[Touch-packages] [Bug 1969375] Re: systemd-cryptenroll does not support TPM2 devices

2022-06-10 Thread Dean Huffman
Thank you, I am away on holiday until next wednesday but I will test
during the second half of next week

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1969375

Title:
  systemd-cryptenroll does not support TPM2 devices

Status in systemd package in Ubuntu:
  In Progress
Status in systemd source package in Jammy:
  Fix Committed
Status in systemd source package in Kinetic:
  In Progress

Bug description:
  [Impact]

   * TPM2/FIDO cannot be used to unlock luks encrpyted block devices
   * due to missing build-time support in systemd
   * Error message: "TPM2 not supported on this build."

  [Test Plan]

  # 1: check no new binary deps have been introduced to the systemd package, 
other than "libssl3", which is already installed by default.
  # Compare to this version of systemd 249.11-0ubuntu3.1:
  $ apt-cache depends systemd
  systemd
PreDepends: libblkid1
PreDepends: libc6
PreDepends: libcap2
PreDepends: libgcrypt20
PreDepends: liblz4-1
PreDepends: liblzma5
PreDepends: libselinux1
PreDepends: libzstd1
Depends: libacl1
Depends: libapparmor1
Depends: libaudit1
Depends: libcrypt1
Depends: libcryptsetup12
Depends: libgnutls30
Depends: libgpg-error0
Depends: libip4tc2
Depends: libkmod2
Depends: liblz4-1
Depends: libmount1
Depends: libpam0g
Depends: libseccomp2
Depends: libsystemd0
Depends: util-linux
Depends: mount
Depends: adduser
Conflicts: 
Conflicts: 
Conflicts: 
Breaks: resolvconf
Breaks: udev
   |Recommends: 
  dbus
Recommends: 
  dbus-broker
  dbus
Recommends: networkd-dispatcher
   |Recommends: systemd-timesyncd
Recommends: 
  chrony
  ntp
  ntpsec
  openntpd
  systemd-timesyncd
Suggests: systemd-container
Suggests: policykit-1

  # 2: check that systemd-cryptenroll doesn't have any undefined symbols that 
prevent it from running:
  $ systemd-cryptenroll --help  # this should not crash
  systemd-cryptenroll [OPTIONS...] BLOCK-DEVICE

  Enroll a security token or authentication credential to a LUKS volume.

-h --helpShow this help
   --version Show package version
   --passwordEnroll a user-supplied password
   --recovery-keyEnroll a recovery key
   --pkcs11-token-uri=URI
 Specify PKCS#11 security token URI
   --fido2-device=PATH
 Enroll a FIDO2-HMAC security token
   --fido2-with-client-pin=BOOL
 Whether to require entering a PIN to unlock the volume
   --fido2-with-user-presence=BOOL
 Whether to require user presence to unlock the volume
   --fido2-with-user-verification=BOOL
 Whether to require user verification to unlock the 
volume
   --tpm2-device=PATH
 Enroll a TPM2 device
   --tpm2-pcrs=PCR1+PCR2+PCR3+…
 Specify TPM2 PCRs to seal against
   --wipe-slot=SLOT1,SLOT2,…
 Wipe specified slots

  See the systemd-cryptenroll(1) man page for details.

  # initial setup
  $ dd if=/dev/zero of=encrypted.img bs=1 count=0 seek=100M
  $ echo -n "s0s3cur3" | cryptsetup luksFormat encrypted.img -
  $ sudo /usr/lib/systemd/systemd-cryptsetup attach volume encrypted.img
   Please enter passphrase for disk volume: s0s3cur3
  Set cipher aes, mode xts-plain64, key size 512 bits for device encrypted.img.
  $ sudo mkfs.ext4 /dev/mapper/volume
  $ sudo mount /dev/mapper/volume /mnt
  $ sudo touch /mnt/TPM_TEST
  $ ls -la /mnt
  drwxr-xr-x  3 root root  4096 Jun  7 15:06 .
  drwxr-xr-x 20 root root  4096 Apr 20 11:45 ..
  drwx--  2 root root 16384 Jun  7 15:06 lost+found
  -rw-r--r--  1 root root 0 Jun  7 15:06 TPM_TEST
  $ sudo umount /dev/mapper/volume
  $ sudo cryptsetup luksClose volume
  $ ls -la /mnt # empty

