* kernel.org tarball/patch signature files
@ 2011-10-23 11:17 Jari Ruusu
2011-10-23 11:37 ` Greg KH
0 siblings, 1 reply; 14+ messages in thread
From: Jari Ruusu @ 2011-10-23 11:17 UTC (permalink / raw)
To: Greg Kroah-Hartman; +Cc: linux-kernel
I noticed that patch-3.0.7.sign is a detached signature file for
DECOMPRESSED patch-3.0.7.{bz2,gz,xz}. Maybe this is not the best possible
way to sign compressed tarballs/patches. This is because it places hell of
lot of trust on quality/security of decompressor implementation.
Historically decompressor implementations have had bugs and security flaws.
It is stupid to assume that there won't be any more of them.
Wrong order to verify compressed tarball/patch:
(1) Feed potentially maliciously formatted data to decompressor, and exploit
any undiscovered/unpatched vulnerability in decompressor implementation.
(2) Verify decompressed output.
Much better order would be:
(1) Verify compressed data.
(2) Feed trusted data to decompressor.
So, would it be possible to have multiple signature files like this? Please.
patch-3.X.Y.bz2
patch-3.X.Y.bz2.sign
patch-3.X.Y.gz
patch-3.X.Y.gz.sign
patch-3.X.Y.xz
patch-3.X.Y.xz.sign
--
Jari Ruusu 1024R/3A220F51 5B 4B F9 BB D3 3F 52 E9 DB 1D EB E3 24 0E A9 DD
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: kernel.org tarball/patch signature files
2011-10-23 11:17 kernel.org tarball/patch signature files Jari Ruusu
@ 2011-10-23 11:37 ` Greg KH
2011-10-23 14:07 ` Jari Ruusu
2011-10-24 17:18 ` Valdis.Kletnieks
0 siblings, 2 replies; 14+ messages in thread
From: Greg KH @ 2011-10-23 11:37 UTC (permalink / raw)
To: Jari Ruusu; +Cc: linux-kernel
On Sun, Oct 23, 2011 at 02:17:20PM +0300, Jari Ruusu wrote:
> I noticed that patch-3.0.7.sign is a detached signature file for
> DECOMPRESSED patch-3.0.7.{bz2,gz,xz}.
That's exactly what I said in my announcement:
https://lkml.org/lkml/2011/10/23/51
so I'm glad it's working properly :)
> Maybe this is not the best possible
> way to sign compressed tarballs/patches. This is because it places hell of
> lot of trust on quality/security of decompressor implementation.
> Historically decompressor implementations have had bugs and security flaws.
> It is stupid to assume that there won't be any more of them.
>
> Wrong order to verify compressed tarball/patch:
>
> (1) Feed potentially maliciously formatted data to decompressor, and exploit
> any undiscovered/unpatched vulnerability in decompressor implementation.
> (2) Verify decompressed output.
>
> Much better order would be:
>
> (1) Verify compressed data.
> (2) Feed trusted data to decompressor.
>
> So, would it be possible to have multiple signature files like this? Please.
>
> patch-3.X.Y.bz2
> patch-3.X.Y.bz2.sign
> patch-3.X.Y.gz
> patch-3.X.Y.gz.sign
> patch-3.X.Y.xz
> patch-3.X.Y.xz.sign
Nope, sorry, let's try this way instead. That way we only have to
generate one signature, not 3.
If you are really worried about decompressor bugs, then run them in a
virtual machine/chroot :)
greg k-h
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: kernel.org tarball/patch signature files
2011-10-23 11:37 ` Greg KH
@ 2011-10-23 14:07 ` Jari Ruusu
2011-10-25 1:49 ` Greg KH
2011-10-24 17:18 ` Valdis.Kletnieks
1 sibling, 1 reply; 14+ messages in thread
From: Jari Ruusu @ 2011-10-23 14:07 UTC (permalink / raw)
To: Greg KH; +Cc: linux-kernel
Greg KH wrote:
> On Sun, Oct 23, 2011 at 02:17:20PM +0300, Jari Ruusu wrote:
> > Wrong order to verify compressed tarball/patch:
> >
> > (1) Feed potentially maliciously formatted data to decompressor, and exploit
> > any undiscovered/unpatched vulnerability in decompressor implementation.
> > (2) Verify decompressed output.
> >
> > Much better order would be:
> >
> > (1) Verify compressed data.
> > (2) Feed trusted data to decompressor.
