> -----Original Message-----
> From: [email protected] [mailto:[email protected]] 
> On Behalf Of Alessandro Vesely
> Sent: Friday, May 27, 2011 10:09 AM
> To: [email protected]
> Subject: Re: [ietf-dkim] New canonicalizations
> 
> By introducing a loose canonicalization we may learn whether signature
> survivability affects DKIM adoption.  If wider usage introduces
> attacks, we can switch back to current canonicalizations --in case
> downgrades will have gone away-- or design yet another one,
> approaching just the tightness we need.  My appeal is for not imposing
> monotonicity to successive approximations, and allow erring on the
> too-lose side as well.

So what, for example, would you do differently?  The unfortunate thing about 
the way the crypto works is that you get a failure, but you don't know for sure 
what changed other than "it was in the header" or "it was in the body".  "z=" 
sometimes gives you details about the former but it's not in widespread use.

I'm all for including experimental code in future releases of our stuff, 
especially if it's an experiment other implementations are trying.  But I need 
to see a spec first, or enough detail that I could write one.


_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to