  # 3: check non-TPM use cases (--password & --recovery-key) of 
systemd-cryptenroll have not regressed.
  # enroll additional password
  $ systemd-cryptenroll --password encrypted.img
   Please enter current passphrase for disk 
/home/lukas/canonical/systemd-dbg/encrypted.img: s0s3cur3
   Please enter new passphrase for disk 
/home/lukas/canonical/systemd-dbg/encrypted.img: s0s3cr3t
   Please enter new passphrase for disk 
/home/lukas/canonical/systemd-dbg/encrypted.img (repeat): s0s3cr3t
  New password enrolled as key slot 1.
  $ sudo /usr/lib/systemd/systemd-cryptsetup attach volume encrypted.img
   Please enter passphrase for disk volume: s0s3cr3t
  Set cipher aes, mode xts-plain64, key size 512 bits for device encrypted.img.
  $ sudo cryptsetup luksClose volume
  $ systemd-cryptenroll --wipe-slot=1 encrypted.img
  Wiped slot 1.

  # enroll additional recovery-key
  $ systemd-cryptenroll --recovery-key encrypted.img
   Please 

[Touch-packages] [Bug 1969375] [NEW] systemd-cryptenroll does not support TPM2 devices

2022-04-18 Thread Dean Huffman
Public bug reported:

systemd-cryptenroll can make use of tpm2 modules to bind against secure
boot pcrs and enable auto unlocking of luks devices.

Following the instructions here:
https://wiki.archlinux.org/title/Trusted_Platform_Module#systemd-cryptenroll

the following commands fail on ubuntu jammy (5.15.0-25-generic)

root@testbox:~# systemd-cryptenroll --tpm2-device=list
TPM2 not supported on this build.
root@testbox:~# systemd-cryptenroll --tpm2-device=auto --tpm2-pcrs=7 /dev/sda3
 Please enter current passphrase for disk /dev/sda3: ***
root@testbox:~# echo $?
1

It appears that this issue has been resolved in the debian build for
systemd here:  https://salsa.debian.org/systemd-
team/systemd/-/commit/6b5e99f1d7f63c0c83007de9f98f7745f4a564f8

Can we get the same modifications to the Jammy systemd build?

** Affects: systemd (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: luks systemd tpm2

** Package changed: linux (Ubuntu) => systemd (Ubuntu)

** Description changed:

  systemd-cryptenroll can make use of tpm2 modules to bind against secure
- boot pcrs an enable auto unlocking of luks devices.
+ boot pcrs and enable auto unlocking of luks devices.
  
- Following the instructions here: 
+ Following the instructions here:
  https://wiki.archlinux.org/title/Trusted_Platform_Module#systemd-cryptenroll
  
  the following commands fail on ubuntu jammy (5.15.0-25-generic)
  
  root@testbox:~# systemd-cryptenroll --tpm2-device=list
  TPM2 not supported on this build.
  root@testbox:~# systemd-cryptenroll --tpm2-device=auto --tpm2-pcrs=7 /dev/sda3
   Please enter current passphrase for disk /dev/sda3: ***
  root@testbox:~# echo $?
  1
  
  It appears that this issue has been resolved in the debian build for
  systemd here:  https://salsa.debian.org/systemd-
  team/systemd/-/commit/6b5e99f1d7f63c0c83007de9f98f7745f4a564f8
  
  Can we get the same modifications to the Jammy systemd build?

