lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Sat, 24 Nov 2018 19:00:23 -0800
From:   Matthew Wilcox <willy@...radead.org>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     Linux List Kernel Mailing <linux-kernel@...r.kernel.org>,
        dan.j.williams@...el.com
Subject: Re: [GIT PULL] XArray updates

On Sat, Nov 24, 2018 at 06:49:30PM -0800, Linus Torvalds wrote:
> On Sat, Nov 24, 2018 at 6:38 PM Matthew Wilcox <willy@...radead.org> wrote:
> >
> > I generated a new key 5EC42E41545C1F5E and signed a new tag
> > xarray-4.20-rc4
> 
> Hmm. Did you publicize it on any keyservers? I'm not finding the key
> on pgp.mit.edu or on the sks-keyservers.net pool..

I pushed it out to hkps://hkps.pool.sks-keyservers.net ... as I recall,
pgp.mit.edu is frequently not synchronised well with the other keyservers,
but I'm surprised that one of the sks-keyservers didn't have it.

http://pgpkeys.uk:11371/pks/lookup?search=0x5EC42E41545C1F5E&fingerprint=on&op=index

sees it just fine.

> > I've signed that key with my old DSA key 2218C81E8E7C03FF which has
> > about 400 signatures on it, but I understand is not terribly trustable
> > these days.
> 
> .. but at least I can find that one.  I think a 1024-bit DSA key may
> be borderline in theory, but it's a lot better than no key at all.
> 
>                Linus

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