I've always thought that the likelihood of a protocol level solution for this issue is pretty close to zero if not zero. The various proposed solutions in the problem draft haven't given me any reason to dissuade me of that notion.

That said, I think that we might be able to catalog some clues that something is suspicious which taken with many other clues can be used to by a receiver to make an ultimate decision of spamminess. A good example is the unsigned To: and Subject: lines. Even if it's strictly allowed by the spec, that doesn't mean it's not suspect. It could be really useful to collect this clues as input signals to a larger preponderance of evidence.

Mike

_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to