Re: Announcing an experimental public S/MIME keyserver

2011-06-08 Thread Kai Engert
On 08.06.2011 14:15, Jean-Marc Desperrier wrote: This seems to be solved with my implementation, because my keyserver can forward the original signed message. But it's not really a great solution. Why not? I'm thinking the following could solve the problem Please help me: which problem

Re: Announcing an experimental public S/MIME keyserver

2011-06-08 Thread Kai Engert
On 08.06.2011 13:51, Jean-Marc Desperrier wrote: Is the script smart enough to identify and extract the encryption certificate in the mail when the sender uses separate signature and encryption certificates ? (and of course the S/MIME properties are correctly set to identify this, and propagate

Re: Announcing an experimental public S/MIME keyserver

2011-06-08 Thread Jean-Marc Desperrier
Kai Engert wrote: > Another short note: The problem with solely distributing the S/MIME > certs is that a MUA does not have the S/MIME capabilities of the cert > owner's MUA. So the sender MUA might choose a weak symmetric cipher. > ... > So the safest way is still to send a signed e-mail fo

Re: Announcing an experimental public S/MIME keyserver

2011-06-08 Thread Jean-Marc Desperrier
Kai Engert wrote: - the keyserver will extract the cert from the email, and will store both email and cert locally Is the script smart enough to identify and extract the encryption certificate in the mail when the sender uses separate signature and encryption certificates ? (and of course

Re: Announcing an experimental public S/MIME keyserver

2011-06-08 Thread Kai Engert
On 03.06.2011 00:12, Kai Engert wrote: In short, go to http://kuix.de/smime-keyserver/ and give it a try. ... (as of today, the keyserver accepts the same signing roots as Mozilla software. It also allows certs from cacert.org) In addition it will also accept the certs from http://ec.europa.