Hector Santos:
[ Charset UTF-8 unsupported, converting... ]
> 
> ----- Original Message -----
> From: "Mark Delany" <[EMAIL PROTECTED]>
> 
> 
> > It obvious that there are two relatively strong viewpoints: one the
> > passive that Dave describes and one the active that, amongst others, I
> > describe.
> >
> > ...
> >
> > Do we try and accommodate both? If so, how?
> 
> In my opinion,  and I had asked the chair a  week or so to consider this
> approach:
> 
> I also proposed a straw vote on the fundamental question:
> 
>        Do you believe there are security problems
>       directly or indirectly related to DKIM-BASE  that are worth
>       solving or addressing using a Sender Signer Policy concept?

None. If a message is signed by example.com, then that signature
introduces no security vulnerability, even if the message originates
from some other, unrelated, domain.

        Wietse
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to