choosing an encryption target from a User ID

John W. Moore III jmoore3rd at bellsouth.net
Tue Sep 22 23:07:45 CEST 2009


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Daniel Kahn Gillmor wrote:
> On 09/22/2009 04:57 PM, John W. Moore III wrote:
>> Like GPG it utilizes the 1st encountered Key that matches the Send To:
>> address & is valid.
> 
> this is not what gpg does.  gpg simply chooses the first key with a
> matching user ID, whether or irrespective of the calculated validity of
> the User ID in question.

I was referring to the validity of the Key; _not_ the UID.  If the Key
isn't expired/revoked or disabled; GPG will use it when it comes upon it
in the 1st order encountered.  So does Command Line PGP.

JOHN ;)
Timestamp: Tuesday 22 Sep 2009, 17:07  --400 (Eastern Daylight Time)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)
Comment: Public Key at:  http://tinyurl.com/8cpho
Comment: Gossamer Spider Web of Trust: http://www.gswot.org
Comment: Personal Web Page:  http://tinyurl.com/yzhbhx

iQEcBAEBCgAGBQJKuTygAAoJEBCGy9eAtCsPB+UH/0OUuuUAXhTG7n4lTpXkedjO
TwsYHPLsCvTws9Zgym+Ojw/NuPeD27hb82AWHz128mF+iL/88TJ5MCdLb/RV7tm8
fAMlSDVDjJQELUDKwLyhT3+eFKSh3SU+PegRmf0yZzEdj01Fv9LURb9O7e8TxXWQ
sOMTxv9b4LL68ievBfWURE+AW2MtVBGRCfrIbbEQfeMsMGjKDD0jTZ+CoOWuaeY3
rWhSHQt8Fn23r3Wxc0D3FL1Tkk3KojKNt39NQI9XBMk/1D3/CIz4YS1Dw3dOVH0z
8FI0eRLTnm7RIN6i5C5cDOLUuUBdAkTmOSJ9zkikBAeOfs7K5i/rQKDDZjjAMe0=
=W8qb
-----END PGP SIGNATURE-----



More information about the Gnupg-users mailing list