Re: hash email addresses / directory privacy enhancement

2014-04-29 Thread Peter Lebbing
On 29/04/14 01:17, MFPA wrote: I have a key on the servers for just over four years now with a valid address that has been used for no other purpose and has not received a single email. OK, not a statistically valid experiment but I'm sure plenty of others have done similar. I have a key on

Re: hash email addresses / directory privacy enhancement

2014-04-29 Thread Hauke Laging
Am Di 29.04.2014, 10:51:35 schrieb Peter Lebbing: But it hardly ever happens. 22 attempted scams in 3 years, and they arrive in batches. 7 batches to be precise; 7 distinct moments in time that scams arrived on that address. That is interesting but if it is supposed to be an answer then I

Re: hash email addresses / directory privacy enhancement

2014-04-29 Thread Peter Lebbing
On 29/04/14 11:13, Hauke Laging wrote: if it is supposed to be an answer then I guess from the perspective of the average user it answers the wrong question. It wasn't. It was an elaboration on one particular aspect of the answer MFPA gave. Will uploading my certificate to a public key

Validation of User ID with invalid (non UTF-8) encoding

2014-04-29 Thread martijn.list
Hi, Some keys stored on the public key servers have User IDs which seem to be encoded with a different encoding than UTF-8. For example the key with key ID 0xA8364AC589C44886 shows an invalid character when viewed online: http://pgp.mit.edu/pks/lookup?search=0xA8364AC589C44886 gpg is able to

Re: Validation of User ID with invalid (non UTF-8) encoding

2014-04-29 Thread Werner Koch
On Tue, 29 Apr 2014 11:11, martijn.l...@gmail.com said: Some keys stored on the public key servers have User IDs which seem to be encoded with a different encoding than UTF-8. Right. Old PGP versions didn't care about the requirement for utf-8 and used whatever the terminal was configured to

Re: hash email addresses / directory privacy enhancement

2014-04-29 Thread Mark H. Wood
Eh, I consider the possibility of address harvesting an opportunity for a bit of sport. I enjoy occasionally crafting a new regular expression to make maildrop automatically toss a new strain of UCE. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should not be friendly.

Re: hash email addresses / directory privacy enhancement

2014-04-29 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Tuesday 29 April 2014 at 3:23:10 PM, in mid:20140429142310.ge14...@iupui.edu, Mark H. Wood wrote: Eh, I consider the possibility of address harvesting an opportunity for a bit of sport. I enjoy occasionally crafting a new regular

Re: hash email addresses / directory privacy enhancement

2014-04-29 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Tuesday 29 April 2014 at 10:59:21 AM, in mid:535f77f9.8070...@digitalbrains.com, Peter Lebbing wrote: The problem with keeping an e-mail address secret is you need to keep it secret all of the time, while it only needs to leak to

Re: hash email addresses / directory privacy enhancement

2014-04-29 Thread vedaal
I don't know how much of a spam problem there is by having keyservers harvested for their e-mail addresses, but if indeed it does become a problem, then maybe at that point, the e-mail addresses should not be listed on the keyserver. When a person generates a new key, the e-mail required by

Re: hash email addresses / directory privacy enhancement

2014-04-29 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Tuesday 29 April 2014 at 7:18:40 PM, in mid:20140429181840.457e7a0...@smtp.hushmail.com, ved...@nym.hush.com wrote: When a person generates a new key, the e-mail required by gnupg for key generation, can be listed as something benign

Re: UI terminology for calculated validities

2014-04-29 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Monday 28 April 2014 at 8:22:44 PM, in mid:535eaa84.9010...@digitalbrains.com, Peter Lebbing wrote: - trust-model direct (and then set validity with trust command) - trust: ultimate (note: don't do this!) But unless I am missing

Re: UI terminology for calculated validities

2014-04-29 Thread Hauke Laging
Am Di 29.04.2014, 20:22:52 schrieb MFPA: validate a key without removing validity from all the keys on the keyring that are validated by signatures. I don't understand that. Hauke -- Crypto für alle: http://www.openpgp-schulungen.de/fuer/unterstuetzer/

Re: UI terminology for calculated validities

2014-04-29 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Tuesday 29 April 2014 at 8:34:27 PM, in mid:1495086.yRroNSC0aI@inno, Hauke Laging wrote: Am Di 29.04.2014, 20:22:52 schrieb MFPA: But unless I am missing something, trust: ultimate is the only way the trust command can validate a key

Get expiration date by searching on keyservers

2014-04-29 Thread Koen
Hi, I use '--keyserver srv --search-keys key' to get info on a number of keys. As far as I can tell, that doesn't return an expiration date (if that exists). Are there other ways to easily check on the exp. date, besides importing the key and then verifying the expiration date? thanks, koen