ietf-dkim
[Top] [All Lists]

[ietf-dkim] Re: Requesting progression of DKIM threats draft...

2006-05-05 13:46:34

Of course I forgot some bits. These are they:

Russ Housley wrote:
The write-up also needs to include these three sections ....

Technical Summary

   This document provides an analysis of some threats against Internet
   mail that are intended to be addressed by signature-based mail
   authentication, in particular DomainKeys Identified Mail.  It
   discusses the nature and location of the bad actors, what their
   capabilities are, and what they intend to accomplish via their
   attacks.

Working Group Summary

   The working group fairly easily reached consensus on the specific
   threats and on how to document them. A couple of participants had
   concerns that the threats draft contained insufficient detail or
   was closing off design options for later, but these participants
   seem also to accept that the WG should move on to protocol design.


Protocol Quality

   As this is a threat analysis there is no issue of implementation.
   The WG chairs solicited review from some current and former IAB
   members and did get some review from one, who while perhaps not
   entirely pleased with DKIM, nonetheless helped improve the
   document. The main issue with such an analysis is that you can
   never know you've completed the work, so additional review and
   insight will be welcomed whenever it turns up. Having said that
   the WG did expend significant effort on this document both in
   creating text and review.

Stephen.

_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

<Prev in Thread] Current Thread [Next in Thread>