Bug#872695: ITP: caja-admin -- Add administrative actions to Caja's right-click menu

2017-08-20 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

* Package name: caja-admin
  Version : 0.0.1
  Upstream Author : Sander Sweers 
* URL : https://github.com/infirit/caja-admin
* License : GPL-3+
  Programming Lang: Python
  Description : Add administrative actions to Caja's right-click menu

 Caja Admin is a simple Python extension for the Caja file manager that
 adds some administrative actions to the right-click menu:
 .
   - Open as Administrator: opens a folder in a new Caja window running
 with administrator (root) privileges.
   - Edit as Administrator: opens a file in a Pluma window running with
 administrator (root) privileges.
   - Run as Administrator: runs an executable file with administrator
 (root) privileges inside a MATE Terminal.
 .
 The package will be maintained under the umbrella of the Debian+Ubuntu MATE
 Packaging Team and it will finally be a substitute for caja-gksu.



Bug#872697: ITP: node-unicode-10.0.0 -- Unicode data for Node.js

2017-08-20 Thread Julien Puydt
Package: wnpp
Severity: wishlist
Owner: Julien Puydt 
X-Debbugs-CC: debian-devel@lists.debian.org

* Package name: node-unicode-10.0.0
  Version : 0.7.4
  Upstream Author : Mathias Bynens (https://mathiasbynens.be/)
* URL : https://github.com/mathiasbynens/unicode-10.0.0
* License : Expat
  Programming Lang: JavaScript
  Description : Unicode data for Node.js
 JavaScript-compatible Unicode data. Arrays of code points, arrays of
symbols,
 and regular expressions for Unicode v10.0.0’s categories, scripts, blocks,
 bidi, and other properties.
 .
 Node.js is an event-based server-side JavaScript engine.


Cheers,

Snark on #debian-js



Re: openssl/libssl1 in Debian now blocks offlineimap?

2017-08-20 Thread Adrian Bunk
On Fri, Aug 18, 2017 at 10:07:49PM +0200, Tollef Fog Heen wrote:
> ]] Adrian Bunk 
>... 
> The PCI consortium extended the deadline until June
> 2018.  Assuming that deadline holds, people with older machines will not
> be able to access services such as online banking or pay online in
> general.

That's wrong.

Think of the "TLS 1.2 not working with WPA" discussed earlier here that 
might still affect half a billion active Android devices at the buster
release date.[1]

The online banking app running on such a device will support TLS 1.2

The PayPal app currently requires Android >= 4.0.3, released in 2011.

> ... but they're pragmatic.
> As they write in their press release: “…in the field a lot of business
> issues surfaced…” said Stephen Orfei, General Manager, PCI SSC. “We want
> merchants protected against data theft but not at the expense of turning
> away business, ...

Corollary:

It is permitted to run your online banking app on an Android device 
with a 5 year old firmware with no security updates ever available.

>...
> to make sure any users on platforms where support for that is
> lacking get a proper notification and a chance to move to something
> newer.
>...

Imagine Debian running on the AP providing the WiFi for a Cafe.

What you are saying is that the staff working at the Cafe should explain 
to their customers that they have to buy a new phone if they want to use 
the WiFi.

cu
Adrian

[1] I haven't investigated how widespread this specific problem 
actually is, or whether it can be mitigated - the point is that
it is unrelated to TLS versions supported by PayPal or online 
banking apps running on the device

-- 

   "Is there not promise of rain?" Ling Tan asked suddenly out
of the darkness. There had been need of rain for many days.
   "Only a promise," Lao Er said.
   Pearl S. Buck - Dragon Seed



Re: openssl/libssl1 in Debian now blocks offlineimap?

2017-08-20 Thread Sven Hartge
Adrian Bunk  wrote:

> [1] I haven't investigated how widespread this specific problem 
> actually is, or whether it can be mitigated - the point is that
> it is unrelated to TLS versions supported by PayPal or online 
> banking apps running on the device

I asked on the freeradius-users list, if there is an easy way to log the
SSL/TLS version a client uses during the PEAP/TTLS handshake, to get a
better understanding of the situation on my universities wireless
networks, but unfortunately this was not easily possible.

http://lists.freeradius.org/pipermail/freeradius-users/2017-August/088521.html

It would be really interesting to gather some long term statistics about
this to see a trend of the adoption of newer TLS versions over time.

