lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 28 Jul 2008 22:50:16 -0400
From:	Theodore Tso <tytso@....edu>
To:	Jon Smirl <jonsmirl@...il.com>
Cc:	Al Viro <viro@...iv.linux.org.uk>,
	lkml <linux-kernel@...r.kernel.org>
Subject: Re: 463 kernel developers missing!

On Mon, Jul 28, 2008 at 10:01:06PM -0400, Jon Smirl wrote:
> I should also point out that external information (Google) was needed
> to identify several hundred names, there was insufficient information
> in the log or kernel source. If we have to reconstruct this mapping
> ten years from now for some random lawsuit, the external information
> may not be there.

Jon,

	The reality is ten years from now, many e-mail addresses won't
be accurate anyway.  We will have to track people down by hand, if it
ever comes down to that.  The signed-off-by needs to be enough so we
can track down someone (very likely only a few set of people); via a
manual method is quite acceptable.  I don't think it is really
necessary to try force fit the signed-off-by just so we can collect
better mode.

       It should also be noted that the Developer's Certification of
Origin 1.1 has laguage that was designed to make it legal to collect
the DCO lines even in the European Union.  So what rmk is doing is
strictly speaking not necessary.

							- Ted
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