From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from sog-mx-1.v43.ch3.sourceforge.com ([172.29.43.191] helo=mx.sourceforge.net) by sfs-ml-3.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1Vpn5W-0000jv-FX for bitcoin-development@lists.sourceforge.net; Sun, 08 Dec 2013 22:44:34 +0000 Received-SPF: pass (sog-mx-1.v43.ch3.sourceforge.com: domain of gmail.com designates 209.85.212.176 as permitted sender) client-ip=209.85.212.176; envelope-from=gavinandresen@gmail.com; helo=mail-wi0-f176.google.com; Received: from mail-wi0-f176.google.com ([209.85.212.176]) by sog-mx-1.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128) (Exim 4.76) id 1Vpn5U-0008S7-FN for bitcoin-development@lists.sourceforge.net; Sun, 08 Dec 2013 22:44:34 +0000 Received: by mail-wi0-f176.google.com with SMTP id hq4so2993807wib.3 for ; Sun, 08 Dec 2013 14:44:26 -0800 (PST) MIME-Version: 1.0 X-Received: by 10.180.87.69 with SMTP id v5mr11439711wiz.45.1386542666303; Sun, 08 Dec 2013 14:44:26 -0800 (PST) Received: by 10.195.13.68 with HTTP; Sun, 8 Dec 2013 14:44:26 -0800 (PST) In-Reply-To: <52A4E199.3000209@gmail.com> References: <52A3C8A5.7010606@gmail.com> <1795f3067ba3fcdd0caf978cc59ff024.squirrel@fruiteater.riseup.net> <52A435EA.7090405@gmail.com> <201312081237.24473.luke@dashjr.org> <52A4E199.3000209@gmail.com> Date: Mon, 9 Dec 2013 08:44:26 +1000 Message-ID: From: Gavin Andresen To: =?ISO-8859-1?Q?Sa=EFvann_Carignan?= Content-Type: multipart/alternative; boundary=f46d044402a217505604ed0d9f63 X-Spam-Score: -0.6 (/) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for sender-domain 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (gavinandresen[at]gmail.com) -0.0 SPF_PASS SPF: sender matches SPF record 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: bitcoin.org] 1.0 HTML_MESSAGE BODY: HTML included in message -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature X-Headers-End: 1Vpn5U-0008S7-FN Cc: Bitcoin Dev Subject: Re: [Bitcoin-development] Dedicated server for bitcoin.org, your thoughts? X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 08 Dec 2013 22:44:34 -0000 --f46d044402a217505604ed0d9f63 Content-Type: text/plain; charset=ISO-8859-1 > > > 4) Who admins it? > > Obviously, I thought it would be important that the server is owned by > someone who can be trusted, with ssh access for all core developers. > That is a really bad idea. If there is not a CLEAR answer to "who admins it", there will be a bunch of "I thought YOU were applying security patches... no, I thought YOU were..." the first time it gets hacked. So, the question is: who wants to take responsibility for keeping bitcoin.org safe and secure? I am not going to do that, I've got too many other things to worry about. It is exactly the type of thing the Foundation was setup to do, but if y'all want to create some other organization to do it, then please make it happen. -- -- Gavin Andresen --f46d044402a217505604ed0d9f63 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
> 4) Who admins it?

Obviously, I thought it would be important that the server is owned by
someone who can be trusted, with ssh access for all core developers.

<= /div>
That is a really bad idea. =A0If there is n= ot a CLEAR answer to "who admins it", there will be a bunch of &q= uot;I thought YOU were applying security patches... no, I thought YOU were.= .." the first time it gets hacked.

So, the question is: =A0who wants to t= ake responsibility for keeping bitcoin.org safe and secure?


--
--
Gavin Andresen

--f46d044402a217505604ed0d9f63--