At 10:48 AM -0800 2/28/07, Dave Crocker wrote:
It's probably worth noting that a catastrophe with a deployed
algorithm, so that a rapid transition is required, has no precedent
in the large-scale, open Internet, and probably would take
considerably more effort and mechanism than anything we are
discussing here.
Similarly, given that the failure would be in a signature algorithm,
the world will be much more concerned with forgeries of SSL
certificates, banking records, and weapons deployment codes than they
will of their email whitelists, regardless of what two or three
people on this list might think.
--Paul Hoffman, Director
--Domain Assurance Council
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html