The authors and the chairs think this version of the "deployment" draft is ready. Therefore, we'll start a working-group last call on it, which will end on Friday, 7 August -- the Friday after the end of the Stockholm IETF meeting.
Everyone: please review this version and bring up any issues you have with it -- please change the subject and start a new thread for that. If you agree that this version's ready to go, please post a "WFM" message to this thread. This is the last document in this working group's charter. At some level, we're done. We have a 2-hour session scheduled in Stockholm on Tuesday afternoon (28 July), and the time there will be spent discussing next steps, and possible rechartering. We'll have a suggested agenda up soon. On Sat, Jul 11, 2009 at 2:45 PM, <[email protected]> wrote: > A New Internet-Draft is available from the on-line Internet-Drafts > directories. > This draft is a work item of the Domain Keys Identified Mail Working Group of > the IETF. > > > Title : DomainKeys Identified Mail (DKIM) Development, > Deployment and Operations > Author(s) : T. Hansen, et al. > Filename : draft-ietf-dkim-deployment-07.txt > Pages : 50 > Date : 2009-07-11 > > DomainKeys Identified Mail (DKIM) allows an organization to claim > responsibility for transmitting a message, in a way that can be > validated by a recipient. The organization can be the author's, the > originating sending site, an intermediary, or one of their agents. A > message can contain multiple signatures, from the same or different > organizations involved with the message. DKIM defines a domain-level > digital signature authentication framework for email, using public > key cryptography, using the domain name service as its key server > technology [RFC4871]. This permits verification of a responsible > organization, as well as the integrity of the message contents. DKIM > will also provide a mechanism that permits potential email signers to > publish information about their email signing practices; this will > permit email receivers to make additional assessments about messages. > DKIM's authentication of email identity can assist in the global > control of "spam" and "phishing". This document provides > implementation, deployment, operational and migration considerations > for DKIM. > > A URL for this Internet-Draft is: > http://www.ietf.org/internet-drafts/draft-ietf-dkim-deployment-07.txt > > Internet-Drafts are also available by anonymous FTP at: > ftp://ftp.ietf.org/internet-drafts/ _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html
