Doug,
In my mail I explicity said that reviewing the goals of SSP is NOT part of
this document. I said that an appendix could explain what SSP is and how it
might be used to extend the base document. I think that SSP needs to do
it's own version of the same document.
Jim
-----Original Message-----
From: Douglas Otis [mailto:dotis(_at_)mail-abuse(_dot_)org]
Sent: Monday, November 21, 2005 9:56 AM
To: dcrocker(_at_)bbiw(_dot_)net
Cc: IETF-DKIM; Jim Schaad
Subject: Re: [ietf-dkim] SSP security relies upon the visual
domain appearance
On Nov 21, 2005, at 8:01 AM, Dave Crocker wrote:
Can you clarify the benefits obtained with SSP?
Scott, please don't.
It would seem reviewing the goals of SSP could be in line
with questions raised by Jim Schaad.
http://www.ietf.org/internet-drafts/draft-otis-dkim-threats-01.txt
Jim, is this review was closer to your expectations?
-Doug
_______________________________________________
ietf-dkim mailing list
http://dkim.org