I finally read it, and I like it, too.

My only suggestion is to add something in section 6 about attacks on
the key distribution system, intended to make it impossible for
recipients to tell whether a signature is valid or not.  I'm thinking
of stuff like DDOS of the DNS servers that distribute the keys and the
usual litany of attacks on DNS.

R's,
John
_______________________________________________
ietf-dkim mailing list
http://dkim.org

Reply via email to