IETF DKIM (date)
August 30, 2005
- Re: [ietf-dkim] Revised threat model, Arvel Hathcock, 18:44
- [ietf-dkim] No centralized database is needed., Douglas Otis, 15:35
- [ietf-dkim] Re: Purpose and sequence for DKIM specification and deployment, Frank Ellermann, 15:11
- RE: [ietf-dkim] Re: Purpose and sequencefor DKIM specificationand deployment, Hallam-Baker, Phillip, 13:22
- [ietf-dkim] Re: Purpose and sequencefor DKIM specificationand deployment, Frank Ellermann, 13:13
- RE: [ietf-dkim] Purpose and sequencefor DKIM specificationand deployment, Hallam-Baker, Phillip, 08:41
- Re: [ietf-dkim] Purpose and sequencefor DKIM specificationand deployment, Michael Thomas, 08:28
- RE: [ietf-dkim] Purpose and sequencefor DKIM specificationand deployment, Hallam-Baker, Phillip, 07:49
- [ietf-dkim] Revised threat model, Hallam-Baker, Phillip, 07:45
- [ietf-dkim] Revisiting the charter., Hallam-Baker, Phillip, 06:59
August 29, 2005
- Re: [ietf-dkim] Re: Forgery complexities, Douglas Otis, 23:41
- Re: [ietf-dkim] Purpose and sequencefor DKIM specification and deployment, Jim Fenton, 22:50
- RE: [ietf-dkim] Purpose and sequencefor DKIM specification anddeployment, Hallam-Baker, Phillip, 20:31
- [ietf-dkim] Re: Purpose and sequence for DKIM specificationand deployment, Frank Ellermann, 19:03
- Re: [ietf-dkim] Purpose and sequence for DKIM specificationand deployment, Douglas Otis, 18:53
- Re: [ietf-dkim] Re: Forgery complexities, Scott Kitterman, 18:49
- Re: [ietf-dkim] Re: Forgery complexities, Douglas Otis, 18:29
- Re: [ietf-dkim] Purpose and sequencefor DKIM specification and deployment, william(at)elan.net, 17:44
- Re: [ietf-dkim] Purpose and sequencefor DKIM specification and deployment, Scott Kitterman, 17:20
- Re: [ietf-dkim] Purpose and sequence for DKIM specificationand deployment, Earl Hood, 17:08
- Re: [ietf-dkim] Purpose and sequence for DKIM specificationand deployment, Earl Hood, 16:53
- Re: [ietf-dkim] Purpose and sequence for DKIM specificationand deployment, Earl Hood, 16:52
- Re: [ietf-dkim] Re: Forgery complexities, Dave Crocker, 16:32
- Re: [ietf-dkim] Forgery complexities, Earl Hood, 16:03
- RE: [ietf-dkim] Purpose and sequence forDKIM specificationand deployment, william(at)elan.net, 15:46
- [ietf-dkim] Re: Forgery complexities, Douglas Otis, 15:32
- RE: [ietf-dkim] Purpose and sequence forDKIM specificationand deployment, Hallam-Baker, Phillip, 15:31
- Re: [ietf-dkim] Purpose and sequence for DKIM specificationand deployment, Scott Kitterman, 13:53
- RE: [ietf-dkim] Purpose and sequence for DKIM specificationand deployment, Hallam-Baker, Phillip, 13:35
- [ietf-dkim] Forgery complexities, Dave Crocker, 13:21
- Re: [ietf-dkim] Purpose and sequence for DKIM specificationand deployment, Douglas Otis, 13:06
- Re: [ietf-dkim] Purpose and sequence for DKIM specificationanddeployment, Arvel Hathcock, 12:27
- Re: [ietf-dkim] Purpose and sequence for DKIM specification anddeployment, Arvel Hathcock, 12:15
- RE: [ietf-dkim] Purpose and sequence for DKIM specificationand deployment, Hallam-Baker, Phillip, 08:42
- RE: [ietf-dkim] Purpose and sequence for DKIM specification anddeployment, Hallam-Baker, Phillip, 07:18
- Re: [ietf-dkim] Purpose and sequence for DKIM specification and deployment, Douglas Otis, 02:50
August 28, 2005
- Re: [ietf-dkim] Purpose and sequence for DKIM specification and deployment, Dave Crocker, 18:49
- Re: [ietf-dkim] Purpose and sequence for DKIM specification and deployment, Douglas Otis, 18:13
- Re: [ietf-dkim] Re: accountability, resenders, and replay, Keith Moore, 15:24
- Re: [ietf-dkim] Purpose and sequence for DKIM specification and deployment, Dave Crocker, 12:51
- Re: [ietf-dkim] Purpose and sequence for DKIM specification and deployment, Douglas Otis, 12:36
August 27, 2005
- Re: [ietf-dkim] Purpose and sequence for DKIM specification and deployment, Scott Kitterman, 11:17
- Re: [ietf-dkim] Purpose and sequence for DKIM specification and deployment, Dave Crocker, 10:30
- Re: [ietf-dkim] Re: accountability, resenders, and replay, John Levine, 09:26
- Re: [ietf-dkim] Purpose and sequence for DKIM specification and deployment, Scott Kitterman, 09:12
- [ietf-dkim] Re: Apology, Frank Ellermann, 02:26
- [ietf-dkim] Re: Thoughts on the DNS RR issue, Frank Ellermann, 01:49
- [ietf-dkim] Re: Feedback in charter, Frank Ellermann, 01:24
- [ietf-dkim] Re: Purpose and sequence for DKIM specification and deployment, Frank Ellermann, 01:16
- [ietf-dkim] Purpose and sequence for DKIM specification and deployment, Dave Crocker, 00:19
August 26, 2005
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Jim Fenton, 15:20
- [ietf-dkim] Re: accountability, resenders, and replay, Keith Moore, 15:16
- [ietf-dkim] Re: accountability, resenders, and replay, Jim Fenton, 15:03
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Earl Hood, 14:41
- [ietf-dkim] Feedback in charter, Hallam-Baker, Phillip, 12:59
- [ietf-dkim] Thoughts on the DNS RR issue, Hallam-Baker, Phillip, 11:23
- [ietf-dkim] accountability, resenders, and replay, Tony Finch, 11:10
- Re: Not exactly not a threat analysis, Florian Weimer, 06:10
August 25, 2005
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record doesnot exist?, Arvel Hathcock, 13:29
- Re: [ietf-dkim] Not exactly not a threat analysis, Tony Finch, 11:38
- Re: [ietf-dkim] updated threat analysis outline, Douglas Otis, 10:55
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Jim Fenton, 09:28
- Re: [ietf-dkim] Inclusion of RCPT TO in signed content, Tony Finch, 09:03
- [ietf-dkim] Inclusion of RCPT TO in signed content, Jim Fenton, 08:54
- Re: [ietf-dkim] updated threat analysis outline, Tony Finch, 08:47
- Re: [ietf-dkim] updated threat analysis outline, Douglas Otis, 08:33
- [ietf-dkim] Apology, Scott Kitterman, 05:40
