-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I think I answered this above, but I'm not sure if you mean what I'm
interpreting certifying to mean. Please correct me if you mean
something else.
I have set up a keyserver (on a trial basis) and asked my colleagues to
add their keys to it.
On Sat, Mar 02, 2002 at 04:15:14AM -0500, Sumit Dhar wrote:
The second part is, say I am running the key server Now there is a user
X I want to certify What I will need to do is most probably sign his
public key with my private key??
And then re-upload it to the keyservers, where all
could do something like
call up the other chappie and get his key fingerprint etc etc So that
part is clear
The second part is, say I am running the key server Now there is a user
X I want to certify What I will need to do is most probably sign his
public key with my private key??
I am currently
. :-) In short, very.
3. Lastly, anyone can send their keys to the keyserver. How does the
keyserver authenticate that [EMAIL PROTECTED] is really X and not some
impersonator?? Or is that beyond the jurisdiction of the key server?
Does the key server also act as some sort of Certification
the jurisdiction of the key server?
Does the key server also act as some sort of Certification Authority??
If no, how can I integrate these two functions?
it doesn't. there is no central CA. instead, you have to get someone to
certify that you are who you say you are. and then everyone who trusts
that [EMAIL PROTECTED] is really X and not some
impersonator?? Or is that beyond the jurisdiction of the key server?
Does the key server also act as some sort of Certification Authority??
If no, how can I integrate these two functions?
With Regards
Sumit Dhar
- --
pub 1024D/7AB2D05A 2002-02-24 Sumit