Re: dpkg-sig support wanted?

2005-11-27 Thread Marc Haber
On Sat, 26 Nov 2005 14:14:38 +0100, Henning Makholm
<[EMAIL PROTECTED]> wrote:
>Scripsit Florian Weimer <[EMAIL PROTECTED]>
>> I wouldn't use real base64, though, because it would mean that you can
>> use its hashed output as a file name.
>
>Good point. One might replace "/" with "_" and omit the final "=".
>Having a "+" in the hash should be safe in most contexts.

Isn't base62, which for example exim uses to create its message-ids, a
standard? I have never seen it outside exim.

Greetins
Marc

-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: dpkg-sig support wanted?

2005-11-27 Thread Steinar H. Gunderson
On Sun, Nov 27, 2005 at 02:18:00PM +1000, Anthony Towns wrote:
> My understanding was that there aren't other hash functions that've had
> remotely similar levels of cryptographic analysis to md5 and sha. IIRC,
> the elliptic curve cryptography stuff was supposed to be similarly neat,
> until people started analysing it seriously, at which point it broke.

To the best of my knowledge, elliptic curve cryptography isn't any more
broken than RSA or ElGamal is.

/* Steinar */
-- 
Homepage: http://www.sesse.net/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: possible freetype transition; improved library handling needed for all C/C++ packages

2005-11-27 Thread Hamish Moffatt
On Tue, Nov 22, 2005 at 02:37:19PM -0800, Steve Langasek wrote:
> Due to upstream ABI changes, it looks very likely that libfreetype is
> going to have to undergo a library transition in the near future[0].
> The details are still being settled, and it's possible (though unlikely)
> that the library will be fixed so that no transition is needed, but in
> the meantime I'd like to leave you all with a public service
> announcement.

[...]

> This email, therefore, is a call-to-arms for maintainers to improve
> the library handling in their packages.  The impetus for this request is
> the prospective freetype transition, but if you maintain *any* packages
> in C and C++, this mail is still addressed to you.

So, I found out that my trustedqsl package is fairly guilty in this
regard. Not in regard to freetype, but it links directly to openssl and
libexpat, even though it doesn't use them. Upstream's autoconf setup
actually does this deliberately.

I've trimmed the configure scripts to avoid this, leaving me with the
link commands for the two binaries being:

g++ -Wall `"/usr/bin/wx-config" --cxxflags` -I/usr/include -I/usr/include 
-I/usr/include -g -O2  -o tqsl  tqsl.o extwizard.o tqslwiz.o dxcc.o 
stationdial.o qsodatadialog.o tqslvalidator.o tqsl_prefs.o wxutil.o -pthread 
-lwx_gtk-2.4 -ltqsllib

g++ -Wall `"/usr/bin/wx-config" --cxxflags` -I/usr/include -I/usr/include 
-I/usr/include -g -O2  -o tqslcert  tqslcert.o crqwiz.o dxcc.o certtree.o 
tqslcert_prefs.o getpassword.o extwizard.o loadcertwiz.o wxutil.o -pthread 
-lwx_gtk-2.4 -ltqsllib

(wx-config --libs says "-pthread -lwx_gtk-2.4").

However, my built package depends on zlib1g, which it doesn't use
directly and doesn't -l during link. 

I'd welcome any suggestions on how this might be... dpkg-shlibdeps bug?

thanks

Hamish
-- 
Hamish Moffatt VK3SB <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: possible freetype transition; improved library handling needed for all C/C++ packages

2005-11-27 Thread Kurt Roeckx
On Sun, Nov 27, 2005 at 11:48:37PM +1100, Hamish Moffatt wrote:
> 
> I've trimmed the configure scripts to avoid this, leaving me with the
> link commands for the two binaries being:
> 
> g++ -Wall `"/usr/bin/wx-config" --cxxflags` -I/usr/include -I/usr/include 
> -I/usr/include -g -O2  -o tqsl  tqsl.o extwizard.o tqslwiz.o dxcc.o 
> stationdial.o qsodatadialog.o tqslvalidator.o tqsl_prefs.o wxutil.o -pthread 
> -lwx_gtk-2.4 -ltqsllib
> 
> However, my built package depends on zlib1g, which it doesn't use
> directly and doesn't -l during link. 

