Re: Call for votes for the Debian Project Leader Election 2005

2005-03-24 Thread Alberto Gonzalez Iniesta
On Sun, Mar 20, 2005 at 05:24:15PM -0600, Debian Project Secretary wrote:
> Hi,
> 
>FIRST CALL FOR VOTES FOR THE DEBIAN PROJECT LEADER ELECTION 2005
>=  === = === === == === ==  
> 
>  Votinge period starts 00:00:01 UTC on March 21st, 2005.
>  Votes must be received by 23:59:59 UTC on April 10th, 2005.
> 
> This vote is being conducted as required by the Debian Constitution.
> You may see the constitution at http://www.debian.org/devel/constitution.
> For voting questions contact [EMAIL PROTECTED]
> 
> HOW TO VOTE
> 
> Do not erase anything between the lines below and do not change the
> choice names.
> 
> In the brackets next to your preferred choice, place a 1. Place a 2 in
> the brackets next to your next choice. Continue till you reach your
> last choice. Do not enter a number smaller than 1 or larger than 7.
> You may skip numbers.  You may rank options equally (as long as all
> choices X you make fall in the range 1<= X <= 7).
> 
> To vote "no, no matter what" rank "None Of The Above" as more
> desirable than the unacceptable choices, or You may rank the "None Of
> The Above" choice, and leave choices you consider unacceptable
> blank. Unranked choices are considered equally the least desired
> choices, and ranked below all ranked choices. (Note: if the None Of
> The Above choice is unranked, then it is equal to all other unranked
> choices, if any -- no special consideration is given to the None Of
> The Above choice by the voting software).
> 
> Then mail the ballot to: [EMAIL PROTECTED] 
> Don't worry about spacing of the columns or any quote characters
> (">") that your reply inserts. NOTE: The vote must be GPG signed
> (or PGP signed) with your key that is in the Debian keyring. 
> 
> - - -=-=-=-=-=- Don't Delete Anything Between These Lines =-=-=-=-=-=-=-=-
> 46348448-74a5-40ae-a651-49704435ae8c
> [ 3 ] Choice 1: Jonathan Walther 
> [   ] Choice 2: Matthew Garrett 
> [ 2 ] Choice 3: Branden Robinson 
> [   ] Choice 4: Anthony Towns 
> [   ] Choice 5: Angus Lees 
> [ 4 ] Choice 6: Andreas Schuldei
> [ 1 ] Choice 7: None Of The Above
> - - -=-=-=-=-=- Don't Delete Anything Between These Lines =-=-=-=-=-=-=-=-
> 
> ----------
> 
> The responses to a valid vote shall be signed by the vote key created
> for this vote. The public key for the vote, signed by the Project
> secretary, is appended below.



-- 
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y software libre
Encrypted mail preferred| http://inittab.org

Key fingerprint = 9782 04E7 2B75 405C F5E9  0C81 C514 AF8E 4BA4 01C3


signature.asc
Description: Digital signature


Bug#302002: ITP: libapache-mod-dosevasive -- evasive maneuvers module to try avoiding DoS or DDoS attacks

2005-03-29 Thread Alberto Gonzalez Iniesta
Package: wnpp
Severity: wishlist
Owner: Alberto Gonzalez Iniesta <[EMAIL PROTECTED]>

* Package name: libapache-mod-dosevasive
  Version : 1.10
  Upstream Author : Jonathan A. Zdziarski <[EMAIL PROTECTED]>
* URL : http://www.nuclearelephant.com/projects/dosevasive/
* License : GPL
  Description : evasive maneuvers module to try avoiding DoS or DDoS attacks

mod_dosevasive is an evasive maneuvers module for Apache to provide
evasive action in the event of an HTTP DoS or DDoS attack or brute force
attack. It is also designed to be a detection and network management
tool, and can be easily configured to talk to ipchains, firewalls,
routers, and etcetera. mod_dosevasive presently reports abuses via email
and syslog facilities.

