Arvel Hathcock wrote:
 > I guess the main argument for the MUST on sha-256 would be to
 > encourage moving away from sha-1 before there's much wider DKIM
 > deployment.
A MUST would more than encourage, it would require :)
Isn't SHA-1 sufficient since it (a) isn't broken (b) is the least 
computationally taxing (I assume) and (c) provides sufficient protection 
for our use (we aren't protecting files full of credit card numbers with 
DKIM).
Just a few data points:
1) sha-256 is about 55% the speed of sha-1  [*]
2) for smallish pieces of email, it's almost certainly the RSA overhead
   that dominates.
3) I've heard tell that it's often the case the MTA's are IO bound. I
   don't know how much this holds true these days on inbound MTA's
   doing scanning/filtering.
Overall, my suspicion is that Moore's law will make this inconsequental
before there's even an RFC number for DKIM.
                Mike
[*] http://www.eskimo.com/~weidai/benchmarks.html
_______________________________________________
NOTE WELL: This list operates according to 
http://dkim.org/ietf-list-rules.html