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Scott Kitterman, 05:35
- Re: [ietf-dkim] updated threat analysis outline, Tony Finch, 04:47
August 24, 2005
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis, 20:32
- Re: [ietf-dkim] Not exactly not a threat analysis, Ned Freed, 20:17
- Re: [ietf-dkim] Not exactly not a threat analysis, John R Levine, 20:08
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 18:44
- Re: [ietf-dkim] Not exactly not a threat analysis, John Levine, 18:13
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Dave Crocker, 18:11
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis, 18:01
- Re: [ietf-dkim] updated threat analysis outline, Douglas Otis, 17:03
- RE: [ietf-dkim] Is accountability singular?, Hallam-Baker, Phillip, 17:00
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Dave Crocker, 15:49
- Re: [ietf-dkim] updated threat analysis outline, Tony Finch, 15:43
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Scott Kitterman, 15:31
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis, 15:04
- Re: [ietf-dkim] Not exactly not a threat analysis, SM, 14:25
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Scott Kitterman, 14:00
- Re: [ietf-dkim] Not exactly not a threat analysis, Miles, 13:59
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis, 13:52
- Re: [ietf-dkim] Not exactly not a threat analysis, Arvel Hathcock, 13:14
- Re: [ietf-dkim] Is accountability binary?, Tony Hansen, 13:13
- Re: [ietf-dkim] Is accountability singular?, domainkeys-feedbackbase02, 13:10
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Scott Kitterman, 12:18
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis, 11:49
- Re: [ietf-dkim] Is accountability singular?, Jim Fenton, 11:24
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Scott Kitterman, 11:18
- RE: [ietf-dkim] Is accountability binary?, John R Levine, 11:10
- Re: [ietf-dkim] updated threat analysis outline, Douglas Otis, 11:08
- RE: [ietf-dkim] Is accountability binary?, Hallam-Baker, Phillip, 11:06
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis, 11:04
- Re: [ietf-dkim] Not exactly not a threat analysis, Dave Crocker, 08:52
- Re: [ietf-dkim] Not exactly not a threat analysis, Ned Freed, 08:51
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 08:45
- Re: [ietf-dkim] Not exactly not a threat analysis, domainkeys-feedbackbase02, 08:15
- Re: [ietf-dkim] Is accountability singular?, Michael Thomas, 08:15
- Re: [ietf-dkim] Is accountability binary?, John Levine, 08:02
- RE: [ietf-dkim] Is accountability singular?, domainkeys-feedbackbase02, 07:56
- Re: [ietf-dkim] Not exactly not a threat analysis, John Levine, 07:55
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 07:31
- RE: [ietf-dkim] Is accountability binary?, Hallam-Baker, Phillip, 07:24
- Re: [ietf-dkim] updated threat analysis outline, Tony Finch, 07:16
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Scott Kitterman, 07:03
- [ietf-dkim] Re: Not exactly not a threat analysis, Frank Ellermann, 04:22
August 23, 2005
- Re: [ietf-dkim] Not exactly not a threat analysis, domainkeys-feedbackbase02, 23:09
- Re: [ietf-dkim] Not exactly not a threat analysis, domainkeys-feedbackbase02, 23:01
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis, 22:33
- Re: [ietf-dkim] Not exactly not a threat analysis, Jim Fenton, 22:11
- Re: [ietf-dkim] Not exactly not a threat analysis, Scott Kitterman, 21:02
- Re: [ietf-dkim] Not exactly not a threat analysis, domainkeys-feedbackbase02, 20:46
- Re: [ietf-dkim] Not exactly not a threat analysis, domainkeys-feedbackbase02, 20:41
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 20:29
- Re: [ietf-dkim] Not exactly not a threat analysis, Scott Kitterman, 20:26
- [ietf-dkim] Is accountability binary?, domainkeys-feedbackbase02, 20:16
- Re: [ietf-dkim] proposed threat analysis outline, Arvel Hathcock, 20:15
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Earl Hood, 20:14
- Re: [ietf-dkim] Not exactly not a threat analysis, Dave Crocker, 20:10
- Re: [ietf-dkim] Not exactly not a threat analysis, John R Levine, 19:48
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 18:49
- Re: [ietf-dkim] Re: SSP and DKIM, was Not exactly not a threat analysis, John Levine, 18:18
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 18:10
- Re: [ietf-dkim] Not exactly not a threat analysis, John Levine, 17:58
- Re: [ietf-dkim] Re: SSP and DKIM, was Not exactly not a threat analysis, Arvel Hathcock, 17:47
- RE: [ietf-dkim] DKIM vs. S/MIME and OpenPGP, Hallam-Baker, Phillip, 17:28
- Re: [ietf-dkim] updated threat analysis outline, Douglas Otis, 17:24
- [ietf-dkim] Re: SSP and DKIM, was Not exactly not a threat analysis, John Levine, 16:51
- RE: [ietf-dkim] BCC Recipients, Hallam-Baker, Phillip, 16:20
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis, 16:18
- [ietf-dkim] DKIM vs. S/MIME and OpenPGP, Keith Moore, 15:23
- Re: [ietf-dkim] Not exactly not a threat analysis, Jim Fenton, 15:13
- [ietf-dkim] Some real world DKIM feedback, Arvel Hathcock, 15:06
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 15:04
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 15:00
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 14:44
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 14:23
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 14:17
- Re: [ietf-dkim] BCC Recipients, Michael Thomas, 14:17
- RE: [ietf-dkim] BCC Recipients, Hallam-Baker, Phillip, 14:00
- Re: [ietf-dkim] Not exactly not a threat analysis, Jim Fenton, 13:54
- Re: [ietf-dkim] Not exactly not a threat analysis, Tony Finch, 13:33
- Re: [ietf-dkim] Not exactly not a threat analysis, Arvel Hathcock, 13:16
- Re: [ietf-dkim] Not exactly not a threat analysis, Arvel Hathcock, 13:02
