I have just submitted a new threat analysis of DKIM as an Internet
Draft. Hopefully this will form the basis for a meaningful discussion
on the utility and effectiveness of DKIM that were voiced at the last BoF.
This should show up in the internet-drafts repository Real Soon Now. If
you just can't wait, you may try:
ftp://ftpeng.cisco.com/fenton/draft-fenton-dkim-threats-00.txt
or
ftp://ftpeng.cisco.com/fenton/draft-fenton-dkim-threats-00.html
Let the discussion begin!
-Jim
_______________________________________________
ietf-dkim mailing list
http://dkim.org