Also, I have no idea what all of the addresses are that I've made up
over the years, many of which still get mail from whoever I gave them
to.  It appears I'm out of luck there.

For one, you can do *._openpgpkey.example.com. IN OPENPGPKEY [...]

My system has more than one user, so we have addresses like johnl-* bobf-*. How are we supposed to handle that with DNS wildcards?

Second you should really have the email address listed as ID on you
openpgp key entry anyway.

I do, and thousands of subaddresses, too, and I'd like to let people send me mail just like they do now, only encrypted.

Third, you can keep doing this fine and not receive encrypred email,
just like you have been doing all of those years.

I'm not very interested in a "solution" that doesn't match the way e-mail works, and has worked for decades. At the session in Dallas, it was pretty clear that the other people at the mike with extensive e-mail experience aren't either.

This is starting to remind me of too many other discussions of mail security hacks that don't match the way that mail actually works, in which the propnents argue that the parts of our working mail that don't happen to match the hack was broken all along. (See, for example, endless arguments about "forgery" in SPF and DMARC lists.)

Regards,
John Levine, [email protected], Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail.

_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to