Of course I forgot some bits. These are they:
Russ Housley wrote:
The write-up also needs to include these three sections ....
Technical Summary
This document provides an analysis of some threats against Internet
mail that are intended to be addressed by signature-based mail
authentication, in particular DomainKeys Identified Mail. It
discusses the nature and location of the bad actors, what their
capabilities are, and what they intend to accomplish via their
attacks.
Working Group Summary
The working group fairly easily reached consensus on the specific
threats and on how to document them. A couple of participants had
concerns that the threats draft contained insufficient detail or
was closing off design options for later, but these participants
seem also to accept that the WG should move on to protocol design.
Protocol Quality
As this is a threat analysis there is no issue of implementation.
The WG chairs solicited review from some current and former IAB
members and did get some review from one, who while perhaps not
entirely pleased with DKIM, nonetheless helped improve the
document. The main issue with such an analysis is that you can
never know you've completed the work, so additional review and
insight will be welcomed whenever it turns up. Having said that
the WG did expend significant effort on this document both in
creating text and review.
Stephen.
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html