On Jan 19, 2007, at 10:06 AM, <[EMAIL PROTECTED]> wrote:

I thought this was resolved via an expiration date x= flag. With this flag set a mua could certainly know whether a signature was still valid before attempting to verify it.

The critical element should be whether the message's signature had expired prior to delivery, which can be determined by checking when the message was received. This check could be made days later and yet safely used to abate abusive replay of messages. There is no need to rapidly remove valid keys and thereby make MUA verification precarious. Retaining public keys for a reasonable period would be a reasonable strategy. Implying that all checking must be done by the MTA fails miserably in efforts aimed at protecting recipients. DKIM is not only about ensuring the acceptance of bulk email by the MTA.

-Doug

_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to