./tqsl.cpp:#include 

And on line 691 you have a gzFile, 1157 calls gzopen, ...

Your configure script also checks for it, and adds it.  linking
tqslcert to -lz doesn't seem to be needed though.

> I'd welcome any suggestions on how this might be... dpkg-shlibdeps bug?

This is a linker feature which I dislike.  It adds missing
libraries if one of the libraries you link to happens to be
linked to the one you need.  For more info see:
http://sourceware.org/ml/binutils/2005-09/msg00200.html


Kurt


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: dpkg-sig support wanted?

2005-11-27 Thread Moritz Muehlenhoff
In linux.debian.devel, you wrote:
> Worse, the existance of a practical md5(A+B+C)=3Dmd5(A+D+C) attack means
> that it's not out of the question that there're md5(A+B)=3Dmd5(C+D)
> attacks in the hands of particularly well resourced groups (which is
> worse, since the version uploaded to the archive could then be entirely
> innocent looking). Personally, I don't have any interest in making the
> NSA's job any easier, or that of other signals intelligence groups.

While this is arguably true (the NSA claims to have developed asymmetric
cryptography ten years ahead of Diffie/Hellman), it seems that nowadays
the end of the cold war and improved corporate interest have shifted
things, so I'm personally not _too_ worried about that.

>> >> Moving away from MD5 is certainly not a bad idea, but it's not clear
>> >> whether the alternatives are any better.  Sure, everyone recommends
>> >> SHA-256 at this stage, but nobody can give a rationale.
>> > MD5 is broken; SHA-1 is where MD5 was a couple of years ago, SHA256 (or
>> > higher) are significantly harder to break in practice,
>> So?  If SHA256 is so much better, why is that nobody can prove it, or
>> at least can provide some evidence which supports that claim?  "The
>> numbers are bigger" is the main argument at this point, which is
>> awfully similar to the usual snake-oil arguments (although there is a
>> slight difference, of course).
>
> SHA256 is better than SHA1 in the same way 2048 bit RSA keys are better
> than 512 bit RSA keys. MD5 is broken, and isn't extensible. SHA1 is
> fragile, but not broken, and is extensible. Do you have other
> suggestions?

I'd suggest the combination of several hash systems, e.g. RIPEMD-160, a
SHA-based algorithm and possibly Tiger.

>> > and there's nothing better yet.
>> In terms of security, there are some better hash functions. =20
>
> My understanding was that there aren't other hash functions that've had
> remotely similar levels of cryptographic analysis to md5 and sha. IIRC,
> the elliptic curve cryptography stuff was supposed to be similarly neat,
> until people started analysing it seriously, at which point it broke.

I'm not aware of any attacks beyond birthday attacks, which are still
infeasible for the recommended key sizes of >= 160 bits.

ECC has several patent problems, though.

Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Bug#340934: lintian check for unneeded/transitive shlibs dependencies

2005-11-27 Thread Henning Makholm
Scripsit Peter Samuelson
> [Henning Makholm]

> > I have written a Lintian check which attempts to flag instances of
> > this problem. It looks for ELF objects that flag shared libraries in
> > the default search path as NEEDED without actually importing symbols
> > that the library exports.

> This produces a lot of noise in a case where a package has multiple
> binaries or libraries (sometimes in multiple packages), and a Makefile
> that links everything to a common set of libs which not everything
> needs.  Your check flags this correctly, but it can be a real pain to
> fix, and doesn't usually cause practical problems - particularly the
> problem Steve writes about.  Remember, the granularity of testing
> migrations and library transitions is not the file or even the binary
> package, but the source package.

This appears to be a fair point. I think I'll revise my proposal so it
works per .deb rather than per object file.

