Okay, I've implemented the current spec, and extended it for sha256. But
it was done in such a way that I am still supporting sha1. I feel that
this proposed suggested change falls in the same category as moving from
sha1 to sha256, and should be treated the same way:

        Receivers MUST implement bodyhash= and b=
        Signers MUST implement bodyhash=
        Signers SHOULD use bodyhash=

We need to make sure that we understand the proposal thoroughly. Some of
the descriptions so far have been worded in a way that their meaning
could be misconstrued.

That's my 2c.

        Tony Hansen
        [EMAIL PROTECTED]

Barry Leiba wrote:
>>> It does not break current implementations though. As Murray and
>>> Arvel's implementations can attest.
>>
>> Again, I didn't say your "X=" broke anything. I said that it 
>> requires a change in the signer and verifier in order to detect 
>> which of the header or body broke the signature.
> 
> Well, but that's irrelevant. Mike's (correct) point is that if the 
> verifier doesn't care about the new information provided, the
> verifier doesn't have to change. With the proposal on the table, all
> verifiers would have to migrate.
> 
> I agree, though, that since the verifiers have to migrate anyway (to 
> SHA-256), I think this is a less-than-compelling reason not to do
> this.
> 
> The "slippery slope" reason is more compelling.

_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to