>> Senders which would like to prevent phishing might want to avoid 
>> third party signatures. 

Only if they deeply fail to understand what DKIM does.  I agree this
has no place in a deployment document.

R's,
John
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to