Resolved issues

Bernie Hoeneisen 3 years ago
parent 7614a24b6b
commit c8f81a6a61

@ -206,8 +206,8 @@ determined by the IETF LAMPS WG.
Header Fields are added by intermediary nodes).
* Receiving User Facing Message (RUFM): The message used for rendering
at the receiving side after the Outer Message Header Section has
been merged with the Inner Message Header Section.
at the receiving side. Typically this is the same as the Inner
* Essential Header Fields (EHF): The minimum set of Header Fields an
Outer Message Header Section SHOULD contain; cf. {{outer-msg-hf}}.
@ -629,7 +629,7 @@ Fields MAY be obfuscated. Further Header Fields MAY be obfuscated,
though simply not adding those to the Outer Message Header SHOULD be
prefered over obfuscation. Header Field obfuscation is further
specified in {{obfuscation-outer-HF}}. Header Fields not obfuscated
MUST contain the same values as in the Original Message.
should contain the same values as in the Original Message.
The MIME Header Section part is the collection of MIME Header Fields
describing the following MIME structure as defined in {{RFC2045}}.
@ -708,6 +708,11 @@ Note: It is for further study to what extent Header Field obfuscation
### Receiving User Facing Message Header Fields {#rufm-hf}
The Receiving User Facing Message SHOULD be a verbatim copy of the
Inner Message.
<!-- Alternative
The Receiving User Facing Message is constructed as follows:
* The Header Section of the Receiving User Facing Message MUST consist
@ -731,7 +736,7 @@ So I think this is just a long way of saying that no extra text is needed here,
unless you want the document to explain the above.
### Header Field Flow
@ -943,11 +948,8 @@ header field may appear in up to three different variants:
usually contains the Bcc unchanged from the original message,
i.e. with all recipient addresses.
Alexey: while this is true, people still need to use the form 3 (for example).
So I would rather just talk about when it is appropriate to use which form.
The most privacy preserving is to standardize 2a, as in the other
The most privacy preserving of the alternatives (2a, 2b, and 2c)
is to standardize 2a, as in the other
cases (2b and 2c) information about hidden recipients is revealed via
keys. In any case the message has to be cloned and adjusted depending
on the recipient.