Grüße,
Sven.

-- 
Sigmentation fault. Core dumped.



Re: openssl/libssl1 in Debian now blocks offlineimap?

2017-08-20 Thread Tollef Fog Heen
]] Adrian Bunk 

> On Fri, Aug 18, 2017 at 10:07:49PM +0200, Tollef Fog Heen wrote:
> > ]] Adrian Bunk 
> >... 
> > The PCI consortium extended the deadline until June
> > 2018.  Assuming that deadline holds, people with older machines will not
> > be able to access services such as online banking or pay online in
> > general.
> 
> That's wrong.

I'm not sure which bit of the quoted text you think is wrong.

> Think of the "TLS 1.2 not working with WPA" discussed earlier here that 
> might still affect half a billion active Android devices at the buster
> release date.[1]
> 
> The online banking app running on such a device will support TLS 1.2

Maybe, maybe not.  Depending on how it's implemented, it's non-trivial
to get TLS 1.2 support in there.  Just doing HTTP or TLS yourself is
easy enough, but if you want to use a webview, you're at the mercy of
the TLS libs of the OS.

> The PayPal app currently requires Android >= 4.0.3, released in 2011.

I'd not be surprised if that gets bumped, but that's just my guess, I
have no knowledge into what their actual plans are.

[...]

> >...
> > to make sure any users on platforms where support for that is
> > lacking get a proper notification and a chance to move to something
> > newer.
> >...
> 
> Imagine Debian running on the AP providing the WiFi for a Cafe.
> 
> What you are saying is that the staff working at the Cafe should explain 
> to their customers that they have to buy a new phone if they want to use 
> the WiFi.

Why would that be the case?  They're likely to just be using WPA2 or
have an open network, neither of which require TLS.

Arguing for keeping TLS 1.0 support means you're arguing for providing
users with a default-insecure setup.  In today's world, I think that's a
pretty poor choice.  Providing people with the possibility to fall back
to less secure solutions sounds like a much better choice, just like
it's possible to install an telnetd providing unencrypted logins, but it
requires you to actively go out and install it.

-- 
Tollef Fog Heen
UNIX is user friendly, it's just picky about who its friends are



Re: Call for volunteers: FTP Team

2017-08-20 Thread Andreas Tille
On Fri, Aug 18, 2017 at 07:16:38PM +0500, Andrey Rahmatullin wrote:
> Several mails in this thread seem to assume that the main or even the only
> job of the ftp team is processing the NEW queue. This is not true.

What is IMHO really true is that all answers in the thread while being
mostly funny and entertaining have not revealed any volunteer for the
team that was rather asking for man power than for name suggestions.

Kind regards

Andreas,

-- 
http://fam-tille.de



Bug#872722: ITP: node-foreground-child -- : helper for running a child process as a foreground process

2017-08-20 Thread Bastien ROUCARIES
Package: wnpp
Severity: wishlist
Owner: ro...@debian.org
X-Debbugs-CC: debian-devel@lists.debian.org

* Package name: node-foreground-child
  Version : 1.5.6
  Upstream Author : Isaac Z. Schlueter  (http://blog.izs.me/)
* URL : https://github.com/tapjs/foreground-child#readme
* License : ISC
  Programming Lang: JavaScript
  Description : helper running a child process as a foreground process

 This Node.js module emulate simple control group in pure javacript.
 It runs a child process as foreground process redirecting output
 to stdout and exiting main process as soon as child exist.
 .
 This module could be used for implementating TAP test
 for Node.js.
 .
 TAP is a simple text-based interface between testing modules
 implemented in many popular languages.
 .
 Node.js is an event-based server-side JavaScript engine.



Re: openssl/libssl1 in Debian now blocks offlineimap?

