2008/9/11 आशीष शुक्ल Ashish Shukla <[EMAIL PROTECTED]>:
>>> but C is
>>> not convinced and is casting aspersion on A and D of
>>> showing tampered
>>> emails.
>>>
>>
>>A basic check that I will do is - get full mail headers of mail sent to D and 
>>of that sent to C, read headers from bottom to up to find the discrepancy.
>
> Don't you think in that case, the result will be negative, since mail header 
> in mail
> sent to D != mail sent to C because, both the mails are originating from
> different sources.

Exactly the problem. And D does not have access to machines of A or B.
Only original email of A sent to him and B and access to C.

How does pgp signature generate hash and is there something out there
which could be fed in given text and public key of A to generate hash
and compare it with hash appearing on the emaiil copy or C as
forwarded by B?

-- 
Regards,
Sudev Barar
Read http://blog.sudev.in for topics ranging from here to there.

PS: I know most of people do not follow email niceties (mostly they
are not aware) but if you follow bottom post/in-line post style of
email conversations it becomes a whole lot easier to carry on
meaningful dialogue and you can snip out what is not meaningful too.
Most people just hit reply button and top post leaving prior message
appended uselessly at bottom. See if you can adopt this style and
persuade others. In case you are already doing this ..... great,
spread the message.
_______________________________________________
ilugd mailinglist -- ilugd@lists.linux-delhi.org
http://frodo.hserus.net/mailman/listinfo/ilugd
Archives at: http://news.gmane.org/gmane.user-groups.linux.delhi 
http://www.mail-archive.com/ilugd@lists.linux-delhi.org/

Reply via email to