Re: Call for votes for the Debian Project Leader Election 2005
On Sun, Mar 20, 2005 at 05:24:15PM -0600, Debian Project Secretary wrote: > Hi, > >FIRST CALL FOR VOTES FOR THE DEBIAN PROJECT LEADER ELECTION 2005 >= === = === === == === == > > Votinge period starts 00:00:01 UTC on March 21st, 2005. > Votes must be received by 23:59:59 UTC on April 10th, 2005. > > This vote is being conducted as required by the Debian Constitution. > You may see the constitution at http://www.debian.org/devel/constitution. > For voting questions contact [EMAIL PROTECTED] > > HOW TO VOTE > > Do not erase anything between the lines below and do not change the > choice names. > > In the brackets next to your preferred choice, place a 1. Place a 2 in > the brackets next to your next choice. Continue till you reach your > last choice. Do not enter a number smaller than 1 or larger than 7. > You may skip numbers. You may rank options equally (as long as all > choices X you make fall in the range 1<= X <= 7). > > To vote "no, no matter what" rank "None Of The Above" as more > desirable than the unacceptable choices, or You may rank the "None Of > The Above" choice, and leave choices you consider unacceptable > blank. Unranked choices are considered equally the least desired > choices, and ranked below all ranked choices. (Note: if the None Of > The Above choice is unranked, then it is equal to all other unranked > choices, if any -- no special consideration is given to the None Of > The Above choice by the voting software). > > Then mail the ballot to: [EMAIL PROTECTED] > Don't worry about spacing of the columns or any quote characters > (">") that your reply inserts. NOTE: The vote must be GPG signed > (or PGP signed) with your key that is in the Debian keyring. > > - - -=-=-=-=-=- Don't Delete Anything Between These Lines =-=-=-=-=-=-=-=- > 46348448-74a5-40ae-a651-49704435ae8c > [ 3 ] Choice 1: Jonathan Walther > [ ] Choice 2: Matthew Garrett > [ 2 ] Choice 3: Branden Robinson > [ ] Choice 4: Anthony Towns > [ ] Choice 5: Angus Lees > [ 4 ] Choice 6: Andreas Schuldei > [ 1 ] Choice 7: None Of The Above > - - -=-=-=-=-=- Don't Delete Anything Between These Lines =-=-=-=-=-=-=-=- > > ---------- > > The responses to a valid vote shall be signed by the vote key created > for this vote. The public key for the vote, signed by the Project > secretary, is appended below. -- Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico agi@(inittab.org|debian.org)| en GNU/Linux y software libre Encrypted mail preferred| http://inittab.org Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3 signature.asc Description: Digital signature
Bug#302002: ITP: libapache-mod-dosevasive -- evasive maneuvers module to try avoiding DoS or DDoS attacks
Package: wnpp Severity: wishlist Owner: Alberto Gonzalez Iniesta <[EMAIL PROTECTED]> * Package name: libapache-mod-dosevasive Version : 1.10 Upstream Author : Jonathan A. Zdziarski <[EMAIL PROTECTED]> * URL : http://www.nuclearelephant.com/projects/dosevasive/ * License : GPL Description : evasive maneuvers module to try avoiding DoS or DDoS attacks mod_dosevasive is an evasive maneuvers module for Apache to provide evasive action in the event of an HTTP DoS or DDoS attack or brute force attack. It is also designed to be a detection and network management tool, and can be easily configured to talk to ipchains, firewalls, routers, and etcetera. mod_dosevasive presently reports abuses via email and syslog facilities. There will be packages for Apache 1.3.x and 2.x -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.10 Locale: LANG=C, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#487431: ITP: libapache-mod-security2 -- Tighten web applications security for Apache
Package: wnpp Severity: wishlist Owner: Alberto Gonzalez Iniesta <[EMAIL PROTECTED]> * Package name: libapache-mod-security2 Version : 2.5.x Upstream Author : Breach Security, Inc. (http://www.breach.com/) * URL : http://www.modsecurity.org/ * License : GPLv2 Programming Lang: C Description : Tighten web applications security for Apache Mod_security is an Apache 1.x/2.x module whose purpose is to tighten the Web application security. Effectively, it is an intrusion detection and prevention system for the web server. . At the moment its main features are: * Audit log; store full request details in a separate file, including POST payloads. * Request filtering; incoming requests can be analysed and offensive requests can be rejected (or simply logged, if that is what you want). This feature can be used to prevent many types of attacks (e.g. XSS attacks, SQL injection, ...) and even allow you to run insecure applications on your servers (if you have no other choice, of course). ** ** To: debian-legal ** ** I'm Cc'ing debian-legal because this package was removed from Debian [1] due to GPLv2 and Apache licences not being compatible [2][3]. After some threads in upstream's mailing list, great interest from users and some work from upstream [4], they (upstream) wrote a exception (draft) in order to get ModSecurity back to Debian [5]. So upstream is basically waiting the green light from -legal on this draft