[ietf-dkim] Document Action: 'Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)' to Informational RFC
The IESG <iesg-secretary@ietf.org> Mon, 24 July 2006 20:46 UTC
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1G57Jz-0000cp-90 for ietf-dkim-archive@lists.ietf.org; Mon, 24 Jul 2006 16:46:35 -0400
Received: from sb7.songbird.com ([208.184.79.137]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G57Jw-0003RO-R1 for ietf-dkim-archive@lists.ietf.org; Mon, 24 Jul 2006 16:46:35 -0400
Received: from sb7.songbird.com (sb7.songbird.com [127.0.0.1]) by sb7.songbird.com (8.12.11.20060308/8.12.11) with ESMTP id k6OKggGk001799; Mon, 24 Jul 2006 13:42:43 -0700
Received: from oak.neustar.com (oak.neustar.com [209.173.53.70]) by sb7.songbird.com (8.12.11.20060308/8.12.11) with ESMTP id k6OKgaDj001775 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for <ietf-dkim@mipassoc.org>; Mon, 24 Jul 2006 13:42:37 -0700
Received: from stiedprstage1.ietf.org (stiedprstage1.va.neustar.com [10.31.47.10]) by oak.neustar.com (8.12.8/8.12.8) with ESMTP id k6OKg5p0010244 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 24 Jul 2006 20:42:06 GMT
Received: from ietf by stiedprstage1.ietf.org with local (Exim 4.43) id 1G57Fd-0001LD-RJ; Mon, 24 Jul 2006 16:42:05 -0400
X-test-idtracker: no
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Message-Id: <E1G57Fd-0001LD-RJ@stiedprstage1.ietf.org>
Date: Mon, 24 Jul 2006 16:42:05 -0400
X-Songbird: Clean, Clean
Cc: dkim chair <leiba@watson.ibm.com>, Internet Architecture Board <iab@iab.org>, dkim mailing list <ietf-dkim@mipassoc.org>, RFC Editor <rfc-editor@rfc-editor.org>
Subject: [ietf-dkim] Document Action: 'Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)' to Informational RFC
X-BeenThere: ietf-dkim@mipassoc.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IETF DKIM Discussion List <ietf-dkim.mipassoc.org>
List-Unsubscribe: <http://mipassoc.org/mailman/listinfo/ietf-dkim>, <mailto:ietf-dkim-request@mipassoc.org?subject=unsubscribe>
List-Archive: <http://mipassoc.org/pipermail/ietf-dkim>
List-Post: <mailto:ietf-dkim@mipassoc.org>
List-Help: <mailto:ietf-dkim-request@mipassoc.org?subject=help>
List-Subscribe: <http://mipassoc.org/mailman/listinfo/ietf-dkim>, <mailto:ietf-dkim-request@mipassoc.org?subject=subscribe>
Sender: ietf-dkim-bounces@mipassoc.org
Errors-To: ietf-dkim-bounces@mipassoc.org
X-SongbirdInformation: support@songbird.com for more information
X-Songbird-From: ietf-dkim-bounces@mipassoc.org
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 21c69d3cfc2dd19218717dbe1d974352
The IESG has approved the following document: - 'Analysis of Threats Motivating DomainKeys Identified Mail (DKIM) ' <draft-ietf-dkim-threats-03.txt> as an Informational RFC This document is the product of the Domain Keys Identified Mail Working Group. The IESG contact persons are Russ Housley and Sam Hartman. A URL of this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-dkim-threats-03.txt Technical Summary This document provides an analysis of some threats against Internet mail that are intended to be addressed by signature-based mail authentication, in particular DomainKeys Identified Mail (DKIM). It discusses the nature and location of the bad actors, what their capabilities are, and what they intend to accomplish via their attacks. Working Group Summary The DKIM WG easily reached consensus on the specific threats and on how to document them. A couple of participants had concerns that the document contained insufficient detail or was restricting design options, but these participants also want the DKIM WG to move on to protocol design. Protocol Quality As this is a threat analysis, there are no implementation issues. The DKIM WG chairs solicited review from some current and former IAB members, and received review from one, who was not totally pleased with the document, nonetheless he helped improve it. The main issue with such an analysis is that one can never know when the work is complete. The DKIM WG did expend significant effort on this document both in creating text and review. This document was reviewed by Russ Housley for the IESG. _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html
- [ietf-dkim] Document Action: 'Analysis of Threats… The IESG
- Re: [ietf-dkim] Document Action: 'Analysis of Thr… Dave Crocker
- Re: [ietf-dkim] Document Action: 'Analysis of Thr… Stephen Farrell