Viktor Dukhovni: > Though dkimpy-milter is likely the more future-proof choice, perhaps > OpenDKIM is slightly more polished at present, be it also dated ( > lacking some of the newer algorithms). > > For signing, lack of bleeding-edge algorithms is less important, so if > you're not also validating, OpenDKIM would be sufficient.
The newer algorithm alluded to here is ed25519-sha256. OpenDKIM does support this algorithm for both signing and verification. However, signing configuration currently supports only one algorithm at a time, so for double-signing using rsa-sha256 and ed25519-sha256 you have to run two OpenDKIM instances. _______________________________________________ Postfix-users mailing list -- postfix-users@postfix.org To unsubscribe send an email to postfix-users-le...@postfix.org