so the new release already includes it. I'm sending this ITP because I understand this exception should solve the problem and got positive feedback from other DDs. So please, if you see something wrong with this talk now or STFU forever :) Please Cc: me and Ivan since we're not subscribed. Thanks, Alberto [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=313615 [2] http://www.gnu.org/philosophy/license-list.html#GPLIncompatibleLicenses [3] http://www.thinkingstone.com/about/legal/licensing-clarifications.html [4] http://lists.debian.org/debian-legal/2008/01/msg00172.html [5] http://blog.modsecurity.org/2008/06/modsecurity-lic.html -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.25.6 (PREEMPT) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash -- Alberto Gonzalez Iniesta | They that give up essential liberty agi@(agi.as|debian.org)| to obtain a little temporary safety Encrypted mail preferred | deserve neither liberty nor safety. -- Benjamin Franklin Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: ideas about how to package something
On Wed, Sep 05, 2001 at 10:50:56PM -0400, Brandon L. Griffith wrote: > Should I package each plugin seperately or make one large > openverse-plugins.deb? I can see pros and cons of each method, such as the > "dict" plugin requiring the dict program which in turn has its dependencies > and such. If I made one large deb then it would have alot of dependencies. But > if I made several small ones then there would be no problem there, except that > the entire deb for some of the smaller ones would be just a few kb in size. > Could someone else out there give me their opinion on this? > thanks Hi, As you already know, I'm quite new to Debian ;-) but here's my opinion from what I've learned/seen here. I'll try to group plugins by requirements (ie. all those needing "dict" in a openverse-dict-plugins). That way you could have the simplest plugins in openverse-base-plugins (or maybe a better name than 'base') and those requiring more dependencies in separate packages. Just my .02 Euro -- Alberto Gonzalez Iniesta [EMAIL PROTECTED] Give Me Liberty or Give Me Death (Patrick Henry)
Seeking help with OpenVPN scripts and systemd
AltSubject: For those who care about OpenVPN Dear fellow developers, This is a cry for help. I've been trying to support systemd in OpenVPN for some time, but the results are not satisfactory. I'd like to keep the current (SysV) behaviour in systemd but it's becoming quite an annoying task. I'd love to hear recommendations, receive patches or any other help with this. Let me explain what the SysV init script did, so you can figure out what I'd like to achieve. If you aren't interested in the task you may skip the rest of this mail. What was working? - First of all, openvpn in Debian is able to run several VPN daemons. Depending on the value of the configuration variable AUTOSTART (in /etc/default/openvpn): - all -> A daemon for each of the configuration files found in /etc/openvpn - none -> Do not manage any VPN (they can be started manually or through a directive in /etc/network/interfaces - A list of the VPNs you want automatically managed (i.e. AUTOSTART="work home"). The rest can be managed manually. In order to be able to control individual VPNs the init.d script accepts a second argument (after start/stop/...) with the name of the VPN to manage. I know this was a hack, but it worked like a charm. This is no longer possible with systemd. stop, reload, soft-restart and cond-restart will only affect running VPNs. The last one is specially important in upgrades, when the currently running daemons have to restart. That includes those VPNs that are managed automatically (in AUTOSTART) *and* those started manually or through a network/interfaces directive. Whereas restart will only affect those managed automatically unless a VPN name is specified. In addition to the init.d script, there are two script in /etc/network/if-(up|down).d/openvpn that allow for VPNs to be managed when interfaces are brought up or down. So you may have AUTOSTART=none, or AUTOSTART="home office", and then enable "work" tunnel when only when using a specific network interface. Where are we now? - The latest version of openvpn's package (in experimental) includes two service files for systemd. One instantiated (openvpn@.service) allows the control of single VPNs, piece of cake. The main issue is with the other one, openvpn.service, that tries to replace the old init.d script and all its features. It is, currently, calling a helper script that (tries to) mimic(s) the former behaviour. First of all, the script can only be called with start, stop or reload arguments. So no distinction can be made between a restart and a stop-then-start. So there's no way (i.e. on an upgrade) to restart all VPNs (those in AUTOSTART *and* those manually controlled), since "start" and "stop" should only manage those in AUTOSTART. Another problem is the package upgrade to systemd in a running system, since the VPNs started with the current init.d script are not recognized by openvpn@NAME.service. So when upgrading the package from the non-systemd-enabled package (< 2.3.2-7) to the package with the service files, we end up with two active VPNs (the one that was running, and one started by systemd) for each AUTOSTARTed configuration. If you know systemd and would like to help with this please Cc: me (since I'm not subscribed to -devel) or mail me directly. You may find the current git repo for openvpn in Debian at: git.debian.org/git/collab-maint/openvpn.git Thanks, Alberto -- Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico mailto/sip: a...@inittab.org | en GNU/Linux y software libre Encrypted mail preferred| http://inittab.com Key fingerprint = 5347 CBD8 3E30 A9EB 4D7D 4BF2 009B 3375 6B9A AA55 -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20140909155120.ga18...@bin.inittab.org
