On Fri, 24 Jun 2011 17:58:19 +0100, Dave CROCKER <[email protected]> wrote:


> Let's simplify this discussion:
>
>     Spammers do a variety of techniques to trick filters and users.
>
>     We should have the DKIM signing specification normatively require  
> checking
> for every known technique, since we cannot be sure that any other part  
> of the
> system will perform the necessary checks.

+100

But sadly the consensus of this WG was otherwise :-(

-- 
Charles H. Lindsey ---------At Home, doing my own thing------------------------
Tel: +44 161 436 6131                       
   Web: http://www.cs.man.ac.uk/~chl
Email: [email protected]      Snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9      Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to