2017-08-20 Thread Adrian Bunk
On Sun, Aug 20, 2017 at 01:51:16PM +0200, Tollef Fog Heen wrote:
> ]] Adrian Bunk 
>...
> > Think of the "TLS 1.2 not working with WPA" discussed earlier here that 
> > might still affect half a billion active Android devices at the buster
> > release date.[1]
> > 
> > The online banking app running on such a device will support TLS 1.2
> 
> Maybe, maybe not.  Depending on how it's implemented, it's non-trivial
> to get TLS 1.2 support in there.  Just doing HTTP or TLS yourself is
> easy enough, but if you want to use a webview, you're at the mercy of
> the TLS libs of the OS.
>...

TLS 1.1 and 1.2 are supported for client sockets
in Android since 2012.

TLS 1.1 and 1.2 are enabled by default for client sockets
in Android since 2014.

In other words:
When buster gets released, there will still be few hundred million 
Android devices in use that do support TLS 1.1 and 1.2 but have it 
disabled by default.

If you are a bank, then using TLS 1.2 in your online banking app
is not a problem on these devices.

The situation can be less rosy when a user tries to open a link to
https://www.debian.org in the default browser.

The recent trend of using HTTPS everywhere has the nasty side effect of 
TLS 1.0 being mandatory for public parts of webservers for as long as 
users continue to use browsers that don't support anything more recent.

Even a bank that might want/have to restrict the online banking part of 
their website to TLS 1.2 and secure ciphers will still have a huge 
commercial incentive to support everything no matter how weak for HTTPS
access to the public parts of their website where they advertise their 
services to potential new customers.

cu
Adrian

-- 

   "Is there not promise of rain?" Ling Tan asked suddenly out
of the darkness. There had been need of rain for many days.
   "Only a promise," Lao Er said.
   Pearl S. Buck - Dragon Seed



Re: Call for volunteers: FTP Team

2017-08-20 Thread Chris Lamb
Hi Andreas,

> What is IMHO really true is that all answers in the thread while being
> mostly funny and entertaining have not revealed any volunteer for the
> team that was rather asking for man power than for name suggestions.

I share your frustration. However, you will be heartened to learn that
the FTP team have received a significant number of requests off-list. :)


Best wishes,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-



Bug#872732: ITP: wildfly-common -- Wildfly common utilities project

2017-08-20 Thread Markus Koschany
Package: wnpp
Severity: wishlist
Owner: Markus Koschany 

* Package name: wildfly-common
  Version : 1.2.0
  Upstream Author : Red Hat Inc.
* URL : http://wildfly.org/
* License : Apache-2.0
  Programming Lang: Java
  Description : Wildfly common utilities project

 Wildfly is a Java application server which implements the Java
 Platform, Enterprise Edition (Java EE) specification.
 .
 This package contains common utilities to work with Wildfly
 applications.

 This package is a new build-dependency of jboss-xnio and will be
 maintained by the Java team.



Bug#872733: ITP: wildfly-client-config -- Wildfly Client Configuration Library

2017-08-20 Thread Markus Koschany
Package: wnpp
Severity: wishlist
Owner: Markus Koschany 

* Package name: wildfly-client-config
  Version : 1.0.0
  Upstream Author : Red Hat Inc.
* URL : http://wildfly.org/
* License : Apache-2.0
  Programming Lang: Java
  Description : Wildfly Client Configuration Library

Wildfly is a Java application server which implements the Java
Platform, Enterprise Edition (Java EE) specification.

This package contains Wildfly's client configuration library.

This package is a new build-dependency of jboss-xnio and required to
update the package to the latest version. It will be maintained by the
Java team.



Single Sign On for Debian

2017-08-20 Thread Geert Stappers

Previous on mailinglist alioth-staff-replacem...@lists.alioth.debian.org

IMHO is debian-devel@lists.debian.org a better place for this.