There will be packages for Apache 1.3.x and 2.x


-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.10
Locale: LANG=C, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#487431: ITP: libapache-mod-security2 -- Tighten web applications security for Apache

2008-06-21 Thread Alberto Gonzalez Iniesta
Package: wnpp
Severity: wishlist
Owner: Alberto Gonzalez Iniesta <[EMAIL PROTECTED]>

* Package name: libapache-mod-security2
  Version : 2.5.x
  Upstream Author : Breach Security, Inc. (http://www.breach.com/)
* URL : http://www.modsecurity.org/
* License : GPLv2
  Programming Lang: C
  Description : Tighten web applications security for Apache

 Mod_security is an Apache 1.x/2.x module whose purpose is to tighten the Web
 application security. Effectively, it is an intrusion detection and prevention
 system for the web server.
 .
 At the moment its main features are:
 * Audit log; store full request details in a separate file, including POST
   payloads.
 * Request filtering; incoming requests can be analysed and offensive requests
   can be rejected (or simply logged, if that is what you want). This feature
   can be used to prevent many types of attacks (e.g. XSS attacks, SQL
   injection, ...) and even allow you to run insecure applications on your
   servers (if you have no other choice, of course).


**
** To: debian-legal **
**

I'm Cc'ing debian-legal because this package was removed from Debian [1]
due to GPLv2 and Apache licences not being compatible [2][3].
After some threads in upstream's mailing list, great interest from users
and some work from upstream [4], they (upstream) wrote a exception (draft)
in order to get ModSecurity back to Debian [5]. 

So upstream is basically waiting the green light from -legal on this
draft so the new release already includes it.

I'm sending this ITP because I understand this exception should solve
the problem and got positive feedback from other DDs. So please, if you
see something wrong with this talk now or STFU forever :)

Please Cc: me and Ivan since we're not subscribed.

Thanks,

Alberto


[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=313615
[2] http://www.gnu.org/philosophy/license-list.html#GPLIncompatibleLicenses
[3] http://www.thinkingstone.com/about/legal/licensing-clarifications.html
[4] http://lists.debian.org/debian-legal/2008/01/msg00172.html
[5] http://blog.modsecurity.org/2008/06/modsecurity-lic.html


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.25.6 (PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

-- 
Alberto Gonzalez Iniesta   | They that give up essential liberty
agi@(agi.as|debian.org)| to obtain a little temporary safety
Encrypted mail preferred   | deserve neither liberty nor safety.
   -- Benjamin Franklin
Key fingerprint = 9782 04E7 2B75 405C F5E9  0C81 C514 AF8E 4BA4 01C3



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: ideas about how to package something

2001-09-06 Thread Alberto Gonzalez Iniesta
On Wed, Sep 05, 2001 at 10:50:56PM -0400, Brandon L. Griffith wrote:
> Should I package each plugin seperately or make one large
> openverse-plugins.deb? I can see pros and cons of each method, such as the
> "dict" plugin requiring the dict program which in turn has its dependencies
> and such. If I made one large deb then it would have alot of dependencies. But
> if I made several small ones then there would be no problem there, except that
> the entire deb for some of the smaller ones would be just a few kb in size.
> Could someone else out there give me their opinion on this?
> thanks

Hi,

As you already know, I'm quite new to Debian ;-) but here's my opinion 
from what I've learned/seen here. I'll try to group plugins by 
requirements (ie. all those needing "dict" in a openverse-dict-plugins).
That way you could have the simplest plugins in openverse-base-plugins
(or maybe a better name than 'base') and those requiring more
dependencies in separate packages.

Just my .02 Euro


-- 
Alberto Gonzalez Iniesta
[EMAIL PROTECTED]
 
Give Me Liberty or Give Me Death (Patrick Henry)




Seeking help with OpenVPN scripts and systemd

2014-09-09 Thread Alberto Gonzalez Iniesta
AltSubject: For those who care about OpenVPN

Dear fellow developers,

This is a cry for help. I've been trying to support systemd in OpenVPN for some
time, but the results are not satisfactory. I'd like to keep the current (SysV)
behaviour in systemd but it's becoming quite an annoying task.

I'd love to hear recommendations, receive patches or any other help with this.
Let me explain what the SysV init script did, so you can figure out what I'd
like to achieve. If you aren't interested in the task you may skip the rest of
this mail.

What was working?
-

First of all, openvpn in Debian is able to run several VPN daemons. Depending
on the value of the configuration variable AUTOSTART (in /etc/default/openvpn):
- all -> A daemon for each of the configuration files found in /etc/openvpn
- none -> Do not manage any VPN (they can be started manually or through a
  directive in /etc/network/interfaces
- A list of the VPNs you want automatically managed (i.e. AUTOSTART="work
  home"). The rest can be managed manually.

