So, you wish to specify that a security validation step rely on a heuristic?

  I have already said that I'm not in favor of "specifying" this.
  "Acceptable" is left as an exercise for the reader.

The question is about validation robustness against change, and about the contents of DKIM specifications, to deal with this question.

I do not understand the benefit of leaving such a major issue un-specified within normative text, particularly when you seem to be relying on the unspecified behavior to resolve the matter.

d/

--

Dave Crocker
Brandenburg InternetWorking
<http://bbiw.net>
_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to