Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Wed, 29 Jan 2003 14:48:17 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Wed, 29 Jan 2003 14:48:17 -0500 Received: from [81.2.122.30] ([81.2.122.30]:20744 "EHLO darkstar.example.net") by vger.kernel.org with ESMTP id ; Wed, 29 Jan 2003 14:48:16 -0500 From: John Bradford Message-Id: <200301291958.h0TJwI3d002366@darkstar.example.net> Subject: Re: kernel.org frontpage To: hpa@zytor.com (H. Peter Anvin) Date: Wed, 29 Jan 2003 19:58:18 +0000 (GMT) Cc: Valdis.Kletnieks@vt.edu, linux-kernel@vger.kernel.org In-Reply-To: <3E382B81.3020400@zytor.com> from "H. Peter Anvin" at Jan 29, 2003 11:29:05 AM X-Mailer: ELM [version 2.5 PL6] MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org > No, just download the signature from the mirror and verify it. This > isn't an MD5 signature. Good point, if the main site has been compromised, and the key obtained, it would be a bit pointless concerning ourselves with whether the mirror had been compromised separately :-) John. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/