Re: bash exorcism experiment ('bug' 762923 & 763012)

2014-10-05 Thread Bernd Zeimetz
On 09/28/2014 10:33 AM, Colin Watson wrote:
> On Sat, Sep 27, 2014 at 09:11:44PM -0500, Troy Benjegerdes wrote:
>> Does update-menus really need bash? Why?
> 
> pipefail is actually a fairly useful bashism.

Use mispipe from moreutils instead.


-- 
 Bernd ZeimetzDebian GNU/Linux Developer
 http://bzed.dehttp://www.debian.org
 GPG Fingerprint: ECA1 E3F2 8E11 2432 D485  DD95 EB36 171A 6FF9 435F


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/54310554.2060...@bzed.de



Bug#764071: ITP: toxic -- a curses Tox based instant messenging client

2014-10-05 Thread Per Andersson
Package: wnpp
Severity: wishlist
Owner: Per Andersson 
Control: block -1 by 739860

* Package name: toxic
  Version : 0.5.2
  Upstream Author : JFreegman 
* URL : https://github.com/tox/toxic
* License : GPL
  Programming Lang: C
  Description : a curses Tox based instant messenging client

Toxic is a Tox-based instant messenging client which formerly resided in
the Tox core repository, and is now available as a standalone
application.
.
Tox is a secure and distributed Skype replacement.
.
At its heart it’s a client dealing with our core library communicating
on our own protocol. All communications are encrypted using the peer
audited NaCl cypto library and this encryption can not be turned off.
.
Tox is powered by a distributed network which uses P2P connections for
chats between people, unlike other Skype replacements no federated
servers, centralized servers, or supernodes are used.



This is a way to replace Skype. It is decentralized, as opposed to
Jabber/XMPP, SIP, Jitsi etc.

If anyone wants to co-maintain they are very welcome. Is there a
communications team? I know of the OTR team, but that is only for OTR...


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20141005084026.7698.97390.report...@saturn.foo.nu



finding out why a package is not in testing

2014-10-05 Thread kamaraju kusumanchi
Since there is no longer a search functionality in
https://release.debian.org/migration/ to find out why a particular package
is not in testing yet, can we please put a link to
https://ftp-master.debian.org/testing/update_excuses.html (or something
more appropriate) on that page?

This way someone can open up the link and search for the package name they
are interested in.

thanks
raju
-- 
Kamaraju S Kusumanchi
http://malayamaarutham.blogspot.com/


Re: finding out why a package is not in testing

2014-10-05 Thread Adam D. Barratt
[not sure if you're subscribed to debian-devel, so CCing]

On Sun, 2014-10-05 at 06:52 -0400, kamaraju kusumanchi wrote:
> Since there is no longer a search functionality
> in https://release.debian.org/migration/ to find out why a particular
> package is not in testing yet, can we please put a link to
> https://ftp-master.debian.org/testing/update_excuses.html (or
> something more appropriate) on that page? 

The correct place to ask for changes to release.debian.org isn't
debian-devel; that would be the debian-release list.

> This way someone can open up the link and search for the package name
> they are interested in.

https://release.debian.org/migration/testing.pl?package=foo still works
perfectly fine, the search functionality is simply disabled because it's
too easy to overload the host (e.g. when it's hit by bots).

Regards,

Adam



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/1412513286.26144.15.ca...@jacala.jungle.funky-badger.org



Bug#764112: ITP: mlbviewer -- Curses interface to the MLB.TV media offering

2014-10-05 Thread Sebastien Delafond
Package: wnpp
Severity: wishlist
Owner: Sebastien Delafond 

* Package name: mlbviewer
  Version : 2014.sf.3
  Upstream Author : straycat...@yahoo.com
* URL : https://sourceforge.net/projects/mlbviewer/
* License : GPL 2
  Programming Lang: Python
  Description : Curses interface to the MLB.TV media offering

A collection of tools to view and listen to streaming baseball games
from MLB.TV. While the main streaming content is mostly for paid MLB.TV
subscribers only, there are a significant number of features and views
available to non-subscribers as well including one free game each
day. You can watch MLB classic content from YouTube without a browser,
and MiLB.TV and Postseason.TV are also integrated into the same
mlbviewer interface.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20141005135538.16315.40806.report...@hetz1.mine.nu



Bug#764115: ITP: baloo-kcmadv -- advanced configuration module for KDE Desktop Search

2014-10-05 Thread Luigi Toscano
Package: wnpp
Severity: wishlist
Owner: Luigi Toscano 

* Package name: baloo-kcmadv
  Version : 0~git20140427
  Upstream Author : Lindsay Mathieson 
* URL : https://gitorious.org/baloo-kcmadv
* License : LGPL2
  Programming Lang: C++
  Description : advanced configuration module for KDE Desktop Search

This module allows users to fine-tune the configuration of the Baloo
Desktop Search technology for KDE applications.

