On Wed, Oct 17, 2007 at 09:34:34AM +0200, Sven Radde wrote:

> Probably true, but how will spammers get signatures on their stuff that
> are valid *for me*? They would have to compromise one of the keys that
> are valid on my keyring or one that would be considered trustworthy by
> means of the web-of-trust.

Why not just take some signed content from a key in the strong set,
like this message, and add some unsigned spam to it?  It would be
a great way to ruin keys by making them "spam-keys."

> Maintaining a dedicated database of "spam-keys" that had been
> trustworthy but were used for spam would help, too (to assign messages
> signed by those keys a bad score).

(These are best revoked by their owners, of course.)

Unfortunately, these databases might be naively implemented as
keyservers, or existing keyservers could start being burdened with
"votes" in the form of signatures and/or revocations from any number
of signers (voters).  At most, you would only want to publish
fingerprints of such keys rather than helping propagate and/or
bloat them.

Worse, how do you determine that some replayed signed content was
indeed replayed?  Does everyone now have to start publishing lists
of the hashes for all their unencrypted, signed messages and the
intended recipient(s) for each message?  How would these lists
be verified?

-- 
Jason Harris           |  NIC:  JH329, PGP:  This _is_ PGP-signed, isn't it?
[EMAIL PROTECTED] _|_ web:  http://keyserver.kjsl.com/~jharris/
          Got photons?   (TM), (C) 2004

Attachment: pgphdV7QHlDiV.pgp
Description: PGP signature

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to