Skip to main content

Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)
draft-fenton-dkim-threats-02

Document Type Replaced Internet-Draft (individual in sec area)
Expired & archived
Author Jim Fenton
Last updated 2015-10-14 (Latest revision 2005-12-20)
Replaced by draft-ietf-dkim-threats
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status Informational
Formats
Stream WG state (None)
Document shepherd (None)
IESG IESG state Replaced by draft-ietf-dkim-threats
Action Holders
(None)
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD Russ Housley
IESG note ** No value found for 'doc.notedoc.note' **
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document provides an analysis of some threats against Internet mail that are intended to be addressed by signature-based mail authentication, in particular DomainKeys Identified Mail. It discusses the nature and location of the bad actors, what their capabilities are, and what they intend to accomplish via their attacks.

Authors

Jim Fenton

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)