> -----Original Message----- > From: McDowell, Brett [mailto:[email protected]] > Sent: Wednesday, January 12, 2011 10:39 AM > To: Murray S. Kucherawy > Cc: [email protected] WG > Subject: Re: [ietf-dkim] RFC4871 interoperability conflict over "h= " tag > > To summarize... a receiver should not fail a message simply because the > sender has "h=sha1" in their DNS and "a=rsa-sha1" on their signatures, > even though that particular configuration isn't exactly expected by an > acutely accurate reader of the RFC.
If an "a=rsa-sha1" message matching a "h=sha1" key fails for reasons other than the usual things that cause a signature to fail (i.e. alteration in transit or mismatched keys), I'd say the verifier is doing something that looks a lot like breakage to me. _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html