I'd like to see some broader debate, however. I am not conviced that
the entire _source_ package is the right level to check this at. Steve
mentioned two problems - one is painfullness of library transitions,
the other is segfaults in case of partial upgrades. While the first
problem indeed works on the source package level, the second is often
a matter between binary packages with the same source.

For a concrete example, consider #260938. The autotrace source package
builds binary packages libautotrace3 and autotrace; the latter
contains a client for the library in the former. A user upgraded the
client package without upgrading the library. This _ought_ to have
worked because the ABI of the library itself was indeed unchanged.
But the upgraded client spuriously pulled in different versions of
some library that was, in fact, used only by libautotrace, and a
segfault resulted.

Had a lintian check for spurious linking existed at the time, I would
have noticed that the client binary requested too many shared libs
and have an opportunity to fix it because it hit a user with a sefault.

-- 
Henning Makholm "This imposes the restriction on any
  procedure statement that the kind and type
 of each actual parameter be compatible with the
   kind and type of the corresponding formal parameter."


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#341012: ITP: kalgebra -- calculator based on MathML language

2005-11-27 Thread Steffen Joeris
Package: wnpp
Severity: wishlist
Owner: Steffen Joeris <[EMAIL PROTECTED]>

* Package name: kalgebra
  Version : 0.4
  Upstream Author : Aleix Pol <[EMAIL PROTECTED]>
* URL : http://kalgebra.berlios.de/
* License : GPL
  Description : calculator based on MathML language

 KAlgebra is a mathematical calculator based content
 markup MathML language. Nowadays it is capable to make
 simple MathML operations (arithmetic and logical) and
 representate 2D and 3D graphs. It is actually not necessary
 to know MathML to use KAlgebra.
 .
 The Mathematical Markup Language, is an XML based language
 used for displaying mathematical notation and content,
 especially on the web. It is a World Wide Web Consortium (W3C)
 recommended standard, and has been receiving increasing support
 by mathematical software vendors.
 .
 Web site: http://kalgebra.berlios.de/


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.14-2-686
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: possible freetype transition; improved library handling needed for all C/C++ packages

2005-11-27 Thread Hamish Moffatt
On Sun, Nov 27, 2005 at 02:31:05PM +0100, Kurt Roeckx wrote:
> On Sun, Nov 27, 2005 at 11:48:37PM +1100, Hamish Moffatt wrote:
> > g++ -Wall `"/usr/bin/wx-config" --cxxflags` -I/usr/include -I/usr/include 
> > -I/usr/include -g -O2  -o tqsl  tqsl.o extwizard.o tqslwiz.o dxcc.o 
> > stationdial.o qsodatadialog.o tqslvalidator.o tqsl_prefs.o wxutil.o 
> > -pthread -lwx_gtk-2.4 -ltqsllib
> > 
> > However, my built package depends on zlib1g, which it doesn't use
> > directly and doesn't -l during link. 
> 
> ./tqsl.cpp:#include 
> And on line 691 you have a gzFile, 1157 calls gzopen, ...

So it does. (And so much for my grep skills.)

> Your configure script also checks for it, and adds it.  linking

Not as of 1.11-3, where I removed the checks for libz, libexpat and
libssl. The latter two definitely aren't needed, and do disappear from
the binary package's Depends line as a result.

> tqslcert to -lz doesn't seem to be needed though.
> 
> > I'd welcome any suggestions on how this might be... dpkg-shlibdeps bug?
> 
> This is a linker feature which I dislike.  It adds missing
> libraries if one of the libraries you link to happens to be
> linked to the one you need.  For more info see:
> http://sourceware.org/ml/binutils/2005-09/msg00200.html

Interesting. Thanks.

