On 08-09-2014 20:09, Stuart Henderson wrote:
> Even with an ssl web page, you would have the same problem, unless you
verify
> which CA issued the key and that you absolutely trust that they wouldn't
issue
> a bogus certificate.
Yes, the current TLS system with it's fucked up certificates
authorities, are a problem. But it's better have than not to.
> btw: an easy way to check the key against an anoncvs server -
>
> $ cvs -d $CVSROOT -p src/etc/signify/openbsd-56-base.pub
> untrusted comment: openbsd 5.6 base public key
> RWR0EANmo9nqhpPbPUZDIBcRtrVcRwQxZ8UKGWY8Ui4RHi229KFL84wV
Nice tip. Perhaps I'll implement a script to check it against all
anoncvs servers to see if any of them disagree with mine.

Cheers,

--
Giancarlo Razzolini
GPG: 4096R/77B981BC

[demime 1.01d removed an attachment of type application/pkcs7-signature which 
had a name of smime.p7s]

Reply via email to