> -----Original Message----- > From: Dave CROCKER [mailto:d...@dcrocker.net] > Sent: Wednesday, February 24, 2010 11:53 AM > To: Murray S. Kucherawy > Cc: Mark Delany; IETF DKIM WG > Subject: Re: [ietf-dkim] Broken signature analysis > > The previous interop event targeted basic, direct signing and > validation. My > sense is that the interest now is extending utility, such as: > > 1) exploring interesting scenarios that seem to be causing > failures. > > 2) perhaps exploring use of d= subdomains for differentially > labeling > different sub-streams > > 3) exploring the use of multiple signatures
Now you're talking. And throw re-signing by lists in there as well. Oh, and signing A-R header fields during relaying. _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html