On Thu 10/Jul/2025 19:52:50 +0200 John Levine wrote:
When we added a new crypto algorithm we realized that you can only have one key per selector.I gather the plan is to allow multiple signatures in the same dkim2-signature header so the key records will need to allow that.


What is the purpose of this change?

I've been double-signing outgoing mail for a while. I did it to monitor the adoption of RFC 8463. When I saw that my ed25519 selector was routinely reported as not verified except by a scant, non-increasing number of domains, I stopped.

Maybe, among the grand changes introduced with DKIM2, the use of ed25519 could catch on.

But why multiple signatures? Is it to let verifiers choose what algorithm they prefer?


Best
Ale
--





_______________________________________________
Ietf-dkim mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to