----- Original Message -----
From: "Dave Crocker" <[EMAIL PROTECTED]>
To: "Eliot Lear" <[EMAIL PROTECTED]>
Cc: "Ned Freed" <[EMAIL PROTECTED]>; <[email protected]>
> However I think the model for the spec language is clear:
>
> A validator MUST support {SHA-1, SHA-256}.
> A signer SHOULD use {SHA-256}.
>
> We can, of course, add discussion about the trade-offs. This might
> lead to the somewhat unusual alternative for signer language,
> along the lines of:
>
> A signer MAY use {SHA-1} for its lower overhead, in spite of
> potentially reduced security strength. A signer SHOULD use
> {SHA-256} for its higher security strength.
>
> Ok, folks. What have I missed?
Nothing in my view. Since it is a rehash of what I posted this morning:
http://mipassoc.org/pipermail/ietf-dkim/2006q1/002305.html
I agree with this. I don't understand why it would be unusual. It follows
Postel's Law:
"Be conservative in what you send, liberal in what you receive."
and IMO, its not really a question of algorithm by the level of strength one
wishes to use.
If one alternative change the above is done, I would probably say:
A signer HAS the option of using {SHA1, SHA-256} depending
on the strength it chooses to sign mail with. The signer
SHOULD use the highest strength when all possible.
Someone should make a note that a Migration clarification and insight
related this topic will be required.
Also, a possible solution:
- Signer/Validator Capability "Handshake" Logic
A validator can define a SSP-like DNS policy that defines the capabilities
of the validator.
Signers can then have the ability (based on advanced implementation) to
pre-examine a target to see what strength it supports. This will only work
for a direct transaction (1 to 1, not 1 to many). But it allows for a
client/server "capability handshake" so to speak.
--
Hector Santos, Santronics Software, Inc.
http://www.santronics.com
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html