- Forwarded message from Enrico Zini  -

Date: Sun, 20 Aug 2017 18:03:26 +0200
From: Enrico Zini 
To: alioth-staff-replacem...@lists.alioth.debian.org
Cc: Geert Stappers 
Subject: Re: [Alioth-staff-replacement] Fwd: Re:  Alioth needs your help
User-Agent: NeoMutt/20170113 (1.7.2)

> >> SSO doesn't have own backends.
> > Isn't  db.debian.org the backend that knowns about all DD?
> 
> SSO, as it is right now, is NOT a user managing thing. SSO is ONLY
> taking existing users from one or more (two right now, db.d.o/alioth)
> backends, and allows them to have a single sign on on connected debian
> services, nm.debian.org being the biggest of it, DebConf pages the next
> one (that i know of).
> 
> If someone is willing to invest the time and work to make SSO fly up and
> be THE one point other things can connect to, meaning that it eats DD
> data from db.d.o but does its own user management for non-DDs, and also
> willing to maintain that over time - and then also add stuff like being
> an ouath provider, SAML something, whatever those things are called by
> now, so that applications/services can easily be connected to it - then
> setups like gitlab/gitea/whatever can go and use it as a provider, and
> not the other way round.
> 
> I am pretty sure the current maintainers of sso would love to get help,
> possibly to the point of being happy to entirely give it to someone who
> really wants to invest the time and work, also i cant speak for them, so
> talk to them for more.

Hi there. I'm not on this list, keep me Cc-ed or add me to the list as
you wish.

I am currently the only maintainer of sso.d.o and I confirm what Ganneff
said.

Currently not only sso.d.o doesn't do any user database, but it also
never sees the users' web password or alioth passwords. Authentication
is delegated to apache's mod_ldap, and I just see what's in REMOTE_USER.
A bug in my code, with the current setup, won't leak users' passwords no
matter what.

I'm happy to give up maintenance of sso.d.o entirely and I don't mind if
it gets replaced with whatever makes sense. The current setup is the
simplest and most secure setup I can think of that can be maintained by
one person, relies on widespread and well tested code (except for the
custom certificate generation interface) and can federate trivially.

Note that it's security-sensitive code for which I don't even get code
review of my commits, with the exception of some recent post-debconf
review and feedback by paultag. 

However, if anyone takes sso.d.o over, and then at some point
disappears, I will be the most affected, as a broken sso.debian.org
means a broken nm.debian.org and contributors.debian.org and I am the
person taking care for those, too. In fact, I got stuck with maintaining
sso.debian.org because the other people involved pulled out and I needed
to keep nm.debian.org running, so that scenario has happened before.
If it happens again, depending on what sso.debian.org will have become,
I might choose to take down nm.debian.org until someone else fixes
sso.debian.org, instead of taking ownership of something I can't
maintain.

I understand that gitlab has its own user database / registration /
password change infrastructure; if you want to use that, we can see how
to make sso.debian.org authenticate to it.

If instead you prefer to have sso.debian.org handle non-DD registration,
it is doable: python3-django-registration exists and can be used, and
gitlab can probably then consume the client certificates.

Between the two options, I would imagine that the gitlab registration
code is far more polished and well tested than
python3-django-registration, so I would suggest to have people register
on gitlab and then interface sso.debian.org with that.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 



___
Alioth-staff-replacement mailing list
alioth-staff-replacem...@lists.alioth.debian.org
https://lists.alioth.debian.org/mailman/listinfo/alioth-staff-replacement


