It appears that Richard Clayton  <[email protected]> said:
>People processing DKIM1 tag-value lists should read the DKIM1
>specification, people processing DKIM2 tag-value lists should read the
>DKIM2 specification ... I don't see any confliction there.
>
>If people wish to use the same code for both then they will need to
>concentrate for a few moments to see if this is wise ...  

Right. The validation process is entirely different. For DKIM1, you look at each
signature separately and return a pass/fail result for each one, with no
relation among multiple signatures. For DKIM2 you look at all the signatures as
a chain and return one result, either the chain is valid or it isn't, perhaps
with some annotations about how the message changed along the way.

You could scavenge some code for things like the key parsing and the body hash
that haven't changed, but the overall work to be done is quite different.

R's,
John

_______________________________________________
Ietf-dkim mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to