TID: FMail-lnx64 2.1.0.18-B20170815   
   RFC-X-No-Archive: Yes   
   TZUTC: 0100   
   CHRS: UTF-8 2   
   PID: GED+LNX 1.1.5-b20161221   
   MSGID: 2:280/464 5e0f7e8d   
   REPLY: 2:221/360.0 5e0f69ce   
   Hi August,   
      
   On 2020-01-03 18:20:39, you wrote to me:   
      
    WvV>> I can now verify your message had a correct signature made with   
    WvV>> this key:   
      
    WvV>> wilfred@wilnux5: ~/tmp> gpg -- import aug.key gpg: key   
    WvV>> 5789589B: public key "August Abolins   
    WvV>> " imported gpg: Total number   
    WvV>> processed: 1 gpg: imported: 1 (RSA: 1) wilfred@wilnux5   
      
    AA> Cool! I still have to learn how to do that here.   
      
   This was done by hand. I exported the message from golded to a file. Imported   
   the key from it, and then did the verify as the commands show...   
      
    AA> I have used the pgp signing process in the long ago past, but now and   
    AA> I am rusty and have only begun figuring out "the process" to use in   
    AA> this new environment.   
      
   There are configuration lines in my golded config to do gpg/pgp functions, but   
   I can't remember when I last used them. Maybe never...   
      
    AA> I like the Enigmail/OpenPGP integration in Thunderbird.   
      
    AA> When pgp first came out found, I found it fascinating.   
      
   Me too.   
      
    AA> I immediately wondered why *wouldn't* anyone want to use it on a   
    AA> regular basic for email exchanges.   
      
   And in fidonet some systems wouldn't allow encrypted routed netmail messages to   
    pass their systems... I remember there was a lot of discussion going on about   
   that at the time.   
      
    AA> I think my old public key is still out there. (I have not really   
    AA> looked for it though. I don't remember the servers I used.)   
      
   Afaik most key-servers are connected to each other these days, and exchange   
   keys on a regular basis. So if your key is out there, it might be "everywhere".   
    ;)   
      
   When I search for "abolins" on my (default) key-server it finds 27 keys as old   
   as from 1994. But none include a mention of "august".   
      
    AA> The private key is probably still on a 3½ diskette, somewhere.   
      
   I have a lot of them still around (mainly Amiga formatted). Haven't tried them   
   in a few decades, and it would surprise me if they are still readable. ;)   
      
    WvV>> The trust thing is sort of an issue. I can't just sign your key   
    WvV>> (technically I could of course), because I can't verify it's   
    WvV>> really you. Anyone could login to Tommy's nntp server   
    WvV>> as 'August Abolins'. and "fake" email addresses are also easy   
    WvV>> to create/get. And since you are not a node we can't even   
    WvV>> exchange some crash netmails...   
      
    AA> Well.. there *is* the email clue above. ;) A few email exchanges, and   
   the   
    AA> analysis of the headers could be one way to get confidence whether the   
    AA> email I claim to use above is really me or suspicious.   
      
   It would establish some trust I suppose. ;)   
      
   It would have helped if we already had email exchanges before this conversation   
    about keys though! ;)   
      
    AA> There is still a trust issue in this whole process for sure. At least   
    AA> one other person who could actually vouch that I am who I am would be   
    AA> needed.   
      
   That would help!   
      
    AA> W.r.t nntp, another "August Abolins" could come from many different   
    AA> outside systems. True. But since registering on Tommi's system   
    AA> requires human intervention, I don't think he would permit another me   
    AA> to register on his system with exactly the same FN LN. So, technically   
    AA> you could be confident that once you grab my public key from here,   
    AA> future correspondences are from "the August Abolins originally seen on   
    AA> Tommi's system." ? :)   
      
    AA> As a minimum, if Tommi were to sign my key, (since my messages are   
    AA> originating on *his* system, and we can be sure that he's the *real deal*   
    AA> operating his *own* system, and I had to be registered manually to have   
    AA> access) then that would be a nice vote of confidence.   
      
   That would help. I already have Tommi's key(s):   
      
   wilfred@wilnux5:~/tmp> gpg -kv koivula   
   gpg: using PGP trust model   
   gpg: NOTE: signature key 2442E762 expired di 03 dec 2019 11:00:00 CET   
   gpg: NOTE: signature key 2442E762 expired di 03 dec 2019 11:00:00 CET   
   gpg: NOTE: signature key 2442E762 expired di 03 dec 2019 11:00:00 CET   
   pub 1024R/2442E762 2015-11-20 [revoked: 2019-12-02]   
   uid [ revoked] Tommi Koivula    
   uid [ revoked] Tommi Koivula    
   uid [ revoked] Tommi Koivula    
   sub 1024R/B8627807 2015-11-20 [revoked: 2019-12-02]   
      
   gpg: can't handle public key algorithm 22   
   gpg: can't handle public key algorithm 18   
   pub 4096R/56CDF35B 2017-10-27 [revoked: 2019-12-29]   
   uid [ revoked] Tommi Koivula    
   uid [ revoked] Tommi Koivula    
   uid [ revoked] Tommi Koivula    
   sub 4096R/3ECEC94C 2017-10-27 [revoked: 2019-12-29]   
      
   pub 4096R/B1F9FF53 2017-06-16 [expires: 2023-09-10]   
   uid [ unknown] Tommi Koivula <0405009611@koivula.iki.fi>   
   uid [ revoked] Tommi Koivula    
   uid [ unknown] Tommi Koivula    
   uid [ unknown] Tommi Koivula <0407680500@koivula.iki.fi>   
   uid [ revoked] Tommi Koivula    
   sub 4096R/7289F937 2017-06-16 [expires: 2023-09-10]   
      
   And I can already exchange (crash) netmail with him on a secure binkp   
   connection (we have a link).   
      
    AA> There is another verification process I can suggest. I'll cover that   
    AA> later. And maybe I'll encrypt that message!    
      
   Cliffhanger! ;)   
      
   Bye, Wilfred.   
      
   --- FMail-lnx64 2.1.0.18-B20170815   
    * Origin: FMail development HQ (2:280/464)   
   SEEN-BY: 1/123 15/0 2 19/36 34/999 90/1 104/115 106/201 114/224 702   
   SEEN-BY: 114/705 706 116/18 120/331 123/140 128/2 73 187 253 153/7715   
   SEEN-BY: 218/700 222/2 227/114 229/426 1014 230/150 152 240/1120 5832   
   SEEN-BY: 249/206 307 317 400 250/1 261/38 100 266/512 267/155 275/100   
   SEEN-BY: 280/464 282/1031 1056 291/1 111 292/854 298/25 305/1 3 310/2   
   SEEN-BY: 312/2 317/3 320/119 219 322/757 340/400 342/13 200 396/45   
   SEEN-BY: 640/1321 712/848 801/161 189 2320/105 3005/1 3634/12 5020/1042   
   PATH: 280/464 2452/250 240/1120 261/38 15/0 317/3 229/426   
      
|