On Mon, 24 Jul 2006, David Shaw wrote:
Note that there is a difference between what page at
http://www.hantslug.org.uk/cgi-bin/wiki.pl?LinuxHints/KeySigning says
and what you say above. The page (correctly) notes that all that is
necessary is that the person *sign* the challenge before sending it back
to you. The page makes clear ("encrypted, if you like") that encryption
is optional here, and adds little to what you are trying to prove. It
doesn't matter if other people can read the signed challenge or not.
Of course, it doesn't hurt to encrypt, so long as it is understood that
it doesn't really help either.
======================
other than adding an extra step to the process, what is gained by signing
a challenge instead of encrypting a key certification (key signature) to
the recipient's public key?
assuming that the primary key is the signing key, the protocol outlined in
the link, above, does NOT demonstrate that the recipient controls the
private half of the encryption subkey.
if, instead, the signed key is encrypted to the recipient, the key
signature is only useful AFTER the recipient has proven their control of
the private encryption key... this protocol simultaneously demonstrates
their control of the primary key (used to self-sign the UID and encryption
subkey) and email address.
--
...atom
________________________
http://atom.smasher.org/
762A 3B98 A3C3 96C9 C6B7 582A B88D 52E4 D9F5 7808
-------------------------------------------------
"Nationalism is the childness sickness of Man.
It is the whooping cough of adults"
-- Albert Einstein
_______________________________________________
Gnupg-users mailing list
[email protected]
http://lists.gnupg.org/mailman/listinfo/gnupg-users