Issues with HTTP
DIME was defined as the transmission format at the data link layer in the OSI model although it was typically transmitted over HTTP. One difficulty here was that it could form an HTTP message of essentially any size (the limit being the size information for each chunk, which was 32 bits so 1 gigabit). Many HTTP receivers were not used to messages as large as this, and if they buffered messages would simply fail, due to the fact that the software expected a short message, but instead received a long one. Moreover, if the HTTP receiver was secured, it would, send back a challenge message (400 code) to the sender upon receiving the message. Because HTTP is connectionless, it would then entirely lose the possibly huge amount of data that had been sent to it, just to accept or deny the challenge. The response to the challenge could of course succeed, at the expense of sending the data twice, which if it were huge rather defeats its point.
In the alternate solution, the criteria for a successful challenge (e.g. a username and password) is established out-of-band, so it can be sent with the message the first time and not receive a challenge (the by-product of the connectionless HTTP protocol being that since each message is treated individual, any message must be able successfully to include its challenge response).
DIME was extremely fast compared to practical applications of other protocols. Because the data was binary rather than, say, Base64 encoded, it was relatively compact, and the chunking and packet methods built into the protocol meant it could be streamed and read by a suitable receiver before the whole message had been read.
Issues at the Network Layer
Because DIME was defined at the data link layer, it was possible to encapsulate a DIME message in another DIME message. This would not help at all for compression purposes but was occasionally useful to bypass networking infrastructure such as routers at the network layer of the OS model, which would otherwise block the encapsulated traffic (being binary they may treat it with suspicion). That being said, other protocols such as MIME may equally suffer such. Since DIME was generally used between well-trusted clients, a specific port could be opened at the router for the express purpose of sending and receiving DIME traffic. This did not subvert the security aspects, since the challenge would still occur, merely that it accepted that binary traffic was the norm on that port, and did not give numerous false positives.
Nielsen, Henrik; Sanders, Henry; Christensen, Eric D.; Huitema, Christian (July 2002). "draft-nielsen-dime-00 Direct Internet Message Encapsulation (DIME)". Retrieved 2021-02-11. https://tools.ietf.org/html/draft-nielsen-dime-00 ↩
Nielsen, Henrik; Sanders, Henry; Christensen, Eric D.; Huitema, Christian (July 2002). "draft-nielsen-dime-02 Direct Internet Message Encapsulation (DIME)". Retrieved 2021-02-11. https://tools.ietf.org/html/draft-nielsen-dime-02 ↩
Salz, Rich (2003-12-12). "Re: Where can I find out about the current status of DIME". Archived from the original on 2007-09-27. Retrieved 2006-10-31. /wiki/Rich_Salz ↩
"Messaging Specifications Index Page". Microsoft. Archived from the original on 2011-06-06. Retrieved 2006-10-31. https://web.archive.org/web/20110606142343/http://msdn.microsoft.com/en-us/library/ms951268.aspx ↩
"Technical documentation". http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnservice/html/service01152002.asp ↩