- End forwarded message -

-- 
Groeten
Geert Stappers
-- 
Leven en laten leven


signature.asc
Description: Digital signature


Re: Single Sign On for Debian

2017-08-20 Thread Luca Filipozzi
On Sun, Aug 20, 2017 at 06:16:07PM +0200, Geert Stappers wrote:
> 
> Previous on mailinglist
> alioth-staff-replacem...@lists.alioth.debian.org
> 
> IMHO is debian-devel@lists.debian.org a better place for this.
> 
> 
> - Forwarded message from Enrico Zini  -
> 
> Date: Sun, 20 Aug 2017 18:03:26 +0200 From: Enrico Zini
>  To:
> alioth-staff-replacem...@lists.alioth.debian.org Cc: Geert Stappers
>  Subject: Re: [Alioth-staff-replacement] Fwd:
> Re:  Alioth needs your help User-Agent: NeoMutt/20170113 (1.7.2)
> 
> > >> SSO doesn't have own backends.
> > > Isn't  db.debian.org the backend that knowns about all DD?
> > 
> > SSO, as it is right now, is NOT a user managing thing. SSO is ONLY
> > taking existing users from one or more (two right now,
> > db.d.o/alioth) backends, and allows them to have a single sign on on
> > connected debian services, nm.debian.org being the biggest of it,
> > DebConf pages the next one (that i know of).
> > 
> > If someone is willing to invest the time and work to make SSO fly up
> > and be THE one point other things can connect to, meaning that it
> > eats DD data from db.d.o but does its own user management for
> > non-DDs, and also willing to maintain that over time - and then also
> > add stuff like being an ouath provider, SAML something, whatever
> > those things are called by now, so that applications/services can
> > easily be connected to it - then setups like gitlab/gitea/whatever
> > can go and use it as a provider, and not the other way round.
> > 
> > I am pretty sure the current maintainers of sso would love to get
> > help, possibly to the point of being happy to entirely give it to
> > someone who really wants to invest the time and work, also i cant
> > speak for them, so talk to them for more.
> 
> Hi there. I'm not on this list, keep me Cc-ed or add me to the list as
> you wish.
> 
> I am currently the only maintainer of sso.d.o and I confirm what
> Ganneff said.
> 
> Currently not only sso.d.o doesn't do any user database, but it also
> never sees the users' web password or alioth passwords. Authentication
> is delegated to apache's mod_ldap, and I just see what's in
> REMOTE_USER.  A bug in my code, with the current setup, won't leak
> users' passwords no matter what.
> 
> I'm happy to give up maintenance of sso.d.o entirely and I don't mind
> if it gets replaced with whatever makes sense. The current setup is
> the simplest and most secure setup I can think of that can be
> maintained by one person, relies on widespread and well tested code
> (except for the custom certificate generation interface) and can
> federate trivially.
> 
> Note that it's security-sensitive code for which I don't even get code
> review of my commits, with the exception of some recent post-debconf
> review and feedback by paultag. 
> 
> However, if anyone takes sso.d.o over, and then at some point
> disappears, I will be the most affected, as a broken sso.debian.org
> means a broken nm.debian.org and contributors.debian.org and I am the
> person taking care for those, too. In fact, I got stuck with
> maintaining sso.debian.org because the other people involved pulled
> out and I needed to keep nm.debian.org running, so that scenario has
> happened before.  If it happens again, depending on what
> sso.debian.org will have become, I might choose to take down
> nm.debian.org until someone else fixes sso.debian.org, instead of
> taking ownership of something I can't maintain.
> 
> I understand that gitlab has its own user database / registration /
> password change infrastructure; if you want to use that, we can see
> how to make sso.debian.org authenticate to it.
> 
> If instead you prefer to have sso.debian.org handle non-DD
> registration, it is doable: python3-django-registration exists and can
> be used, and gitlab can probably then consume the client certificates.
> 
> Between the two options, I would imagine that the gitlab registration
> code is far more polished and well tested than
> python3-django-registration, so I would suggest to have people
> register on gitlab and then interface sso.debian.org with that.

As expressed during the DC17 DSA and Cloud BoFs, I'm in favour of two
related but orthogonal things:
1 collapsing user management into a single user store (LDAP)**
2 introducing SAML or OIDC IdPs so that we can tie into AWS, Azure, and
  GCP SSO features

1 isn't necessarily a pre-requisite for 2 but the mishmash of processing
we have Guest vs DM vs DD is fugly (let alone Alioth-type users).

** Not necessarily the opinion of all DSA team members.

-- 
Luca Filipozzi



Bug#869908: relax dependency on faraday in gemspec

2017-08-20 Thread Sebastien Badia
On Fri, Aug 18, 2017 at 07:50:44PM (+0530), Pirate Praveen wrote:
> ruby-faraday-middleware 0.12.2-1 just uploaded to unstable.

Thanks!!

Seb


signature.asc
Description: PGP signature


Re: openssl/libssl1 in Debian now blocks offlineimap?

2017-08-20 Thread Wouter Verhelst
On Sun, Aug 20, 2017 at 01:51:16PM +0200, Tollef Fog Heen wrote:
> Arguing for keeping TLS 1.0 support means you're arguing for providing
> users with a default-insecure setup.

No.

