[tor-bugs] #25536 [Internal Services/Schleuder]: Build (and document) a set of habits around our schleuder replies
Tor Bug Tracker & Wiki
blackhole at torproject.org
Sun Mar 18 14:10:05 UTC 2018
#25536: Build (and document) a set of habits around our schleuder replies
---------------------------------------------+------------------
Reporter: arma | Owner: hiro
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Internal Services/Schleuder | Version:
Severity: Normal | Keywords:
Actual Points: | Parent ID:
Points: | Reviewer:
Sponsor: |
---------------------------------------------+------------------
The tor-security@ list is set up using schleuder:
https://trac.torproject.org/projects/tor/wiki/doc/emailLists#AdministrativeLists
Generally people send mail to it unencrypted and unsigned, I guess because
pgp is hard.
When I reply to the mails, I've been manually pasting the original sender
onto the To: address, and switching my reply from the default encrypted
back to unencrypted so the mail can go to the original sender (I don't
have their key after all). It looks like other people are following a
similar pattern.
But intrigeri tells me that there are secret directives you can give to
schleuder, like x-resend, that might allow me to ask schleuder to handle
the mail delivery:
https://schleuder.nadir.org/docs/#using-a-list
Should we be using that directive and then encrypting the mail to
schleuder? Does it work? is there something better we should be doing?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/25536>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list