to recipient. For example, that's why DKIM has succeeded at Internet scale, where PGP and S/MIME have not. But we need to be clear about what benefits it gets us and what it doesn't. If, for example, one is worried about their email operator being compelled to produce keys for decrypting user mail... d/ -- Dave Crocker Brandenburg InternetWorking bbiw.net _______________________________________________ Endymail mailing list [email protected] https://www.ietf.org/mailman/listinfo/endymail