In order to be able to control individual VPNs the init.d script accepts a
second argument (after start/stop/...) with the name of the VPN to manage. I
know this was a hack, but it worked like a charm. This is no longer possible
with systemd.

stop, reload, soft-restart and cond-restart will only affect running VPNs.
The last one is specially important in upgrades, when the currently running
daemons have to restart. That includes those VPNs that are managed
automatically (in AUTOSTART) *and* those started manually or through a
network/interfaces directive. Whereas restart will only affect those managed
automatically unless a VPN name is specified.

In addition to the init.d script, there are two script in
/etc/network/if-(up|down).d/openvpn that allow for VPNs to be managed when
interfaces are brought up or down. So you may have AUTOSTART=none, or
AUTOSTART="home office", and then enable "work" tunnel when only when using a
specific network interface.

Where are we now?
-

The latest version of openvpn's package (in experimental) includes two service
files for systemd. One instantiated (openvpn@.service) allows the control of
single VPNs, piece of cake.

The main issue is with the other one, openvpn.service, that tries to replace
the old init.d script and all its features. It is, currently, calling a helper
script that (tries to) mimic(s) the former behaviour.

First of all, the script can only be called with start, stop or reload
arguments. So no distinction can be made between a restart and a
stop-then-start. So there's no way (i.e.  on an upgrade) to restart all VPNs
(those in AUTOSTART *and* those manually controlled), since "start" and "stop"
should only manage those in AUTOSTART.

Another problem is the package upgrade to systemd in a running system, since
the VPNs started with the current init.d script are not recognized by
openvpn@NAME.service. So when upgrading the package from the
non-systemd-enabled package (< 2.3.2-7) to the package with the service files,
we end up with two active VPNs (the one that was running, and one started by
systemd) for each AUTOSTARTed configuration.

If you know systemd and would like to help with this please Cc: me (since I'm
not subscribed to -devel) or mail me directly. You may find the current git
repo for openvpn in Debian at: git.debian.org/git/collab-maint/openvpn.git

Thanks,

Alberto

-- 
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
mailto/sip: a...@inittab.org | en GNU/Linux y software libre
Encrypted mail preferred| http://inittab.com

Key fingerprint = 5347 CBD8 3E30 A9EB 4D7D  4BF2 009B 3375 6B9A AA55


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140909155120.ga18...@bin.inittab.org



Re: Seeking help with OpenVPN scripts and systemd

2014-09-11 Thread Alberto Gonzalez Iniesta
On Wed, Sep 10, 2014 at 02:01:00PM +0200, Ondřej Surý wrote:
> Alberto,
> 
> I think you might be too deep in sysvinit paradigms how we did (hack)
> things before.

> I personally think that mapping the functionality 1:1 is a wrong
> approach because you will end up in some impossible scenario in the end
> anyway.
> 

Hi Ondřej,

Thanks for the "new" vision.

> I think the better way how to convert openvpn to systemd would be:
> 
> to convert all AUTOSTART= VPNs to openvpn@ enabled instances and all
> other to disabled openvpn@ instances at upgrade time. I guess there
> might be a need to some more subtle tweaking, but I think you can
> autoconvert most of the old configuration this way.
[snip]
> I don't think it's needed to support "I drop new configuration" and it
> get's picked automatically, but if you think it's needed, I think you
> can prepare openvpn.script that would:
> 
> a) make a note which openvpn@ instances are autoconfigured (probably by
> having openvpn-auto@.service)
> b) walk through all AUTOSTART configurations and instantiate
> openvpn-auto@.service for each new configuration (not already managed by
> openvpn@.service
> c) when configuration disappears remove the auto-enabled
> openvpn-auto@.service

Yep, that sounds like a plan.

> In that way you will have:
> 
> openvpn@.service # manually managed
> openvpn-auto@.service # automanaged
> openvpn.service # service script to manage opevpn-auto@.service(s)
> 
> How does that sounds?

