On Dec 8, 2006, at 7:05 AM, <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> wrote:

Slight disagreement
" No. AIUI DKIM is supposed to operate mainly between the 1st MTA after the sending MUA and the last MTA before the receiving MUA (though smarter MUAs that sign their own, or verify their own are welcome to try)."

I would suggest that DKIM operates between the signing MTA and the edge boundary MTA of the receiving domain that is the certifier of DKIM signatures which may be a smart MUA but is more likely a filtering MTA at the ISP.

Signing is not limited to the MTA, it can be done at the MUA. In addition, protections afforded by DKIM requires the MUA to verify signatures or obtain trustworthy signaling from the MDA. Blocking at the MTA can not offer adequate protection. It would be wrong to expect blocking at the MTA via restrictive policy produces a significant effect on the level of abuse. Blocking via policy definitely does _not_ offer much in the way of protection, but will require a significant level of support explaining why various messages are being rejected.

-Doug
_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to