Tue Dec 3 21:17:30 2024
EVENTS
 FREE
SOFTWARE
INSTITUTE

POLITICS
JOBS
MEMBERS'
CORNER

MAILING
LIST

NYLXS Mailing Lists and Archives
NYLXS Members have a lot to say and share but we don't keep many secrets. Join the Hangout Mailing List and say your peice.

DATE 2006-09-01

HANGOUT

2024-12-03 | 2024-11-03 | 2024-10-03 | 2024-09-03 | 2024-08-03 | 2024-07-03 | 2024-06-03 | 2024-05-03 | 2024-04-03 | 2024-03-03 | 2024-02-03 | 2024-01-03 | 2023-12-03 | 2023-11-03 | 2023-10-03 | 2023-09-03 | 2023-08-03 | 2023-07-03 | 2023-06-03 | 2023-05-03 | 2023-04-03 | 2023-03-03 | 2023-02-03 | 2023-01-03 | 2022-12-03 | 2022-11-03 | 2022-10-03 | 2022-09-03 | 2022-08-03 | 2022-07-03 | 2022-06-03 | 2022-05-03 | 2022-04-03 | 2022-03-03 | 2022-02-03 | 2022-01-03 | 2021-12-03 | 2021-11-03 | 2021-10-03 | 2021-09-03 | 2021-08-03 | 2021-07-03 | 2021-06-03 | 2021-05-03 | 2021-04-03 | 2021-03-03 | 2021-02-03 | 2021-01-03 | 2020-12-03 | 2020-11-03 | 2020-10-03 | 2020-09-03 | 2020-08-03 | 2020-07-03 | 2020-06-03 | 2020-05-03 | 2020-04-03 | 2020-03-03 | 2020-02-03 | 2020-01-03 | 2019-12-03 | 2019-11-03 | 2019-10-03 | 2019-09-03 | 2019-08-03 | 2019-07-03 | 2019-06-03 | 2019-05-03 | 2019-04-03 | 2019-03-03 | 2019-02-03 | 2019-01-03 | 2018-12-03 | 2018-11-03 | 2018-10-03 | 2018-09-03 | 2018-08-03 | 2018-07-03 | 2018-06-03 | 2018-05-03 | 2018-04-03 | 2018-03-03 | 2018-02-03 | 2018-01-03 | 2017-12-03 | 2017-11-03 | 2017-10-03 | 2017-09-03 | 2017-08-03 | 2017-07-03 | 2017-06-03 | 2017-05-03 | 2017-04-03 | 2017-03-03 | 2017-02-03 | 2017-01-03 | 2016-12-03 | 2016-11-03 | 2016-10-03 | 2016-09-03 | 2016-08-03 | 2016-07-03 | 2016-06-03 | 2016-05-03 | 2016-04-03 | 2016-03-03 | 2016-02-03 | 2016-01-03 | 2015-12-03 | 2015-11-03 | 2015-10-03 | 2015-09-03 | 2015-08-03 | 2015-07-03 | 2015-06-03 | 2015-05-03 | 2015-04-03 | 2015-03-03 | 2015-02-03 | 2015-01-03 | 2014-12-03 | 2014-11-03 | 2014-10-03 | 2014-09-03 | 2014-08-03 | 2014-07-03 | 2014-06-03 | 2014-05-03 | 2014-04-03 | 2014-03-03 | 2014-02-03 | 2014-01-03 | 2013-12-03 | 2013-11-03 | 2013-10-03 | 2013-09-03 | 2013-08-03 | 2013-07-03 | 2013-06-03 | 2013-05-03 | 2013-04-03 | 2013-03-03 | 2013-02-03 | 2013-01-03 | 2012-12-03 | 2012-11-03 | 2012-10-03 | 2012-09-03 | 2012-08-03 | 2012-07-03 | 2012-06-03 | 2012-05-03 | 2012-04-03 | 2012-03-03 | 2012-02-03 | 2012-01-03 | 2011-12-03 | 2011-11-03 | 2011-10-03 | 2011-09-03 | 2011-08-03 | 2011-07-03 | 2011-06-03 | 2011-05-03 | 2011-04-03 | 2011-03-03 | 2011-02-03 | 2011-01-03 | 2010-12-03 | 2010-11-03 | 2010-10-03 | 2010-09-03 | 2010-08-03 | 2010-07-03 | 2010-06-03 | 2010-05-03 | 2010-04-03 | 2010-03-03 | 2010-02-03 | 2010-01-03 | 2009-12-03 | 2009-11-03 | 2009-10-03 | 2009-09-03 | 2009-08-03 | 2009-07-03 | 2009-06-03 | 2009-05-03 | 2009-04-03 | 2009-03-03 | 2009-02-03 | 2009-01-03 | 2008-12-03 | 2008-11-03 | 