Hamish
-- 
Hamish Moffatt VK3SB <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: possible freetype transition; improved library handling needed for all C/C++ packages

2005-11-27 Thread Adam Heath
On Sun, 27 Nov 2005, Hamish Moffatt wrote:

> On Tue, Nov 22, 2005 at 02:37:19PM -0800, Steve Langasek wrote:
> > Due to upstream ABI changes, it looks very likely that libfreetype is
> > going to have to undergo a library transition in the near future[0].
> > The details are still being settled, and it's possible (though unlikely)
> > that the library will be fixed so that no transition is needed, but in
> > the meantime I'd like to leave you all with a public service
> > announcement.
>
> [...]
>
> > This email, therefore, is a call-to-arms for maintainers to improve
> > the library handling in their packages.  The impetus for this request is
> > the prospective freetype transition, but if you maintain *any* packages
> > in C and C++, this mail is still addressed to you.
>
> So, I found out that my trustedqsl package is fairly guilty in this
> regard. Not in regard to freetype, but it links directly to openssl and
> libexpat, even though it doesn't use them. Upstream's autoconf setup
> actually does this deliberately.
>
> I've trimmed the configure scripts to avoid this, leaving me with the
> link commands for the two binaries being:
>
> g++ -Wall `"/usr/bin/wx-config" --cxxflags` -I/usr/include -I/usr/include 
> -I/usr/include -g -O2  -o tqsl  tqsl.o extwizard.o tqslwiz.o dxcc.o 
> stationdial.o qsodatadialog.o tqslvalidator.o tqsl_prefs.o wxutil.o -pthread 
> -lwx_gtk-2.4 -ltqsllib
>
> g++ -Wall `"/usr/bin/wx-config" --cxxflags` -I/usr/include -I/usr/include 
> -I/usr/include -g -O2  -o tqslcert  tqslcert.o crqwiz.o dxcc.o certtree.o 
> tqslcert_prefs.o getpassword.o extwizard.o loadcertwiz.o wxutil.o -pthread 
> -lwx_gtk-2.4 -ltqsllib

And what does wx-config produce?  Please expand everything when asking
questions.

> (wx-config --libs says "-pthread -lwx_gtk-2.4").

But you use --cxxflags.

> However, my built package depends on zlib1g, which it doesn't use
> directly and doesn't -l during link.

objdump -p $binary|grep NEEDED.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Bug#340934: lintian check for unneeded/transitive shlibs dependencies

2005-11-27 Thread Steve Langasek
On Sun, Nov 27, 2005 at 06:05:52PM +0100, Henning Makholm wrote:
> > > I have written a Lintian check which attempts to flag instances of
> > > this problem. It looks for ELF objects that flag shared libraries in
> > > the default search path as NEEDED without actually importing symbols
> > > that the library exports.

> > This produces a lot of noise in a case where a package has multiple
> > binaries or libraries (sometimes in multiple packages), and a Makefile
> > that links everything to a common set of libs which not everything
> > needs.  Your check flags this correctly, but it can be a real pain to
> > fix, and doesn't usually cause practical problems - particularly the
> > problem Steve writes about.  Remember, the granularity of testing
> > migrations and library transitions is not the file or even the binary
> > package, but the source package.

> This appears to be a fair point. I think I'll revise my proposal so it
> works per .deb rather than per object file.

> I'd like to see some broader debate, however. I am not conviced that
> the entire _source_ package is the right level to check this at. Steve
> mentioned two problems - one is painfullness of library transitions,
> the other is segfaults in case of partial upgrades. While the first
> problem indeed works on the source package level, the second is often
> a matter between binary packages with the same source.

I agree that we need better granularity than per-source.  I actually think
that having it per object file is ideal in the long run, though in the short
term doing it per binary package means less confusing noise.

Cheers,
-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Re: Chao ban ve may bay

2005-11-27 Thread Vannt



 
 
Ban cho toi gia bay noi dia tiuyen Hanoi - Daklak 
vao ngay 29,30/11/2005.
 
Gia re nhat.
 


Re: dpkg-sig support wanted?

2005-11-27 Thread Anthony Towns
On Sun, Nov 27, 2005 at 12:42:42PM +0100, Steinar H. Gunderson wrote:
> On Sun, Nov 27, 2005 at 02:18:00PM +1000, Anthony Towns wrote:
> > My understanding was that there aren't other hash functions that've had
> > remotely similar levels of cryptographic analysis to md5 and sha. IIRC,
> > the elliptic curve cryptography stuff was supposed to be similarly neat,
> > until people started analysing it seriously, at which point it broke.
> To the best of my knowledge, elliptic curve cryptography isn't any more
> broken than RSA or ElGamal is.

