[ietf-dkim] base-02: Normative order of verification
eric at neophilic.com
Thu Jun 1 07:34:31 PDT 2006
There's some place in the draft where it says "these steps must be
performed such that the semantics are identical to processing them in
this order" --- i.e., it makes the sequential nature be to define
semantics, not to implement the code. I think that's probably
appropriate here as well.
--On May 31, 2006 1:29:20 PM -0700 Jim Fenton <fenton at cisco.com>
> Section 6 of base-02 defines a specific order for the steps in the
> verification process. The last sentence of section 6 says,
> "Verifiers MUST apply the following steps in the order listed."
> I think this is too prescriptive of the verification process.
> Later on, it does say that some of the steps can happen in
> parallel, but it can go further than that. It should be possible,
> for example, to verify the body hash on a message, and if it
> doesn't match, it shouldn't be necessary to retrieve the key at
> all. Can we instead concentrate on the steps that need to be
> performed rather than their order?
> NOTE WELL: This list operates according to
More information about the ietf-dkim