> Please refer to Section 3.3 for a discussion of the hash algorithms > implemented by Signers and Verifiers. Which algorithms are listed > in h= is an operational choice made by the sender.
Mr Nit Picker suggests: Refer to Section 3.3 for a discussion of the hash algorithms implemented by Signers and Verifiers. The algorithms listed in h= in each record is an operational choice made by the sender. Regards, John Levine, jo...@iecc.com, Primary Perpetrator of "The Internet for Dummies", Please consider the environment before reading this e-mail. http://jl.ly _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html