2008-10-03 | 2008-09-03 | 2008-08-03 | 2008-07-03 | 2008-06-03 | 2008-05-03 | 2008-04-03 | 2008-03-03 | 2008-02-03 | 2008-01-03 | 2007-12-03 | 2007-11-03 | 2007-10-03 | 2007-09-03 | 2007-08-03 | 2007-07-03 | 2007-06-03 | 2007-05-03 | 2007-04-03 | 2007-03-03 | 2007-02-03 | 2007-01-03 | 2006-12-03 | 2006-11-03 | 2006-10-03 | 2006-09-03 | 2006-08-03 | 2006-07-03 | 2006-06-03 | 2006-05-03 | 2006-04-03 | 2006-03-03 | 2006-02-03 | 2006-01-03 | 2005-12-03 | 2005-11-03 | 2005-10-03 | 2005-09-03 | 2005-08-03 | 2005-07-03 | 2005-06-03 | 2005-05-03 | 2005-04-03 | 2005-03-03 | 2005-02-03 | 2005-01-03 | 2004-12-03 | 2004-11-03 | 2004-10-03 | 2004-09-03 | 2004-08-03 | 2004-07-03 | 2004-06-03 | 2004-05-03 | 2004-04-03 | 2004-03-03 | 2004-02-03 | 2004-01-03 | 2003-12-03 | 2003-11-03 | 2003-10-03 | 2003-09-03 | 2003-08-03 | 2003-07-03 | 2003-06-03 | 2003-05-03 | 2003-04-03 | 2003-03-03 | 2003-02-03 | 2003-01-03 | 2002-12-03 | 2002-11-03 | 2002-10-03 | 2002-09-03 | 2002-08-03 | 2002-07-03 | 2002-06-03 | 2002-05-03 | 2002-04-03 | 2002-03-03 | 2002-02-03 | 2002-01-03 | 2001-12-03 | 2001-11-03 | 2001-10-03 | 2001-09-03 | 2001-08-03 | 2001-07-03 | 2001-06-03 | 2001-05-03 | 2001-04-03 | 2001-03-03 | 2001-02-03 | 2001-01-03 | 2000-12-03 | 2000-11-03 | 2000-10-03 | 2000-09-03 | 2000-08-03 | 2000-07-03 | 2000-06-03 | 2000-05-03 | 2000-04-03 | 2000-03-03 | 2000-02-03 | 2000-01-03 | 1999-12-03

Key: Value:

Key: Value:

MESSAGE
DATE 2006-09-28
FROM Ruben Safir
SUBJECT Subject: [NYLXS - HANGOUT] Re: [suse-security-announce] SUSE Security Announcement: openssl
Here we go again


On Thu, 2006-09-28 at 12:40, Marcus Meissner wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> ______________________________________________________________________________
>
> SUSE Security Announcement
>
> Package: openssl
> Announcement ID: SUSE-SA:2006:058
> Date: Thu, 28 Sep 2006 18:00:00 +0000
> Affected Products: Novell Linux Desktop 9
> Novell Linux POS 9
> Open Enterprise Server
> SUSE LINUX 10.1
> SUSE LINUX 10.0
> SUSE LINUX 9.3
> SUSE LINUX 9.2
> SuSE Linux Desktop 1.0
> SuSE Linux Enterprise Server 8
> SuSE Linux Openexchange Server 4
> SUSE LINUX Retail Solution 8
> SuSE Linux School Server
> SuSE Linux Standard Server 8
> SUSE SLED 10
> SUSE SLES 10
> SUSE SLES 9
> UnitedLinux 1.0
> Vulnerability Type: remote denial of service
> Severity (1-10): 7
> SUSE Default Package: yes
> Cross-References: CVE-2006-2937, CVE-2006-2940, CVE-2006-3738
> CVE-2006-4343, VU#547300, VU#386964
>
> Content of This Advisory:
> 1) Security Vulnerability Resolved:
> several security problems in openssl
> Problem Description
> 2) Solution or Work-Around
> 3) Special Instructions and Notes
> 4) Package Location and Checksums
> 5) Pending Vulnerabilities, Solutions, and Work-Arounds:
> See SUSE Security Summary Report.
