In case anyone needs them, here are useful links:

Meeting materials, including agenda and slides used:
https://datatracker.ietf.org/public/meeting_materials.cgi?meeting_num=65
(search for "DKIM")

Jabber logs:
http://www.ietf.org/meetings/ietf-logs/[EMAIL PROTECTED]/2006-03-20.html
http://www.ietf.org/meetings/ietf-logs/[EMAIL PROTECTED]/2006-03-22.html

Audio archive:
http://limestone.uoregon.edu/ftp/pub/videolab/media/ietf65/ietf65monch2.mp3.1
http://limestone.uoregon.edu/ftp/pub/videolab/media/ietf65/ietf65wedch2.mp3.1


I will post a summary of the threats and base issues later today,
taking the items from Jim's and Eric's slides and including the
resolutions.

--
Barry Leiba, DKIM Working Group co-chair  ([EMAIL PROTECTED])
http://www.research.ibm.com/people/l/leiba
http://www.research.ibm.com/spam
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to