On Mar 1, 2007, at 3:07 PM, Arvel Hathcock wrote:

The folks supporting to list used algorithms in the SSP apparently think that receivers could care about this nuance.

In my view, they won't care. They can't care. In fact, they *dare not* care. Knowing that a signature "might have verified if only I knew how to do so" is worthless from a practical perspective.

1) When a signer offers multiple signatures, the verifier should select their preferred signature.

2) When a signer indicates that an algorithm within the a signature has been deprecated, then the verifier should expect the specified signature to be available.

3) When the specified alternative signature does not exist, the deprecated signature should be considered invalid.

Verifiers desiring the strongest protection should be able to detect when an optional signature has been removed. This protection ensures a graceful transition regardless of the severity of the possible threat. Ensuring a graceful transition is a practical consideration. Dare to care.

-Doug



_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to