Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)
draft-fenton-dkim-threats-02
Document | Type |
Replaced Internet-Draft
(individual in sec area)
Expired & archived
|
|
---|---|---|---|
Author | Jim Fenton | ||
Last updated | 2015-10-14 (Latest revision 2005-12-20) | ||
Replaced by | draft-ietf-dkim-threats | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | Informational | ||
Formats | |||
Stream | WG state | (None) | |
Document shepherd | (None) | ||
IESG | IESG state | Replaced by draft-ietf-dkim-threats | |
Action Holders |
(None)
|
||
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | Russ Housley | ||
IESG note | |||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document provides an analysis of some threats against Internet mail that are intended to be addressed by signature-based mail authentication, in particular DomainKeys Identified Mail. It discusses the nature and location of the bad actors, what their capabilities are, and what they intend to accomplish via their attacks.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)