Arguing for keeping TLS1.0 *enabled by default* does. But arguing for
*allowing* it to be re-enabled (without requiring a recompile of
OpenSSL), as opposed to the "it's not even compiled in" stuff that we're
getting now, does not.

-- 
Could you people please use IRC like normal people?!?

  -- Amaya Rodrigo Sastre, trying to quiet down the buzz in the DebConf 2008
 Hacklab



Re: New archive key for wheezy generated

2017-08-20 Thread Paul Wise
2017-08-16 5:15 GMT-04:00 bogdan:

> My name is bogdan .i need help.

Please contact Debian user support for help:

https://www.debian.org/support

-- 
bye,
pabs

https://wiki.debian.org/PaulWise



Re: OpenSSL disables TLS 1.0 and 1.1

2017-08-20 Thread Kurt Roeckx
On Mon, Aug 07, 2017 at 08:35:52PM +0200, Kurt Roeckx wrote:
> On Mon, Aug 07, 2017 at 05:22:51PM +0200, Joerg Jaspert wrote:
> > I wonder if there is a middle way that ensures that all new stuff does
> > go TLS1.2 (or later, whenever), but does allow older stuff still to
> > work. Which isnt the case if they are just disabled.
> 
> I could change the default settings to set the minimum supported
> version as TLS 1.2. That is, act like
> SSL_CTX_set_min_proto_version() was called with TLS1_2_VERSION.
> That would allow applications to override this this by calling
> SSL_CTX_set_min_proto_version(). But then those are new
> functions in 1.1.0 and they probably aren't supported by many
> applications.

I have a patch for that at:
https://github.com/openssl/openssl/pull/4128

I might upload this soon. The intention is still to ship Buster
with TLS 1.0 and 1.1 completly disabled.


Kurt



Re: openssl/libssl1 in Debian now blocks offlineimap?

2017-08-20 Thread Michael Meskes
> pretty poor choice.  Providing people with the possibility to fall back
> to less secure solutions sounds like a much better choice, just like

Problem is, where is this possibility right now?

Michael
-- 
Michael Meskes
Michael at Fam-Meskes dot De, Michael at Meskes dot (De|Com|Net|Org)
Meskes at (Debian|Postgresql) dot Org
Jabber: michael at xmpp dot meskes dot org
VfL Borussia! Força Barça! Go SF 49ers! Use Debian GNU/Linux, PostgreSQL



Re: OpenSSL disables TLS 1.0 and 1.1

2017-08-20 Thread Michael Meskes
> I might upload this soon. The intention is still to ship Buster
> with TLS 1.0 and 1.1 completly disabled.

Disabled by configuration or disabled by not compiling it in?

It'd be nice if, after all this discussion, you stated clearly whether
you plan to change something or not. Meaning, will we get a libssl
version that allows older TLS version or do you flatly deny the need for
it and keep libssl as is?

Michael
-- 
Michael Meskes
Michael at Fam-Meskes dot De, Michael at Meskes dot (De|Com|Net|Org)
Meskes at (Debian|Postgresql) dot Org
Jabber: michael at xmpp dot meskes dot org
VfL Borussia! Força Barça! Go SF 49ers! Use Debian GNU/Linux, PostgreSQL



Re: OpenSSL disables TLS 1.0 and 1.1

2017-08-20 Thread Kurt Roeckx
On Sun, Aug 20, 2017 at 09:14:47PM +0200, Michael Meskes wrote:
> > I might upload this soon. The intention is still to ship Buster
> > with TLS 1.0 and 1.1 completly disabled.
> 
> Disabled by configuration or disabled by not compiling it in?

With "completly disabled" I mean at build time.

> It'd be nice if, after all this discussion, you stated clearly whether
> you plan to change something or not.

Isn't that what I just did?


Kurt



Re: OpenSSL disables TLS 1.0 and 1.1

2017-08-20 Thread Michael Meskes
>> It'd be nice if, after all this discussion, you stated clearly whether
>> you plan to change something or not.
> 
> Isn't that what I just did?

No, not exactly. You stated what you want to do in *Buster*, but not
whether it's supposed to stay broken all the way until then. I guess
this email of yours does make it clear, though.

I guess we should then move the discussion from "should libssl support
TLS 1.0/1.1" to "how do we get a system again that works with the
not-so-up-to-date rest of the world".

