I would (using the singular I) ignore any i/d comparisons or usage as a valid signature represents a dkim=passed part of any rules engine. This may be coupled with a subset of adsp requests to drop non signed or malformed signatures. Otherwise its just one cog in a rule based asav system. thanks,
Bill Oxley Messaging Engineer Cox Communications, Inc 404-847-6397 -----Original Message----- From: [email protected] on behalf of Al Iverson Sent: Fri 1/30/2009 12:32 PM To: [email protected] Cc: DKIM IETF WG Subject: Re: [ietf-dkim] dkim usage examples Not bad questions, but ones that I don't really have answers for. I could tell you what I *want* out of authentication, but that leads us to things like *cough* disposition instructions for bad mail and things like ADSP. Instead of going there, I'd like to learn more about how what is more or less nearing consensus, and how it is actually desired to be used by ISPs. Al On Fri, Jan 30, 2009 at 11:26 AM, Dave CROCKER <[email protected]> wrote: > Perhaps it can help to turn this around, and make the technical details be > derivative of functional need. > > That is: What kinds of questions and answers would signer and assessor like > to share, which DKIM could help with? What kinds of roles and analyses > would be good to facilitate? > > d/ > > Al Iverson wrote: >> >> On Fri, Jan 30, 2009 at 10:55 AM, Dave CROCKER <[email protected]> wrote: >>> >>> Al Iverson wrote: >>>> >>>> Also, I wish somebody smarter than me would take a >>>> shot at a PPT for dummies like me, showing a few examples of how a >>>> receiver would like to use DKIM. >>> >>> Can you describe particular usage examples you would like to see >>> explained? >>> >>> I'm not asking you to give the details, but rather describe what the >>> details >>> should explain. >> >> Off the top of my head... >> . >> Use cases for i= and d=, and what an ISP would care to do with that >> data, if they could do anything they wanted to. >> >> What the restrictions are on i= and d= (and other fields/configuration >> options I might not be thinking of). What has to match the PRA, if >> anything, what can contain a sub-level identifier, etc. >> >> Best, >> Al >> > > -- > > Dave Crocker > Brandenburg InternetWorking > bbiw.net > -- Al Iverson on Spam and Deliverability, see http://www.spamresource.com News, stats, info, and commentary on blacklists: http://www.dnsbl.com My personal website: http://www.aliverson.com -- Chicago, IL, USA _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html
