Viktor Dukhovni:
> Though dkimpy-milter is likely the more future-proof choice, perhaps
> OpenDKIM is slightly more polished at present, be it also dated (
> lacking some of the newer algorithms).
> 
> For signing, lack of bleeding-edge algorithms is less important, so if
> you're not also validating, OpenDKIM would be sufficient.

The newer algorithm alluded to here is ed25519-sha256. OpenDKIM does
support this algorithm for both signing and verification. However,
signing configuration currently supports only one algorithm at a time,
so for double-signing using rsa-sha256 and ed25519-sha256 you have to
run two OpenDKIM instances.
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to