[ietf-dkim] on the scope and necessity of threat analysis
pbaker at verisign.com
Sun Aug 14 05:29:40 PDT 2005
Just make a cogent statement of the problems that DKIM is attempting to
solve that would not exist if DKIM did not exist.
There are two threat analyses possible:
Report = Threats (World)
Report = Threats (World + DKIM)
To get chartered the group needs to show
Threats (World + DKIM) < Threats (World)
If you take my advice on the charter this is much easier to do.
More information about the ietf-dkim