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1969375

Title:
  systemd-cryptenroll does not support TPM2 devices

Status in systemd package in Ubuntu:
  New

Bug description:
  systemd-cryptenroll can make use of tpm2 modules to bind against
  secure boot pcrs and enable auto unlocking of luks devices.

  Following the instructions here:
  https://wiki.archlinux.org/title/Trusted_Platform_Module#systemd-cryptenroll

  the following commands fail on ubuntu jammy (5.15.0-25-generic)

  root@testbox:~# systemd-cryptenroll --tpm2-device=list
  TPM2 not supported on this build.
  root@testbox:~# systemd-cryptenroll --tpm2-device=auto --tpm2-pcrs=7 /dev/sda3
   Please enter current passphrase for disk /dev/sda3: ***
  root@testbox:~# echo $?
  1

  It appears that this issue has been resolved in the debian build for
  systemd here:  https://salsa.debian.org/systemd-
  team/systemd/-/commit/6b5e99f1d7f63c0c83007de9f98f7745f4a564f8

  Can we get the same modifications to the Jammy systemd build?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1969375/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Bug 1969375] [NEW] systemd-cryptenroll does not support TPM2 devices

2022-04-18 Thread Dean Huffman
Public bug reported:

systemd-cryptenroll can make use of tpm2 modules to bind against secure
boot pcrs and enable auto unlocking of luks devices.

Following the instructions here:
https://wiki.archlinux.org/title/Trusted_Platform_Module#systemd-cryptenroll

the following commands fail on ubuntu jammy (5.15.0-25-generic)

root@testbox:~# systemd-cryptenroll --tpm2-device=list
TPM2 not supported on this build.
root@testbox:~# systemd-cryptenroll --tpm2-device=auto --tpm2-pcrs=7 /dev/sda3
 Please enter current passphrase for disk /dev/sda3: ***
root@testbox:~# echo $?
1

It appears that this issue has been resolved in the debian build for
systemd here:  https://salsa.debian.org/systemd-
team/systemd/-/commit/6b5e99f1d7f63c0c83007de9f98f7745f4a564f8

Can we get the same modifications to the Jammy systemd build?

** Affects: systemd (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: luks systemd tpm2

** Package changed: linux (Ubuntu) => systemd (Ubuntu)

** Description changed:

  systemd-cryptenroll can make use of tpm2 modules to bind against secure
- boot pcrs an enable auto unlocking of luks devices.
+ boot pcrs and enable auto unlocking of luks devices.
  
- Following the instructions here: 
+ Following the instructions here:
  https://wiki.archlinux.org/title/Trusted_Platform_Module#systemd-cryptenroll
  
  the following commands fail on ubuntu jammy (5.15.0-25-generic)
  
  root@testbox:~# systemd-cryptenroll --tpm2-device=list
  TPM2 not supported on this build.
  root@testbox:~# systemd-cryptenroll --tpm2-device=auto --tpm2-pcrs=7 /dev/sda3
   Please enter current passphrase for disk /dev/sda3: ***
  root@testbox:~# echo $?
  1
  
  It appears that this issue has been resolved in the debian build for
  systemd here:  https://salsa.debian.org/systemd-
  team/systemd/-/commit/6b5e99f1d7f63c0c83007de9f98f7745f4a564f8
  
  Can we get the same modifications to the Jammy systemd build?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1969375

Title:
  systemd-cryptenroll does not support TPM2 devices

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1969375/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Kernel-packages] [Bug 1969375] [NEW] systemd-cryptenroll does not support TPM2 devices

2022-04-18 Thread Dean Huffman
Public bug reported:

systemd-cryptenroll can make use of tpm2 modules to bind against secure
boot pcrs and enable auto unlocking of luks devices.