> >
> > So, would it be possible to have multiple signature files like this? Please.
> >
> > patch-3.X.Y.bz2
> > patch-3.X.Y.bz2.sign
> > patch-3.X.Y.gz
> > patch-3.X.Y.gz.sign
> > patch-3.X.Y.xz
> > patch-3.X.Y.xz.sign
>
> Nope, sorry, let's try this way instead. That way we only have to
> generate one signature, not 3.
How about one signed message that contains multiple SHA256 sums or whatever?
sha256sum patch-3.X.Y.{bz2,gz,xz} | gpg --clearsign -a >patch-3.X.Y.sign
That allows verification before decompression.
> If you are really worried about decompressor bugs, then run them in a
> virtual machine/chroot :)
I am not amused.
Greg, please put your security hat on, and look at this from security point
of view. Decompression after verify removes/closes attacks utilizing yet
unidentified decompressor bugs or security flaws.
If I remember correctly, newer versions of OpenSSH disable compression
before authentication. They do that to pre-emptively close attacks resulting
yet unidentified bugs in decompression code.
--
Jari Ruusu 1024R/3A220F51 5B 4B F9 BB D3 3F 52 E9 DB 1D EB E3 24 0E A9 DD
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: kernel.org tarball/patch signature files
2011-10-23 11:37 ` Greg KH
2011-10-23 14:07 ` Jari Ruusu
@ 2011-10-24 17:18 ` Valdis.Kletnieks
1 sibling, 0 replies; 14+ messages in thread
From: Valdis.Kletnieks @ 2011-10-24 17:18 UTC (permalink / raw)
To: Greg KH; +Cc: Jari Ruusu, linux-kernel
[-- Attachment #1: Type: text/plain, Size: 602 bytes --]
On Sun, 23 Oct 2011 13:37:27 +0200, Greg KH said:
> If you are really worried about decompressor bugs, then run them in a
> virtual machine/chroot :)
Of more concern than bugs are errors during download. Yes, TCP has a checksum,
which is a CRC that quite frankly sucks when we're talking the amount of data
that kernel.org moves. So there's a non-zero chance you'll get bad data
downloaded. And you really want to do a more effective data check (MD5 or SHA
sum, or a PGP signature) *before* you decompress, in case the corrupted data
causes a spew of gigabytes of trash and fills your filesystem.
[-- Attachment #2: Type: application/pgp-signature, Size: 227 bytes --]
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: kernel.org tarball/patch signature files
2011-10-23 14:07 ` Jari Ruusu
@ 2011-10-25 1:49 ` Greg KH
2011-10-25 4:31 ` Kyle Moffett
` (2 more replies)
0 siblings, 3 replies; 14+ messages in thread
From: Greg KH @ 2011-10-25 1:49 UTC (permalink / raw)
To: Jari Ruusu; +Cc: linux-kernel
On Sun, Oct 23, 2011 at 05:07:51PM +0300, Jari Ruusu wrote:
> Greg KH wrote:
> > On Sun, Oct 23, 2011 at 02:17:20PM +0300, Jari Ruusu wrote:
> > > Wrong order to verify compressed tarball/patch:
> > >
> > > (1) Feed potentially maliciously formatted data to decompressor, and exploit
> > > any undiscovered/unpatched vulnerability in decompressor implementation.
> > > (2) Verify decompressed output.
> > >
> > > Much better order would be:
> > >
> > > (1) Verify compressed data.
> > > (2) Feed trusted data to decompressor.
> > >
> > > So, would it be possible to have multiple signature files like this? Please.
> > >
> > > patch-3.X.Y.bz2
> > > patch-3.X.Y.bz2.sign
> > > patch-3.X.Y.gz
> > > patch-3.X.Y.gz.sign
> > > patch-3.X.Y.xz
> > > patch-3.X.Y.xz.sign
> >
> > Nope, sorry, let's try this way instead. That way we only have to
> > generate one signature, not 3.
>
> How about one signed message that contains multiple SHA256 sums or whatever?
>
> sha256sum patch-3.X.Y.{bz2,gz,xz} | gpg --clearsign -a >patch-3.X.Y.sign
>
> That allows verification before decompression.
>
> > If you are really worried about decompressor bugs, then run them in a
> > virtual machine/chroot :)
>
> I am not amused.
>
> Greg, please put your security hat on, and look at this from security point
> of view. Decompression after verify removes/closes attacks utilizing yet
> unidentified decompressor bugs or security flaws.
