On Fri, 24 Jun 2011 17:58:19 +0100, Dave CROCKER <[email protected]> wrote:
> Let's simplify this discussion: > > Spammers do a variety of techniques to trick filters and users. > > We should have the DKIM signing specification normatively require > checking > for every known technique, since we cannot be sure that any other part > of the > system will perform the necessary checks. +100 But sadly the consensus of this WG was otherwise :-( -- Charles H. Lindsey ---------At Home, doing my own thing------------------------ Tel: +44 161 436 6131 Web: http://www.cs.man.ac.uk/~chl Email: [email protected] Snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K. PGP: 2C15F1A9 Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5 _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html
