No matter which way you wish to preach this David, and ignore all comments, the protocol inconsistency issues in the WG documents are clearly present and make it very difficult to employ DKIM with any of the WG proposed methods.
Any current DKIM-CORE deployment cited is not used by itself but rather augmented with proprietary methods, special host to host arrangements and non-standard solutions. Resolving the inconsistency with the working WG documents would be much welcome. Ignoring it, just continue a status quo of lack of wide understanding and usefulness for DKIM from SMALL to LARGE MTAs. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html
