andrewg <[email protected]> wrote: > Speaking for the current SKS keyserver operators, it *is* currently > working. There are occasional glitches when vandals find a way around > our flooding protections, but we are constantly improving these. (I > realise I'm tempting fate by saying this...)
But, today, you don't keep/flood revocations, right?
>> specifically, keyservers will stop publishing keys that they can't
>> confirm that the user actually still wants published.
> It's a good idea in principle, but the practicalities of getting
> continually refreshed consent to publish are currently
> prohibitive. ACME works because the end user (i.e. the server operator)
I think that it can't happen unless it's automated.
Whether autocrypt or something else.
> not need to be aware of. This does not translate well to email, which
> is a fundamentally interactive protocol. It is true that enigmail used
> to automatically handle WKS verification emails, but this did not catch
> on elsewhere (unfortunately!) and having multiple keyservers send out
> such verifications on a recurring schedule would quickly become
> annoying (and potentially get a keyserver blacklisted).
Let's take this to [email protected].
--
Michael Richardson <[email protected]>, Sandelman Software Works
-= IPv6 IoT consulting =- *I*LIKE*TRAINS*
signature.asc
Description: PGP signature
_______________________________________________ Gnupg-users mailing list [email protected] https://lists.gnupg.org/mailman/listinfo/gnupg-users
