[ietf-dkim] 5 outstanding issues with the threat review
leiba at watson.ibm.com
Wed Mar 15 11:04:56 PST 2006
> That's more of an issue of SSP, right? It's with SSP that you'd
> like to subdivide the policy
Mm, I see your point, but I don't know that we want SSP changing the key
record, and that's where I'm thinking this would go ("This key is used
for Really Serious Stuff"; "This key is used for Frivolous User Stuff").
I'm not sure how to move that to SSP.
Barry Leiba, Pervasive Computing Technology (leiba at watson.ibm.com)
More information about the ietf-dkim