[2726] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Secure Office

daemon@ATHENA.MIT.EDU (Jay D. Dyson)
Wed May 20 13:06:06 1998

Date: Wed, 20 May 1998 09:14:19 -0700 (PDT)
From: "Jay D. Dyson" <jdyson@techreports.jpl.nasa.gov>
To: Cryptography List <cryptography@c2.net>
In-Reply-To: <v03110729b1880d88d8af@[207.94.249.48]>

-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 19 May 1998, Bill Frantz wrote:

> >	I have upwards of a dozen keys (mostly expired).  I've put
> >very few on the key servers.
> 
> Also, there are a number of attacks you can prevent by not allowing your
> opponent to have your public key.

	Namely?

> If you are paranoid, you might decide to treat your public key as a
> "need to know" item. 

	And what's to keep Friendly Joe User from submitting your pubkey
*for* you?  Many people I've known submit their entire keyrings to
keyservers.  And most keyservers I know don't honor remove requests
(though they will honor key revocation certificates).

   (    (                                                        ______
   ))   ))  .- "There's always time for a good cup of coffee" -.  >===<--.
 C|~~|C|~~| [> Jay D. Dyson - jdyson@techreports.jpl.nasa.gov <] | =   |-'
  `--' `--' `-------------- Nemo impune lacessit --------------' `-----'

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNWMBXee1NzV7EsRFAQGx1wQAjGQ8ve+LDxqHzbueyvvrXkzDEOBbZ1LI
VfJPPkvvHpv5qJgjjExGbogjaQC4kQaznTzaDEBNsHzCOkGOfjCIhSCTajFJmJGA
+QpOESGNU9up+eZ6qSu7SGauF4OhzLEjSzN8sW0cl+45XEMwf8dwWN9Ik7jQV9ps
utCA7yoy3wY=
=GWmP
-----END PGP SIGNATURE-----


home help back first fref pref prev next nref lref last post