From: | "Ned Ludd (solar)" <solar@g.o> |
---|---|
To: | gentoo-commits@l.g.o |
Subject: | [gentoo-commits] gentoo commit in xml/htdocs/proj/en/hardened: index.xml |
Date: | Fri, 24 Apr 2009 21:48:49 |
Message-Id: | E1LxTGI-0000Jv-H5@stork.gentoo.org |
1 | solar 09/04/24 21:48:46 |
2 | |
3 | Modified: index.xml |
4 | Log: |
5 | - remove myself from hardened and other gentoo related duties |
6 | |
7 | Revision Changes Path |
8 | 1.93 xml/htdocs/proj/en/hardened/index.xml |
9 | |
10 | file : http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/proj/en/hardened/index.xml?rev=1.93&view=markup |
11 | plain: http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/proj/en/hardened/index.xml?rev=1.93&content-type=text/plain |
12 | diff : http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/proj/en/hardened/index.xml?r1=1.92&r2=1.93 |
13 | |
14 | Index: index.xml |
15 | =================================================================== |
16 | RCS file: /var/cvsroot/gentoo/xml/htdocs/proj/en/hardened/index.xml,v |
17 | retrieving revision 1.92 |
18 | retrieving revision 1.93 |
19 | diff -u -r1.92 -r1.93 |
20 | --- index.xml 20 Sep 2008 16:54:33 -0000 1.92 |
21 | +++ index.xml 24 Apr 2009 21:48:46 -0000 1.93 |
22 | @@ -25,14 +25,13 @@ |
23 | Hardened team.</p></goals> |
24 | |
25 | <dev description="SELinux">pebenito</dev> |
26 | - <dev description="PaX/Grsecurity Hardened Toolchain">solar</dev> |
27 | + <dev description="PaX/Grsecurity Hardened Toolchain">gengor</dev> |
28 | <dev description="Bastille">Battousai</dev> |
29 | - <dev description="Kernel lead">gengor</dev> |
30 | <dev description="PPC arch team liaison">nixnut</dev> |
31 | |
32 | <subproject ref="/proj/en/hardened/selinux/index.xml" inheritresources="yes" /> |
33 | <subproject ref="/proj/en/hardened/rsbac/index.xml" inheritresources="yes" /> |
34 | - <extraproject name="PaX/Grsecurity" lead="solar"> |
35 | + <extraproject name="PaX/Grsecurity" lead="gengor"> |
36 | Grsecurity is a complete security solution |
37 | providing such features as a MAC or RBAC system, Chroot |
38 | restrictions, address space modification protection (via PaX), |
39 | @@ -40,7 +39,7 @@ |
40 | to prevent file race conditions, ipc protections and much more. |
41 | </extraproject> |
42 | |
43 | - <extraproject name="Hardened Toolchain" lead="solar">Transparent |
44 | + <extraproject name="Hardened Toolchain" lead="gengor">Transparent |
45 | implementation of |
46 | <uri link="http://pax.grsecurity.net/docs/aslr.txt"> |
47 | PaX</uri> address space layout randomizations and stack smashing |