ietf-dkim
[Top] [All Lists]

[ietf-dkim] Re: Core algorithm support/use, draft text v2

2006-02-25 15:27:30
Dave Crocker wrote:

    A validator MUST support {SHA-1, SHA-256}.

+1
 
    A signer MUST support {SHA-1, SHA-26}.

IMHO unnecessary, "SHOULD use SHA-256" and "MAY use SHA-1"
are good enough as you have it here:

A signer SHOULD use {SHA-256} for its higher security
strength. However a signer MAY use {SHA-1}, such as for
compatibility with an installed base, lower computational
cost, or easier implementation effort.

All fine, but IIRC Stephen's concern was about the future
transition to another constellation when SHA-1 met Mr. Bond.

To emulate this, what would you say about CRC32 today ?  Is
that "SHOULD NOT accept" and "MUST NOT generate" ?  Or take
MD5 if CRC32 is too simple.
                              Bye, Frank


_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html