Robot CA at toehold.com
Per Tunedal
pt@radvis.nu
Fri Dec 6 10:53:02 2002
At 11:13 2002-12-05 -0500, you wrote:
>On Thu, Dec 05, 2002 at 02:09:58PM +0100, Michael Nahrath wrote:
>
>> Verifying nothing but mail adresses can be valid for a limited time.
>> Mail addresses cange more often than real-life-identities.
>> Your signature should reflect this in some way.
>>
>> Either you give signatures that expire after a certain time (eg 6 months).
>> I don't know if this is possible and if it doesn't raise a bunch of
>> compatibility problems.
>> Or you let the signing key expire (eg after 1 year).
>
>Better to expire the signatures themselves. If you expire your
>signing key, then everyone will have to get their key re-signed.
I agree. Otherwise the CA-service would be useless.
>
>> Important:
>> IMHO one encrypted communication path is mandatory. That would verify that
>> the holder of the mail address is also in posess of the secret key and the
>> passphrase.
>
>Yes, but it doesn't have to be encrypted. Signatures are made on the
>primary key, which is (99.9% of the time) a key that can sign. You
>can do the same thing by sending a challenge and asking for it to be
>signed. This is what I did with keysigners.org.
Agree! It is important to have the ability to sign signingkeys. Otherwise
the service would be useless in an automated environment (invisible GUI).
>
>Note also that OpenPGP defines multiple signature verification
>levels. I've argued in the past, and continue to argue now that any
>automated signer should use 0x11 "persona" signatures as a hint that
>this is an unusual signature.
0x11 means "I have not checked at all"? Then its the best choice.
Per Tunedal