On September 27, 2005 at 20:56, Jim Fenton wrote:

> Actually this document goes somewhat beyond a pure requirements document 
> because it does discuss the effectiveness of a particular existing 
> design, dkim-base-00 and dkim-ssp-00, in responding to these threats.  

Which can lead to the problem of defining the problem(s) to fit
the solution.

> This is intended to illustrate the approximate effectiveness of 
> something that approximates DKIM, to show (hopefully) that it does 
> something useful and is worthy of the formation of a working group.  It 
> is not intended to preclude further improvement of the specifications.

It will help if more specifics are given on how DKIM actually prevents,
or addresses, a specific threat.  Some of the text requires the
reader takes it on faith that DKIM adequetely addresses the problem.
Simple references to specific components of DKIM may be adequate.

--ewh
_______________________________________________
ietf-dkim mailing list
http://dkim.org

Reply via email to