At 4:17 PM -0800 2/27/07, Jim Fenton wrote:
With a mechanism in SSP to specify the signature algorithms that
should be present, it is always necessary to consult SSP to find out
the list of required signature algorithms.
Why?!?! If one of the signatures is good, there is no need to do the
SSP lookup.
--Paul Hoffman, Director
--Domain Assurance Council
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html