[13534] in cryptography@c2.net mail archive
Re: Keyservers and Spam
daemon@ATHENA.MIT.EDU (Michael Helm)
Mon Jun 9 13:28:11 2003
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
To: Jill.Ramonsky@Aculab.com
Cc: pete@flatline.org.uk, cryptography@metzdowd.com
Reply-To: helm@fionn.es.net
In-reply-to: Your message of "Mon, 09 Jun 2003 16:57:07 BST."
<8C9A566C643ED6119E8900A0C9DE297A32467E@saturn.aculab.com>
Date: Mon, 09 Jun 2003 09:34:20 -0700
From: Michael Helm <helm@fionn.es.net>
Jill.Ramonsky@Aculab.com writes:
> My first thought is to generate a new (secure) email address which includes
> the old (insecure) address as a substring (for example
> "PGP.Jill.Ramonsky@Aculab.com"). Will this work? I don't know enough about
> keyservers to know the answer to that one.
I don't know about all pgp key servers, but the one I am familiar with
searches on whatever text you have added to the data packet with your public key,
as well as on signers and other things.
It would be feasible to create a PGP-only (or -mostly) email alias,
make that the sole email address in your key stored in pgp key servers.
On the other hand, on the particular key server I am familiar with,
_all text_ you put in the trusted data can be discovered. Other key servers
may have additional controls.
If you have ever had a key stored in such a key server with many addresses
you do not want discovered, it is very difficult (probably impossible)
to rectify this problem; revocation does not solve it.
I have no idea how important a source of email addresses this
represents; maybe someone has some empirical data on that.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com