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Earl Hood, 12:54
- Re: [ietf-dkim] Not exactly not a threat analysis, william(at)elan.net, 12:42
- Re: [ietf-dkim] Not exactly not a threat analysis, domainkeys-feedbackbase02, 12:39
- Re: [ietf-dkim] BCC Recipients, william(at)elan.net, 12:37
- Re: [ietf-dkim] More of a marketting plan really, Tony Finch, 12:32
- [ietf-dkim] updated threat analysis outline, Tony Finch, 12:28
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Earl Hood, 12:24
- [ietf-dkim] BCC Recipients, Hallam-Baker, Phillip, 12:21
- Re: [ietf-dkim] Not exactly not a threat analysis, Tony Finch, 12:19
- [ietf-dkim] More of a marketting plan really, Hallam-Baker, Phillip, 12:18
- Re: [ietf-dkim] Not exactly not a threat analysis, Scott Kitterman, 12:11
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 12:03
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 11:59
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 11:59
- Re: [ietf-dkim] Not exactly not a threat analysis, Ned Freed, 11:58
- Re: [ietf-dkim] Not exactly not a threat analysis, Tony Finch, 11:53
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 11:47
- RE: [ietf-dkim] Not exactly not a threat analysis, Hallam-Baker, Phillip, 11:46
- Re: [ietf-dkim] Not exactly not a threat analysis, Scott Kitterman, 11:40
- Re: [ietf-dkim] Not exactly not a threat analysis, Tony Finch, 11:39
- Re: [ietf-dkim] Not exactly not a threat analysis, Ned Freed, 11:29
- Re: [ietf-dkim] Not exactly not a threat analysis, Ned Freed, 11:28
- Re: [ietf-dkim] what DKIM is --- a personal perspective, Earl Hood, 11:17
- Re: [ietf-dkim] Not exactly not a threat analysis, Douglas Otis, 11:14
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 11:09
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 11:02
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP recorddoesnot exist?, Arvel Hathcock, 11:01
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 11:00
- Re: [ietf-dkim] Not exactly not a threat analysis, Tony Finch, 10:51
- Re: [ietf-dkim] Not exactly not a threat analysis, Douglas Otis, 10:51
- Re: [ietf-dkim] Not exactly not a threat analysis, Russ Housley, 10:50
- Re: [ietf-dkim] Not exactly not a threat analysis, Tony Finch, 10:50
- Re: [ietf-dkim] Not exactly not a threat analysis, Ned Freed, 10:48
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 10:44
- Re: [ietf-dkim] Not exactly not a threat analysis, Ned Freed, 10:41
- Re: [ietf-dkim] Not exactly not a threat analysis, Tony Finch, 10:34
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 10:34
- Re: [ietf-dkim] Not exactly not a threat analysis, John R Levine, 10:29
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 10:28
- Re: [ietf-dkim] Not exactly not a threat analysis, Tony Finch, 10:21
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 10:16
- Re: [ietf-dkim] Not exactly not a threat analysis, John R Levine, 09:58
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 09:53
- Re: [ietf-dkim] Not exactly not a threat analysis, Tony Finch, 09:26
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 08:54
- Re: [ietf-dkim] Not exactly not a threat analysis, Douglas Otis, 08:11
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Scott Kitterman, 05:41
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 05:03
- Re: [ietf-dkim] proposed threat analysis outline, Tony Finch, 03:35
- Re: [ietf-dkim] Re: Not exactly not a threat analysis, Tony Finch, 02:52
- [ietf-dkim] Re: Not exactly not a threat analysis, Frank Ellermann, 02:07
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis, 00:07
August 22, 2005
- Re: [ietf-dkim] Not exactly not a threat analysis, John Levine, 21:53
- Re: [ietf-dkim] proposed threat analysis outline, Jim Fenton, 21:32
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Scott Kitterman, 18:38
- Re: [ietf-dkim] proposed threat analysis outline, Eric Allman, 17:17
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis, 16:53
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Scott Kitterman, 15:25
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis, 14:38
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record doesnot exist?, Arvel Hathcock, 14:21
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 12:22
- [ietf-dkim] proposed threat analysis outline, Tony Finch, 12:10
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 12:07
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record doesnot exist?, Tony Finch, 11:10
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Scott Kitterman, 11:05
- Re: [ietf-dkim] Not exactly not a threat analysis, Tony Finch, 11:01
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis, 10:42
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 09:56
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 09:54
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 09:41
- Re: [ietf-dkim] Not exactly not a threat analysis, John Levine, 09:25
- Re: [ietf-dkim] Not exactly not a threat analysis, Dave Crocker, 09:12
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 09:09
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 08:55
- Re: [ietf-dkim] Not exactly not a threat analysis, Dave Crocker, 08:47
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Scott Kitterman, 08:36
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 08:24
- Re: [ietf-dkim] Not exactly not a threat analysis, Dave Crocker, 08:20
- Re: [ietf-dkim] Not exactly not a threat analysis, Dave Crocker, 08:12
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record doesnot exist?, Arvel Hathcock, 07:24
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis, 01:33
August 20, 2005
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record doesnot exist?, Dave Crocker, 23:43
