RFC 4686

Analysis of Threats Motivating DomainKeys Identified Mail (DKIM), September 2006

File formats:
icon for text file icon for PDF icon for HTML
J. Fenton
dkim (sec)

Cite this RFC: TXT  |  XML  |   BibTeX

DOI:  https://doi.org/10.17487/RFC4686

Discuss this RFC: Send questions or comments to the mailing list ietf-dkim@ietf.org

Other actions: Submit Errata  |  Find IPR Disclosures from the IETF  |  View History of RFC 4686


This document provides an analysis of some threats against Internet mail that are intended to be addressed by signature-based mail authentication, in particular DomainKeys Identified Mail. It discusses the nature and location of the bad actors, what their capabilities are, and what they intend to accomplish via their attacks. This memo provides information for the Internet community.

For the definition of Status, see RFC 2026.

For the definition of Stream, see RFC 8729.

Advanced Search