* Ben Hutchings:
>> The Terms & Conditions of existing EV code-signing CAs do not permit a
>> code-signing end-entity certificate to be used for signing another
>> certificate, so we'd directly have to embed the end-entity certificate
>> used to sign GRUB and the kernel into the shim—or we'd have
Neil McGovern writes ("Re: Updating the Policy Editors delegation"):
> I think me and Kurt have now reached consensus about the issue - and as
> such we'd welcome any comments on the draft, available below!
Thanks, Neil. It appears that most people disagree with me about the
status of the policy
to debian.org
iam on ALLAH religion on ALLAH denomination named alrahtaa
i need a rk or what you name a hk but islamic one no pointing toward in
other way of talking no hinid three number on ALLAH name in it or
separate from it i need girls too from wdow ALLAH to us i have knone and
know from
On Wed, 2014-01-08 at 08:31 +0100, Florian Weimer wrote:
> * Ben Hutchings:
>
> > However, there is now a blog post from Microsoft that supports what
> > Matthew Garrett has been saying for a while - they may revoke the
> > signature on a boot loader if signature verification is not extended to
>
On Mon, Jan 06, 2014 at 07:39:55PM +, Neil McGovern wrote:
> On Mon, Jan 06, 2014 at 03:38:46PM +0100, Lucas Nussbaum wrote:
> > Doing that now. :-) Also, I'm more worried with the interactions with
> > Constitution 6.1.1. It seems to me that a Policy Editors delegation
> > should have come fr
On Wed, Jan 08, 2014 at 08:31:11AM +0100, Florian Weimer wrote:
> Furthermore, we need to store the keys for all EV certificates (both
> the certificate used for submission, and the certificate embedded in
> the shim) in devices that meet at least FIPS 140 Level 2. Such
> devices that are affordab
6 matches
Mail list logo