Following the instructions here:
https://wiki.archlinux.org/title/Trusted_Platform_Module#systemd-cryptenroll

the following commands fail on ubuntu jammy (5.15.0-25-generic)

root@testbox:~# systemd-cryptenroll --tpm2-device=list
TPM2 not supported on this build.
root@testbox:~# systemd-cryptenroll --tpm2-device=auto --tpm2-pcrs=7 /dev/sda3
 Please enter current passphrase for disk /dev/sda3: ***
root@testbox:~# echo $?
1

It appears that this issue has been resolved in the debian build for
systemd here:  https://salsa.debian.org/systemd-
team/systemd/-/commit/6b5e99f1d7f63c0c83007de9f98f7745f4a564f8

Can we get the same modifications to the Jammy systemd build?

** Affects: systemd (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: luks systemd tpm2

** Package changed: linux (Ubuntu) => systemd (Ubuntu)

** Description changed:

  systemd-cryptenroll can make use of tpm2 modules to bind against secure
- boot pcrs an enable auto unlocking of luks devices.
+ boot pcrs and enable auto unlocking of luks devices.
  
- Following the instructions here: 
+ Following the instructions here:
  https://wiki.archlinux.org/title/Trusted_Platform_Module#systemd-cryptenroll
  
  the following commands fail on ubuntu jammy (5.15.0-25-generic)
  
  root@testbox:~# systemd-cryptenroll --tpm2-device=list
  TPM2 not supported on this build.
  root@testbox:~# systemd-cryptenroll --tpm2-device=auto --tpm2-pcrs=7 /dev/sda3
   Please enter current passphrase for disk /dev/sda3: ***
  root@testbox:~# echo $?
  1
  
  It appears that this issue has been resolved in the debian build for
  systemd here:  https://salsa.debian.org/systemd-
  team/systemd/-/commit/6b5e99f1d7f63c0c83007de9f98f7745f4a564f8
  
  Can we get the same modifications to the Jammy systemd build?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1969375

Title:
  systemd-cryptenroll does not support TPM2 devices

Status in systemd package in Ubuntu:
  New

Bug description:
  systemd-cryptenroll can make use of tpm2 modules to bind against
  secure boot pcrs and enable auto unlocking of luks devices.

  Following the instructions here:
  https://wiki.archlinux.org/title/Trusted_Platform_Module#systemd-cryptenroll

  the following commands fail on ubuntu jammy (5.15.0-25-generic)

  root@testbox:~# systemd-cryptenroll --tpm2-device=list
  TPM2 not supported on this build.
  root@testbox:~# systemd-cryptenroll --tpm2-device=auto --tpm2-pcrs=7 /dev/sda3
   Please enter current passphrase for disk /dev/sda3: ***
  root@testbox:~# echo $?
  1

  It appears that this issue has been resolved in the debian build for
  systemd here:  https://salsa.debian.org/systemd-
  team/systemd/-/commit/6b5e99f1d7f63c0c83007de9f98f7745f4a564f8

  Can we get the same modifications to the Jammy systemd build?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1969375/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Bug 1961758] Re: Fail to run tpm2 command under ubuntu server 22.04

2022-03-01 Thread Dean Huffman
I can confirm the following steps work on 21.10 fresh install to enroll
a TPM2.0 for use with a LUKS encrypted partition but do not work on
22.04.

apt install clevis clevis-tpm2 clevis-luks clevis-udisks2 clevis-systemd 
clevis-initramfs
udevadm trigger
clevis luks bind -d /dev/sda3 tpm2 '{"pcr_bank":"sha256","pcr_ids":"0,1,7"}'
update-initramfs -u -k 'all'


