ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] draft-fenton-dkim-threats-00

2005-10-12 14:11:35
On September 27, 2005 at 20:56, Jim Fenton wrote:

Actually this document goes somewhat beyond a pure requirements document 
because it does discuss the effectiveness of a particular existing 
design, dkim-base-00 and dkim-ssp-00, in responding to these threats.  

Which can lead to the problem of defining the problem(s) to fit
the solution.

This is intended to illustrate the approximate effectiveness of 
something that approximates DKIM, to show (hopefully) that it does 
something useful and is worthy of the formation of a working group.  It 
is not intended to preclude further improvement of the specifications.

It will help if more specifics are given on how DKIM actually prevents,
or addresses, a specific threat.  Some of the text requires the
reader takes it on faith that DKIM adequetely addresses the problem.
Simple references to specific components of DKIM may be adequate.

--ewh
_______________________________________________
ietf-dkim mailing list
http://dkim.org

<Prev in Thread] Current Thread [Next in Thread>