
In message <200502071721.05162.mark(a)mcs.vuw.ac.nz>, Mark Davies writes:
I agree that the "keysigning" party approach generally bypasses actually confirming the email addresses really belong to the person in control of the key. (Which is unfortunate as the email address tends to be one of the more trusted parts.) The usual approach I've seen to confirm that the email address is correct is to send the signed key to the email address listed, encrypted with the key. And not upload the key/signature to a key server. That way only the person in control of both the email address (used) and the key is able to gain access to the signature, and it's not visible to anyone else until they've done so. The NetBSD approach seems to go further and confirm all the uids, providing one follows the elaborate process of tracking each "challenge" that is sent out against the particular uid it belongs to. But I'm not sure it's always necessary if one only signs uids one has other reasons to know are associated with the person in question. (I generally avoid signing uids for which I don't recognise the email address, for instance, unless it's the one to which the key is being sent.) As it happens I've already seen half a dozen new signatures for my key uploaded to the keyservers and not emailed to me, so those people presumably trust the email address for other reasons. Ewen
participants (1)
-
Ewen McNeill