The command starting with "clevis"  fails with the following under a
fresh install of 22.04:


root@svdivr-:/var/log/installer# clevis luks bind -d /dev/sda3 tpm2 
'{"pcr_bank":"sha256","pcr_ids":"0,1,7"}'
Enter existing LUKS password: 
No key available with this passphrase.
Enter existing LUKS password: 
Warning: Value 512 is outside of the allowed entropy range, adjusting it.
ERROR:esys_crypto:src/tss2-esys/esys_crypto_ossl.c:327:iesys_cryptossl_hmac_start()
 ErrorCode (0x00070001) EVP_PKEY_new_mac_key 
ERROR:esys_crypto:src/tss2-esys/esys_crypto.c:185:iesys_crypto_authHmac() Error 
ErrorCode (0x00070001) 
ERROR:esys:src/tss2-esys/esys_iutil.c:1244:iesys_compute_hmac() HMAC error 
ErrorCode (0x00070001) 
ERROR:esys:src/tss2-esys/esys_iutil.c:1354:iesys_gen_auths() Error while 
computing hmacs ErrorCode (0x00070001) 
ERROR:esys:src/tss2-esys/api/Esys_CreatePrimary.c:244:Esys_CreatePrimary_Async()
 Error in computation of auth values ErrorCode (0x00070001) 
ERROR:esys:src/tss2-esys/api/Esys_CreatePrimary.c:110:Esys_CreatePrimary() 
Error in async function ErrorCode (0x00070001) 
ERROR: Esys_CreatePrimary(0x70001) - esapi:Catch all for all errors not 
otherwise specified
ERROR: Unable to run tpm2_createprimary
Creating TPM2 primary key failed!
Invalid input!
Usage: jose jwe fmt -i JWE [-I CT] [-o JWE] [-O CT] [-c]

Converts a JWE between serialization formats

  -i JSON --input=JSON Parse JWE from JSON
  -i FILE --input=FILE Read JWE from FILE
  -i ---input=-Read JWE from standard input

  -I FILE --detached=FILE  Read decoded ciphertext from FILE
  -I ---detached=- Read decoded ciphertext from standard input

  -o JSON --output=JSONParse JWE from JSON
  -o FILE --output=FILERead JWE from FILE
  -o ---output=-   Read JWE from standard input
   Default: "-"

  -O JSON --detach=JSONParse JWE from JSON
  -O FILE --detach=FILERead JWE from FILE
  -O ---detach=-   Read JWE from standard input

  -c  --compactOutput JWE using compact serialization

Failed to import token from file.
Error saving metadata to LUKS2 header in device /dev/sda3
Unable to update metadata; operation cancelled
Error adding new binding to /dev/sda3

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1961758

Title:
  Fail to run tpm2 command under ubuntu server 22.04

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tpm2-tss-engine/+bug/1961758/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

JavaScriptObject deep copy.

2010-04-06 Thread Dean Huffman
Since it took me 3 hours to figure out why this doesn't work and I
could not find any other post on the subject, here is one way to do a
deep copy of a JavaScriptObject using JSNI.

public static final native JavaScriptObject deepCopy(JavaScriptObject
obj) /*-{
  if (Object.prototype.toString.call(obj) === '[object Array]') {
var out = [], i = 0, len = obj.length;
for ( ; i  len; i++ ) {
  out[i] = arguments.callee(obj[i]);
}
return out;
  }
  if (typeof obj === 'object') {
var out = {}, i;
for ( i in obj ) {
  if (i != __gwt_ObjectId) {
out[i] = arguments.callee(obj[i]);
  }
}
return out;
  }
  return obj;
}-*/;

-- 
You received this message because you are subscribed to the Google Groups 
Google Web Toolkit group.
To post to this group, send email to google-web-tool...@googlegroups.com.
To unsubscribe from this group, send email to 
google-web-toolkit+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/google-web-toolkit?hl=en.