The source package will generate a binary package called
kde-config-baloo-advanced
I'm looking for sponsors but I'm in touch with the Debian Qt/KDE team.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20141005135946.1352.16057.reportbug@nomaios.toscano



Re: Allow encfs into jessie?

2014-10-05 Thread Eduard Bloch
Hallo,
* Matthias Urlichs [Mon, Sep 29 2014, 07:29:44AM]:

> > >  According to a security audit by Taylor Hornby (Defuse Security), the 
> > > current
> > >  implementation of Encfs is vulnerable or potentially vulnerable to 
> > > multiple
> > >  attacks on the encrypted data. This especially affects use cases where 
> > > the
> > >  attacker has read/write access to the encrypted directory or has enough
> > >  knowledge of the unencrypted file system contents.
> > >  .
> s/especially/only/, AFAIK.

Maybe, but: "only" could sound like absolution to clueless users and I
am not willing to make such suggestions.

> > >  In the current situation encfs should not be considered a safe home for
> > >  sensible data. This package should be only used to retrieve information 
> > > from
> 
> s/sensible/sensitive/

Ouch, thank you.

> > >  previously encrypted sources, and even this action contains some risk of
> > >  receiving compromised data.
> > 
> To recap the security analysis, as I understood it: There's a problem if
> somebody has, or had, access to the encrypted files _and_ can store random
> data of their choosing there (by manipulating either the encrypted or the
> unencrypted files). The notice should unequivocally state exactly that,
> instead of the current level of (IMHO) panic mongering.
> 
> In most scenarios (encrypt some personal or corporate data stored on NFS,
> use reverse mode to store an encrypted backup of sensitive stuff to the
> cloud, whatever) this is a non-problem.

I agree regarding most scenarios and I changed the text now. However,
it's hard to keep the text understandable for average user and mention
all relevant dangers without goind too much into details.

So, I suggest this new version. Added below for review; I consider
uploading this to Experimental and submitting for l10n in a couple of
days.

Regards,
Eduard.

Template: encfs/security-information
Type: error
_Description: Encfs security information
 According to a security audit by Taylor Hornby (Defuse Security), the current
 implementation of Encfs is vulnerable or potentially vulnerable to multiple
 types of attacks. For example, an attacker with read/write access to encrypted
 data might lower the decryption complexity for subsequently encrypted data
 without being noticed by the legimitate user, or may compute encryption
 information by timing analysis.
 .
 Until these issues are resolved, encfs should not be considered a safe home
 for sensitive data in certain scenarios.


signature.asc
Description: Digital signature


Re: Bug#762949: ITP: obs-build -- scripts for building RPM/debian packages for multiple distributions

2014-10-05 Thread Dimitri John Ledkov
On 26 September 2014 14:58, Neil Williams  wrote:
> On Fri, 26 Sep 2014 14:19:24 +0100
> Dimitri John Ledkov  wrote:
>
>> Package: wnpp
>> Owner: Dimitri John Ledkov 
>> Severity: wishlist
>>
>> * Package name: obs-build
>>   Version : 20140918
>>   Upstream Author : Adrian Schröter 
>> * URL or Web page : https://github.com/openSUSE/obs-build
>> * License : GPL-2+
>>   Description : scripts for building RPM/debian packages for
>> multiple distributions
>>
>> This package provides scripts for building RPM and debian packages in
>> contained environments for various build distributions. These tools
>> are use by Open Build Service workers and openSUSE distribution by
>> default.
>>
>> By default it claims very generic paths:
>> /usr/bin/build
>> /usr/lib/build
>>
>> I'm planning to keep those as per upstream, if however there are
>> strong objections I'd be happy to change those to obs-build.
>
> Any number of packages could have claimed /usr/bin/build by now,
> instead we have sbuild, debuild, pdebuild, make, dpkg-buildpackage,
> git-buildpackage and a host of others. I don't see that obs deserves to
> be the "one true build" which may be the impression given by an overly
> common binary name.
>

So i've patched obs-build to use obs-build and tested out osc with it.
Which turned out hardcoded paths to /var/lib/build in some legacy
support checks. Filed bug-report which has been fixed upstream.
obs-build uploaded, and should hit new queue soon. Once it's in, I'll
propose for osc to cherry-pick that upstream commit, set build-cmd to
"obs-build" and depend/recommend/suggest obs-build package.

Regards,

Dimitri.