At least I think our social contract demands we offer a *working*" ssl
setup:
...
We will be guided by the needs of our users and the free software
community. We will place their interests first in our priorities. We
will support the needs of our users for operation in many different
kinds of computing environments.
...

Michael
-- 
Michael Meskes
Michael at Fam-Meskes dot De, Michael at Meskes dot (De|Com|Net|Org)
Meskes at (Debian|Postgresql) dot Org
Jabber: michael at xmpp dot meskes dot org
VfL Borussia! Força Barça! Go SF 49ers! Use Debian GNU/Linux, PostgreSQL



Re: Single Sign On for Debian

2017-08-20 Thread Marcin Kulisz
On 2017-08-20 16:28:05, Luca Filipozzi wrote:
> As expressed during the DC17 DSA and Cloud BoFs, I'm in favour of two
> related but orthogonal things:
> 1 collapsing user management into a single user store (LDAP)**
> 2 introducing SAML or OIDC IdPs so that we can tie into AWS, Azure, and
>   GCP SSO features
> 
> 1 isn't necessarily a pre-requisite for 2 but the mishmash of processing
> we have Guest vs DM vs DD is fugly (let alone Alioth-type users).

Looking at the above from Cloud Team member perspective I'd like to see this
done. I also know that JEB was suggesting something similar some time ago.
I don't think that any of the Cloud Team members or DDs would be against this
solution, but if they would is it should be know, that's why cross post to
debian-cloud (sorry for this) so people can vice their opinion.

At this point in time I'm not capable of helping with backends but I could
help with integrating db.d.o with our AWS account (I'm one of the admins)
however we'll choose to do it.

From experience I also know that not too many non DD or DMs are having access to
those (AWS,GCP) accounts. So focusing on those 2 groups should be sufficient
for start.
-- 

|_|0|_|  |
|_|_|0|  "Panta rei" |
|0|0|0|  kuLa    |

gpg --keyserver pgp.mit.edu --recv-keys 0x686930DD58C338B3
3DF1  A4DF  C732  4688  38BC  F121  6869  30DD  58C3  38B3


signature.asc
Description: PGP signature


Re: openssl/libssl1 in Debian now blocks offlineimap?

2017-08-20 Thread Jonas Smedegaard
Quoting Hanno Rince' Wagner (2017-08-20 22:01:51)
> On Fri, 18 Aug 2017, Tollef Fog Heen wrote:
> 
> > I think you're wrong on this point, having Debian make this change makes
> > it a lot easier for me to go to company management and explain that TLS
> > v1.2 is the only way forward and that we need to spend engineering
> > resources to make sure any users on platforms where support for that is
> > lacking get a proper notification and a chance to move to something
> > newer.  «We need to do this because this change is coming, whether we
> > want it or not.»
> 
> If you need more "firepower" for management: The BSI (german
> governmental organisation for security in information technology) has
> guidelines regarding cryptography, see 
> 
> https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR02102/BSI-TR-02102-2.pdf
> 
> They say in their technical guidelines that TLS 1.1 is not recommended
> anymore and TLS 1.0 is not recommended at all.
> SSLv2 and SSLv3 are not recommended.
> 
> So, if managers want to have somewhere "officially" written that
> TLS1.0 and 1.1 shouldn't be used anymore, this is a guideline I can
> recommend.
> 
> And IMHO we as debian should support all people going for stronger
> encryption by enabling it as good as possible and make it default. If
> someone wants or needs to use older ciphers, he should be able to, but
> it shouldn't be default...

I believe noone in this thread disagree with _recommending_ only TLS 1.2 
and that no services _should_ use anything else.

Question is if Debian _force_ only TLS 1.2 so that no services _can_ use 
anything else.


