[ietf-dkim] Collection of use cases for SSP requirements
stephen.farrell at cs.tcd.ie
Mon Nov 13 14:00:30 PST 2006
Steve Atkins wrote:
> Well, I believe the list is wrong, however it isn't my list,
> it's the list in dkim-ssp-requirements-02.
> 4.1. Problem Scenario 1: All Mail Signed with DKIM
> 4.2. Problem Scenario 2: Illegitimate Domain Name Use
> 4.3. Problem Scenario 3: Domain Sends No Mail
Good. You have read the draft.
In that case I'm sure you'll agree that we can best
progress if we deal with what's in there and not with
some re-wording that (with this list on this topic),
amounts to starting over.
My problem is not with your or the draft's list. It is
with the endless wandering about in the wilderness that
this thread represents. (If it was a bit unfair to jump
on your message, then I'm sorry but I've now seen this
entire discussion fizzle out enough times that I'm not
very tolerant of it.)
I look forward to you raising an issue against the -02
draft saying how you'd like to fix section 4. Please do
that in a new thread.
More information about the ietf-dkim