Hej,

I suppose the only feasible way is for each key server operator to be
able to specifiy a sort of custom block list of keys their server will
not accept/show/propagate.

Over time, some collaborative list curated by trusted operators would
probably emerge that most of the key servers would use.

That brings its own set of issues for the pool though. Like, if a server
in the pool went rogue and blocked a large number of keys, which might
compromise pool users' security. Then again, that is already possible on
a theoretical level.

Lukas

On 03/25/2016 02:33 PM, Andrew Gallagher wrote:
> On 25/03/16 13:16, Christoph Egger wrote:
>> Hi!
>>
>> Douglas <douglas...@protonmail.com> writes:
>>> It doesn't benefit anyone to retain keys uploaded with malicious
>>> intent, so I believe it's worth discussing a mechanism for key removal
>>> due to abuse of the system.
>>
>> Sure. I suggest you start  by reading the Minsky paper on how the
>> keyservers work and bring forward a feasible protocol proposal.
>>
>>   Christoph
> 
> Before we even *think* about a protocol, there are policy hurdles to be
> overcome, e.g.:
> 
> 1. What criteria should be met before a key is removed?
> 
> 2. Who decides that the criteria have been met?
> 
> 3. How are malicious removals prevented?
> 
> 4. How is whack-a-mole prevented?
> 
> These are all *hard* problems, and none of them have much, or anything,
> to do with protocol design.
> 
> A
> 
> 
> 
> _______________________________________________
> Sks-devel mailing list
> Sks-devel@nongnu.org
> https://lists.nongnu.org/mailman/listinfo/sks-devel
> 



    Lukas

-- 
Lukas Martini
https://lutoma.org
Twitter: @lutoma
Jabber: lut...@ohai.su

If possible, please consider replying with PGP encryption.

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel

Reply via email to