{"draft":"draft-ietf-dkim-threats-03","doc_id":"RFC4686","title":"Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)","authors":["J. Fenton"],"format":["ASCII","HTML"],"page_count":"29","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Domain Keys Identified Mail SEC","abstract":"This document provides an analysis of some threats against Internet\r\nmail that are intended to be addressed by signature-based mail\r\nauthentication, in particular DomainKeys Identified Mail. It\r\ndiscusses the nature and location of the bad actors, what their\r\ncapabilities are, and what they intend to accomplish via their\r\nattacks. This memo provides information for the Internet community.","pub_date":"September 2006","keywords":["email","attack","authentication","signature","ssp"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC4686","errata_url":null}