> The goal is to ensure when there are two signatures added to the
> message, an attacker does not toss out the stronger signature in order
> to exploit the weaker signature added within a transition period.
I think that we should leave this to the verifier.  If the verifier is 
uncomfortable accepting a "weaker" signature then by all means let the 
verifier stop doing so.  Is there a problem with that approach that I 
can't see?
--
Arvel
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html