--On Monday, September 24, 2012 22:51 +0100 Brian E Carpenter <brian.e.carpenter@xxxxxxxxx> wrote: >... > Some of the "violations" are "motivated by a desire to handle > legacy content". That seems to be in the IETF spirit of "Be > strict when sending and tolerant when receiving" for the sake > of backwards compatibility. Any of them that damage > interoperability and compatibility would be more worrisome. And some of it isn't. As just one example, opinions may differ about whether it is reasonable to impose restrictions on valid email addresses because some legacy implementations did a sloppy job, but one certainly cannot justify it on the basis of the Robustness Principle. john