Andrei writes: > What is not explicitly mentioned there is that you should also somehow > establish that a specific key belongs to the person, e.g. by meeting > in person and comparing key fingerprints (and some photo ID if you > don't know each other). Only if you require identification (a slippery thing) rather than authentication. -- John Hasler jhasler@newsguy.com Elmwood, WI USA