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Scott Kitterman, 20:21
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis, 19:12
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis, 18:27
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Scott Kitterman, 17:32
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis, 17:18
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Earl Hood, 17:02
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record doesnot exist?, Arvel Hathcock, 15:38
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Scott Kitterman, 10:12
- Re: [ietf-dkim] DKIM Threat Analysis v0.06, Scott Kitterman, 10:01
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Scott Kitterman, 09:53
- Re: [ietf-dkim] Not exactly not a threat analysis, domainkeys-feedbackbase02, 00:11
August 19, 2005
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 20:40
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 20:30
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis, 17:26
- Re: [ietf-dkim] DKIM Threat Analysis v0.06, SM, 17:07
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, SM, 17:07
- Re: [ietf-dkim] Not exactly not a threat analysis, Jim Fenton, 16:24
- Re: [ietf-dkim] Not exactly not a threat analysis, Jim Fenton, 16:02
- Re: [ietf-dkim] semantics of message signing, Jim Fenton, 15:49
- Re: [ietf-dkim] DKIM Threat Analysis v0.06, Jim Fenton, 13:31
- [ietf-dkim] what DKIM is --- a personal perspective, Eric Allman, 13:21
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Earl Hood, 12:46
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, John Levine, 09:35
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Dave Crocker, 09:35
- Re: [ietf-dkim] DKIM Threat Analysis v0.06, Scott Kitterman, 06:41
- Re: [ietf-dkim] DKIM Threat Analysis v0.06, Arvel Hathcock, 06:04
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis, 01:32
August 18, 2005
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Earl Hood, 20:45
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis, 17:04
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Earl Hood, 13:08
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Earl Hood, 13:08
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Earl Hood, 12:22
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Earl Hood, 12:18
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis, 10:02
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, SM, 09:39
- Re: [ietf-dkim] DKIM Threat Analysis v0.06, Scott Kitterman, 09:13
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Jim Fenton, 09:03
- Re: [ietf-dkim] DKIM Threat Analysis v0.06, Arvel Hathcock, 06:41
- Re: [ietf-dkim] DKIM Threat Analysis v0.06, Arvel Hathcock, 04:45
August 17, 2005
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Earl Hood, 22:59
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Jim Fenton, 22:16
- [ietf-dkim] Re: Not exactly not a threat analysis, Frank Ellermann, 21:34
- Re: [ietf-dkim] assertions, was on DKIM as an anti-spam measure, Keith Moore, 21:18
- Re: [ietf-dkim] assertions, was on DKIM as an anti-spam measure, John Levine, 20:36
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Earl Hood, 19:39
- [ietf-dkim] Local-part and user-key risk, Douglas Otis, 18:20
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Jim Fenton, 16:58
- Re: [ietf-dkim] Not exactly not a threat analysis, william(at)elan.net, 15:55
- Re: [ietf-dkim] DKIM Threat Analysis v0.06, Dave Crocker, 15:48
- Re: [ietf-dkim] on DKIM as an anti-spam measure, Keith Moore, 15:46
- Re: [ietf-dkim] Authentication-Results: Header, Arvel Hathcock, 15:42
- Re: [ietf-dkim] linkage between "originator" and "handling agent", Arvel Hathcock, 15:25
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Jim Fenton, 15:19
- Re: [ietf-dkim] on DKIM as an anti-spam measure, John R Levine, 14:51
- Re: [ietf-dkim] on DKIM as an anti-spam measure, Keith Moore, 14:33
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), domainkeys-feedbackbase02, 14:33
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Jim Fenton, 14:10
- Re: [ietf-dkim] Not exactly not a threat analysis, Arvel Hathcock, 13:49
- Re: [ietf-dkim] on DKIM as an anti-spam measure, Michael Thomas, 13:43
- Re: [ietf-dkim] linkage between "originator" and "handling agent", Scott Kitterman, 13:40
- Re: [ietf-dkim] linkage between "originator" and "handling agent", Douglas Otis, 13:19
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 12:48
- Re: [ietf-dkim] Not exactly not a threat analysis, Arvel Hathcock, 12:45
- rogue DNS registrars, was Re: [ietf-dkim] Not exactly not a threat analysis, George Gross, 12:36
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 12:34
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 12:33
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 12:22
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 12:18
- Re: [ietf-dkim] Not exactly not a threat analysis, Tony Finch, 11:36
- [ietf-dkim] [THREAT] poor deployment of secure email, Tony Finch, 11:33
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 11:33
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 11:31
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 11:17
- Re: [ietf-dkim] linkage between "originator" and "handling agent", Earl Hood, 11:12
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 11:09
- Re: [ietf-dkim] Not exactly not a threat analysis, Douglas Otis, 10:48
- Re: [ietf-dkim] Not exactly not a threat analysis, Tony Finch, 10:41
- Re: [ietf-dkim] Not exactly not a threat analysis, Tony Finch, 10:16
- Re: [ietf-dkim] Not exactly not a threat analysis, Tony Finch, 10:04
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 09:58
- Re: [ietf-dkim] linkage between "originator" and "handling agent", Hector Santos, 09:54