> 6) Authenticity Verification and Additional Information
>
> ______________________________________________________________________________
>
> 1) Problem Description and Brief Discussion
>
> Several security problems were found and fixed in the OpenSSL
> cryptographic library.
>
> CVE-2006-3738/VU#547300:
> A Google security audit found a buffer overflow condition within the
> SSL_get_shared_ciphers() function which has been fixed.
>
> CVE-2006-4343/VU#386964:
> The above Google security audit also found that the OpenSSL SSLv2
> client code fails to properly check for NULL which could lead to a
> server program using openssl to crash.
>
> CVE-2006-2937:
> Fix mishandling of an error condition in parsing of certain invalid
> ASN1 structures, which could result in an infinite loop which consumes
> system memory.
>
> CVE-2006-2940:
> Certain types of public key can take disproportionate amounts of time
> to process. This could be used by an attacker in a denial of service
> attack to cause the remote side top spend an excessive amount of time
> in computation.
>
> 2) Solution or Work-Around
>
> There is no known workaround, please install the update packages.
>
> 3) Special Instructions and Notes
>
> None.
>
> 4) Package Location and Checksums
>
> The preferred method for installing security updates is to use the YaST
> Online Update (YOU) tool. YOU detects which updates are required and
> automatically performs the necessary steps to verify and install them.
> Alternatively, download the update packages for your distribution manually
> and verify their integrity by the methods listed in Section 6 of this
> announcement. Then install the packages using the command
>
> rpm -Fhv
>
> to apply the update, replacing with the filename of the
> downloaded RPM package.
>
>
> x86 Platform:
>
> SUSE LINUX 10.1:
> ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/openssl-0.9.8a-18.10.i586.rpm
> f5d7a08e60a52b7816cae88e9def7762
> ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/openssl-devel-0.9.8a-18.10.i586.rpm
> a583491fc985dff2f3f405776fa8554a
>
> SUSE LINUX 10.0:
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/openssl-0.9.7g-2.10.i586.rpm
> 13d07a7a3b81fdef9ba68b0f0670f14c
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/openssl-devel-0.9.7g-2.10.i586.rpm
> 1198085023a60d99ce90207b5498db45
>
> SUSE LINUX 9.3:
> ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/openssl-0.9.7e-3.6.i586.rpm
> 51606d0da43bc5c61562bb8d4679ca8b
> ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/openssl-devel-0.9.7e-3.6.i586.rpm
> c6a9122fec64b5a82f433c56b602f2b5
>
> SUSE LINUX 9.2:
> ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/openssl-0.9.7d-25.6.i586.rpm
> 96b59a2af5663ae1f780626da0b5756a
> ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/openssl-devel-0.9.7d-25.6.i586.rpm
> e33a86104b85919dda444b4a9901a10b
>
> Power PC Platform:
>
> SUSE LINUX 10.1:
> ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/openssl-0.9.8a-18.10.ppc.rpm
> 8310266cd6da01baaf964ed8cac841c0
> ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/openssl-devel-0.9.8a-18.10.ppc.rpm
> 8ff4b94e685be05d00599ecc6cc939e7
>
> SUSE LINUX 10.0:
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/openssl-0.9.7g-2.10.ppc.rpm
> 0678839057c3170dc84fab28b3dd202f
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/openssl-devel-0.9.7g-2.10.ppc.rpm
> e86965c19538073b15c2131a04c20260
>
> x86-64 Platform:
>
> SUSE LINUX 10.1:
> ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/openssl-0.9.8a-18.10.x86_64.rpm
> 28dc138c088450b753fdd419c487023e
> ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/openssl-32bit-0.9.8a-18.10.x86_64.rpm
> 651d62cab3c31d0bc3e18b91a4ba9ac3
> ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/openssl-devel-0.9.8a-18.10.x86_64.rpm
> 2a3e98aca1aa613a58f09b39f12e84a4
> ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/openssl-devel-32bit-0.9.8a-18.10.x86_64.rpm
> 81bb446763424df4c18eac760e0ed80e
>
> SUSE LINUX 10.0:
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/openssl-0.9.7g-2.10.x86_64.rpm
> 5a612bd7a6756e2926a3ef59a72fd197
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/openssl-32bit-0.9.7g-2.10.x86_64.rpm
> 840e98707317d9cef51837a486541be7
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/openssl-devel-0.9.7g-2.10.x86_64.rpm
> 46b1a289d445c5304001aba4417e73a9
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/openssl-devel-32bit-0.9.7g-2.10.x86_64.rpm
> a4e2a59c151ff22ed683e115da8fce48
>
> SUSE LINUX 9.3:
> ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/openssl-0.9.7e-3.6.x86_64.rpm
> 3bf35d8e03848aa87a662b93a8c14fe1
> ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/openssl-32bit-9.3-7.3.x86_64.rpm
> 35ce818f05f655397c4b1b13ba3a93b3
> ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/openssl-devel-0.9.7e-3.6.x86_64.rpm
> dcfbcadb626de068028ac546f07ba685
> ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/openssl-devel-32bit-9.3-7.3.x86_64.rpm
> da50170edc9a2596954c2453030494d6
>
> SUSE LINUX 9.2:
> ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/openssl-0.9.7d-25.6.x86_64.rpm
> 32ec53e71eefb0ebe893034ac2e552ac
> ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/openssl-32bit-9.2-200609270647.x86_64.rpm
> 0b7706ce568832eb1b2e86bdd7cbe51d
> ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/openssl-devel-0.9.7d-25.6.x86_64.rpm
> c8671a7a77dcc5a08e2c19f9a6ff056c
> ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/openssl-devel-32bit-9.2-200609270647.x86_64.rpm
> 2bebb0fea9579ca5e659fca63c7beac0
>
> Sources:
>
> SUSE LINUX 10.1:
> ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/openssl-0.9.8a-18.10.src.rpm
> 2613501ca4ea03f1a79548014b13ff67
>
> SUSE LINUX 10.0:
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/openssl-0.9.7g-2.10.src.rpm
> c5b1ff892ff74af82ddbceaf757c6fb3
>
> SUSE LINUX 9.3:
> ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/openssl-0.9.7e-3.6.src.rpm
> f62e34422fc77343fd15a1790e6ef8d8
>
> SUSE LINUX 9.2:
> ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/openssl-0.9.7d-25.6.src.rpm
> 8c451560ea55a3bec1b01f0b36943048
>
> Our maintenance customers are notified individually. The packages are
> offered for installation from the maintenance web:
>
> UnitedLinux 1.0
> http://support.novell.com/techcenter/psdb/16e2a93b390a1ceb86b0945a88a4d415.html
>
> SuSE Linux Openexchange Server 4
> http://support.novell.com/techcenter/psdb/16e2a93b390a1ceb86b0945a88a4d415.html
>
> Open Enterprise Server
> http://support.novell.com/techcenter/psdb/16e2a93b390a1ceb86b0945a88a4d415.html
>
> Novell Linux POS 9
> http://support.novell.com/techcenter/psdb/16e2a93b390a1ceb86b0945a88a4d415.html
>
> Novell Linux Desktop 9
> http://support.novell.com/techcenter/psdb/16e2a93b390a1ceb86b0945a88a4d415.html
>
> SuSE Linux Enterprise Server 8
> http://support.novell.com/techcenter/psdb/16e2a93b390a1ceb86b0945a88a4d415.html
>
> SuSE Linux Standard Server 8
> http://support.novell.com/techcenter/psdb/16e2a93b390a1ceb86b0945a88a4d415.html
>
> SuSE Linux School Server
> http://support.novell.com/techcenter/psdb/16e2a93b390a1ceb86b0945a88a4d415.html
>
> SUSE LINUX Retail Solution 8
> http://support.novell.com/techcenter/psdb/16e2a93b390a1ceb86b0945a88a4d415.html
>
> SuSE Linux Desktop 1.0
> http://support.novell.com/techcenter/psdb/16e2a93b390a1ceb86b0945a88a4d415.html
>
> SUSE SLES 10
> http://support.novell.com/techcenter/psdb/16e2a93b390a1ceb86b0945a88a4d415.html
>
> SUSE SLED 10
