[146447] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Implementations, attacks on DHTs, Mix Nets?

daemon@ATHENA.MIT.EDU (The Doctor)
Wed Aug 28 13:13:53 2013

X-Original-To: cryptography@metzdowd.com
Date: Wed, 28 Aug 2013 10:59:30 -0400
From: The Doctor <drwho@virtadpt.net>
To: cryptography@metzdowd.com
In-Reply-To: <alpine.BSO.2.00.1308272145240.19706@cobalt.astro.indiana.edu>
Reply-To: drwho@virtadpt.net
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 08/27/2013 09:47 PM, Jonathan Thornburg wrote:

> Assuming it were widely deployed, would
> DNSSEC-for-key-distribution be a reasonable way to store 
> email_address --> public_key mappings?

It might be a reasonable way of protecting PGP key information in DNS
records so that someone doesn't try inserting their own when it's
looked up.  Here's something I've been playing with for the first half
of this: http://www.gushi.org/make-dns-cert/HOWTO.html

- -- 
The Doctor [412/724/301/703] [ZS]
Developer, Project Byzantium: http://project-byzantium.org/

PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F  DD89 3BD8 FF2B 807B 17C1
WWW: https://drwho.virtadpt.net/

"The enemies know the system.  The allies do not." --Jay Jacobs

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.20 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlIeEFIACgkQO9j/K4B7F8EDGQCfdLmwFha87qK3PjVaUBD2gB+4
S90AoKkoy+lg6Pyww5HvV+fRJ2IcnhSg
=jZy3
-----END PGP SIGNATURE-----
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post