Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)
draft-fenton-dkim-threats-02

Document Type Replaced Internet-Draft (individual in sec area)
Last updated 2006-05-05 (latest revision 2005-12-20)
Replaced by draft-ietf-dkim-threats
Stream IETF
Intended RFC status Informational
Formats
Expired & archived
plain text pdf html
Stream WG state (None)
Document shepherd No shepherd assigned
IESG IESG state Replaced by draft-ietf-dkim-threats
Telechat date
Responsible AD Russ Housley
IESG note PROTO Shepherd: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Send notices to fenton@cisco.com, stephen.farrell@cs.tcd.ie

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-fenton-dkim-threats-02.txt

Abstract

This document provides an analysis of some threats against Internet mail that are intended to be addressed by signature-based mail authentication, in particular DomainKeys Identified Mail. It discusses the nature and location of the bad actors, what their capabilities are, and what they intend to accomplish via their attacks.

Authors

Jim Fenton (fenton@cisco.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)