Also, we'll get them to switch to ed25519 at the same time.

I have a hard time believing that all the libraries focusing on DKIMv1 will go 
back and create some code to handle this case.  It's better to create a proper 
delineation.  If the header string doesn't match, we don't have to worry about 
how it might handle deviation from what it believes should be happening.

-- 
Alex Brotman
Sr. Engineer, Anti-Abuse & Messaging Policy
Comcast
 

> -----Original Message-----
> From: Taavi Eomäe <taavi=40zone...@dmarc.ietf.org>
> Sent: Monday, March 31, 2025 5:54 AM
> To: Alessandro Vesely <ves...@tana.it>; ietf-dkim@ietf.org
> Subject: [Ietf-dkim] Re: On the rationale for a new protocol (from the 
> meeting)
> 
> On 31/03/2025 11:55, Alessandro Vesely wrote:
> > If we don't change the canonicalizations, a DKIM1 verifier will be
> > able to verify a DKIM2 signature, limited to DKIM1 semantics. A
> > successful verification still adds something to the properties of a
> > message.
> 
> And as mentioned in some other thread I can't find right now. Keeping the same
> header and incrementing the version will also allow DKIM-aware software to
> remove DKIM(v2) signatures that they know that they'll break, for example
> mailing list milters.
> 
> I can't predict however which is better, missing or broken DKIMv2 signatures.

_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to