Please realize that we are building this whole thing back up from
scratch here, and some services are not possible to do just yet.
Also realize our constraints. I don't want to, and in fact it's almost
impossible to, upload the 3 compressed tarballs over a large number of
internet connections that I have access to as I travel around the world.
So, given that you don't want all kernel release maintainers to store
their private keys on the server (remember what just happened), the
ability to generate that signature would be a pretty difficult thing,
right?
So, we are working on a proposal that has a "throw away" signature for
the compressed files, that can be verified by people after they download
the tarball to ensure that they didn't get something "odd". That will
handle the sha256sum, and allow us to add future compression types with
no need to regenerate the "real" signatures from the original release.
The real check, to verify that this tarball really came from "me" should
be done on the uncompressed tarball, which is what I can sign, and it is
something that you, or anyone else, can reliable duplicate on their own
by just using git and not even downloading the tarball at all.
In other words, we just saved you a MASSIVE bandwidth transation for all
of your future kernel downloads, and you can reliable know that the
tarball you have in your system is what is on the kernel.org servers
without you even having to download it yourself and run those
decompression tools that you don't trus.
And still you complain :)
Hope this helps explain why this is the way it is. It's as if people
think we are just making it up as we go along...
greg k-h
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: kernel.org tarball/patch signature files
2011-10-25 1:49 ` Greg KH
@ 2011-10-25 4:31 ` Kyle Moffett
2011-10-25 8:27 ` H. Peter Anvin
2011-10-25 6:06 ` Jari Ruusu
2011-10-25 7:28 ` Valdis.Kletnieks
2 siblings, 1 reply; 14+ messages in thread
From: Kyle Moffett @ 2011-10-25 4:31 UTC (permalink / raw)
To: Greg KH; +Cc: Jari Ruusu, linux-kernel
On Mon, Oct 24, 2011 at 21:49, Greg KH <greg@kroah.com> wrote:
> Please realize that we are building this whole thing back up from
> scratch here, and some services are not possible to do just yet.
>
> Also realize our constraints. I don't want to, and in fact it's almost
> impossible to, upload the 3 compressed tarballs over a large number of
> internet connections that I have access to as I travel around the world.
> So, given that you don't want all kernel release maintainers to store
> their private keys on the server (remember what just happened), the
> ability to generate that signature would be a pretty difficult thing,
> right?
>
> So, we are working on a proposal that has a "throw away" signature for
> the compressed files, that can be verified by people after they download
> the tarball to ensure that they didn't get something "odd". That will
> handle the sha256sum, and allow us to add future compression types with
> no need to regenerate the "real" signatures from the original release.
>
> The real check, to verify that this tarball really came from "me" should
> be done on the uncompressed tarball, which is what I can sign, and it is
> something that you, or anyone else, can reliable duplicate on their own
> by just using git and not even downloading the tarball at all.
>
> In other words, we just saved you a MASSIVE bandwidth transation for all
> of your future kernel downloads, and you can reliable know that the
> tarball you have in your system is what is on the kernel.org servers
> without you even having to download it yourself and run those
> decompression tools that you don't trus.
>
> And still you complain :)
>
> Hope this helps explain why this is the way it is. It's as if people
> think we are just making it up as we go along...
Well, in theory it could still be done (albeit not in practice right now).
There is a tool called "pristine-tar" designed to generate a
byte-identical tar.gz given the original source tree. Obviously with
git-archive you don't need the "tar" portion, but it also includes
"pristine-gz" and "pristine-bz2" tools which tease out and store the
original compression parameters in a small file. It's commonly used
to be able to "import" a bunch of source files and a tarball into GIT
without storing the entire original tarball as a binary file.
So the kernel developers would locally produce the uncompressed and
compressed tarballs, then digitally sign them and create small
"pristine-{gz,bz2,xz}" archive deltas; the signatures and deltas would
be uploaded.
The kernel.org server would use the original input and compression
parameters to reconstruct the byte-identical compressed archive from
the output of "git archive --format=tar", again with the "pristine-*"
tools.
Unfortunately, while there are "pristine-gz" and "pristine-bz2" tools,
there has not yet been developed a "pristine-xz" tool:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499489
So it's not yet reasonably possible for the kernel.org archive, but
sometime in the future it might become so.
Cheers,
Kyle Moffett
--
Curious about my work on the Debian powerpcspe port?
