Le 14 janv. 2016 17:30, "Robert J. Hansen" <r...@sixdemonbag.org> a écrit :

> Fingerprint verification.  An attacker can create a fraudulent
> certificate, but an attacker cannot (to the best of our knowledge)
> create a certificate that has an identical fingerprint to the real one.

Yes, of course. I'm just wondering whether there's anything that I can do
to increase the probability that a user who looks me up and emails me out
of nowhere will get the right key.

> And if you're concerned about this, then retrieve certificates based on
> fingerprints, not on email addresses.

This breaks the "look up key and then just use ToFU" workflow though, which
is what I was more worried about.  You can't _guarantee_ that other users
will receive the same key, but it would be nice if there were some
possibility that a long-ago added key without an expiry date wouldn't be at
risk of being automatically chosen until the end of time.

Thanks,
Lachlan
_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to