On September 27, 2005 at 20:56, Jim Fenton wrote: > Actually this document goes somewhat beyond a pure requirements document > because it does discuss the effectiveness of a particular existing > design, dkim-base-00 and dkim-ssp-00, in responding to these threats.
Which can lead to the problem of defining the problem(s) to fit the solution. > This is intended to illustrate the approximate effectiveness of > something that approximates DKIM, to show (hopefully) that it does > something useful and is worthy of the formation of a working group. It > is not intended to preclude further improvement of the specifications. It will help if more specifics are given on how DKIM actually prevents, or addresses, a specific threat. Some of the text requires the reader takes it on faith that DKIM adequetely addresses the problem. Simple references to specific components of DKIM may be adequate. --ewh _______________________________________________ ietf-dkim mailing list http://dkim.org
