Good morning,
https://www.rfc-editor.org/rfc/rfc6376#section-5 reads:
"Survivability of signatures after transit is not guaranteed, and
signatures can fail to verify through no fault of the Signer.
Therefore, a Verifier SHOULD NOT treat a message that has one or more
bad signatures and no good signatures differently from a message with
no signature at all."
What does that exactly mean? That is, for me it seems to be saying that if hash of a message does not correspond to the DKIM public key for a given message, a verifier should behave as there was a sort of no problem at all. It's exaggeration because messages that lack DKIM signature will probably be treated as having at least lower reputation than those that positively passed DKIM verification. But bad DKIM signature is explicit sign that something is wrong with the message.
Can you clarify how above is meant to be understood? It's possible that I miss something as I haven't read this article in its entirety yet and what I quoted seems to be colliding with "6.2. Communicate Verification Results".
Update: reading "6. Verifier Actions" seems to confirm my suppositions which I described in a comment (that Verifier only checks if the DKIM signature is good or bad, but what to actually do with it is to be determined by Identity Assessor and this RFC a kind proposes (although does not enforce) to implement Receiving Server to be Verifier and MUA to be Identity Assessor:
"A border or intermediate MTA MAY verify the message signature(s). An
MTA who has performed verification MAY communicate the result of that
verification by adding a verification header field to incoming
messages."