> -----Original Message-----
> From: McDowell, Brett [mailto:[email protected]]
> Sent: Wednesday, January 12, 2011 10:39 AM
> To: Murray S. Kucherawy
> Cc: [email protected] WG
> Subject: Re: [ietf-dkim] RFC4871 interoperability conflict over "h= " tag
> 
> To summarize... a receiver should not fail a message simply because the
> sender has "h=sha1" in their DNS and "a=rsa-sha1" on their signatures,
> even though that particular configuration isn't exactly expected by an
> acutely accurate reader of the RFC.

If an "a=rsa-sha1" message matching a "h=sha1" key fails for reasons other than 
the usual things that cause a signature to fail (i.e. alteration in transit or 
mismatched keys), I'd say the verifier is doing something that looks a lot like 
breakage to me.



_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to