[jira] Created: (SYNAPSE-428) WstxIOException when using Dynamic Sequences with large size XML files

2008-08-13 Thread Dean Huffman (JIRA)
WstxIOException when using Dynamic Sequences with large size XML files
--

 Key: SYNAPSE-428
 URL: https://issues.apache.org/jira/browse/SYNAPSE-428
 Project: Synapse
  Issue Type: Bug
Affects Versions: 1.2
 Environment: Redhat Linux 5, Java 1.5.  Catching message from JMS, 
transforming message, logging to database.
Reporter: Dean Huffman


When I'm using an external XML file for a dynamic sequence, Synapse throws an 
error when the XML file is too large.  I'm not sure if it's related to the file 
size or to the number of elements.  My sequence works correctly when specified 
all in one file.  I'm running a query as part of the sequence so if i slim down 
the number of parameters, the sequence will also work when dynamically linked.  
However, once i found the maximum number of parameters that will execute, if i 
even add a html comment to the xml file, synapse will throw an error.  I'm not 
able to post detailed stack traces but the top level error i'm receiving when 
things fail is:

org.apache.axiom.om.OMException, com.ctc.wstx.exc.WstxIOException: Stream 
Closed.

the linked xml file is not that large, only about 4 KB.



-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: Real VNC over 52K modem

2006-02-26 Thread Dean Huffman

.

I use VNC to connect from the road to my computer at home. One time the 
router went out and I could not connect to my computer. I therefore had my 
wife connect to the internet through a dial-up connection. In my area, the 
best speed I can get by dialup is 22 - 24 KBPS. The connection was SLOW but 
otherwise fine. The only problem I noted was that periodically I would have 
to reconnect to my home computer. with the slow connection speed, the VNC 
connection kept closng. The home computer maintianed the modem connection, 
however, so it was always simple to re-connect through VNC. I do not know 
why I kept losing the VNC connection, but I presume it was because of 
problems caused by the 22 KBPS connection.


Dean Huffman

- - - -

I am very new to RealVNC and now am using it between computers, linux and 
windows. I really appreciate the functionality. My question:



Mom lives on the west coast, I'm on the east. She only has a 52K dial-up 
modem. When she has computer problems, I walk through the checks and fixes 
with her over the phone. Invariably, right click gets mixed up with left 
click and she is not conveying precisely what is happening on her box. 
Terminology becomes an obstacle--the usual stuff for the home-user. I want 
to work on her box via RealVNC to show her what to do and teach her how 
things work. Can I have her install VNC and then work over the viewer 
through her 52K modem? If so, please note special hardware configurations 
that may be required. I have the standard broadband modem/router hookup.

This would be a great teaching tool.


-Mark
___
VNC-List mailing list
VNC-List@realvnc.com
To remove yourself from the list visit:
http://www.realvnc.com/mailman/listinfo/vnc-list


Using SSH ...

2005-10-09 Thread Dean Huffman

.

Is there a good URL that contains a tutorial on how to set up SSH for VNC?

I have been trying to figure out the system and it appears that one 
computer (with the VNC server) must have an SSH server that accepts the 
messages (from an SSH client) and converts them to plaintext and sends them 
on to the VNC server on the same computer. The VNC server then responds, 
sends the message to the SSH server, on the same computer, in plaintext, 
which then converts the signal to an encrypted signal, sends it on to the 
SSH client on the other computer, which then translates the signal into 
plaintext and sends it to the VNC client on the same computer.


Are the SSH applications on the client and server computer the SAME 
application, or are there different SSH applications for each computer? 
How, on the server end, does the VNC client (or web browser) know to send 
the text to SSH rather than directly to the internet? How does the SSH know 
to send the signal to the SSH on the other end rather than directly to VNC?


In some of the tutorials I have found, it appears (but is not stated) that 
SSH is assumed to be running on the server side.


What I am looking for is a tutorial that explains SSH and gives the nuts 
and bolts of setting it up.


As an aside, why doesn't Windows (yes, I am embarrassed to admit that I use 
Windows) have SSH set up in its operating system so that one just has to do 
a few mouse clicks to get it started?


Thanks.




Dean Huffman
___
VNC-List mailing list
VNC-List@realvnc.com
To remove yourself from the list visit:
http://www.realvnc.com/mailman/listinfo/vnc-list