Tony Hansen wrote:
I'm tempted to say: if the mailing list is going to do *anything* to the message other than act as a simple reflector, it *must* strip out any existing dkim signature. What it does after that is up to the mailing list.
This has been my view, too, but I'm starting to see some plausible benefit in at least permitting co-existence.
So, I still believe that the safest policy is the old list rule we established: you break it, you own it.
But recent discussions makes additional scenarios just too tantalizing to prohibit. (And too complex to pursue right now.)
d/ -- Dave Crocker Brandenburg InternetWorking <http://bbiw.net> _______________________________________________ ietf-dkim mailing list http://dkim.org
