This is a personal attempt at describing a two-stage sequence of producing DKIM capabilities, to permit the earliest possible deployment of a basic service,
This is a very well thought out plan.
I note though that it sites as features (a) the authentication of a DKIM identity and (b) the use of SSP to handle unsigned mail. There is also the issue of (c) the use of SSP to determine the types of DKIM identities that are acceptable. -- Arvel _______________________________________________ ietf-dkim mailing list http://dkim.org
