ietf-dkim
[Top] [All Lists]

Re: threat modeling & use cases (was RE: [ietf-dkim] Tracing SSP'sparadigm change

2007-12-13 00:34:18
Steve Atkins wrote:

Well, without knowing what threats SSP is supposed to mitigate, it's
impossible to start analyzing how well it does so. So identifying the
threats
certainly can't be the last step, and I can't actually think of anything
that comes before that.

Where would you start?

RFC 5016.

-Jim
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

<Prev in Thread] Current Thread [Next in Thread>