----- Original Message -----
From: <Bill(_dot_)Oxley(_at_)cox(_dot_)com>
2. If the query for the public key fails to respond, the verifier
SHOULD defer acceptance of this email. Verifiers SHOULD track
continuous errors and SHOULD eventually accept the message
object after a number of tries.
If the query for the public key fails to respond, the verifier
SHOULD defer acceptance of this email. Verifiers MAY track
continuous errors and determine the message has a broken signature.
Bill,
Isn't it always the case, the signature always broken (or non-verifiable) in
step 2?
PS: The above step I wrote was basically something it should not say. I view
that as a loophole bad actors will exploit.
--
Hector Santos, Santronics Software, Inc.
http://www.santronics.com
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html