From: Derek Atkins <warlord@MIT.EDU>
To: “Jeremy R. Smith” <jersmit@eis.calstate.edu>
Message Hash: cc68bb331b5ea593fcd96facdfa78240a5b6b9541b7897ed57632455dc7ff759
Message ID: <9307302128.AA00604@toxicwaste.MEDIA.MIT.EDU>
Reply To: <Pine.3.07.9307301400.A27332-8100000@eis.calstate.edu>
UTC Datetime: 1993-07-30 21:29:55 UTC
Raw Date: Fri, 30 Jul 93 14:29:55 PDT
From: Derek Atkins <warlord@MIT.EDU>
Date: Fri, 30 Jul 93 14:29:55 PDT
To: "Jeremy R. Smith" <jersmit@eis.calstate.edu>
Subject: Re: Public Key Servers
In-Reply-To: <Pine.3.07.9307301400.A27332-8100000@eis.calstate.edu>
Message-ID: <9307302128.AA00604@toxicwaste.MEDIA.MIT.EDU>
MIME-Version: 1.0
Content-Type: text/plain
> Are the key servers listed in the PGP documentation still active?
Yes, they are active.
> And if so, what is the general opinion of using them?
It depends what you are trying to get to here? The keyservers were
created as a way to implement out-of-band key distribution. They
provide an easy way for you to get someone's key before initiating
contact with this person.
The key-servers do not do any key authentication, leaving the
validity-checking up to the end user. It does leave a few things
open, namely, anyone can see who has keys on the servers. But once a
US-legal PGP does come out (RSN, I believe), it won't be as big a
deal.
I hope this helps.
-derek
Return to July 1993
Return to ““Jeremy R. Smith” <jersmit@eis.calstate.edu>”