The authors and the chairs think this version of the "deployment"
draft is ready. Therefore, we'll start a working-group last call on
it, which will end on Friday, 7 August -- the Friday after the end of
the Stockholm IETF meeting.
Everyone: please review this version and bring up any issues you have
with it -- please change the subject and start a new thread for that.
If you agree that this version's ready to go, please post a "WFM"
message to this thread.
This is the last document in this working group's charter. At some
level, we're done. We have a 2-hour session scheduled in Stockholm on
Tuesday afternoon (28 July), and the time there will be spent
discussing next steps, and possible rechartering. We'll have a
suggested agenda up soon.
On Sat, Jul 11, 2009 at 2:45 PM, <Internet-Drafts(_at_)ietf(_dot_)org> wrote:
A New Internet-Draft is available from the on-line Internet-Drafts
directories.
This draft is a work item of the Domain Keys Identified Mail Working Group of
the IETF.
Title : DomainKeys Identified Mail (DKIM) Development,
Deployment and Operations
Author(s) : T. Hansen, et al.
Filename : draft-ietf-dkim-deployment-07.txt
Pages : 50
Date : 2009-07-11
DomainKeys Identified Mail (DKIM) allows an organization to claim
responsibility for transmitting a message, in a way that can be
validated by a recipient. The organization can be the author's, the
originating sending site, an intermediary, or one of their agents. A
message can contain multiple signatures, from the same or different
organizations involved with the message. DKIM defines a domain-level
digital signature authentication framework for email, using public
key cryptography, using the domain name service as its key server
technology [RFC4871]. This permits verification of a responsible
organization, as well as the integrity of the message contents. DKIM
will also provide a mechanism that permits potential email signers to
publish information about their email signing practices; this will
permit email receivers to make additional assessments about messages.
DKIM's authentication of email identity can assist in the global
control of "spam" and "phishing". This document provides
implementation, deployment, operational and migration considerations
for DKIM.
A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-dkim-deployment-07.txt
Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html