[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: A brief comparison of email encryption protocols
Alex Strasheim writes:
> Sorry for the stupid questions, but I want to make sure I'm on the same
> page as the rest of you. Correct me where I'm wrong --
>
> The idea to have a distributed database (like DNS?) that allows you to
> retrieve keys with query strings similar to urls. So if you wanted to do
> a secure telnet to host.foobar.com, you'd submit something like
> "telnet://host.foobar.com" to the key server, and it would give you back a
> key. If you wanted to send mail to me, you'd submit something like
> "mailto://[email protected]". Etc.
That wasn't actually what I had in mind. When I said a new URL I meant
something like key://foo.bar.com/bleh/blah/foo, to go with the new key
server protocol.
I'm not exactly sure what the key servers should take as lookup values
-- that is, at this point, a matter for discussion.
> Finally, does anyone know if anything's been happening with Matt's key
> management project?
Matt does, I presume...
Perry