From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on archive.lwn.net X-Spam-Level: X-Spam-Status: No, score=-5.8 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_EF,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.2 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by archive.lwn.net (Postfix) with ESMTP id AC1FA7D922 for ; Tue, 20 Aug 2019 16:58:38 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729137AbfHTQ62 (ORCPT ); Tue, 20 Aug 2019 12:58:28 -0400 Received: from mail.kernel.org ([198.145.29.99]:38836 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730088AbfHTQ62 (ORCPT ); Tue, 20 Aug 2019 12:58:28 -0400 Received: from localhost (wsip-184-188-36-2.sd.sd.cox.net [184.188.36.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 371DA2087E; Tue, 20 Aug 2019 16:58:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1566320307; bh=sFHOWf96vi7j1GNkuu7k6bQraygG3Q7ZGW8YYWz6/84=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=d2zrD9tuaRrnLHmBG37ekGWvZyqiDxfqQQlxJMjESJL5bmHg14df1GG/AXR2GYEwr lKdseJRZPnvj4nUYlLCqx3nIyJzzrf6ZRrQEEB5NkG5EstfhOmY6SyNiNPSFqDFR7A zKjo5XlIkQDuXLdxOuZg6l2zmDp5Hge3t3lTWQ/M= Date: Tue, 20 Aug 2019 09:58:26 -0700 From: Greg Kroah-Hartman To: Josh Poimboeuf Cc: linux-kernel@vger.kernel.org, Jonathan Corbet , security@kernel.org, linux-doc@vger.kernel.org, Thomas Gleixner , Jiri Kosina , Mauro Carvalho Chehab , Laura Abbott , Ben Hutchings , Tyler Hicks , Konrad Rzeszutek Wilk , Jiri Kosina Subject: Re: [PATCH v2] Documentation/admin-guide: Embargoed hardware security issues Message-ID: <20190820165826.GB3736@kroah.com> References: <20190725130113.GA12932@kroah.com> <20190815212505.GC12041@kroah.com> <20190820145850.x445rw4uoqz6n4hw@treble> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190820145850.x445rw4uoqz6n4hw@treble> User-Agent: Mutt/1.12.1 (2019-06-15) Sender: linux-doc-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-doc@vger.kernel.org On Tue, Aug 20, 2019 at 09:58:50AM -0500, Josh Poimboeuf wrote: > On Thu, Aug 15, 2019 at 11:25:05PM +0200, Greg Kroah-Hartman wrote: > > +Contact > > +------- > > + > > +The Linux kernel hardware security team is separate from the regular Linux > > +kernel security team. > > + > > +The team only handles the coordination of embargoed hardware security > > +issues. Reports of pure software security bugs in the Linux kernel are not > > +handled by this team and the reporter will be guided to contact the regular > > +Linux kernel security team (:ref:`Documentation/admin-guide/ > > +`) instead. > > + > > +The team can be contacted by email at . This > > +is a private list of security officers who will help you to coordinate an > > +issue according to our documented process. > > + > > +The list is encrypted and email to the list can be sent by either PGP or > > +S/MIME encrypted and must be signed with the reporter's PGP key or S/MIME > > +certificate. The list's PGP key and S/MIME certificate are available from > > +https://www.kernel.org/.... > > This link needs to be filled in? > > > +Encrypted mailing-lists > > +----------------------- > > + > > +We use encrypted mailing-lists for communication. The operating principle > > +of these lists is that email sent to the list is encrypted either with the > > +list's PGP key or with the list's S/MIME certificate. The mailing-list > > +software decrypts the email and re-encrypts it individually for each > > +subscriber with the subscriber's PGP key or S/MIME certificate. Details > > +about the mailing-list software and the setup which is used to ensure the > > +security of the lists and protection of the data can be found here: > > +https://www.kernel.org/.... > > Ditto? Yes, they will once the links are up and running :) thanks, greg k-h