In case anyone needs them, here are useful links: Meeting materials, including agenda and slides used: https://datatracker.ietf.org/public/meeting_materials.cgi?meeting_num=65 (search for "DKIM")
Jabber logs: http://www.ietf.org/meetings/ietf-logs/[EMAIL PROTECTED]/2006-03-20.html http://www.ietf.org/meetings/ietf-logs/[EMAIL PROTECTED]/2006-03-22.html Audio archive: http://limestone.uoregon.edu/ftp/pub/videolab/media/ietf65/ietf65monch2.mp3.1 http://limestone.uoregon.edu/ftp/pub/videolab/media/ietf65/ietf65wedch2.mp3.1 I will post a summary of the threats and base issues later today, taking the items from Jim's and Eric's slides and including the resolutions. -- Barry Leiba, DKIM Working Group co-chair ([EMAIL PROTECTED]) http://www.research.ibm.com/people/l/leiba http://www.research.ibm.com/spam _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html
