----- Original Message -----
From: "Barry Leiba" <leiba(_at_)watson(_dot_)ibm(_dot_)com>
To: "IETF-DKIM" <ietf-dkim(_at_)mipassoc(_dot_)org>
For now, let's all think about what aspects of SS{P/D/x} we need to
consider for the threats document.
Is it reasonable to ask if the thread considerations include impact
considerations?
IMO, impact considerations are important to discuss and work out, I
personally would prefer to not get into the semantics that an impact is in
itself an exploit.
--
Hector Santos, Santronics Software, Inc.
http://www.santronics.com
_______________________________________________
ietf-dkim mailing list
http://dkim.org