John wants to know how a 2nd signature could invalid an already valid
message. This is really based on a "Good Citizen" model where everything is
done correctly.
Actually, it's based on the model in draft-ietf-dkim-base-04.txt.
As always, concrete scenarios would be a great help to understand the
problems you believe exist. In particular, a concrete example of a second
signature invalidating a message without breaking the first signature
would be extremely useful since it would point out a major flaw in
dkim-base that nobody else is aware of.
Regards,
John Levine, johnl(_at_)iecc(_dot_)com, Primary Perpetrator of "The Internet for
Dummies",
Information Superhighwayman wanna-be, http://johnlevine.com, Mayor
"I dropped the toothpaste", said Tom, crestfallenly.
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html