>> Senders which would like to prevent phishing might want to avoid >> third party signatures.
Only if they deeply fail to understand what DKIM does. I agree this has no place in a deployment document. R's, John _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html