I'm keeping a blog here: http://pureperl.blogspot.com/
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: kernel.org tarball/patch signature files
2011-10-25 1:49 ` Greg KH
2011-10-25 4:31 ` Kyle Moffett
@ 2011-10-25 6:06 ` Jari Ruusu
2011-10-25 7:09 ` Greg KH
2011-10-25 7:28 ` Valdis.Kletnieks
2 siblings, 1 reply; 14+ messages in thread
From: Jari Ruusu @ 2011-10-25 6:06 UTC (permalink / raw)
To: Greg KH; +Cc: linux-kernel
Greg KH wrote:
> Also realize our constraints. I don't want to, and in fact it's almost
> impossible to, upload the 3 compressed tarballs over a large number of
> internet connections that I have access to as I travel around the world.
How about signing just one compressed tarball/patch, and let other
compressed versions be without signature files. Users who want to check
signature will then download the one you signed.
--
Jari Ruusu 1024R/3A220F51 5B 4B F9 BB D3 3F 52 E9 DB 1D EB E3 24 0E A9 DD
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: kernel.org tarball/patch signature files
2011-10-25 6:06 ` Jari Ruusu
@ 2011-10-25 7:09 ` Greg KH
2011-10-25 8:09 ` Jari Ruusu
0 siblings, 1 reply; 14+ messages in thread
From: Greg KH @ 2011-10-25 7:09 UTC (permalink / raw)
To: Jari Ruusu; +Cc: linux-kernel
On Tue, Oct 25, 2011 at 09:06:37AM +0300, Jari Ruusu wrote:
> Greg KH wrote:
> > Also realize our constraints. I don't want to, and in fact it's almost
> > impossible to, upload the 3 compressed tarballs over a large number of
> > internet connections that I have access to as I travel around the world.
>
> How about signing just one compressed tarball/patch, and let other
> compressed versions be without signature files. Users who want to check
> signature will then download the one you signed.
That's no difference from what we are doing today if you think it
though.
greg k-h
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: kernel.org tarball/patch signature files
2011-10-25 1:49 ` Greg KH
2011-10-25 4:31 ` Kyle Moffett
2011-10-25 6:06 ` Jari Ruusu
@ 2011-10-25 7:28 ` Valdis.Kletnieks
2011-10-25 7:34 ` Greg KH
2 siblings, 1 reply; 14+ messages in thread
From: Valdis.Kletnieks @ 2011-10-25 7:28 UTC (permalink / raw)
To: Greg KH; +Cc: Jari Ruusu, linux-kernel
[-- Attachment #1: Type: text/plain, Size: 1168 bytes --]
On Tue, 25 Oct 2011 03:49:11 +0200, Greg KH said:
> The real check, to verify that this tarball really came from "me" should
> be done on the uncompressed tarball, which is what I can sign, and it is
> something that you, or anyone else, can reliable duplicate on their own
> by just using git and not even downloading the tarball at all.
I'm OK on that part..
> In other words, we just saved you a MASSIVE bandwidth transation for all
> of your future kernel downloads, and you can reliable know that the
> tarball you have in your system is what is on the kernel.org servers
> without you even having to download it yourself and run those
> decompression tools that you don't trus.
If you're building an automated process that will take a just-uploaded foo.tar
and generate foo.tar.{bz2,gz,foozip}, can you add a step that would just do an
'md5sum foo.tar.* > foo.tar.sums'? Or sha256sum if you're worried about the
crypto weakness issues with MD5. Personally, I'm more interested in the "Did I
hit a network error that the TCP checksum didn't catch?" case.
No hurry, I know what a beast it can be to redesign systems of this scale. Just
a would-be-nice...
[-- Attachment #2: Type: application/pgp-signature, Size: 227 bytes --]
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: kernel.org tarball/patch signature files
2011-10-25 7:28 ` Valdis.Kletnieks
@ 2011-10-25 7:34 ` Greg KH
0 siblings, 0 replies; 14+ messages in thread
From: Greg KH @ 2011-10-25 7:34 UTC (permalink / raw)
To: Valdis.Kletnieks; +Cc: Jari Ruusu, linux-kernel
On Tue, Oct 25, 2011 at 03:28:37AM -0400, Valdis.Kletnieks@vt.edu wrote:
> On Tue, 25 Oct 2011 03:49:11 +0200, Greg KH said:
>
> > The real check, to verify that this tarball really came from "me" should
> > be done on the uncompressed tarball, which is what I can sign, and it is
> > something that you, or anyone else, can reliable duplicate on their own
> > by just using git and not even downloading the tarball at all.
