lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sun,  7 Jun 2015 21:00:01 +0200 (CEST)
From: Thijs Kinkhorst <thijs@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3281-1] Debian Security Team PGP/GPG key change notice

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3281-1                   security@...ian.org
http://www.debian.org/security/                           Thijs Kinkhorst
June 7, 2015                           http://www.debian.org/security/faq
- -------------------------------------------------------------------------

This is a notice that the Debian security team has changed its PGP/GPG
contact key because of a periodic regular key rollover.

The new key's fingerprint is:
  0D59 D2B1 5144 766A 14D2  41C6 6BAF 400B 05C3 E651

The creation date is 2015-01-18 and it has been signed by the previous
Security Team contact key and several individual team members.

Please use the new key from now on for encrypted communication with the
Debian Security Team. You can obtain the new key from a keyserver, e.g.,
http://pgp.surfnet.nl/pks/lookup?op=vindex&search=0x0D59D2B15144766A14D241C66BAF400B05C3E651

Our website has been updated to reflect this change.

Note that this concerns only the key used for communication with the
team. The keys used to sign the security.debian.org APT archive or
the keys used to sign the security advisories have not changed.

Further information is available at https://www.debian.org/security/.

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJVdJSGAAoJEFb2GnlAHawEOxIIAJWUNtyJ24UvHIj128PY1hkY
AdDMzO+kLJNnkEftKRsj6RkcFgroFqoK/HqfOGM1nkGLbfwM92S7eDW3VoMtvmXH
wePiZdhpijfLjbazGggPd5q4lWWYcIMQ9opCz5/lmEeRPCec0wU5X6HDcSJP0OCs
dksvJRqu/Z9ZXV3NG5ytP1Llgr6nnSk+FPrQj5f006P7Kqy3R5XKed2tdKtBSVtY
mSO6/nmMRdbsht0FMzJ+FnNVrM6Tclje5RrTnl6dPYkqnySlTERvwXAEsTkaaiY0
SuTHbPjBtgJo4crfEt/AoNbhfby/IaeOi2AOc0zKpGziiax+opxUCRbwL2irX9Q=
=gsdL
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