Sounds good. Thanks,

Alberto

-- 
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
mailto/sip: a...@inittab.org | en GNU/Linux y software libre
Encrypted mail preferred| http://inittab.com

Key fingerprint = 5347 CBD8 3E30 A9EB 4D7D  4BF2 009B 3375 6B9A AA55


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140911094357.gu18...@bin.inittab.org



Bug#693070: ITP: easy-rsa -- Simple shell based CA utility

2012-11-12 Thread Alberto Gonzalez Iniesta
Package: wnpp
Severity: wishlist
Owner: Alberto Gonzalez Iniesta 

* Package name: easy-rsa
  Version : 2.2.0
  Upstream Author : OpenVPN Technologies, Inc. 
* URL : https://community.openvpn.net/openvpn
* License : GPL-2
  Programming Lang: Shell
  Description : Simple shell based CA utility

This package eases the creation of certificates, for example for
openvpn clients.
.
This was formerly part of the openvpn package.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121112170334.ga15...@lib.inittab.org



Bug#620252: ITP: modsecurity-crs -- modsecurity's Core Rule Set

2011-03-31 Thread Alberto Gonzalez Iniesta
Package: wnpp
Severity: wishlist
Owner: Alberto Gonzalez Iniesta 

* Package name: modsecurity-crs
  Version : 2.1.2
  Upstream Author : Trustwave 
* URL : http://www.modsecurity.org/
* License : GPL-2
  Programming Lang: N/A
  Description : modsecurity's Core Rule Set

modsecurity provides critical protections against attacks across most
every web architecture. CRS is based on generic rules which focus on
attack payload identification in order to provide protection from zero
day and unknown vulnerabilities often found in web applications, which
are in most cases custom coded.
.
Core Rules use the following techniques: HTTP request validation, HTTP
protocol anomalies, Global constraints, HTTP Usage policy, Malicious
client software detection, Generic Attack Detection (SQL injection,
Cross Site Scripting, OS Command Injection, ColdFusion, PHP and ASP
injection, etc.), Trojans & Backdoors Detection, Error Detection, XML
Protection, Search Engine Monitoring.




-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110331150630.ga14...@lib.inittab.org



Bug#909025: ITP: libmodsecurity3 -- ModSecurity v3 library component

2018-09-17 Thread Alberto Gonzalez Iniesta
Package: wnpp
Severity: wishlist
Owner: Alberto Gonzalez Iniesta 

* Package name: libmodsecurity3
  Version : 3.0.2
  Upstream Author : Trustwave Holdings, Inc.
* URL : https://www.modsecurity.org/
* License : Apache-2.0
  Programming Lang: C++
  Description : ModSecurity v3 library component

 Libmodsecurity is one component of the ModSecurity v3 project. The library
 codebase serves as an interface to ModSecurity Connectors taking in web
 traffic and applying traditional ModSecurity processing. In general, it
 provides the capability to load/interpret rules written in the ModSecurity
 SecRules format and apply them to HTTP content provided by your application
 via Connectors.



