On Fri, 23 Oct 2009 16:54:52 -0700 Dave CROCKER <[email protected]> wrote:
>
>
>Jim Fenton wrote:
>> It's fairly easy to demonstrate interoperability of protocols, but
>> usefulness is much more difficult.  DKIM is an infrastructure protocol,
>> designed to provide a basis for other mechanisms, such as domain-based
>> reputation, to operate.  Those other mechanisms are as yet nascent; how
>> does one judge usefulness at this point?
>
>
>Jim,
>
>This appears to be imposing criteria that go considerably beyond the 
IETF's 
>requirements for Draft.
>
> From the standpoing of IESG process, how is this legitimate?

So is it your position that a protocol must be advanced if it meets a 
minimal set of criteria even in the face of engineering judgement that the 
protocol is not yet sufficiently deployed to have a reliable understanding 
of the adequacy of the current design?

Scott K
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to