On October 29, 2005 at 20:25, "Hector Santos" wrote: > I don't see the problem here. I'm thinking PROTOCOL LOGIC here. In other > words, what will it take to make it DKIM work.
I understand the protocol logic, and what you have written should be part of some DKIM-related document since domains will have to enact policies beyond signing and verification. I've been trying to emphasize things from the end-user perspective, not just the domain perspective, which I was more explicit in another post and not my OP for this thread. We can all come up with scenarios where a domain is justified in imposing an EXCLUSIVE policy. The problem is if EXCLUSIVE policy can be abused by domains that have a noticable negative effect on end-users and their ability to use email in certain, non-malicious, ways. As I have noted in a different post, email service providers could enable EXCLUSIVE. This is a risky business decision, but it is possibility, and with some providers having a large user base, there may business interests in favor of enabling EXCLUSIVE. I consider this a threat. A threat to end-users. A threat that DKIM has created where end-users may suddenly be restricted on the use of their email address or risk their messages from never getting delivered. --ewh _______________________________________________ ietf-dkim mailing list http://dkim.org
