Automatic key verification / CERT in DNS / RFC4398
Julian Mehnle
julian at mehnle.net
Wed Apr 5 15:38:31 CEST 2006
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Julian Mehnle wrote:
> Werner Koch wrote:
> > The goal of PKA is much simpler: Authenticate the From: header and
> > allow the MUA or MTA to detected spoofed messages this way.
> >
> > The ability to do an opportunistic encryption using the PKA framework
> > is just a very welcome side-effect.
>
> It is exactly that side-effect of opportunistic encryption that SPF aims
> to support.
Oops, please read that as "opportunistic authentication". But that's not
all that different.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFEM8hYwL7PKlBZWjsRAn9YAKCIsQPyGnlsU9OSh5T4MNpWpMonhQCfeOGx
hnjEHXKVpAS8emYIiUvT+4c=
=Gkh2
-----END PGP SIGNATURE-----
More information about the Gnupg-devel
mailing list