Re: Debian Project Leader election 2017: First call for votes

2017-04-08 Thread Alberto Gonzalez Iniesta
On Sun, Apr 02, 2017 at 01:42:06AM +0200, Debian Project Secretary - Kurt 
Roeckx wrote:
> 
> 
> - - -=-=-=-=-=- Don't Delete Anything Between These Lines =-=-=-=-=-=-=-=-
> 4bfd7999-2252-4a5f-8f4e-e10ea7b8fdf8
> [ 2 ] Choice 1: Mehdi Dogguy
> [ 1 ] Choice 2: Chris Lamb
> [   ] Choice 3: None Of The Above
> - - -=-=-=-=-=- Don't Delete Anything Between These Lines =-=-=-=-=-=-=-=-
> 
> --
> 
> The responses to a valid vote shall be signed by the vote key created
> for this vote. The public key for the vote, signed by the Project
> secretary, is appended below.
> 
> -BEGIN PGP PUBLIC KEY BLOCK-
> 
> mQINBFjf/WsBEADDFHtoejre4AsAH29go+PPL1/W2pGjVii5pbjyDnzsRJ72cWes
> oZ0RVPjEc8zEcD4oKODoFoZ+YFxd89Xl44zI7Y3KV4popAjWVbdEwnSao7dFLsim
> 6c+HXAQmPX8ualHBM3CdP5QGUP5cROs6xIUrRSFIVvyLwP8N9LiVwupGj1NiOE73
> /f9/OSxjm05XQT10fy44q3hag+44Xpxn6JmybAesAymvbo2IIB7BmR3ekNx1NUSl
> I2DUmRHB7rgKXSc8KpxccXi0U+2luQnRAaIBjKM6g+suoOS+Y+nXFLGotZWoIlGg
> 94dykBaX987g6Al9P5KcwUHn8P9uQ589fMrapl7ZdRwXdjUEA7qZ9IZq6hsf/E50
> hjAVk+dNs6UPwKBa+uuSmJPuI1Yvsj0SM55jN6FK2d8MBFHm8BXkIhHpTT7gvbeC
> i8bnKzH9KFlKnGF3nWBjUljyHYiB9f+I8n0gXLElbLn20+n9uZQ+uDCvowjcwLfF
> wb5G6Gbv1UkWtrNbNPtMAvFeUauy9APHmYba3V8uh9PdAPauqnqCwdLbjaeI0s8G
> InwPRjmoRVsM+be35mo7sR42h8dRocbUJosQrcjjeYoyJSheoxKq3E2kUTxNZfjS
> Jn+huk3yPa3iUtl/vzS7lSX/zQ8bmb/8lCtWMYn91koM/RicJvg/SE5vZQARAQAB
> tCpEUEwgdm90ZSAyMDE3IDxsZWFkZXIyMDE3QHZvdGUuZGViaWFuLm9yZz6JAj4E
> EwECACgFAljf/WsCGwMFCQAVGAAGCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJ
> EDYSpgypEBP4MWcP/0BltDmP/z+mq27bbRIO7CLG5LN1wXbkQ4+aUIuo+Sl3oDRc
> drYN7zNzpxFUabYIZYpI1uGrM0egzRgMaYWd0busKMiq680WhcQvs2+MCBxZdTHE
> 4MU4HRvm9+4SGAauSdxIwhK6ueglTLc/qaXBnLgyBsJUbFWcTqeh9ojbx4tT785E
> Mi3sFS76Wr+cCBgMrDFjuR2I1v0gkEB3keqBH5AFakSZAXtjMeQOAP9qcmWOQuYl
> pJpmtR3j8QYHnDdHlolkFhl+AhyC2STIjcQBnbG4xzMKnFDZUGSknn98YsY57t01
> mm6JTYhS41eFV3dT1DTY3DxQ5c3cpYG2ocB79/OADanTkYf80aDXNy+J8PKYeIMw
> 0qfokH8mUcU1Kr78xMCZDdcRF0gVJiu0xG5+WNu8EvpiRSKi6CLKTA82mDKIUVb4
> P2xQgYyL409hiu1dhTQV5Zf5CxNuy/D1Xp3AR4Y/Hcj+LmIoCfs39m3TbtyElGGZ
> oZWR+LcdEyMnSFJnXbjPQRigxEgGC3NVKHyC3AoIB+EK+L8m3pOvXb+KE2bySUtu
> c0HhaR4EoOlTJr6neJ4bivxT2yaG87o+0MpGbgGxbE/82y0fy0T/qrdQsx+DrMfX
> JwnlimqGOcbKYLqm6sFy6AvG2h2ichz0bR90ljllIJiRsE6cxgvTbs9hsCVviQIz
> BBABCgAdFiEE5eUlYN2RxVbdvaXQIGTFNkHCXl0FAljf/cgACgkQIGTFNkHCXl0s
> hA/+NZzRXWUgGiKyCvKw6XeUWyPYFiJrJe1JGRYHSCoh+6dHzlldscyM1PfWy8yh