> http://support.novell.com/techcenter/psdb/16e2a93b390a1ceb86b0945a88a4d415.html
>
> SUSE SLES 9
> http://support.novell.com/techcenter/psdb/16e2a93b390a1ceb86b0945a88a4d415.html
>
> ______________________________________________________________________________
>
> 5) Pending Vulnerabilities, Solutions, and Work-Arounds:
>
> See SUSE Security Summary Report.
> ______________________________________________________________________________
>
> 6) Authenticity Verification and Additional Information
>
> - Announcement authenticity verification:
>
> SUSE security announcements are published via mailing lists and on Web
> sites. The authenticity and integrity of a SUSE security announcement is
> guaranteed by a cryptographic signature in each announcement. All SUSE
> security announcements are published with a valid signature.
>
> To verify the signature of the announcement, save it as text into a file
> and run the command
>
> gpg --verify
>
> replacing with the name of the file where you saved the
> announcement. The output for a valid signature looks like:
>
> gpg: Signature made using RSA key ID 3D25D3D9
> gpg: Good signature from "SuSE Security Team "
>
> where is replaced by the date the document was signed.
>
> If the security team's key is not contained in your key ring, you can
> import it from the first installation CD. To import the key, use the
> command
>
> gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
>
> - Package authenticity verification:
>
> SUSE update packages are available on many mirror FTP servers all over the
> world. While this service is considered valuable and important to the free
> and open source software community, the authenticity and the integrity of
> a package needs to be verified to ensure that it has not been tampered
> with.
>
> There are two verification methods that can be used independently from
> each other to prove the authenticity of a downloaded file or RPM package:
>
> 1) Using the internal gpg signatures of the rpm package
> 2) MD5 checksums as provided in this announcement
>
> 1) The internal rpm package signatures provide an easy way to verify the
> authenticity of an RPM package. Use the command
>
> rpm -v --checksig
>
> to verify the signature of the package, replacing with the
> filename of the RPM package downloaded. The package is unmodified if it
> contains a valid signature from build-at-suse.de with the key ID 9C800ACA.
>
> This key is automatically imported into the RPM database (on
> RPMv4-based distributions) and the gpg key ring of 'root' during
> installation. You can also find it on the first installation CD and at
> the end of this announcement.
>
> 2) If you need an alternative means of verification, use the md5sum
> command to verify the authenticity of the packages. Execute the command
>
> md5sum
>
> after you downloaded the file from a SUSE FTP server or its mirrors.
> Then compare the resulting md5sum with the one that is listed in the
> SUSE security announcement. Because the announcement containing the
> checksums is cryptographically signed (by security-at-suse.de), the
> checksums show proof of the authenticity of the package if the
> signature of the announcement is valid. Note that the md5 sums
> published in the SUSE Security Announcements are valid for the
> respective packages only. Newer versions of these packages cannot be
> verified.
>
> - SUSE runs two security mailing lists to which any interested party may
> subscribe:
>
> suse-security-at-suse.com
> - General Linux and SUSE security discussion.
> All SUSE security announcements are sent to this list.
> To subscribe, send an e-mail to
> .
>
> suse-security-announce-at-suse.com
> - SUSE's announce-only mailing list.
> Only SUSE's security announcements are sent to this list.