>
> I'm OK on that part..
>
> > In other words, we just saved you a MASSIVE bandwidth transation for all
> > of your future kernel downloads, and you can reliable know that the
> > tarball you have in your system is what is on the kernel.org servers
> > without you even having to download it yourself and run those
> > decompression tools that you don't trus.
>
> If you're building an automated process that will take a just-uploaded foo.tar
> and generate foo.tar.{bz2,gz,foozip}, can you add a step that would just do an
> 'md5sum foo.tar.* > foo.tar.sums'? Or sha256sum if you're worried about the
> crypto weakness issues with MD5. Personally, I'm more interested in the "Did I
> hit a network error that the TCP checksum didn't catch?" case.
Yes, we are working on just that thing, and the foo.tar.sums file will
be signed with the kernel.org "throwaway" key, so you can check that as
well.
greg k-h
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: kernel.org tarball/patch signature files
2011-10-25 7:09 ` Greg KH
@ 2011-10-25 8:09 ` Jari Ruusu
0 siblings, 0 replies; 14+ messages in thread
From: Jari Ruusu @ 2011-10-25 8:09 UTC (permalink / raw)
To: Greg KH; +Cc: linux-kernel
Greg KH wrote:
> On Tue, Oct 25, 2011 at 09:06:37AM +0300, Jari Ruusu wrote:
> > How about signing just one compressed tarball/patch, and let other
> > compressed versions be without signature files. Users who want to check
> > signature will then download the one you signed.
>
> That's no difference from what we are doing today if you think it
> though.
You signing compressed version eliminates exposure to yet undiscovered
decompressor bugs. Pre-emptively removing as many as possible attack
surfaces is the correct securely engineered way of doing things. You signing
decompressed version is opposite of that. You added new attack surface.
Decompressors are complex software. They almost certainly have bugs in
evil-formatted data handling, forever. Reading data from untrusted internet
and feeding that data to decompressor without any authentication, screams
"REMOTE EXPLOIT ME", if you look at it from security point of view.
> Yes, we are working on just that thing, and the foo.tar.sums file will
> be signed with the kernel.org "throwaway" key, so you can check that as
> well.
That sounds much better than current signing practice.
--
Jari Ruusu 1024R/3A220F51 5B 4B F9 BB D3 3F 52 E9 DB 1D EB E3 24 0E A9 DD
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: kernel.org tarball/patch signature files
2011-10-25 4:31 ` Kyle Moffett
@ 2011-10-25 8:27 ` H. Peter Anvin
2011-10-25 9:13 ` Valdis.Kletnieks
0 siblings, 1 reply; 14+ messages in thread
From: H. Peter Anvin @ 2011-10-25 8:27 UTC (permalink / raw)
To: Kyle Moffett; +Cc: Greg KH, Jari Ruusu, linux-kernel
On 10/25/2011 06:31 AM, Kyle Moffett wrote:
>
> Unfortunately, while there are "pristine-gz" and "pristine-bz2" tools,
> there has not yet been developed a "pristine-xz" tool:
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499489
>
> So it's not yet reasonably possible for the kernel.org archive, but
> sometime in the future it might become so.
>
There are a lot of strong reasons to NOT do so, however.
Any time we have something signed by a developer, we have something that
is precious and cannot be replicated by kernel.org staff.
Any time we have something signed by a robot, we have something that
people *will* misinterpret as having security properties that they don't
-- this has unfortunately been amply shown.
Compression formats evolve over time; right now we're concerned with gz,
bz2, and xz, but xz is brand new here and there may very well be new
things in the future.
It would be a very good thing for people to develop tools to run
compressors and decompressors in locked-down boxes. It should be
possible to run these kinds of programs without access to either network
or filesystem; only read from stdin and out on stdout (and presumably
stderr for errors.) This would solve problems for much more than just
kernel.org.
