Douglas Otis wrote:
Sorry, I still don't understand what the purpose or impact of this
attack is. Can you explain?
An attack may be enabled by replaying a message compromised due to a
weak hash, key, or canonicalization algorithm.
You didn't answer his question (or, by derivation, mine.)
d/
--
Dave Crocker
Brandenburg InternetWorking
<http://bbiw.net>
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html