> To subscribe, send an e-mail to
> .
>
> For general information or the frequently asked questions (FAQ),
> send mail to or
> .
>
> =====================================================================
> SUSE's security contact is or .
> The public key is listed below.
> =====================================================================
> ______________________________________________________________________________
>
> The information in this advisory may be distributed or reproduced,
> provided that the advisory is not modified in any way. In particular, the
> clear text signature should show proof of the authenticity of the text.
>
> SUSE Linux Products GmbH provides no warranties of any kind whatsoever
> with respect to the information contained in this security advisory.
>
> Type Bits/KeyID Date User ID
> pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team
> pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key
>
> - -----BEGIN PGP PUBLIC KEY BLOCK-----
> Version: GnuPG v1.4.2 (GNU/Linux)
>
> mQENAzbhLQQAAAEIAKAkXHe0lWRBXLpn38hMHy03F0I4Sszmoc8aaKJrhfhyMlOA
> BqvklPLE2f9UrI4Xc860gH79ZREwAgPt0pi6+SleNFLNcNFAuuHMLQOOsaMFatbz
> JR9i4m/lf6q929YROu5zB48rBAlcfTm+IBbijaEdnqpwGib45wE/Cfy6FAttBHQh
> 1Kp+r/jPbf1mYAvljUfHKuvbg8t2EIQz/5yGp+n5trn9pElfQO2cRBq8LFpf1l+U
> P7EKjFmlOq+Gs/fF98/dP3DfniSd78LQPq5vp8RL8nr/o2i7jkAQ33m4f1wOBWd+
> cZovrKXYlXiR+Bf7m2hpZo+/sAzhd7LmAD0l09kABRG0JVN1U0UgU2VjdXJpdHkg
> VGVhbSA8c2VjdXJpdHlAc3VzZS5kZT6JARUDBRA24S1H5Fiyh7HKPEUBAVcOB/9b
> yHYji1/+4Xc2GhvXK0FSJN0MGgeXgW47yxDL7gmR4mNgjlIOUHZj0PEpVjWepOJ7
> tQS3L9oP6cpj1Fj/XxuLbkp5VCQ61hpt54coQAvYrnT9rtWEGN+xmwejT1WmYmDJ
> xG+EGBXKr+XP69oIUl1E2JO3rXeklulgjqRKos4cdXKgyjWZ7CP9V9daRXDtje63
> Om8gwSdU/nCvhdRIWp/Vwbf7Ia8iZr9OJ5YuQl0DBG4qmGDDrvImgPAFkYFzwlqo
> choXFQ9y0YVCV41DnR+GYhwl2qBd81T8aXhihEGPIgaw3g8gd8B5o6mPVgl+nJqI
> BkEYGBusiag2pS6qwznZiQEVAwUQNuEtBHey5gA9JdPZAQFtOAf+KVh939b0J94u
> v/kpg4xs1LthlhquhbHcKNoVTNspugiC3qMPyvSX4XcBr2PC0cVkS4Z9PY9iCfT+
> x9WM96g39dAF+le2CCx7XISk9XXJ4ApEy5g4AuK7NYgAJd39PPbERgWnxjxir9g0
> Ix30dS30bW39D+3NPU5Ho9TD/B7UDFvYT5AWHl3MGwo3a1RhTs6sfgL7yQ3U+mvq
> MkTExZb5mfN1FeaYKMopoI4VpzNVeGxQWIz67VjJHVyUlF20ekOz4kWVgsxkc8G2
> saqZd6yv2EwqYTi8BDAduweP33KrQc4KDDommQNDOXxaKOeCoESIdM4p7Esdjq1o