Oh god, how embarassing. I'm confusing elliptic curves and knapsacks,
my bad. Knapsack cryptograph's "provably" secure (in that a general
solution is NP), and practically insecure (in that it's hard to find
instances that are reliably hard enough, at least without obscene key
sizes).

But hey, SHA-something, Tiger, or whatever; it's well past time to choose
one, get a /usr/bin/<...> binary we can use, and replace md5 with it.

Cheers,
aj


signature.asc
Description: Digital signature


Re: master mail problems -- help needed

2005-11-27 Thread Florian Weimer
* Stephen Gran:

> No noticable time difference between the two, either.  So, I don't 
> think this is the real problem.

You could be right.

The problem is still present, unfortunately.  One more data point: A
couple of seconds before the last bounce was generated, murphy (which
is on the same network as master) successfully delivered mail to
mail.enyo.de.  It doesn't seem to be related to connectivity issues on
my part.

postmaster@ has been contacted, I'm waiting for log excerpts from DSA.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: dpkg-sig support wanted?

2005-11-27 Thread Lionel Elie Mamane
On Sun, Nov 27, 2005 at 12:42:42PM +0100, Steinar H. Gunderson wrote:
> On Sun, Nov 27, 2005 at 02:18:00PM +1000, Anthony Towns wrote:

>> My understanding was that there aren't other hash functions that've
>> had remotely similar levels of cryptographic analysis to md5 and
>> sha. IIRC, the elliptic curve cryptography stuff was supposed to be
>> similarly neat, until people started analysing it seriously, at
>> which point it broke.

> To the best of my knowledge, elliptic curve cryptography isn't any
> more broken than RSA or ElGamal is.

It isn't really broken, but the recommended key sizes have grown
significantly. I mean, the factor to divide RSA/DH/ElGamal key sizes
by to get equivalent security in ECC has shrunk. At least, I've heard
so, I don't remember what keys sizes were advertised in the beginnings
of ECC.

-- 
Lionel


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: dpkg-sig support wanted?

2005-11-27 Thread Lionel Elie Mamane
On Mon, Nov 28, 2005 at 03:32:21PM +1000, Anthony Towns wrote:

> Knapsack cryptograph's "provably" secure (in that a general solution
> is NP),

You mean NP-_complete_. (Sorting is also NP, but not NP-complete. NP
is "can be done in polynomial time by a non-deterministic Turing
machine, so anything polynomial by a normal machine is also
NP. "Foo is NP-complete" is "any NP problem can be polynomially
reduced to foo", or in other words, if there is a normal machine that
does foo in polynomial time, all NP problems can be done in polynomial
time.)

-- 
Lionel


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: texlive-basic_2005-1_i386.changes REJECTED

2005-11-27 Thread Norbert Preining
Hi Jörg, hi ftpmasters!

(I take in debian-devel and debian-tetex-maint)

I want to add some comments and questions:

First, genesis of TeX live for Debian. This probably/hopefully answers
"the big ?" of you: Following the ITP #312897 there was quite a bit of
discussion on debian-devel on the topic why to include another TeX
distribution, especially one that big.
(ITP: http://lists.debian.org/debian-devel/2005/06/msg00970.html)

There it is also stated that although TeX live is also a Live TeX
distribution, it is also one of the most complete TeX system currently
available. Furthermore it has the advantage that it is already split
into smaller packages. Frank Küster, the maintainer of teTeX packages,
summed up the advantages of having TeX live in Debian, explaining why it
should be included (see
http://lists.debian.org/debian-devel/2005/06/msg01103.html).

