[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Certificate proposal




Don M. Kitchen writes:
 > >  If we are forced to exchange keys remotely, then perhaps some sort of
 > >  "proof" techniques could be used to establish to some level of
 > >  assurance that the remote entity I *think* is you is really you.  Or
 > 
 > So who is Pr0duct Cypher then? And why should I have to produce ID saying 
 > my name is Don, unless I'm proving my Real Name[tm] is Don.

Right.  If we're forced to exchange keys remotely, I just have to deal
with the possibility that I'm being spoofed.

 > >  you could provide me with a key, and then I could poll a list of
 > >  references to inquire as to the "goodness" of the key.  This seems to
 > 
 > But there's no way to prove that there's no MITM. But "middle" is a
 > subjective term.

Yes, that's why I put "proof" in quotes.  I guess I meant "demonstrate
to a personally sufficient level of satisfaction".

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
| Nobody's going to listen to you if you just | Mike McNally ([email protected]) |
| stand there and flap your arms like a fish. | Tivoli Systems, Austin TX    |
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~