Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)

Document Type Replaced Internet-Draft (individual in sec area)
Author Jim Fenton 
Last updated 2015-10-14 (latest revision 2005-12-20)
Replaced by RFC 4686, RFC 4686
Stream Internet Engineering Task Force (IETF)
Expired & archived
plain text pdf htmlized bibtex
Stream WG state (None)
Document shepherd No shepherd assigned
IESG IESG state Replaced by draft-ietf-dkim-threats
Consensus Boilerplate Unknown
Telechat date
Responsible AD Russ Housley
IESG note PROTO Shepherd: Stephen Farrell <>
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


This document provides an analysis of some threats against Internet mail that are intended to be addressed by signature-based mail authentication, in particular DomainKeys Identified Mail. It discusses the nature and location of the bad actors, what their capabilities are, and what they intend to accomplish via their attacks.


Jim Fenton (

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)