[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: A brief comparison of email encryption protocols




Alex Strasheim writes:
> Sorry for the stupid questions, but I want to make sure I'm on the same 
> page as the rest of you.  Correct me where I'm wrong --
> 
> The idea to have a distributed database (like DNS?) that allows you to
> retrieve keys with query strings similar to urls.  So if you wanted to do
> a secure telnet to host.foobar.com, you'd submit something like
> "telnet://host.foobar.com" to the key server, and it would give you back a
> key.  If you wanted to send mail to me, you'd submit something like 
> "mailto://[email protected]".  Etc.

That wasn't actually what I had in mind. When I said a new URL I meant
something like key://foo.bar.com/bleh/blah/foo, to go with the new key
server protocol.

I'm not exactly sure what the key servers should take as lookup values
-- that is, at this point, a matter for discussion.

> Finally, does anyone know if anything's been happening with Matt's key
> management project? 

Matt does, I presume...

Perry