Beginn der weitergeleiteten Nachricht:
Datum: Sun, 9 Dec 2018 20:35:41 +0100
Von: Stefan Claas
An: Dirk Gottschalk
Betreff: Re: Garbled data in keyservers
On Sun, 09 Dec 2018 20:26:21 +0100, Dirk Gottschalk wrote:
Hi Dirk,
> > I don't think so. Create an anon account at ProtonMail via Tor
On 09.12.2018 20:03, Stefan Claas wrote:
> To bad that Werner's WKD is not widely adopted from email
> service providers...
Just for the record but it is adopted by e-mail service providers that are
interested in OpenPGP (like ProtonMail and Posteo.de, see
https://wiki.gnupg.org/WKD).
As for
Am 09.12.18 um 18:24 schrieb Dirk Gottschalk via Gnupg-users:
> And further, why should anyone run something like a ca CA for free.
> Sure, CAcert does it. But that's the onlöy organisation I know who does
> this.
Also WPIA [1] plans to do this and started a audit process for their CA.
regards
Hello Justina
Am Sonntag, den 09.12.2018, 08:23 -0900 schrieb justina colmena via
Gnupg-users:
> On December 9, 2018 7:54:01 AM EST, Stefan Claas <
> stefan.cl...@posteo.de> wrote::
> > Get a sig from a CA and then upload your key via email.
> >
> That's a bit steep, and was never the original
On Sun, 09 Dec 2018 20:55:36 +0100, Dirk Gottschalk wrote:
Hello Dirk,
> That I mentioned in the other reply I have sent a few seconds ago.
>
> > right? A key which would bear a CA sig would imho not have such
> > additional and funny UID's or sigs, because it would make the key
> > owner look
Am Sonntag, den 09.12.2018, 19:54 +0100 schrieb Stefan Claas:
> On Sun, 9 Dec 2018 19:51:37 +0100, Stefan Claas wrote:
> > On Sun, 09 Dec 2018 18:24:38 +0100, Dirk Gottschalk wrote:
>
> Hi Dirk,
> > > Get a sig from a CA and then upload your key via email.
> > > Then the key servers do something
Am Sonntag, den 09.12.2018, 20:03 +0100 schrieb Stefan Claas:
> On Sun, 9 Dec 2018 19:38:31 +0100, Stefan Claas wrote:
> > On Sun, 09 Dec 2018 08:23:03 -0900, justina colmena via Gnupg-users
> > wrote:
> > > On December 9, 2018 7:54:01 AM EST, Stefan Claas
> > > wrote::
> > > > Get a sig from a
Hi.
Am Sonntag, den 09.12.2018, 13:54 +0100 schrieb Stefan Claas:
> On Thu, 06 Dec 2018 15:22:14 +0100, Werner Koch wrote:
>
> > > That's right, but my thought is / was someone can (ab)use key
> > > servers as data storage / retrieval system and then only provides
> > > the key id
> >
> > As
On Sun, 9 Dec 2018 19:51:37 +0100, Stefan Claas wrote:
> On Sun, 09 Dec 2018 18:24:38 +0100, Dirk Gottschalk wrote:
Hi Dirk,
>
> > Get a sig from a CA and then upload your key via email.
> > Then the key servers do something like a gpg --check-sigs
> > to see if a key bears a valid CA sig and
On Sun, 9 Dec 2018 21:11:12 +0100, Juergen Bruckner wrote:
> Am 09.12.18 um 18:24 schrieb Dirk Gottschalk via Gnupg-users:
> > And further, why should anyone run something like a ca CA for free.
> > Sure, CAcert does it. But that's the onlöy organisation I know who
> > does this.
>
> Also WPIA
On December 9, 2018 7:54:01 AM EST, Stefan Claas
wrote::
>
>Get a sig from a CA and then upload your key via email.
>
That's a bit steep, and was never the original goal of PGP or GPG.
If the goal is to eliminate the bulk of bad keys and junk from key servers, an
account creation with basic
On Sun, 9 Dec 2018 19:38:31 +0100, Stefan Claas wrote:
> On Sun, 09 Dec 2018 08:23:03 -0900, justina colmena via Gnupg-users
> wrote:
> > On December 9, 2018 7:54:01 AM EST, Stefan Claas
> > wrote::
> > >
> > >Get a sig from a CA and then upload your key via email.
> > >
> > That's a bit
On Sun, 09 Dec 2018 08:23:03 -0900, justina colmena via Gnupg-users
wrote:
> On December 9, 2018 7:54:01 AM EST, Stefan Claas
> wrote::
> >
> >Get a sig from a CA and then upload your key via email.
> >
> That's a bit steep, and was never the original goal of PGP or GPG.
No, in 2018 i think it
Hello Stefan.
Am Sonntag, den 09.12.2018, 19:38 +0100 schrieb Stefan Claas:
> On Sun, 09 Dec 2018 08:23:03 -0900, justina colmena via Gnupg-users
> wrote:
> > On December 9, 2018 7:54:01 AM EST, Stefan Claas
> > wrote::
> > > Get a sig from a CA and then upload your key via email.
> > >
> >
On Sun, 09 Dec 2018 20:34:55 +0100, Dirk Gottschalk wrote:
> Am Sonntag, den 09.12.2018, 20:03 +0100 schrieb Stefan Claas:
Hi Dirk,
> A weekend job... Muhahahahahahaha, you don't do much programming,
> don't you? One would have to write an email bot, change the keyserver
> code to no longer
Hi Stefan.
Am Sonntag, den 09.12.2018, 21:13 +0100 schrieb Stefan Claas:
> On Sun, 09 Dec 2018 20:55:36 +0100, Dirk Gottschalk wrote:
>
> Hello Dirk,
>
> > That I mentioned in the other reply I have sent a few seconds ago.
> >
> > > right? A key which would bear a CA sig would imho not have
On December 9, 2018 11:17:34 AM AKST, Stefan Claas
wrote:
>On Sun, 9 Dec 2018 21:11:12 +0100, Juergen Bruckner wrote:
>> Am 09.12.18 um 18:24 schrieb Dirk Gottschalk via Gnupg-users:
>> > And further, why should anyone run something like a ca CA for free.
>> > Sure, CAcert does it. But that's
Hi Stefan.
Am Sonntag, den 09.12.2018, 19:38 +0100 schrieb Stefan Claas:
> On Sun, 09 Dec 2018 08:23:03 -0900, justina colmena via Gnupg-users
> wrote:
> > On December 9, 2018 7:54:01 AM EST, Stefan Claas
> > wrote::
> > > Get a sig from a CA and then upload your key via email.
> > >
> >
On Thu, 06 Dec 2018 15:22:14 +0100, Werner Koch wrote:
> > That's right, but my thought is / was someone can (ab)use key
> > servers as data storage / retrieval system and then only provides
> > the key id
>
> As it has been commeted, there are easier ways to do that.
I have read also the
19 matches
Mail list logo