> L0oixF12CohGBBARAgAGBQI7HmHDAAoJEJ5A4xAACqukTlQAoI4QzP9yjPohY7OU
> F7J3eKBTzp25AJ42BmtSd3pvm5ldmognWF3Trhp+GYkAlQMFEDe3O8IWkDf+zvyS
> FQEBAfkD/3GG5UgJj18UhYmh1gfjIlDcPAeqMwSytEHDENmHC+vlZQ/p0mT9tPiW
> tp34io54mwr+bLPN8l6B5GJNkbGvH6M+mO7R8Lj4nHL6pyAv3PQr83WyLHcaX7It
> Klj371/4yzKV6qpz43SGRK4MacLo2rNZ/dNej7lwPCtzCcFYwqkiiEYEEBECAAYF
> AjoaQqQACgkQx1KqMrDf94ArewCfWnTUDG5gNYkmHG4bYL8fQcizyA4An2eVo/n+
> 3J2KRWSOhpAMsnMxtPbBmQGiBDnu9IERBACT8Y35+2vv4MGVKiLEMOl9GdST6MCk
> YS3yEKeueNWc+z/0Kvff4JctBsgs47tjmiI9sl0eHjm3gTR8rItXMN6sJEUHWzDP
> +Y0PFPboMvKx0FXl/A0dM+HFrruCgBlWt6FA+okRySQiliuI5phwqkXefl9AhkwR
> 8xocQSVCFxcwvwCglVcOQliHu8jwRQHxlRE0tkwQQI0D+wfQwKdvhDplxHJ5nf7U
> 8c/yE/vdvpN6lF0tmFrKXBUX+K7u4ifrZlQvj/81M4INjtXreqDiJtr99Rs6xa0S
> cZqITuZC4CWxJa9GynBED3+D2t1V/f8l0smsuYoFOF7Ib49IkTdbtwAThlZp8bEh
> ELBeGaPdNCcmfZ66rKUdG5sRA/9ovnc1krSQF2+sqB9/o7w5/q2qiyzwOSTnkjtB
> UVKn4zLUOf6aeBAoV6NMCC3Kj9aZHfA+ND0ehPaVGJgjaVNFhPi4x0e7BULdvgOo
> AqajLfvkURHAeSsxXIoEmyW/xC1sBbDkDUIBSx5oej73XCZgnj/inphRqGpsb+1n
> KFvF+rQoU3VTRSBQYWNrYWdlIFNpZ25pbmcgS2V5IDxidWlsZEBzdXNlLmRlPohi
> BBMRAgAiBQJA2AY+AhsDBQkObd+9BAsHAwIDFQIDAxYCAQIeAQIXgAAKCRCoTtro
> nIAKypCfAJ9RuZ6ZSV7QW4pTgTIxQ+ABPp0sIwCffG9bCNnrETPlgOn+dGEkAWeg
> KL+IRgQQEQIABgUCOnBeUgAKCRCeQOMQAAqrpNzOAKCL512FZvv4VZx94TpbA9lx
> yoAejACeOO1HIbActAevk5MUBhNeLZa/qM2JARUDBRA6cGBvd7LmAD0l09kBATWn
> B/9An5vfiUUE1VQnt+T/EYklES3tXXaJJp9pHMa4fzFa8jPVtv5UBHGee3XoUNDV
> wM2OgSEISZxbzdXGnqIlcT08TzBUD9i579uifklLsnr35SJDZ6ram51/CWOnnaVh
> UzneOA9gTPSr+/fT3WeVnwJiQCQ30kNLWVXWATMnsnT486eAOlT6UNBPYQLpUprF
> 5Yryk23pQUPAgJENDEqeU6iIO9Ot1ZPtB0lniw+/xCi13D360o1tZDYOp0hHHJN3
> D3EN8C1yPqZd5CvvznYvB6bWBIpWcRgdn2DUVMmpU661jwqGlRz1F84JG/xe4jGu
> zgpJt9IXSzyohEJB6XG5+D0BuQINBDnu9JIQCACEkdBN6Mxf5WvqDWkcMRy6wnrd
> 9DYJ8UUTmIT2iQf07tRUKJJ9v0JXfx2Z4d08IQSMNRaq4VgSe+PdYgIy0fbj23Vi
> a5/gO7fJEpD2hd2f+pMnOWvH2rOOIbeYfuhzAc6BQjAKtmgR0ERUTafTM9Wb6F13
> CNZZNZfDqnFDP6L12w3z3F7FFXkz07Rs3AIto1ZfYZd4sCSpMr/0S5nLrHbIvGLp
> 271hhQBeRmmoGEKO2JRelGgUJ2CUzOdtwDIKT0LbCpvaP8PVnYF5IFoYJIWRHqlE
> t5ucTXstZy7vYjL6vTP4l5xs+LIOkNmPhqmfsgLzVo0UaLt80hOwc4NvDCOLAAMG
> B/9g+9V3ORzw4LvO1pwRYJqfDKUq/EJ0rNMMD4N8RLpZRhKHKJUm9nNHLbksnlZw
> rbSTM5LpC/U6sheLP+l0bLVoq0lmsCcUSyh+mY6PxWirLIWCn/IAZAGnXb6Zd6Tt
