On 6/10/2025 1:14 PM, Dave Crocker wrote:
This means you have done the affirmative work of trying to consider
various legitimate vs. illegitimate scenarios. Please document those
analyses.
It is typical for those making assertions of what is true to carry the
initial burden of demonstrating the basis for their claims. Simple
assertions of faith in the truth does not typically carry any force.
Let me cast this in a different way:
There is a proposal for a new set of technical capabilities. In this
case, they will affect the entire global email infrastructure.
As is almost always true, the advocates are enthusiastic.
But for everyone else, the question is how they can do a cost-benefit
analysis, beyond taking the word of advocates.
In other words, they typically have questions like:
How will this work in practice?
How does that provide the claimed benefits? (Note this is 'how' and
not 'whether'.)
How will this avoid doing damage, such as false positives?
Of the range of abuses, what does this cover and what does it not cover?
And so on.
All of these are mundane, due diligence questions. Nothing... exotic...
about any of them.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
bluesky: @dcrocker.bsky.social
mast: @dcrocker@mastodon.social
_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org