A section may prove useful explaining how a new signature algorithm
should be rapidly deployed while also avoiding disruption. (Handling
a worst-case scenario.)
The issues to cover while assuming use of non-updated verifiers are:
1) Expectations of a domain's messages being signed, when new
algorithms are ignored.
2) Selection of a signature when more than one is available from the
same domain.
3) Differentiating between unimplemented and spoofed algorithms
during a transition phase.
-Doug
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html