 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private


signature.asc
Description: signature


Bug#845789: ITP: spymemcached -- simple, asynchronous, single-threaded memcached client written in java

2017-08-20 Thread Christopher Hoskin
Package: wnpp
Followup-For: Bug #845789
Owner: Christopher Hoskin 

Work in progress here:

https://anonscm.debian.org/cgit/pkg-java/spymemcached.git/

Christopher Hoskin



Re: OpenSSL disables TLS 1.0 and 1.1

2017-08-20 Thread Martin Zobel-Helas
Hi, 

On Sun Aug 20, 2017 at 21:54:12 +0200, Michael Meskes wrote:
> >> It'd be nice if, after all this discussion, you stated clearly whether
> >> you plan to change something or not.
> > 
> > Isn't that what I just did?
> 
> No, not exactly. You stated what you want to do in *Buster*, but not
> whether it's supposed to stay broken all the way until then. I guess
> this email of yours does make it clear, though.
> 
> I guess we should then move the discussion from "should libssl support
> TLS 1.0/1.1" to "how do we get a system again that works with the
> not-so-up-to-date rest of the world".
> 
> At least I think our social contract demands we offer a *working*" ssl
> setup:
> ...
> We will be guided by the needs of our users and the free software
> community. We will place their interests first in our priorities. We
> will support the needs of our users for operation in many different
> kinds of computing environments.
> ...

+1

-- 
 Martin Zobel-Helas Debian System Administrator
 Debian & GNU/Linux Developer   Debian Listmaster
 http://about.me/zobel   Debian Webmaster
 GPG Fingerprint:  6B18 5642 8E41 EC89 3D5D  BDBB 53B1 AC6D B11B 627B 



Bug#872763: node-clean-yaml-object

2017-08-20 Thread Bastien ROUCARIES
Package: wnpp
Severity: wishlist
Owner: ro...@debian.org
X-Debbugs-CC: debian-devel@lists.debian.org

* Package name: node-clean-yaml-object
  Version : 0.1.0
  Upstream Author : James Talmage  (github.com/jamestalmage)
* URL : https://github.com/tapjs/clean-yaml-object#readme
* License : Expat
  Programming Lang: JavaScript
  Description : Safe clean of an object prior to serialization

 This module clean up (fille with zero) an object before sending
 to serialisation, thus avoiding to serialize private data.
 This module supports generalisation by allowing ones to specify
 filter function, that support whitelisting.
 .
 Clearing data before serialization is critical from a security
 point of view in order to avoid leaking information.
 .
 Node.js is an event-based server-side JavaScript engine.



salsa.debian.net

2017-08-20 Thread Florian Weimer
I received some key SSH import notices from salsa.debian.net, but I
didn't request anything.

Is this harmless, or is something fishy going on?



Re: salsa.debian.net

2017-08-20 Thread Salvatore Bonaccorso
Hi Florian,

On Mon, Aug 21, 2017 at 06:50:06AM +0200, Florian Weimer wrote:
> I received some key SSH import notices from salsa.debian.net, but I
> didn't request anything.
> 
> Is this harmless, or is something fishy going on?

It looks this is the new collaboration server in replacement to
alioth: https://wiki.debian.org/Salsa .

I don't think there was yet an announcement yet, so maybe the SSH key
import mails were sent out not intentionally yet.

HTH,

Regards,
Salvatore



Bug#872773: ITP: firefox-passff -- pass manager extension for Firefox

2017-08-20 Thread 魏銘廷
Package: wnpp
Severity: wishlist
Owner: =?utf-8?b?WWFvIFdlaSAo6a2P6YqY5bu3KQ==?= 

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

* Package name: passff
  Version : 1.0.0
  Upstream Author : Nathan Wallace 
* URL : http://github.com/passff/passff
* License : GPL-2.0
  Programming Lang: JavaScript
  Description : pass manager extension for Firefox and Chromium

This is a browser extension to pass password manager. The extension
itself uses WebExtension, hence it is cross platform between chromium
and firefox.

This package should be placed under collab-maint for comaintaining.

-BEGIN PGP SIGNATURE-
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=1Zhz
-END PGP SIGNATURE-



Re: salsa.debian.net

2017-08-20 Thread Joerg Jaspert
On 14771 March 1977, Florian Weimer wrote:
> I received some key SSH import notices from salsa.debian.net, but I
> didn't request anything.

> Is this harmless, or is something fishy going on?

Harmless, sorry.

Salvatore guessed right, and the mails had been a mistake at that point.

-- 
bye, Joerg