> -----Original Message-----
> From: Dave CROCKER [mailto:d...@dcrocker.net]
> Sent: Wednesday, February 24, 2010 11:53 AM
> To: Murray S. Kucherawy
> Cc: Mark Delany; IETF DKIM WG
> Subject: Re: [ietf-dkim] Broken signature analysis
> 
> The previous interop event targeted basic, direct signing and
> validation.  My
> sense is that the interest now is extending utility, such as:
> 
>     1)  exploring interesting scenarios that seem to be causing
> failures.
> 
>     2)  perhaps exploring use of d= subdomains for differentially
> labeling
> different sub-streams
> 
>     3)  exploring the use of multiple signatures

Now you're talking.  And throw re-signing by lists in there as well.  Oh, and 
signing A-R header fields during relaying.


_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to