On Sep 21, 2008, at 10:30 PM, Kevin Hilton wrote:

If you never want to see that algorithm used ever, leave it
off the list completely.

Not to beat a dead horse, but this statement isn't exactly true.  The
sender can force the use of a particular algorithm that is not on the
list.  I take objection to the use of the work "never".

Oh, for crying out loud. The sender can do whatever the sender likes. That's what is so nice about being the sender. The sender can send unencrypted, but we don't mention that option. The sender could also choose to encapsulate their message in a text-to-speech MP3, but we don't mention that option either. Heck, there could be some bug in the sender's program that causes it to use the wrong algorithm, and again we don't mention that.

I'm not going to prefix every single statement I make with an "Except in the case where the sender is intentionally violating the spec and is ignoring all the warning messages telling them to knock it off...." We need to have some baseline of communication here, and avoid taking something that is really very simple and making it tragically complex.

David


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to