Hector Santos wrote:
What I said (http://mipassoc.org/pipermail/ietf-dkim/2005q4/001242.html) was:----- Original Message ----- From: "Jim Fenton" <[EMAIL PROTECTED]> I really like Hector's table, and the terminology he has introduced to make it easier to talk about the SSP policies. I think we still need to talk through the specifics of the table once we get chartered, as there will be some disagreement over the content of specific cells. For example, I'm not convinced of the utility of the "weak" policy. But that's good stuff to address once we get chartered.So I don't think I'm contradicting myself, and I don't think we need to work out the details for the -threats document, which is our current focus.
This aligns with my view of SSP, and the non-requirement to consult SSP
if there is a valid originator address signature.-Jim |
_______________________________________________ ietf-dkim mailing list http://dkim.org
