ietf-dkim
[Top] [All Lists]

RE: [ietf-dkim] on the scope and necessity of threat analysis

2005-08-14 05:33:42
Just make a cogent statement of the problems that DKIM is attempting to
solve that would not exist if DKIM did not exist.

There are two threat analyses possible:

        Report = Threats (World)

        Report = Threats (World + DKIM)

To get chartered the group needs to show

        Threats (World + DKIM) < Threats (World)

If you take my advice on the charter this is much easier to do. 

_______________________________________________
ietf-dkim mailing list
ietf-dkim(_at_)mipassoc(_dot_)org
http://mipassoc.org/mailman/listinfo/ietf-dkim