The package splitting strategy was developed in cooperation with the TeX
live upstream maintainers (via the [EMAIL PROTECTED] ml), and the teTeX
maintainers (starting in late 2004 beginning of 2005):
http://lists.debian.org/debian-tetex-maint/2005/01/msg00228.html

It boils down to the following: In TeX live upstream there are packages
(called tpm - tex package management) for each single package from CTAN.
These tpms are grouped together in areas of interest called
`collections'. In the discussion on the package split policy we came to
the conclusion that it is not feasable to make one debian package from
one tpm, that would be around 1000+ different packages. So we decided to
go for transforming collections into debian packages.

Now for your comments:

On Son, 27 Nov 2005, Joerg Jaspert wrote:
> Looking at the texlive packages in NEW I have some comments for you,
> leaving alone my big ? why one wants to include basically a ctan mirror
> in debian / dupe many things with tetex, instead of simply putting more
> man-power/work into tetex if its not modular enough.

See Franks comment above. Or: How many users of TeX packages have to go
through the difficult process of installing packages by hand from the
CTAN archive only to see that it is not working. It is not a completely
trivial task, even for experienced sysadmins. To have a more or less
complete TeX system in Debian is not a useless addition, it helps those
working with TeX and more than the set included in teTeX.

> Looking at what I know from texlive its intended as a live thingie for
> users to play/start with tex? Is there such a huge userbase for this to

No. Definitely not. Please see the web pages of texlive:
http://www.tug.org/texlive. It is used on a wide range of platforms and
operating systems, and normally is installed. It is *not* primary a live
system (although the name suggests this). 

> Im also not really happy with the current packaging, starting with the too
> heavy split of (source) packages.

Ok, this can be dealt with. I thought it would be better to have a
strict relation between source and bin packages, but where it was not
possible.

> For example there are 19 documentation source packages, all building one
> binary. Better merge them into one texlive-source and build the
> different binary packages out of that one. You are left with 47 sources.
> 
> Similar things can be said for the language packs, merge the *27* to one
> and built the binaries out of that. Down to 21 sources. :)

Ok, this is no problem. The .orig.tar.gz will be bigger, but I can merge
the source packages without any problem.

> Also I *suggest* to add a - after lang, so it reads lang-FOO, which is
> *IMO* easier. (Well, for all packages which dont have the additional -).

The reason behind this decision was to have the package name reflecting
the collection name, so that people using TeX live and using Debian see
(+-) the same names.

> as you do now with 65. Yes, that makes the orig-tarballs bigger, but I
> dont think thats so much of a problem here.

Ok, will do this.

> allrunes   dfsg
> 
> Please: Tell me its not true that the DFSG is used as a license there.

As stated in the License file, this list was generated from the TeX
Catalogue, which *can be wrong*! If you check the actual allrunes files,
you see that it is LPPL.

So for the further proceeding:
I will generate a new set of .orig.tar.gz etc with a new source packages
splitting scheme, trying to reduce the source packages as much as
possible.

Here a question: Theoretically I can make only *ONE* source package.
That would make *many* *many* things *much* more easier. But, this would
be rather big a .orig.tar.gz. In my understanding of the packaging
process this is not what is wished, but please correct me!
Especially I don't see the advantage of having such a big source
package, fixes always would force a big rebuild of everything.

For the package names I would prefer staying at the current names, as
the relate to the TeX live collection names. But if ftpmasters would not
accept, I will change.

What further steps are necessary to get t

Re: dpkg-sig support wanted?

2005-11-27 Thread Lionel Elie Mamane
On Sat, Nov 26, 2005 at 10:59:57AM +0100, Florian Weimer wrote:
> * Anthony Towns:
>> On Fri, Nov 25, 2005 at 07:59:40PM +0100, Florian Weimer wrote:
>>> * Anthony Towns:

>>> Moving away from MD5 is certainly not a bad idea, but it's not
>>> clear whether the alternatives are any better.  Sure, everyone
>>> recommends SHA-256 at this stage, but nobody can give a rationale.

>> MD5 is broken; SHA-1 is where MD5 was a couple of years ago, SHA256
>> (or higher) are significantly harder to break in practice,

> So?  If SHA256 is so much better, why is that nobody can prove it,
> or at least can provide some evidence which supports that claim?