> ivV5pXKikTsmWG9ki+zXNL+mpFmmrXh+ELID6kX9oWnrULVgjxoVIPZaZhNqjnWr
> xwVrHyFrB8pywkWp7L7DdwKe1oRyxSsGHErQ8kKEq7P5dBp4eqVGuTOvaD0eJcMY
> C1ljdBNMUrR29ceHsUi18z+f7f8LWQ0Xj761C2Y9vijPfMAYbAxmFX3TA34jXkUN
> ZqkyTg6dXuv+QbLCrPHoWqdcb00ixwR/g8n8Qs9/r4I3x8TNW6x4uIjqewA3o/4d
> eyF8ATEkSSlqVeTHbEs9JMceNhjK460LQ5MyIZNW9TH0FjPrY5zjvIjbP/SirCjh
> s9sz9zpj0QGSEDY12H/uloJ8uKKlO6l7J65koFPe7feIJFDEANc2zn7BH+r6/LLu
> mSQ5wiQCInbsEVhxB1xsLqasv1OS9CGebs73liL5Kj66H/IP8R5hPK+rHhOnNPnD
> OkDY5/55PYgKPdrJJ1c/rul4/CfvXGQiiJInqXPoqkP13s9ywtGPYdVRIcIRKgM7
> zjPNdIQseA7hd0P+zyaqSWa93DHEGOG+cDhdyFYvRn2DKXhlzbIfOZrwInRg2PRA
> niCd3NkETmPh4d/NPSuIUIKDXH3UKbzEIFBNdnC76FdldnW5Ag0EWN/9awEQAMTj
> hcYUmH7qCI/69Bz9E7rhiDFXEORY+/58wEyPC7eofNVxDDZuLwXXMmtqaIBN8xMF
> ZOCk94MouORJkO2ENJhVmW3d+5u2OWsRPd+Axlk3Hpa6H20BJ/KscvOdq22Eh+VB
> nFBWCJ2v/TuWeQC92hdGNSAnl22Ng1CL9j5Z/H6gVscaFRck5xwJMyILUigNNdjD
> hJzFD30i6596rxRl8fzMoEaBb+jxrtAoYU+7mya7wRjLirqhyp+Zrit9Hl+VCAu2
> O+TPt72hMG96tdeZWdJkKTkBcNpZKEtQOKxWsIvu1Oxch6UbU/LJI5xBeGFHBp6D
> UGB196zkOzZz/JOjIdfPs8pxLO2mGmCh2UnpSpjLkzOWaqY8GXjx9SazvS99dDAJ
> DsOMEmsVK4YzRlQXDDQQYybxGbrWbPSwWQI9rct7uEwcLBvuimiTp1UP+KSvqWGb
> Ozbh/jFrtCg+xkRmziDcgVFNY9YIf2kUDikPNnx4kJPNiMg0jkWpDqL/qJBlXGgL
> vBrzB7UN/pRGfQoq05VtkbS8UGkG9yDy0OI0FATMbTqf2XRAJt0PAzxeKWWXJ0nR
> L3Nqtpqw2Qj632b4K88f0IG+XzNNyByUdvJcgLL56ADMkZMKkcrZfTOiZzM3vkAu
> QanmiID+aMCGV109i/y6oVX+V67WF/E/Ix915iifABEBAAGJAiUEGAECAA8FAljf
> /WsCGwwFCQAVGAAACgkQNhKmDKkQE/iE8g/+NqJPPmwVLOgPtiqEsz4u9ckvvuEf
> wjg0Ds0JsTxj2c1x5HoBEnkzVDiTzko8mij6k7he8xYR9IWatMUCkeX9q9dLSe9s
> s16CEwft/NbH6BMxxLdKgkTbqDpkCw8mofMqw4NU6dfcU33cTXRIOpt9tU+Y7XRr
> taXHNBL703rn0kFSajQzYU8xFJoDeDuBkg2xgu+tLe4emXi6j3TT6O4nlY0CGBwM
> ODPFJYdqVaAbAfBfEYtDbiSu1FL8/h2elEVdAtXW62h2Yi2xVw+W4QT6qqkKy7uG
> 740fyno4uiSVPBxKeX9Kjp3oUZK3pVw1LmuB0CccEgl6lctSW+3X8mNG8zbIiVEo
> 9S57NOg8KhFDQKYx6MnvHn5+SsJeVvtuG8ViQmuf3e56HaR/xRQO40KixDPgMYOy
> 4UCnWtIYMEjBznCLKMhEzwQrcdmwBTqUilxRLQMscYXPqQzAHLz5iJYd0qLNYnNn
> 4lpCGG/8nn+6tt43oGSzhnD9+xoZKMNwxP/k7rrfLBbERk+YZIte1PV8Tg6B4ekt
> 6lZndQ6e8PmhWo24K8mNU8E1cOlCwW1uqpVApIxSgy5BrZi6Ty5bBto4/pkBlCzB
> h/gZMNDb5Swvv//7GU8rTBfm3GUuYx4jh7nWmTzHtBVnczcMfTrjwfXIpGK0bZH8
> PskH3di8dUPObdQ=
> =SKnD
> -END PGP PUBLIC KEY BLOCK-
> 



-- 
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
mailto/sip: a...@inittab.org | en GNU/Linux y software libre
Encrypted mail preferred| http://inittab.com

Key fingerprint = 5347 CBD8 3E30 A9EB 4D7D  4BF2 009B 3375 6B9A AA55


signature.asc
Description: PGP signature