Re: [openpgp] key distribution by email strategy
Steffen Nurpmeso <steffen@sdaoden.eu> Sat, 12 December 2020 22:08 UTC
Return-Path: <steffen@sdaoden.eu>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F48C3A0E63 for <openpgp@ietfa.amsl.com>; Sat, 12 Dec 2020 14:08:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0
X-Spam-Level:
X-Spam-Status: No, score=0 tagged_above=-999 required=5 tests=[SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9yWNjnI52csg for <openpgp@ietfa.amsl.com>; Sat, 12 Dec 2020 14:08:28 -0800 (PST)
Received: from sdaoden.eu (sdaoden.eu [217.144.132.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A08BE3A0ADF for <openpgp@ietf.org>; Sat, 12 Dec 2020 14:08:28 -0800 (PST)
Received: by sdaoden.eu (Postfix, from userid 1000) id 7DE3516057; Sat, 12 Dec 2020 23:08:25 +0100 (CET)
Date: Sat, 12 Dec 2020 23:08:25 +0100
From: Steffen Nurpmeso <steffen@sdaoden.eu>
To: Vincent Breitmoser <look@my.amazin.horse>
Cc: openpgp@ietf.org, Heiko Schaefer <heiko.schaefer@posteo.de>
Message-ID: <20201212220825.jMcf-%steffen@sdaoden.eu>
In-Reply-To: <2L846BD1235O5.2AHC2UF19W9NU@my.amazin.horse>
References: <20201211202818.bul-I%steffen@sdaoden.eu> <48be3fcf-cdce-9ef4-655b-63b6dddf9310@kuix.de> <322cc545-4358-ba95-65d5-3f75b7050c0b@kuix.de> <47bcbed4-3832-6ee0-4a39-127af7e455b3@posteo.de> <87k0to3yen.fsf@wheatstone.g10code.de> <2L846BD1235O5.2AHC2UF19W9NU@my.amazin.horse>
Mail-Followup-To: Vincent Breitmoser <look@my.amazin.horse>, openpgp@ietf.org, Heiko Schaefer <heiko.schaefer@posteo.de>
User-Agent: s-nail v14.9.19-179-g6a1d3a31-dirty
OpenPGP: id=EE19E1C1F2F7054F8D3954D8308964B51883A0DD; url=https://ftp.sdaoden.eu/steffen.asc; preference=signencrypt
BlahBlahBlah: Any stupid boy can crush a beetle. But all the professors in the world can make no bugs.
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/htV7bviq-Nu65VSz5o-Im7deuzA>
Subject: Re: [openpgp] key distribution by email strategy
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Dec 2020 22:08:30 -0000
Vincent Breitmoser wrote in <2L846BD1235O5.2AHC2UF19W9NU@my.amazin.horse>: |> then you can very well send a small message in advance and ask for \ |> a public |> key, or how and where to get it. I admit, i never understood autocrypt. | |Autocrypt was designed with folks in mind who don't think that way. |We wildly speculated there'd be a lot of those. Well yes, sure. It is just, i guess i "never gonna fall for Modern Love". I find it wasteful, superfluous, and over-engineered. And in my opinion it is not bad advice to users to say just that. In S/MIME that is much better, but of course you need a CA. I have a CACert S/MIME certificate, i had to verify its email address, and if i send a S/MIME signed mail anyone can savely save the public certificate that ships with it, when they verify it against the ... well you know how it works of course. I'd rather have the same for OpenPGP, a signed message with the public thing extractable embedded, then i at least know that the signer had the private key for that public thing at hand. --steffen | |Der Kragenbaer, The moon bear, |der holt sich munter he cheerfully and one by one |einen nach dem anderen runter wa.ks himself off |(By Robert Gernhardt)
- [openpgp] Combining signature with signer's publi… Kai Engert
- Re: [openpgp] Combining signature with signer's p… vedaal
- Re: [openpgp] Combining signature with signer's p… brian m. carlson
- Re: [openpgp] Combining signature with signer's p… Wiktor Kwapisiewicz
- Re: [openpgp] Combining signature with signer's p… Werner Koch
- Re: [openpgp] Combining signature with signer's p… holger krekel
- Re: [openpgp] Combining signature with signer's p… Neal H. Walfield
- Re: [openpgp] Combining signature with signer's p… Neal H. Walfield
- Re: [openpgp] Combining signature with signer's p… Hanno Böck
- Re: [openpgp] Combining signature with signer's p… Wiktor Kwapisiewicz
- Re: [openpgp] Combining signature with signer's p… Kai Engert
- Re: [openpgp] Combining signature with signer's p… Wiktor Kwapisiewicz
- Re: [openpgp] Combining signature with signer's p… Neal H. Walfield
- Re: [openpgp] Combining signature with signer's p… Kai Engert
- Re: [openpgp] Combining signature with signer's p… Neal H. Walfield
- [openpgp] Put Signature in an Email's Header Neal H. Walfield
- Re: [openpgp] Put Signature in an Email's Header Kai Engert
- [openpgp] key distribution by email strategy Kai Engert
- Re: [openpgp] key distribution by email strategy Andrew Gallagher
- Re: [openpgp] key distribution by email strategy Kai Engert
- Re: [openpgp] Put Signature in an Email's Header Bart Butler
- Re: [openpgp] key distribution by email strategy Heiko Schaefer
- Re: [openpgp] key distribution by email strategy Werner Koch
- Re: [openpgp] key distribution by email strategy Steffen Nurpmeso
- Re: [openpgp] key distribution by email strategy Vincent Breitmoser
- Re: [openpgp] key distribution by email strategy Steffen Nurpmeso
- Re: [openpgp] key distribution by email strategy John Scott
- Re: [openpgp] key distribution by email strategy Steffen Nurpmeso
- Re: [openpgp] Put Signature in an Email's Header Daniel Kahn Gillmor
- Re: [openpgp] Put Signature in an Email's Header Benjamin Kaduk