The idea behind using SHA256 (or SHA512) is that we have more
_margin_. If we are targeting MD5's design security (2^64 against
collisions), even if SHA512 is "broken" significantly - say an attack
four times better than birthday - we still have our expected strength.

It is also the best we can get to *right* *now*, unless we escape to
humongous hash sizes (arithmetic-based designs).

>> and there's nothing better yet.

> In terms of security, there are some better hash functions.  But
> those are academic designs, most of them based on big integer
> arithmetic instead of bit fiddling.  Currently, nobody seems to be
> willing to pay the price that comes with them.

What this means is that your hashes will be as big as your asymmetric
keys, and hashing as slow as asymmetric cryptography. That's
significant.

They also seem to have deeply different security properties as far as
the user is concerned: the one I know, at least
(http://diswww.mit.edu/bloom-picayune/crypto/13190) relies (as
asymmetric crypto) on n a hard to factor product of two primes p and
q. The "security proof under assumption that factoring is hard" is
that if you generate a collision, you have factored n (roughly).

Now, what I don't get is who generates n and thus knows p and q and
thus _can_ generate collisions? Does everyone use his own n (and thus
everyone can generate collisions for the hash _he_ uses, but not for
the hash others use), do we use a trusted third party (that's a
_significantly_ different security model!) that publishes n?

(When I write n above, I obviously mean the pair (n,g), g element of
maximal order in Z/nZ.)

-- 
Lionel


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: texlive-basic_2005-1_i386.changes REJECTED

2005-11-27 Thread Norbert Preining
On Mon, 28 Nov 2005, Norbert Preining wrote:
> (I take in debian-devel and debian-tetex-maint)

For completeness I attach the complete email of Jörg.

Best wishes

Norbert

---
Dr. Norbert Preining  Università di Siena
gpg DSA: 0x09C5B094  fp: 14DF 2E6C 0307 BE6D AD76  A9C0 D2BF 4AA3 09C5 B094
---
WEST WITTERING (participial vb.)
The uncontrollable twitching which breaks out when you're trying to
get away from the most boring person at a party.
--- Douglas Adams, The Meaning of Liff
--- Begin Message ---
Hi Maintainer(s),

Looking at the texlive packages in NEW I have some comments for you,
leaving alone my big ? why one wants to include basically a ctan mirror
in debian / dupe many things with tetex, instead of simply putting more
man-power/work into tetex if its not modular enough.

Looking at what I know from texlive its intended as a live thingie for
users to play/start with tex? Is there such a huge userbase for this to
include it (hey, its >600MB) into Debian?


Im also not really happy with the current packaging, starting with the too
heavy split of (source) packages.

You have 65 of them right now.
For example there are 19 documentation source packages, all building one
binary. Better merge them into one texlive-source and build the
different binary packages out of that one. You are left with 47 sources.

Similar things can be said for the language packs, merge the *27* to one
and built the binaries out of that. Down to 21 sources. :)
Also I *suggest* to add a - after lang, so it reads lang-FOO, which is
*IMO* easier. (Well, for all packages which dont have the additional -).

To not repeat too much: The same goes for all different source packages
that are splitted into recommended/extra/whatever. I think you can end
up with less than 20 source packages, building up the same functionality
as you do now with 65. Yes, that makes the orig-tarballs bigger, but I
dont think thats so much of a problem here.


Oh, if I go and read the included Licenses.txt i see they have the
following listed:

# The licenses codes as described on
#  http://www.ctan.org/tex-archive/help/Catalogue/licenses.html
# are
# DFSG free licenses:
#  dfsg Debian Free Software Guidelines
#  artisticPerl Artistic License
[... and so on]

and a bit down:

allrunes   dfsg
(and more package)

Please: Tell me its not true that the DFSG is used as a license there.

Note: Feel free to move the discussion to the -devel list if you want.

-- 
bye Joerg



===

If you don't understand why your files were rejected, or if the
override file requires editing, reply to this email.
--- End Message ---