Leo Gaspard <ekl...@gmail.com> wrote: >> You are right. Decryption is sufficient to demonstrate control of >the private key, because if he can decrypt, he can also sign. What I >said, "decrypt and sign," was redundant. > >Well... I still do not understand why decryption is sufficient to >demonstrate >control of the private key and not adding a UID (note I'm talking about >signed >UID's, not unsigned ones, of course). >Sorry.
I don't know how I can explain it any better than I have. I think you are confusing assertion with verification. Unless you can differentiate between the two in this case, I don't think you will see what I am talking about. The process of certifying someone else's key involves the following: (1) He claims that a key with n number of UIDs and fingerprint of x is his key. (2) You verify his identity and compare it with the information in his UID(s). (3) You send encrypted emails to each email address in his UIDs. (4) He replies with the decrypted messages that you sent. (5) If all went well, you certify his key. In the case that we have been discussing, it is assumed that all of those steps have been followed for the first key. With the second key, only the first two steps, and part of the third, have been followed. And now you are assuming that the second key (being independent from the first) is valid without following through all of those steps simply because you have validated the first key which, according to what you are suggesting, was used to sign the second key. Simply, assertion is not verification; probability is not certainty. If you didn't verify control of the key (wasn't that the point behind signing someone's key?), then your signature on his key will be baseless. If on the other hand we were talking about a new UID on the first key, we would just need to verify control of the email address in the new UID if the UID contains the same name as the other UIDs. No one is going to stop you from signing someone's key if that person sends you an email saying, "Hey, would you sign my other key?" But if I know you sign any keys without following the same thorough verification process each time, don't expect me to assign ownertrust to you. I guess all I can say is that one should have a key signing policy to let others know how he verifies keys. There. I said it all over again, just differently (and a whole lot more). --Paul -- PGP: 3DB6D884 _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users