Automatic key verification / CERT in DNS / RFC4398

Julian Mehnle julian at mehnle.net
Wed Apr 5 15:38:31 CEST 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Julian Mehnle wrote:
> Werner Koch wrote:
> > The goal of PKA is much simpler: Authenticate the From: header and
> > allow the MUA or MTA to detected spoofed messages this way.
> >
> > The ability to do an opportunistic encryption using the PKA framework
> > is just a very welcome side-effect.
>
> It is exactly that side-effect of opportunistic encryption that SPF aims
> to support.

Oops, please read that as "opportunistic authentication".  But that's not 
all that different.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEM8hYwL7PKlBZWjsRAn9YAKCIsQPyGnlsU9OSh5T4MNpWpMonhQCfeOGx
hnjEHXKVpAS8emYIiUvT+4c=
=Gkh2
-----END PGP SIGNATURE-----



More information about the Gnupg-devel mailing list