Hey all,

With the release of 0.9.0 I started thinking about something.  We're not
signing those tarballs with PGP or even publishing MD5/SHA-1/SHA-256
checksums on them.  That has been kind of a standard practice with a lot
of packages, most particularly with anything that can impact security.
the Samba packages (I'm on the Samba Team) are all signed and the team
signing key has been signed by several of us, including me, that anchors
it all the way back to the "dead trees edition" book of the web of trust
fingerprints.

As we're now opening up the branch heading for 1.0, should we start
thinking about establishing a key, getting it signed, and starting to
use it for releases?

Just food for though.

Regards,
Mike
-- 
Michael H. Warfield (AI4NB) | (770) 985-6132 |  m...@wittsend.com
   /\/\|=mhw=|\/\/          | (678) 463-0932 |  http://www.wittsend.com/mhw/
   NIC whois: MHW9          | An optimist believes we live in the best of all
 PGP Key: 0x674627FF        | possible worlds.  A pessimist is sure of it!

Attachment: signature.asc
Description: This is a digitally signed message part

------------------------------------------------------------------------------
Minimize network downtime and maximize team effectiveness.
Reduce network management and security costs.Learn how to hire 
the most talented Cisco Certified professionals. Visit the 
Employer Resources Portal
http://www.cisco.com/web/learning/employer_resources/index.html
_______________________________________________
Lxc-devel mailing list
Lxc-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/lxc-devel

Reply via email to