ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] on the scope and necessity of threat analysis

2005-08-14 06:50:03
Hallam-Baker, Phillip wrote:
Just make a cogent statement of the problems that DKIM is attempting to
solve that would not exist if DKIM did not exist.

There are two threat analyses possible:

        Report = Threats (World)

        Report = Threats (World + DKIM)

To get chartered the group needs to show

        Threats (World + DKIM) < Threats (World)

that's a necessary condition, not a sufficient one.

Keith
_______________________________________________
ietf-dkim mailing list
ietf-dkim(_at_)mipassoc(_dot_)org
http://mipassoc.org/mailman/listinfo/ietf-dkim