Hi Patrick,

> Am 01.03.2015 um 15:41 schrieb Patrick Brunschwig <patr...@enigmail.net>:
> 
> The idea I have in mind is roughly as follows: if you upload a key to
> a keyserver, the keyserver would send an encrypted email to every UID
> in the key. Each encrypted mail contains a unique link to confirm the
> email address. Once all email addresses are confirmed, the key is
> validated and the keyserver will allow access to it just like with any
> regular keyserver.

I like this idea very, very much! This is a confirmation that doesn’t hurt 
anybody, and it is something that insures on a basic level, that the key isn’t 
completely bogus.

I have seen part of this in a different context in Mozilla’s Bugzilla, when one 
uploads one’s public key into the Bugzilla account to be able to receive 
security-sensitive messages. After submitting the form, Bugzilla sends an 
encrypted message to the account’s e-mail address, assuming the public key just 
uploaded belongs to that address. It doesn’t go as far as requiring 
verification via a link, but it definitely confirms if the key is working for 
the user.

Marco

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to