ietf-dkim
[Top] [All Lists]

Re: Issue 1527 - Threats (was Re: [ietf-dkim] Hostile to DKIM deployment)

2007-12-14 10:20:40
Dave Crocker wrote:

Right. So let's explore what current problems specific functions in SSP will mitigate.

Folks who are proponents of particular SSP features should document specific threats and specific SSP feature(s) that will mitigate them.

An essential part of such exercise is to explain why the mitigation is strategic. That is, why will it not be easy for attackers to work around the SSP mechanism and achieve equivalent attack success.

I believe the analysis and chart just posted and provided in:

  http://mipassoc.org/pipermail/ietf-dkim/2007q4/008702.html

Serves as basis in analyzing the DKIM-BASE Protocol Model and how SSP plays a major role in the non-repudiation process. In additional, it shows where failures are still a fundamental problem in DKIM-BASE.


--
Sincerely

Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com

_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

<Prev in Thread] Current Thread [Next in Thread>