> IJlGG6pqUN8QxGJYQnonl0uTJKHJENbI9sWHQdcTtBMc34gorHFCo1Bcvpnc1LFL
> rWn7mfoGx6INQjf3HGQpMXAWuSBQhzkazY6vaWFpa8bBJ+gKbBuySWzNm3rFtT5H
> RKMWpO+M9bHp4d+puY0L1YwN1OMatcMMpcWnZpiWiR83oi32+xtWUY2U7Ae38mMa
> g8zFbpeqPQUsDv9V7CAJ1dbriEwEGBECAAwFAkDYBnoFCQ5t3+gACgkQqE7a6JyA
> CspnpgCfRbYwxT3iq+9l/PgNTUNTZOlof2oAn25y0eGi0371jap9kOV6uq71sUuO
> =ypVs
> - -----END PGP PUBLIC KEY BLOCK-----
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.2 (GNU/Linux)
>
> iQEVAwUBRRv66Xey5gA9JdPZAQL7fgf/WskObtJd6xDwy4d+F9TjeGy+K3Mi8iNC
> Meb8Chs08TaVuuuvp6+UwtUpek+zuMTimdUZdedF4Tc3xBjwQL6GmIvdh5Kr5vdA
> UZRnHUMWdD9ClKyc3KPKVHXrDGOmgytWVtaQdD4pSmrh6k7j5aE9Gsss1MSrI64u
> BefsTWYnoJ0OJ/iXFVIIh964A/6wBcFV6f0C9YWKMYjfylXPBTWlSBzhY69g722N
> kmgboFffBkxD37ILQSKygJrJ3N2fn6acN7pRylCEb+n0XWu5nPMf/xTWVVzH4f/I
> FS5jdzJc7gfb096tWsNoB48ULkLENIaauHZup1p6NCyt5/R3eLmgcQ==
> =TSxY
> -----END PGP SIGNATURE-----

  1. 2006-09-18 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] grep hello
  2. 2006-09-18 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] WebServer Meeting
  3. 2006-09-17 From: "mlr52-at-michaellrichardson.com" <mlr52-at-michaellrichardson.com> Subject: [NYLXS - HANGOUT] Fwd: [Fwd: Re: [FCNYC_Cafe] inexpensive wi-fi]
  4. 2006-09-18 Ron Guerin <ron-at-vnetworx.net> Re: [NYLXS - HANGOUT] grep hello
  5. 2006-09-18 Ron Guerin <ron-at-vnetworx.net> Re: [NYLXS - HANGOUT] grep hello
  6. 2006-09-18 hangout-at-mrbrklyn.com Re: [NYLXS - HANGOUT] grep aggain
  7. 2006-09-20 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] JOB: PHP/MySQL Developer (2 Positions) Lanham, MD]
  8. 2006-09-25 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] Next Meeting
  9. 2006-09-25 From: "mlr52-at-michaellrichardson.com" <mlr52-at-michaellrichardson.com> Subject: [NYLXS - HANGOUT] Fwd: Call 4 volunteers this week at Community Free Software
  10. 2006-09-25 Ruben Safir <ruben-at-mrbrklyn.com> Re: [NYLXS - HANGOUT] Fwd: Call 4 volunteers this week at Community Free Software Group
  11. 2006-09-28 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] Re: [suse-security-announce] SUSE Security Announcement: openssl

NYLXS are Do'ers and the first step of Doing is Joining! Join NYLXS and make a difference in your community today!