>The idea is to anticipate any unknown signature breaker. I'm pretty sure that's specifically out of scope.
And I promise that whatever you do, short of wrapping the whole message in opaque armor, I can come up with something that will break it. Regards, John Levine, jo...@iecc.com, Primary Perpetrator of "The Internet for Dummies", Please consider the environment before reading this e-mail. http://jl.ly _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html