- Re: [ietf-dkim] on DKIM as an anti-spam measure, Keith Moore, 09:46
- Re: [ietf-dkim] Not exactly not a threat analysis, domainkeys-feedbackbase02, 09:43
- [ietf-dkim] Focus on: Threat Analysis and Chartering, Dave Crocker, 09:37
- Re: [ietf-dkim] linkage between "originator" and "handling agent", Scott Kitterman, 09:35
- [ietf-dkim] DKIM Threat Analysis & Charter, Hector Santos, 09:19
- Re: [ietf-dkim] on DKIM as an anti-spam measure, Tony Finch, 09:14
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 09:09
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 09:08
- Re: [ietf-dkim] linkage between "originator" and "handling agent", Dave Crocker, 09:07
- Re: [ietf-dkim] Exactly not a threat analysis, John R Levine, 09:04
- [ietf-dkim] semantics of message signing, Keith Moore, 09:02
- Re: [ietf-dkim] on DKIM as an anti-spam measure, Dave Crocker, 08:51
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 08:49
- Re: [ietf-dkim] Not exactly not a threat analysis, Dave Crocker, 08:43
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 08:31
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 08:22
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 08:13
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 08:10
- Re: [ietf-dkim] linkage between "originator" and "handling agent", Michael Thomas, 08:01
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 07:57
- Re: [ietf-dkim] linkage between "originator" and "handling agent", Scott Kitterman, 07:29
- Re: [ietf-dkim] Authentication-Results: Header, Tony Hansen, 06:54
- Re: [ietf-dkim] on DKIM as an anti-spam measure, Keith Moore, 04:14
August 16, 2005
- Re: [ietf-dkim] Authentication-Results: Header, Earl Hood, 23:58
- Re: [ietf-dkim] linkage between "originator" and "handling agent", Earl Hood, 23:35
- Re: [ietf-dkim] on DKIM as an anti-spam measure, John R Levine, 21:55
- [ietf-dkim] Re: on DKIM as an anti-spam measure, Frank Ellermann, 21:48
- [ietf-dkim] Authentication-Results: Header, Hector Santos, 21:31
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 21:24
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 21:13
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 21:08
- Re: [ietf-dkim] on DKIM as an anti-spam measure, Douglas Otis, 21:02
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 21:00
- Re: [ietf-dkim] linkage between "originator" and "handling agent", Hector Santos, 20:53
- Re: [ietf-dkim] on DKIM as an anti-spam measure, Keith Moore, 20:41
- Re: [ietf-dkim] Not exactly not a threat analysis, John Levine, 20:29
- Re: [ietf-dkim] Not exactly not a threat analysis, John Levine, 19:46
- Re: [ietf-dkim] on DKIM as an anti-spam measure, John Levine, 19:39
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 19:38
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 19:28
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 19:23
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 19:22
- Re: [ietf-dkim] Not exactly not a threat analysis, domainkeys-feedbackbase02, 19:05
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 18:52
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 18:39
- Re: [ietf-dkim] Not exactly not a threat analysis, Douglas Otis, 18:15
- Re: [ietf-dkim] Not exactly not a threat analysis, domainkeys-feedbackbase02, 16:50
- Re: [ietf-dkim] linkage between "originator" and "handling agent", Douglas Otis, 16:20
- Re: [ietf-dkim] on the suitability of the From header field, Earl Hood, 16:18
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 16:13
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 15:57
- Re: [ietf-dkim] linkage between "originator" and "handling agent", Earl Hood, 15:49
- Re: [ietf-dkim] on the suitability of the From header field, Keith Moore, 15:23
- [ietf-dkim] on DKIM as an anti-spam measure, Keith Moore, 15:10
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 14:56
- Re: [ietf-dkim] linkage between "originator" and "handling agent", Arvel Hathcock, 14:45
- Re: [ietf-dkim] Not exactly not a threat analysis, Arvel Hathcock, 14:42
- Re: [ietf-dkim] on the suitability of the From header field, Keith Moore, 13:53
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 13:24
- Re: [ietf-dkim] Not exactly not a threat analysis, Thomas Roessler, 13:15
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 12:49
- Re: [ietf-dkim] linkage between "originator" and "handling agent", Hector Santos, 12:49
- Re: [ietf-dkim] Not exactly not a threat analysis, John R Levine, 12:43
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 12:32
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 12:17
- Re: [ietf-dkim] Not exactly not a threat analysis, Keith Moore, 12:04
- Re: [ietf-dkim] linkage between "originator" and "handling agent", Hector Santos, 11:45
- Re: [ietf-dkim] linkage between "originator" and "handling agent", Michael Thomas, 11:44
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 11:23
- Re: [ietf-dkim] Not exactly not a threat analysis, Douglas Otis, 11:19
- Re: [ietf-dkim] linkage between "originator" and "handling agent", Hector Santos, 11:09
- Re: [ietf-dkim] linkage between "originator" and "handling agent", william(at)elan.net, 11:05
- Re: [ietf-dkim] linkage between "originator" and "handling agent", Arvel Hathcock, 09:56
- Re: [ietf-dkim] linkage between "originator" and "handling agent", Scott Kitterman, 08:12
- Re: [ietf-dkim] Not exactly not a threat analysis, Arvel Hathcock, 08:11
- Re: [ietf-dkim] a bit of philosophy on working group productivity and scope, Keith Moore, 07:40
August 15, 2005
- Re: [ietf-dkim] Not exactly not a threat analysis, Douglas Otis, 23:03
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 20:03
