Steve Atkins wrote:

>> Actually, I think that's the LAST step.  My hypothesis is that
>> different types of signers and/or verifiers (different use cases)
>> perceive different threats.
> 
> Well, without knowing what threats SSP is supposed to mitigate, it's
> impossible to start analyzing how well it does so. So identifying the
> threats certainly can't be the last step, and I can't actually think
> of anything that comes before that.
> 
> Where would you start?

Dangit, Steve, we're agreeing again.  I'm going to start by documenting
the many different-yet-overlapping use cases & related threats.  The
only difference from your earlier statement is that I don't think we'll
ever have conesensus on The One True Threat Model; instead each
different-yet-overlapping user of DKIM & SSP will have
different-yet-overlapping concerns about each.


_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to