> The goal is to ensure when there are two signatures added to the
> message, an attacker does not toss out the stronger signature in order
> to exploit the weaker signature added within a transition period.
I think that we should leave this to the verifier. If the verifier is
uncomfortable accepting a "weaker" signature then by all means let the
verifier stop doing so. Is there a problem with that approach that I
can't see?
--
Arvel
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html