> The thing that I'm skeptical about is that an automaton can be  
> programmed
> to do this sort of analysis with any sort of accuracy. We're talking  
> about
> a potential flood of reports coming in, I assume, so I doubt we're  
> all going
> to be putting out job reqs for "DKIM Signature Breakage Analysis  
> Engineer".
> There were far too many breakages even with tools and hunches that  
> were very
> difficult to figure out, and even then there were lots of mysteries.
>
> And of course, there's an open question about what you do with this  
> sort of
> forensic data... it can be gamed, after all. So if there's any  
> advantage for
> bad guys to game it, it probably will be.

I wasn't thinking of wide activation necessarily, it might be  
something that, eg, just MAAWG members and implementors might  
selective enable over an interop testing period.


Mark.

_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to