- [ietf-dkim] linkage between "originator" and "handling agent", Dave Crocker, 18:38
- Re: [ietf-dkim] Not exactly not a threat analysis, Douglas Otis, 17:24
- Re: [ietf-dkim] Not exactly not a threat analysis, SM, 17:00
- Re: [ietf-dkim] Not exactly not a threat analysis, Douglas Otis, 16:41
- Re: [ietf-dkim] Not exactly not a threat analysis, Arvel Hathcock, 15:49
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 15:36
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 15:18
- Re: [ietf-dkim] Not exactly not a threat analysis, Arvel Hathcock, 15:14
- RE: [ietf-dkim] Not exactly not a threat analysis, James Scott, 15:11
- Re: [ietf-dkim] Not exactly not a threat analysis, Douglas Otis, 15:00
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 14:55
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 14:50
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 14:38
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 14:23
- Re: [ietf-dkim] Not exactly not a threat analysis, Arvel Hathcock, 14:04
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 13:44
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 13:34
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 13:25
- Re: [ietf-dkim] Not exactly not a threat analysis, Earl Hood, 13:18
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 13:16
- Re: [ietf-dkim] Not exactly not a threat analysis, Michael Thomas, 12:55
- Re: [ietf-dkim] Not exactly not a threat analysis, George Gross, 12:22
- Re: [ietf-dkim] Not exactly not a threat analysis, Arvel Hathcock, 12:03
- Re: [ietf-dkim] Not exactly not a threat analysis, SM, 12:03
- Re: [ietf-dkim] Not exactly not a threat analysis, SM, 11:49
- Re: [ietf-dkim] Not exactly not a threat analysis, John Levine, 10:18
- RE: [ietf-dkim] dkim implementations, Ned Freed, 10:14
- Re: [ietf-dkim] Not exactly not a threat analysis, Douglas Otis, 10:00
- RE: [ietf-dkim] dkim implementations, Hallam-Baker, Phillip, 09:48
- Re: [ietf-dkim] Not exactly not a threat analysis, SM, 09:47
- [ietf-dkim] dkim implementations, Dave Crocker, 08:54
- RE: [ietf-dkim] Not exactly not a threat analysis, Dave Crocker, 08:50
- Re: [ietf-dkim] Not exactly not a threat analysis, Scott Kitterman, 08:44
- RE: [ietf-dkim] Not exactly not a threat analysis, Hallam-Baker, Phillip, 08:36
- Just stop complaining and produce a threat analysis. RE: [ietf-dkim] on the scope and necessity of threat analysis, Hallam-Baker, Phillip, 07:47
- Re: [ietf-dkim] Not exactly not a threat analysis, Hector Santos, 02:20
- RE: [ietf-dkim] Not exactly not a threat analysis, James Scott, 01:34
- Re: [ietf-dkim] Not exactly not a threat analysis, Douglas Otis, 00:52
- Re: [ietf-dkim] Not exactly not a threat analysis, Eliot Lear, 00:06
August 14, 2005
- Re: [ietf-dkim] Not exactly not a threat analysis, Dave Crocker, 22:35
- RE: [ietf-dkim] a bit of philosophy on working groupproductivityandscope, James Scott, 18:40
- Re: [ietf-dkim] Not exactly not a threat analysis, Jon Callas, 16:46
- Re: [ietf-dkim] a bit of philosophy on working group productivityandscope, Arvel Hathcock, 16:14
- Re: [ietf-dkim] a bit of philosophy on working group productivity andscope, Arvel Hathcock, 15:49
- Re: [ietf-dkim] a bit of philosophy on working group productivityandscope, Arvel Hathcock, 15:48
- Re: [ietf-dkim] a bit of philosophy on working group productivity andscope, Scott Kitterman, 15:34
- RE: [ietf-dkim] a bit of philosophy on working group productivity andscope, Dave Crocker, 14:30
- RE: [ietf-dkim] a bit of philosophy on working group productivity andscope, Scott Kitterman, 14:22
- [ietf-dkim] a bit of philosophy on working group productivity and scope, Dave Crocker, 09:40
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Keith Moore, 07:17
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Keith Moore, 06:50
- Re: [ietf-dkim] on the scope and necessity of threat analysis, SM, 05:57
- RE: [ietf-dkim] on the scope and necessity of threat analysis, Hallam-Baker, Phillip, 05:33
- Re: [ietf-dkim] on the suitability of the From header field, SM, 00:02
- Re: [ietf-dkim] on the scope and necessity of threat analysis, SM, 00:02
August 13, 2005
- Re: [ietf-dkim] on the suitability of the From header field, SM, 23:49
- Re: [ietf-dkim] DKIM Threat Analysis v0.06, SM, 23:47
- Re: [ietf-dkim] on the suitability of the From header field, Earl Hood, 21:20
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Earl Hood, 21:05
- [ietf-dkim] Not exactly not a threat analysis, John Levine, 20:23
- Re: [ietf-dkim] on the suitability of the From header field, domainkeys-feedbackbase02, 19:34
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Michael Thomas, 19:20
- [ietf-dkim] Re: on the suitability of the From header field, Arvel Hathcock, 18:33
- Re: [ietf-dkim] on the suitability of the From header field, Earl Hood, 18:07
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Earl Hood, 17:50
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Michael Thomas, 17:47
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Earl Hood, 17:41
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Keith Moore, 17:35
- Re: [ietf-dkim] on the suitability of the From header field, Keith Moore, 17:24
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Michael Thomas, 17:17
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Keith Moore, 17:04
- Re: [ietf-dkim] on the suitability of the From header field, Earl Hood, 17:00
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Michael Thomas, 16:59
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Earl Hood, 16:36
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Arvel Hathcock, 16:36
- Re: [ietf-dkim] on the suitability of the From header field, domainkeys-feedbackbase02, 16:34
