> Keith Moore wrote:
> 
> > Relative to DKIM's authentication model I'm asking for two things: one 
> > is the ability to separately authenticate successive submissions of 
> > the same message without destroying information about earlier 
> > submission. The other is the ability to authenticate envelope 
> > information in addition to header and body information.  I'm asking 
> > for these because I know through long experience that sometimes it's 
> > important to know who originally sent a message, sometimes it's 
> > important to know who last sent a message, and sometimes it's 
> > important to know to whom the message was sent.
> 
> 
> The question that gets asked here is: what problem are you trying to solve?

in effect, you're asking me to do the analysis for my threat model. *

it's a reasonable request, but not something I can do within the
timeframe that people seem to expect responses to email messages.

Keith

* because if I stop short of doing a fairly complete analysis, the group
will attack it for incompleteness.  if I provide a fairly complete
analysis the group will attack that too, but at least that attack will
be useful.
_______________________________________________
ietf-dkim mailing list
http://dkim.org

Reply via email to