Echoing the views of Bron, Richard and John, I support the adoption of this document on the proviso that earlier adopted documents which this supersedes are withdrawn.

All technical objections remain.

Regards,
R. Latimer

On 10/03/2026 8:32 am, Murray Kucherawy via Datatracker wrote:
This message starts a dkim WG Call for Adoption of:
draft-clayton-dkim2-spec-08

This Working Group Call for Adoption ends on 2026-03-16

Abstract:
    DomainKeys Identified Mail v2 (DKIM2) permits a person, role, or
    organization that owns a signing domain to document that it has
    handled an email message by associating their domain with the
    message.  This is achieved by providing a hash value that has been
    calculated on the current contents of the message and then applying a
    cryptographic signature that covers the hash values and other details
    about the transmission of the message.  Verification is performed by
    querying an entry within the signing domain's DNS space to retrieve
    an appropriate public key.  As a message is transferred from author
    to recipient systems that alter the body or header fields will
    provide details of their changes and calculate new hash values.
    Further signatures will be added to provide a validatable "chain".
    This permits validators to identify the nature of changes made by
    intermediaries and apply a reputation to the systems that made
    changed.  DKIM2 also allows recipients to detect when messages have
    been unexpectedly "replayed" and will ensure that Delivery Status
    Notifications are only sent to entities that were involved in the
    transmission of a message.

Please reply to this message and indicate whether or not you support adoption
of this Internet-Draft by the dkim WG. Comments to explain your preference
are greatly appreciated. Please reply to all recipients of this message and
include this message in your response.

Authors, and WG participants in general, are reminded of the Intellectual
Property Rights (IPR) disclosure obligations described in BCP 79 [2].
Appropriate IPR disclosures required for full conformance with the provisions
of BCP 78 [1] and BCP 79 [2] must be filed, if you are aware of any.
Sanctions available for application to violators of IETF IPR Policy can be
found at [3].

Thank you.
[1] https://datatracker.ietf.org/doc/bcp78/
[2] https://datatracker.ietf.org/doc/bcp79/
[3] https://datatracker.ietf.org/doc/rfc6701/

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-clayton-dkim2-spec/

There is also an HTMLized version available at:
https://datatracker.ietf.org/doc/html/draft-clayton-dkim2-spec-08

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-clayton-dkim2-spec-08

_______________________________________________
Ietf-dkim mailing list -- [email protected]
To unsubscribe send an email to [email protected]

_______________________________________________
Ietf-dkim mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to