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Arvel Hathcock, 16:27
- [ietf-dkim] on the suitability of the From header field, Keith Moore, 12:32
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Keith Moore, 12:22
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Arvel Hathcock, 12:12
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Earl Hood, 11:44
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Arvel Hathcock, 10:46
- Re: [ietf-dkim] DKIM Threat Analysis v0.06, Jon Callas, 09:49
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Keith Moore, 08:30
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Dave Crocker, 08:27
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Keith Moore, 05:11
August 12, 2005
- Re: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), Ned Freed, 22:17
- Re: [ietf-dkim] What's a replay?, Douglas Otis, 22:09
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Ned Freed, 22:08
- Re: [ietf-dkim] What's a replay?, Eric Allman, 18:25
- Re: [ietf-dkim] on the scope and necessity of threat analysis, Arvel Hathcock, 16:43
- [ietf-dkim] on the scope and necessity of threat analysis, Keith Moore, 15:09
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), SM, 12:47
- Re: [ietf-dkim] DKIM Threat Analysis v0.06, Arvel Hathcock, 11:43
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Hector Santos, 10:40
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Earl Hood, 10:05
- Re: [ietf-dkim] DKIM Threat Analysis v0.06, Arvel Hathcock, 09:17
- RE: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), Hallam-Baker, Phillip, 07:52
- [ietf-dkim] Threat assement - alternative approach, Hallam-Baker, Phillip, 07:32
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Andrew Newton, 07:27
- Re: [ietf-dkim] DKIM Threat Analysis v0.06, Dave Crocker, 07:20
- RE: [ietf-dkim] Why we will never solve the problem completely, John Glube, 07:17
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Michael Thomas, 06:55
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Hector Santos, 05:20
- Re: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), Arvel Hathcock, 03:47
- Re: [ietf-dkim] Replay isn't the problem, spam is the problem, Douglas Otis, 00:58
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Jim Fenton, 00:53
August 11, 2005
- [ietf-dkim] Re: DKIM Threat Analysis v0.06, Frank Ellermann, 23:04
- Re: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), John Levine, 21:36
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Andrew Newton, 20:02
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Andrew Newton, 19:44
- Re: [ietf-dkim] DKIM Threat Analysis v0.06, william(at)elan.net, 19:33
- Re: [ietf-dkim] Replay isn't the problem, spam is the problem, Hector Santos, 18:09
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Hector Santos, 17:02
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Ned Freed, 16:11
- Re: [ietf-dkim] DKIM Threat Analysis v0.06, Hector Santos, 16:10
- Re: [ietf-dkim] Replay isn't the problem, spam is the problem, Michael Thomas, 15:55
- Re: [ietf-dkim] DKIM Threat Analysis v0.06, Arvel Hathcock, 15:35
- Re: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), Earl Hood, 15:33
- Re: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), Michael Thomas, 14:57
- Re: replay, revocation, repudiation, was RE: [ietf-dkim] On per-user-keying, Earl Hood, 14:42
- Re: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), Arvel Hathcock, 14:40
- Re: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), Earl Hood, 14:38
- [ietf-dkim] Why we will never solve the problem completely, Hallam-Baker, Phillip, 14:34
- Re: [ietf-dkim] Re: Using PKIX certificates with dkim, Michael Thomas, 14:21
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Andrew Newton, 13:52
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Arvel Hathcock, 13:17
- RE: replay, revocation, repudiation, was RE: [ietf-dkim] On per-user-keying, Hallam-Baker, Phillip, 12:13
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Jon Callas, 12:08
- RE: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), Hallam-Baker, Phillip, 11:55
- Re: [ietf-dkim] What's a replay?, Douglas Otis, 11:54
- Re: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), Dave Crocker, 11:14
- replay, revocation, repudiation, was RE: [ietf-dkim] On per-user-keying, Tony Finch, 10:54
- RE: [ietf-dkim] What's a replay?, Paul Maddox, 10:37
- Re: [ietf-dkim] What's a replay?, Tony Finch, 10:32
- Re: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), Earl Hood, 09:47
- [ietf-dkim] RE: MASS/DKIM BOF Summary, Tony Finch, 09:21
- RE: [ietf-dkim] Re: Using PKIX certificates with dkim, Hallam-Baker, Phillip, 08:43
- RE: [ietf-dkim] What's a replay?, Paul Maddox, 08:07
- [ietf-dkim] Re: Using PKIX certificates with dkim, Frank Ellermann, 06:55
- RE: [ietf-dkim] DKIM Threat Analysis v0.06, Hallam-Baker, Phillip, 06:24
August 10, 2005
- Re: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), John Levine, 21:14
- Re: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), Earl Hood, 19:22
- Re: [ietf-dkim] DKIM Threat Analysis v0.06, SM, 17:12
- Re: [ietf-dkim] DKIM Threat Analysis v0.06, Douglas Otis, 16:55
- [ietf-dkim] DKIM Threat Analysis v0.06, Dave Crocker, 15:19
- Re: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), Eric Allman, 13:45
- [ietf-dkim] Using PKIX certificates with dkim, Hallam-Baker, Phillip, 11:22
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP recorddoesnot exist?, Arvel Hathcock, 09:34
- Re: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), Earl Hood, 09:23
- Re: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), Dave Crocker, 09:23
- Re: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), Earl Hood, 09:08
