-----Original Message-----
From: McDowell, Brett [mailto:bmcdowell(_at_)paypal-inc(_dot_)com]
Sent: Wednesday, January 12, 2011 10:39 AM
To: Murray S. Kucherawy
Cc: ietf-dkim(_at_)mipassoc(_dot_)org WG
Subject: Re: [ietf-dkim] RFC4871 interoperability conflict over "h= " tag
To summarize... a receiver should not fail a message simply because the
sender has "h=sha1" in their DNS and "a=rsa-sha1" on their signatures,
even though that particular configuration isn't exactly expected by an
acutely accurate reader of the RFC.
If an "a=rsa-sha1" message matching a "h=sha1" key fails for reasons other than
the usual things that cause a signature to fail (i.e. alteration in transit or
mismatched keys), I'd say the verifier is doing something that looks a lot like
breakage to me.
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html