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/CANBHLUjPibkyVnEqB8cQH_wfYgt98=kumxz1a8eogsckcq_...@mail.gmail.com



Inert DEB_BUILD_OPTIONS noopt in debian/rules files

2014-10-05 Thread Guillem Jover
Hi!

While going through the dpkg codebase, I realized that any
debian/rules file that calls dpkg-buildflags through make's $(shell)
function will not honor at least noopt from DEB_BUILD_OPTIONS, which
affects the build flags returned by dpkg-buildflags.

This is fixed in dpkg 1.17.14 buildflags.mk, but any package handling
the flags inline will probably be affected, as I don't expect that case
to be currently handled.

Packages using dh(1) or cdbs are not affected. I'm not sure how many
packages might be affected, but I think the current situation is *bad*.

Regards,
Guillem


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20141005233308.ga31...@gaara.hadrons.org



Re: Inert DEB_BUILD_OPTIONS noopt in debian/rules files

2014-10-05 Thread Jakub Wilk

* Guillem Jover , 2014-10-06, 01:33:
I realized that any debian/rules file that calls dpkg-buildflags 
through make's $(shell) function will not honor at least noopt from 
DEB_BUILD_OPTIONS, which affects the build flags returned by 
dpkg-buildflags.


Why?

any package handling the flags inline will probably be affected, as I 
don't expect that case to be currently handled.


I've just checked a random package of mine[0], and it honours noopt just 
fine.



[0] https://sources.debian.net/src/rc/1.7.1-5/debian/rules/?hl=11:13#L11

--
Jakub Wilk


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20141005235500.ga5...@jwilk.net



Re: Inert DEB_BUILD_OPTIONS noopt in debian/rules files

2014-10-05 Thread Guillem Jover
Hi!

On Mon, 2014-10-06 at 01:55:01 +0200, Jakub Wilk wrote:
> * Guillem Jover , 2014-10-06, 01:33:
> >I realized that any debian/rules file that calls dpkg-buildflags through
> >make's $(shell) function will not honor at least noopt from
> >DEB_BUILD_OPTIONS, which affects the build flags returned by
> >dpkg-buildflags.
> 
> Why?

Because make does not (yet) pass make variables to $(shell) subshells.

> >any package handling the flags inline will probably be affected, as I
> >don't expect that case to be currently handled.
> 
> I've just checked a random package of mine[0], and it honours noopt just
> fine.

Try this:

  $ make -f debian/rules DEB_BUILD_OPTIONS=noopt build

instead. This just breaks the interface. We could of course simply
just document that people should not do that… it's still a regression
from when people switched to dpkg-buildflags (me included).

(Or get the make bug #327154 fixed. :)

Rereading my mail again, it sounded a bit alarmist, the situation is
not *that* bad, as in the consequences on normal usage, it just affects
probably lots of packages, in case we care.

Thanks,
Guillem


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20141006003821.ga19...@gaara.hadrons.org



Re: apache2 issues

2014-10-05 Thread Brian May
On 23 September 2014 17:58, Jeroen Dekkers  wrote:
>
> > Isn't that an implementation detail? Is Python version relevant for the
> > on-the-wire WSGI protocol?
>
> WSGI is an API, not a wire protocol. The Python version of the WSGI
> server would also be the Python version the code is run under, so we
> must distinguish between Python 2 and 3. The best way would probably
> be to specify that httpd-wsgi is for Python 2 and create a httpd-wsgi3
> virtual package for Python 3.
>

How do we make this change? Does this require reopening #588497 and/or
creating a new bug against debian-policy?
-- 
Brian May 


Re: Bug#763930: ITP: mysecureshell -- SFTP Server with ACL

2014-10-05 Thread Pierre Mavro
Thanks, I've corrected it

Le 10/04/2014 10:18 AM, Adam D. Barratt a écrit :
> On Fri, 2014-10-03 at 22:08 +, Pierre Mavro wrote:
>> MySecureShell is a solution which has been made to bring more features to
>> sftp/scp protocol given by OpenSSH. By default, OpenSSH brings a lot of
>> liberty to connected users which imply to thrust in your users.
> This seems to be a common error, but the word you're looking for is
> "trust".
>
> Thrusting your users would be something quite different...
>
> Regards,
>
> Adam
>


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/54323282.8000...@mavro.fr



Re: Allow encfs into jessie?

2014-10-05 Thread Matthias Urlichs
Hi,

Eduard Bloch:
> So, I suggest this new version. Added below for review; I consider
> uploading this to Experimental and submitting for l10n in a couple of
> days.
> 
Fair enough.

-- 
-- Matthias Urlichs


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20141006065051.gt3...@smurf.noris.de