Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 29 Jan 2000 01:41:19 -0500 (EST)
From:      Chuck Robey <chuckr@picnic.mat.net>
To:        ctm-announce@freebsd.org
Subject:   Starting PGP signing of ctm
Message-ID:  <Pine.BSF.4.21.0001290132370.315-100000@picnic.mat.net>

next in thread | raw e-mail | index | archive | help
This is to announce that ctm signing of ctm pieces is starting (replacing
the existing service).  I chose to do it on the uuencoded pieces, because
even with the signing, they are still 100% compatible with ctm_rmail, so
if you don't want to verify the signatures, you don't have to, you don't
have to make any changes whatsoever.

For those of you who care to use PGP to verify the signatures, read on.

I have used GnuPG to create the signatures, with arguments arranged so
that they are compatible with PGP5 and above.  This is not compatible with
the old PGP 2.6x versions.  The key is available by fingering
ctm@freebsd.org, but I'll repeat it here.  Please mail me immediately if
there are any new problems with ctm.

BTW, in the last few days there were problems with dropped pieces.  This
should be entirely corrected in the switch to using the new signing code,
so if you have any more lost pieces from this point forward, please let me
know.  Thanks for all the help, guys, in reporting problems promptly.

[freebsd.org]
Login: ctm            			Name: FreeBSD CTM Generating Robot
Directory: /home/ctm                	Shell: /sbin/nologin
Never logged in.
No Mail.
Plan:
This is the CTM User.  CTM deltas are cryptographically signed
using GnuPG, using the public key provided below.  Please address
any questions to the mailing list ctm-announce@freebsd.org.

CTM Generator <ctm@freebsd.org>

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.1 (FreeBSD)
Comment: For info see http://www.gnupg.org
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==
=2xfG
-----END PGP PUBLIC KEY BLOCK-----

Key fingerprint = C05C DC5B B56E A62D 405E  C7D3 C255 8F14 C380 B4D8

----------------------------------------------------------------------------
Chuck Robey            | Interests include C & Java programming, FreeBSD,
chuckr@picnic.mat.net  | electronics, communications, and signal processing.

New Year's Resolution:  I will not sphroxify gullible people into looking up
fictitious words in the dictionary.
----------------------------------------------------------------------------



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe ctm-announce" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0001290132370.315-100000>