Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 20 Nov 2017 23:42:05 +0100
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Subject: Re: distros list archive

On Sat, Jun 24, 2017 at 06:39:50PM +0200, Solar Designer wrote:
> I've just set up these archives of the private lists up until June 19:
> 
> http://www.openwall.com/lists/linux-distros/
> http://www.openwall.com/lists/distros/
> 
> I did not decrypt the actual messages, but the statistics and the
> message headers should provide some visibility into how much and roughly
> what was discussed and when.

I've just updated these with message headers until November 19 (although
there was nothing posted after November 9, until further still-embargoed
messages appeared today).

> The messages appearing on distros should be strictly a subset of those
> appearing on linux-distros, as per the description of the lists here:
> 
> http://oss-security.openwall.org/wiki/mailing-lists/distros
> 
> As you may notice, the Subject lines sometimes contain [vs] and other
> times [vs-plain].  This reflects whether the messages traveled to the
> list exploder in encrypted or plaintext form, respectively.  They
> traveled to the list members in re-encrypted form either way.  The
> [vs-plain] case commonly occurs on messages CC'ed to other parties, for
> which the sender might not have had the keys.  MUAs generally don't
> allow a message to be encrypted to a subset of the addressees and sent
> in plaintext to others.
> 
> Enjoy.

Alexander

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