Dave Crocker wrote:
Right. So let's explore what current problems specific functions in SSP
will mitigate.
Folks who are proponents of particular SSP features should document
specific threats and specific SSP feature(s) that will mitigate them.
An essential part of such exercise is to explain why the mitigation is
strategic. That is, why will it not be easy for attackers to work
around the SSP mechanism and achieve equivalent attack success.
I believe the analysis and chart just posted and provided in:
http://mipassoc.org/pipermail/ietf-dkim/2007q4/008702.html
Serves as basis in analyzing the DKIM-BASE Protocol Model and how SSP
plays a major role in the non-repudiation process. In additional, it
shows where failures are still a fundamental problem in DKIM-BASE.
--
Sincerely
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html