In message <9411121709.AA26564@sandelman.ocunix.on.ca>,
Michael Richardson writes:
> There are three ways I can see one might want to use public key
> i) majordomo signs all messages
> ii) users encrypt all messages going in for majordomo, and
>majordomo decrypts and broadcasts.
> iii) users sign all messages and majordomo checks the signature.
> I don't see (ii) as being particularly usefull unless it also
>encrypts the outgoing message.
Majordomo could also just sign all messages (option 1). This would
allow the users on the list to validate all messages comming over the
list as actually being from the person they claim to be from, without
having the public key for the person sending the message. In this case
majordomo would act as a notary for the message.
Senior Systems Administrator IDD Information Services
firstname.lastname@example.org Waltham, MA (617) 890-1576 x225
Senior Systems Consultant (SERL Project) University of Massachusetts at Boston
email@example.com (preferred) Boston, MA, (617) 287-6480
My employers don't acknowledge my existence much less my opinions.