Dave CROCKER wrote: > We need to be careful that we distinguish between scenarios that are > reasonable > to include in any mechanism that requires end-to-end perfection, versus other > legitimate scenarios that are not subject to such tight controls.
+1 It SHOULD|MUST also be reasonable to recognize and acknowledge the conflicts between the two introduced by subjective incomplete scenarios who are ignoring IETF written proposed draft standards that was specifically designed to protected against these subjective incomplete scenarios creating unreasonable and unexpected 3rd party signatures. The result - interoperability issues and unintentional victims. -- HLS _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html
