ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] requirements

2006-07-28 00:51:31
In short, it implies DKIM-BASE is based on a "Good Citizen" model where every "i is dotted" and every "t is crossed." But it lacks no security provisions for protecting against the most obvious of all DKIM failures - in
this case as to relates the above statement - unauthorized signings.

What do you mean by an unauthorized signing, Hector?

Perhaps I don't understand something, but if some unauthorized entity owns my DNS and my outgoing MTAs, then I have network problems beyond the scope of DKIM.

        Jon

_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html