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record doesnot exist?, Dave Crocker, 08:23
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record doesnot exist?, Earl Hood, 08:06
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record doesnot exist?, Arvel Hathcock, 07:58
- Re: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), Dave Crocker, 07:37
- RE: [ietf-dkim] On per-user-keying, Hallam-Baker, Phillip, 06:08
- Re: [ietf-dkim] On per-user-keying, Douglas Otis, 01:21
- [ietf-dkim] Re: How to solve replay with no specification changes, william(at)elan.net, 01:15
August 09, 2005
- Re: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), domainkeys-feedbackbase02, 23:59
- Re: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), John Levine, 23:56
- Re: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), Earl Hood, 22:50
- Re: Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), domainkeys-feedbackbase02, 21:48
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), domainkeys-feedbackbase02, 21:32
- Re: [ietf-dkim] On per-user-keying, John Levine, 21:25
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, John Levine, 21:22
- Design approach to MASS (was Re: [ietf-dkim] On per-user-keying), Earl Hood, 20:13
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Earl Hood, 20:02
- Re: [ietf-dkim] What's a replay?, Douglas Otis, 18:31
- RE: [ietf-dkim] On per-user-keying, Hallam-Baker, Phillip, 17:53
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Michael Thomas, 17:40
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Michael Thomas, 17:36
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Eric Allman, 17:36
- [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Earl Hood, 17:29
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Michael Thomas, 17:14
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Earl Hood, 17:13
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), domainkeys-feedbackbase02, 16:55
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Michael Thomas, 16:55
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Dave Crocker, 16:49
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Earl Hood, 16:49
- Re: [ietf-dkim] What's a replay?, Eric Allman, 16:48
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Michael Thomas, 16:37
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Hector Santos, 16:32
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Eric Allman, 16:14
- RE: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Eric Allman, 16:03
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Michael Thomas, 15:54
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Dave Crocker, 15:35
- Re: [ietf-dkim] What's a replay?, Douglas Otis, 15:25
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Earl Hood, 14:46
- RE: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Scott Kitterman, 13:49
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Michael Thomas, 13:39
- Re: [ietf-dkim] What's a replay?, Dave Crocker, 13:37
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Dave Crocker, 13:27
- [ietf-dkim] How to solve replay with no specification changes, Hallam-Baker, Phillip, 12:30
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Michael Thomas, 12:29
- RE: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Dan Wing, 12:18
- Re: [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Earl Hood, 11:50
- Re: [ietf-dkim] Replay isn't the problem, spam is the problem, Douglas Otis, 09:41
- [ietf-dkim] DKIM Threat Assessment v0.02 (very rough draft), Dave Crocker, 09:04
- Re: [ietf-dkim] Replay isn't the problem, spam is the problem, John R Levine, 08:11
- Re: [ietf-dkim] Replay isn't the problem, spam is the problem, Amir Herzberg, 06:49
- Re: [ietf-dkim] Replay isn't the problem, spam is the problem, Amir Herzberg, 06:43
August 08, 2005
- Re: [ietf-dkim] Replay isn't the problem, spam is the problem, Douglas Otis, 23:32
- Re: [ietf-dkim] Replay isn't the problem, spam is the problem, John R Levine, 20:18
- Re: [ietf-dkim] What's a replay?, Douglas Otis, 19:49
- [ietf-dkim] What's a replay?, Jon Callas, 15:37
- Re: [ietf-dkim] Replay isn't the problem, spam is the problem, Amir Herzberg, 15:24
- Re: DKIM implementations SHOULD support replay protection (was: Re: [ietf-dkim]Re: Replay attacks and ISP business models, Dave Crocker, 15:18
- Re: [ietf-dkim] Replay isn't the problem, spam is the problem, Douglas Otis, 13:38
- RE: [ietf-dkim] Replay isn't the problem, spam is the problem, Hallam-Baker, Phillip, 12:07
- [ietf-dkim] Replay isn't the problem, spam is the problem, John R Levine, 11:34
- [ietf-dkim] RE: MASS/DKIM BOF Summary, Hallam-Baker, Phillip, 11:29
- [ietf-dkim] Re: MASS/DKIM BOF Summary, Dave Crocker, 08:20
- DKIM implementations SHOULD support replay protection (was: Re: [ietf-dkim]Re: Replay attacks and ISP business models, Amir Herzberg, 07:24
- Re: [ietf-dkim] Re: Replay attacks and ISP business models, John R Levine, 06:48
- Re: [ietf-dkim] Re: Replay attacks and ISP business models, Amir Herzberg, 06:25
- Re: [ietf-dkim] Re: Replay attacks and ISP business models, Amir Herzberg, 05:22
August 07, 2005
- Re: [ietf-dkim] Re: Replay attacks and ISP business models, Douglas Otis, 23:29
- Re: [ietf-dkim] Re: Replay attacks and ISP business models, John R Levine, 19:03
- [ietf-dkim] Re: Replay attacks and ISP business models, Douglas Otis, 18:52
- Re: [ietf-dkim] Re: Replay attacks and ISP business models, Douglas Otis, 18:13
- Re: [ietf-dkim] Re: Replay attacks and ISP business models, John R Levine, 15:17
- [ietf-dkim] Re: Replay attacks and ISP business models, Douglas Otis, 14:04
- Re: [ietf-dkim] Re: Replay attacks, what's that?, Douglas Otis, 01:56
- Re: [ietf-dkim] Re: Replay attacks, what's that?, Tony Finch, 00:08