[ietf-dkim] Document Action: 'Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)' to Informational RFC

The IESG <iesg-secretary@ietf.org> Mon, 24 July 2006 20:46 UTC

Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1G57Jz-0000cp-90 for ietf-dkim-archive@lists.ietf.org; Mon, 24 Jul 2006 16:46:35 -0400
Received: from sb7.songbird.com ([208.184.79.137]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G57Jw-0003RO-R1 for ietf-dkim-archive@lists.ietf.org; Mon, 24 Jul 2006 16:46:35 -0400
Received: from sb7.songbird.com (sb7.songbird.com [127.0.0.1]) by sb7.songbird.com (8.12.11.20060308/8.12.11) with ESMTP id k6OKggGk001799; Mon, 24 Jul 2006 13:42:43 -0700
Received: from oak.neustar.com (oak.neustar.com [209.173.53.70]) by sb7.songbird.com (8.12.11.20060308/8.12.11) with ESMTP id k6OKgaDj001775 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for <ietf-dkim@mipassoc.org>; Mon, 24 Jul 2006 13:42:37 -0700
Received: from stiedprstage1.ietf.org (stiedprstage1.va.neustar.com [10.31.47.10]) by oak.neustar.com (8.12.8/8.12.8) with ESMTP id k6OKg5p0010244 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 24 Jul 2006 20:42:06 GMT
Received: from ietf by stiedprstage1.ietf.org with local (Exim 4.43) id 1G57Fd-0001LD-RJ; Mon, 24 Jul 2006 16:42:05 -0400
X-test-idtracker: no
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Message-Id: <E1G57Fd-0001LD-RJ@stiedprstage1.ietf.org>
Date: Mon, 24 Jul 2006 16:42:05 -0400
X-Songbird: Clean, Clean
Cc: dkim chair <leiba@watson.ibm.com>, Internet Architecture Board <iab@iab.org>, dkim mailing list <ietf-dkim@mipassoc.org>, RFC Editor <rfc-editor@rfc-editor.org>
Subject: [ietf-dkim] Document Action: 'Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)' to Informational RFC
X-BeenThere: ietf-dkim@mipassoc.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IETF DKIM Discussion List <ietf-dkim.mipassoc.org>
List-Unsubscribe: <http://mipassoc.org/mailman/listinfo/ietf-dkim>, <mailto:ietf-dkim-request@mipassoc.org?subject=unsubscribe>
List-Archive: <http://mipassoc.org/pipermail/ietf-dkim>
List-Post: <mailto:ietf-dkim@mipassoc.org>
List-Help: <mailto:ietf-dkim-request@mipassoc.org?subject=help>
List-Subscribe: <http://mipassoc.org/mailman/listinfo/ietf-dkim>, <mailto:ietf-dkim-request@mipassoc.org?subject=subscribe>
Sender: ietf-dkim-bounces@mipassoc.org
Errors-To: ietf-dkim-bounces@mipassoc.org
X-SongbirdInformation: support@songbird.com for more information
X-Songbird-From: ietf-dkim-bounces@mipassoc.org
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 21c69d3cfc2dd19218717dbe1d974352

The IESG has approved the following document:

- 'Analysis of Threats Motivating DomainKeys Identified Mail (DKIM) '
   <draft-ietf-dkim-threats-03.txt> as an Informational RFC

This document is the product of the Domain Keys Identified Mail Working Group. 

The IESG contact persons are Russ Housley and Sam Hartman.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-dkim-threats-03.txt

Technical Summary

  This document provides an analysis of some threats against Internet
  mail that are intended to be addressed by signature-based mail
  authentication, in particular DomainKeys Identified Mail (DKIM).  It
  discusses the nature and location of the bad actors, what their
  capabilities are, and what they intend to accomplish via their
  attacks.

Working Group Summary

  The DKIM WG easily reached consensus on the specific threats and on
  how to document them.  A couple of participants had concerns that the
  document contained insufficient detail or was restricting design
  options, but these participants also want the DKIM WG to move on to
  protocol design.

Protocol Quality

  As this is a threat analysis, there are no implementation issues.  The
  DKIM WG chairs solicited review from some current and former IAB
  members, and received review from one, who was not totally pleased
  with the document, nonetheless he helped improve it.  The main issue
  with such an analysis is that one can never know when the work is
  complete.  The DKIM WG did expend significant effort on this document
  both in creating text and review.

  This document was reviewed by Russ Housley for the IESG.

_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html