-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Robert J. Hansen escribió:
Andre Amorim wrote:
X.509 (the standard used by freemail certs) and OpenPGP use the same
underlying algorithms, but the protocols are dramatically different.
Making them interoperate is hard, and is usually not worth
://www.nabble.com/using-gpg-with-private-keys-from-openssl-certificates--tp21057804p21074117.html
Sent from the GnuPG - User mailing list archive at Nabble.com.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg
arghman wrote:
So (and here's where I'm less clear) if I wanted to link the assertions made
by my X.509 certificates and my OpenPGP keys, there's no way to
automatically do this. But if I were to use the same private/public key in
both cases, I can assert to a third party that the entity in
Robert J. Hansen wrote:
arghman wrote:
So (and here's where I'm less clear) if I wanted to link the assertions made
by my X.509 certificates and my OpenPGP keys, there's no way to
automatically do this. But if I were to use the same private/public key in
both cases, I can assert to a third
arghman wrote:
I'm experimenting w/ using the freemail certificates from thawte was just
wondering if there is a way I can use them with gpg (openpgp, NOT S/MIME). I
can figure out how to use openssl to extract the rsa public key / private
key from the exported PKCS12 file, but I'm not sure
in an overall cryptographic framework.
--
View this message in context:
http://www.nabble.com/using-gpg-with-private-keys-from-openssl-certificates--tp21057804p21057804.html
Sent from the GnuPG - User mailing list archive at Nabble.com.
___
Gnupg-users mailing
arghman wrote:
* is this a bad idea?
It is a _hard_ idea. It is not necessarily a bad or stupid idea. Like
most things, whether it's inspired lunacy or just insane depends a lot
on your particular problem domain. :)
X.509 (the standard used by freemail certs) and OpenPGP use the same
with] is both trustable via Wot, *or* by trusting a
certificate authority. trustable probably not the right word but I'm a bit
shaky on the protocol vocabulary.
--
View this message in context:
http://www.nabble.com/using-gpg-with-private-keys-from-openssl-certificates--tp21057804p21063072.html
Sent from
arghman wrote:
I don't need them to interoperate, I would just like to use the same key
pair.
If they're using the same keypair, then they're interoperating. (For at
least some definitions of 'interoperability.' Total interoperability is
probably infeasible.)
What you want to do is very hard
not the right word but I'm a bit
shaky on the protocol vocabulary.
--
View this message in context:
http://www.nabble.com/using-gpg-with-private-keys-from-openssl-certificates--tp21057804p21063072.html
Sent from the GnuPG - User mailing list archive at Nabble.com
Andre Amorim wrote:
X.509 (the standard used by freemail certs) and OpenPGP use the same
underlying algorithms, but the protocols are dramatically different.
Making them interoperate is hard, and is usually not worth it.
Robert did you already check this:
The paper does not propose a way to
It's instead proposing something much different, which is
unrelated to the original poster's request
sorry bob, rigth, I misunderstood what he had said. It is whiskey
fault. :-) I'll read it again tom.
kind regards,
A.A.
2008/12/18 Robert J. Hansen r...@sixdemonbag.org:
Andre Amorim wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
arghman escribió:
* if I sign a message with that key pair, and someone challenges my
identity, what's the best/easiest way for me to prove my identity?
I don't need them to interoperate, I would just like to use the same key
pair. WoT is fine
13 matches
Mail list logo