On 10/25/2010 8:16 AM, Ian Eiloart wrote:
Actually, my verifier produces two bits: one for the headers, and one for
the body. In terms of authentication, that might not mean much. It is
useful for debugging, though.
We need to be careful to distinguish between software and protocol.
Software is free to do whatever it wants.
The DKIM Signing specification, however, deals with constrained, standardized
behavior.
d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html