> The thing that I'm skeptical about is that an automaton can be > programmed > to do this sort of analysis with any sort of accuracy. We're talking > about > a potential flood of reports coming in, I assume, so I doubt we're > all going > to be putting out job reqs for "DKIM Signature Breakage Analysis > Engineer". > There were far too many breakages even with tools and hunches that > were very > difficult to figure out, and even then there were lots of mysteries. > > And of course, there's an open question about what you do with this > sort of > forensic data... it can be gamed, after all. So if there's any > advantage for > bad guys to game it, it probably will be.
I wasn't thinking of wide activation necessarily, it might be something that, eg, just MAAWG members and implementors might selective enable over an interop testing period. Mark. _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html
