[ietf-dkim] The URL to my paper describing the DKIM policy options
jon at callas.org
Fri Jul 28 15:00:45 PDT 2006
On 28 Jul 2006, at 12:12 PM, Scott Kitterman wrote:
> On Friday 28 July 2006 14:23, John Levine wrote:
>>> Yes and what is another customer of the ISP submits mail using my
>>> in virtually all cases today there is nothing to prevent that.
>> If you give your keys to untrustworthy third parties, all bets are
>> off. No amount of extra protocol goop is going to change that.
> Yes. Absolutely. I meant this to be a comment about pre-
> requisites, not
> something that could be solved in protocol.
Thanks for the clarification.
More information about the ietf-dkim