choosing an encryption target from a User ID
John W. Moore III
jmoore3rd at bellsouth.net
Tue Sep 22 23:07:45 CEST 2009
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Daniel Kahn Gillmor wrote:
> On 09/22/2009 04:57 PM, John W. Moore III wrote:
>> Like GPG it utilizes the 1st encountered Key that matches the Send To:
>> address & is valid.
>
> this is not what gpg does. gpg simply chooses the first key with a
> matching user ID, whether or irrespective of the calculated validity of
> the User ID in question.
I was referring to the validity of the Key; _not_ the UID. If the Key
isn't expired/revoked or disabled; GPG will use it when it comes upon it
in the 1st order encountered. So does Command Line PGP.
JOHN ;)
Timestamp: Tuesday 22 Sep 2009, 17:07 --400 (Eastern Daylight Time)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)
Comment: Public Key at: http://tinyurl.com/8cpho
Comment: Gossamer Spider Web of Trust: http://www.gswot.org
Comment: Personal Web Page: http://tinyurl.com/yzhbhx
iQEcBAEBCgAGBQJKuTygAAoJEBCGy9eAtCsPB+UH/0OUuuUAXhTG7n4lTpXkedjO
TwsYHPLsCvTws9Zgym+Ojw/NuPeD27hb82AWHz128mF+iL/88TJ5MCdLb/RV7tm8
fAMlSDVDjJQELUDKwLyhT3+eFKSh3SU+PegRmf0yZzEdj01Fv9LURb9O7e8TxXWQ
sOMTxv9b4LL68ievBfWURE+AW2MtVBGRCfrIbbEQfeMsMGjKDD0jTZ+CoOWuaeY3
rWhSHQt8Fn23r3Wxc0D3FL1Tkk3KojKNt39NQI9XBMk/1D3/CIz4YS1Dw3dOVH0z
8FI0eRLTnm7RIN6i5C5cDOLUuUBdAkTmOSJ9zkikBAeOfs7K5i/rQKDDZjjAMe0=
=W8qb
-----END PGP SIGNATURE-----
More information about the Gnupg-users
mailing list