You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We'll probably want to expose a DefaultVerifyOptions variable to allow users to easily customize the defaults (e.g. keeping the default MaxVerifications but change the default LookupTXT).
The text was updated successfully, but these errors were encountered:
The amount of signatures attached to the message is directly related to the amount of servers that processed it. I believe allowing up to 15 signatures per message is a reasonably safe bet.
The amount of signatures attached to the message is directly related to the amount of servers that processed it.
I don't think so. Only authoritative servers should sign the message (ie. servers which have control over the sender's domain name). Intermediary servers (e.g. mailing lists) shouldn't.
So only a single server in the chain should sign the message. Note that allowing multiple signatures is still useful to allow cryptographic primitives to be gradually deployed (e.g. having messages double-signed with both RSA and ECDSA).
We'll probably want to expose a
DefaultVerifyOptions
variable to allow users to easily customize the defaults (e.g. keeping the defaultMaxVerifications
but change the defaultLookupTXT
).The text was updated successfully, but these errors were encountered: