2008/9/11 आशीष शुक्ल Ashish Shukla <[EMAIL PROTECTED]>: >>> but C is >>> not convinced and is casting aspersion on A and D of >>> showing tampered >>> emails. >>> >> >>A basic check that I will do is - get full mail headers of mail sent to D and >>of that sent to C, read headers from bottom to up to find the discrepancy. > > Don't you think in that case, the result will be negative, since mail header > in mail > sent to D != mail sent to C because, both the mails are originating from > different sources.
Exactly the problem. And D does not have access to machines of A or B. Only original email of A sent to him and B and access to C. How does pgp signature generate hash and is there something out there which could be fed in given text and public key of A to generate hash and compare it with hash appearing on the emaiil copy or C as forwarded by B? -- Regards, Sudev Barar Read http://blog.sudev.in for topics ranging from here to there. PS: I know most of people do not follow email niceties (mostly they are not aware) but if you follow bottom post/in-line post style of email conversations it becomes a whole lot easier to carry on meaningful dialogue and you can snip out what is not meaningful too. Most people just hit reply button and top post leaving prior message appended uselessly at bottom. See if you can adopt this style and persuade others. In case you are already doing this ..... great, spread the message. _______________________________________________ ilugd mailinglist -- ilugd@lists.linux-delhi.org http://frodo.hserus.net/mailman/listinfo/ilugd Archives at: http://news.gmane.org/gmane.user-groups.linux.delhi http://www.mail-archive.com/ilugd@lists.linux-delhi.org/