-hpa
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: kernel.org tarball/patch signature files
2011-10-25 8:27 ` H. Peter Anvin
@ 2011-10-25 9:13 ` Valdis.Kletnieks
2011-10-25 9:32 ` H. Peter Anvin
0 siblings, 1 reply; 14+ messages in thread
From: Valdis.Kletnieks @ 2011-10-25 9:13 UTC (permalink / raw)
To: H. Peter Anvin; +Cc: Kyle Moffett, Greg KH, Jari Ruusu, linux-kernel
[-- Attachment #1: Type: text/plain, Size: 561 bytes --]
On Tue, 25 Oct 2011 10:27:05 +0200, "H. Peter Anvin" said:
> It would be a very good thing for people to develop tools to run
> compressors and decompressors in locked-down boxes. It should be
> possible to run these kinds of programs without access to either network
> or filesystem; only read from stdin and out on stdout (and presumably
> stderr for errors.) This would solve problems for much more than just
> kernel.org.
Wasn't there once a kernel hack called seccomp, that only allowed read syscalls
on stdin and writes on stdout and that was it? ;)
[-- Attachment #2: Type: application/pgp-signature, Size: 227 bytes --]
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: kernel.org tarball/patch signature files
2011-10-25 9:13 ` Valdis.Kletnieks
@ 2011-10-25 9:32 ` H. Peter Anvin
0 siblings, 0 replies; 14+ messages in thread
From: H. Peter Anvin @ 2011-10-25 9:32 UTC (permalink / raw)
To: Valdis.Kletnieks
Cc: Kyle Moffett, Greg KH, Jari Ruusu, linux-kernel, John Hawley
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 10/25/2011 11:13 AM, Valdis.Kletnieks@vt.edu wrote:
>
> Wasn't there once a kernel hack called seccomp, that only allowed
> read syscalls on stdin and writes on stdout and that was it? ;)
>
It's still there (and there are a bunch of other ways to do this in
Linux). The big thing is to wrapper this up and get people to use it.
Even better would be to get this into gzip, bzip2 and xz so it
happens automatically!
-hpa
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iQIcBAEBAgAGBQJOpoIwAAoJEL2gYIVJO6zkzr4P/2NRkQuMXLtaVLLaxGo1CRx+
7PrNNbUqOMCWcLaMJeNQZPabgWzpaUUshtxkUsmDcKuiHzZcXGK8Pp7QmCGVssmR
zPCn/D2bN+JFkqKxAJyTy57OE35ccXGanGd3BtmNe5KQic06SsEZJ/EWFRuTZxDP
t+Ub08/Fq35D8/dw6ZQ3UdFzwGDQt/8Oxs+gVymuYro08Cezz7aL6bYllS+v5Y1m
2EQ9Nk9sBe9wKLLQJqvwTTXl9abhzlugFCcCsK41PZ0fW38s9728NgKru4sn8CmC
O7E3aClUJPEu/58h6WnAavaemEjHPhQn0KqShgn+amgyqRTMbX+uwq5RY49pLWZ2
eEVRHbGkLLHkfQYJuCjM09y5sRGp1HZC3CUPiZoEZTZXTeZ0Fl162v6utyo39dxT
1TJYsYpoYYrjtg5jFBNLh1uQ1ZeI46fOvhP84v9JbSmYBpo/Fb1yb5nj5YflIpUs
XVXVv9mu0Cuz60tuf0ceqAsvoiYaliM56bZjr65pscOPDzTP/qPtY4Q9UfEjeiAO
1N/l3gBJpOcHD3K5E1v3wcfD0PMeAu1W3WfW9Mj4KswPIz3EFQ6h1ja/urGC8GD3
pw19Uv33mDVHAlKFmZ5N2qIAmbmNaXejDmqvZxsvUyvSzqk+EmB33oYzPv+6n76p
IWHwm1SNbBjQI2AlEmmW
=P2oY
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] 14+ messages in thread
end of thread, other threads:[~2011-10-25 9:33 UTC | newest]
Thread overview: 14+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2011-10-23 11:17 kernel.org tarball/patch signature files Jari Ruusu
2011-10-23 11:37 ` Greg KH
2011-10-23 14:07 ` Jari Ruusu
2011-10-25 1:49 ` Greg KH
2011-10-25 4:31 ` Kyle Moffett
2011-10-25 8:27 ` H. Peter Anvin
2011-10-25 9:13 ` Valdis.Kletnieks
2011-10-25 9:32 ` H. Peter Anvin
2011-10-25 6:06 ` Jari Ruusu
2011-10-25 7:09 ` Greg KH
2011-10-25 8:09 ` Jari Ruusu
2011-10-25 7:28 ` Valdis.Kletnieks
2011-10-25 7:34 ` Greg KH
2011-10-24 17:18 ` Valdis.Kletnieks
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).