Charles Lindsey:
> That was quite some time ago, so to refresh your memories, I had been  
> claiming that DKIM-base would fail to verify if some message had its  
> Content-Transfer-Encoding changed en route, and that it proposed to get  
> around this by saying that all messages SHOULD be sent as 7bit, or encoded  
> into 7bit. In these days when 8BITMIME is now almost universally supported  
> and widely used (with BINARYMIME coming along as well), that seemed to be  
> a very backward step. So I proposed a canonicalization that would reverse  
> all those encodings before hashing.
...
> So it was an issue of whether such a canonicalization really would be  
> "orders of magnitude more complicated". Anyway, I have been working off  
> and on on this since then, and I have written a demonstration  
> implementation, as promised, of what it would take, which you can find at  
> <http://www.cs.man.ac.uk/~chl/uncode/uncode.html>.
> 
> It is less that 140 lines of Perl (excluding comments and empty lines).  
> Hardly any "orders of magnitude" in evidence there.

Actually, it's 128 lines. But that's a minor detail.

With real production MTAs such as Sendmail and Postfix, the MIME
processor takes about 900 lines of C code (sans comments, formatted
in the K&R coding style). That's 900 lines of opportunity for error.

My concern is about interoperabilitity.  With the present design,
senders and recipients who exchange QP or Base64 content only need
bug-compatible MIME processors in their respective MUAs.

When DKIM signers and verifiers are requird to up-convert QP or
Base64 content before computing signatures, we also require that
all DKIM signers and verifiers have bug-compatible MIME processors.
That is, bug-compatible with every MUA.

Introducing this extra requirement is unlikely to help with the
successful adoption of DKIM.

        Wietse
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to