[ietf-dkim] Proposal: Removal of AUID (i= tag/value)
John R. Levine
johnl at iecc.com
Mon Apr 11 08:53:34 PDT 2011
> 3. From = Alice at example.com i=mallet at example.com d=example.com.
> 3a. From = support at example.com i=alice at example.com d=example.com
How in the world in an automaton supposed to guess that 3. is bogus and
3a. is not?
A point that could use more emphasis is that effective use of DKIM
is essentially a collaboration between senders and receivers who don't
know each other except by the mail they exchange. The best strategy for a
sender is to figure out what its mail streams are, and put consistent
signatures on each stream, so receivers can most easily sort them. Rather
than trying to invent ever more complex ways for receivers to read
senders' minds, it would be more productive to provide advice to senders
so that it's not necessary.
John Levine, johnl at iecc.com, Primary Perpetrator of "The Internet for Dummies",
Please consider the environment before reading this e-mail. http://jl.ly
More information about the ietf-dkim