From: Derek Atkins <warlord@MIT.EDU>
To: Kevin L Prigge <klp@gold.tc.umn.edu>
Message Hash: ad7df97f870d7f7a4802a57566f590b99f9d661300639d495cfd8e8e04623f08
Message ID: <199511142124.QAA23598@toxicwaste.media.mit.edu>
Reply To: <30a8f8836ed1002@noc.cis.umn.edu>
UTC Datetime: 1995-11-14 21:46:08 UTC
Raw Date: Wed, 15 Nov 1995 05:46:08 +0800
From: Derek Atkins <warlord@MIT.EDU>
Date: Wed, 15 Nov 1995 05:46:08 +0800
To: Kevin L Prigge <klp@gold.tc.umn.edu>
Subject: Re: Good Enough?
In-Reply-To: <30a8f8836ed1002@noc.cis.umn.edu>
Message-ID: <199511142124.QAA23598@toxicwaste.media.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain
Hi.
First, I must warn you that generating keys on behalf of users is in
general a very bad thing to do. Instead, you might want to provide a
simple way for users to generate keys and get them certified. The
biggest problem is that there is not an easy way to get a good set of
random numbers on a server platform. On the other hand, users can get
a great deal of randomness on their own client machines. If they can
run netscape, then they can run PGP.
Second, you might want to look at a paper that Jeff Schiller and I
wrote for the 1995 Usenix conference on scaling the web of trust.
The paper is available off my home page or via ftp:
toxicwaste.mit.edu:/pub/pgpsign/scaleweb.{txt,PS}
The sources to the keysigner are also in the same directory.
Hope this helps.
-derek
Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
Member, MIT Student Information Processing Board (SIPB)
Home page: http://www.mit.edu:8001/people/warlord/home_page.html
warlord@MIT.EDU PP-ASEL N1NWH PGP key available
Return to November 1995
Return to “Kevin L Prigge <klp@gold.tc.umn.edu>”