Re: Seeking help with OpenVPN scripts and systemd
On Wed, Sep 10, 2014 at 02:01:00PM +0200, Ondřej Surý wrote: > Alberto, > > I think you might be too deep in sysvinit paradigms how we did (hack) > things before. > I personally think that mapping the functionality 1:1 is a wrong > approach because you will end up in some impossible scenario in the end > anyway. > Hi Ondřej, Thanks for the "new" vision. > I think the better way how to convert openvpn to systemd would be: > > to convert all AUTOSTART= VPNs to openvpn@ enabled instances and all > other to disabled openvpn@ instances at upgrade time. I guess there > might be a need to some more subtle tweaking, but I think you can > autoconvert most of the old configuration this way. [snip] > I don't think it's needed to support "I drop new configuration" and it > get's picked automatically, but if you think it's needed, I think you > can prepare openvpn.script that would: > > a) make a note which openvpn@ instances are autoconfigured (probably by > having openvpn-auto@.service) > b) walk through all AUTOSTART configurations and instantiate > openvpn-auto@.service for each new configuration (not already managed by > openvpn@.service > c) when configuration disappears remove the auto-enabled > openvpn-auto@.service Yep, that sounds like a plan. > In that way you will have: > > openvpn@.service # manually managed > openvpn-auto@.service # automanaged > openvpn.service # service script to manage opevpn-auto@.service(s) > > How does that sounds? Sounds good. Thanks, Alberto -- Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico mailto/sip: a...@inittab.org | en GNU/Linux y software libre Encrypted mail preferred| http://inittab.com Key fingerprint = 5347 CBD8 3E30 A9EB 4D7D 4BF2 009B 3375 6B9A AA55 -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20140911094357.gu18...@bin.inittab.org
Bug#693070: ITP: easy-rsa -- Simple shell based CA utility
Package: wnpp Severity: wishlist Owner: Alberto Gonzalez Iniesta * Package name: easy-rsa Version : 2.2.0 Upstream Author : OpenVPN Technologies, Inc. * URL : https://community.openvpn.net/openvpn * License : GPL-2 Programming Lang: Shell Description : Simple shell based CA utility This package eases the creation of certificates, for example for openvpn clients. . This was formerly part of the openvpn package. -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20121112170334.ga15...@lib.inittab.org
Bug#620252: ITP: modsecurity-crs -- modsecurity's Core Rule Set
Package: wnpp Severity: wishlist Owner: Alberto Gonzalez Iniesta * Package name: modsecurity-crs Version : 2.1.2 Upstream Author : Trustwave * URL : http://www.modsecurity.org/ * License : GPL-2 Programming Lang: N/A Description : modsecurity's Core Rule Set modsecurity provides critical protections against attacks across most every web architecture. CRS is based on generic rules which focus on attack payload identification in order to provide protection from zero day and unknown vulnerabilities often found in web applications, which are in most cases custom coded. . Core Rules use the following techniques: HTTP request validation, HTTP protocol anomalies, Global constraints, HTTP Usage policy, Malicious client software detection, Generic Attack Detection (SQL injection, Cross Site Scripting, OS Command Injection, ColdFusion, PHP and ASP injection, etc.), Trojans & Backdoors Detection, Error Detection, XML Protection, Search Engine Monitoring. -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20110331150630.ga14...@lib.inittab.org
Bug#909025: ITP: libmodsecurity3 -- ModSecurity v3 library component
Package: wnpp Severity: wishlist Owner: Alberto Gonzalez Iniesta * Package name: libmodsecurity3 Version : 3.0.2 Upstream Author : Trustwave Holdings, Inc. * URL : https://www.modsecurity.org/ * License : Apache-2.0 Programming Lang: C++ Description : ModSecurity v3 library component Libmodsecurity is one component of the ModSecurity v3 project. The library codebase serves as an interface to ModSecurity Connectors taking in web traffic and applying traditional ModSecurity processing. In general, it provides the capability to load/interpret rules written in the ModSecurity SecRules format and apply them to HTTP content provided by your application via Connectors.
Re: Debian Project Leader election 2017: First call for votes
On Sun, Apr 02, 2017 at 01:42:06AM +0200, Debian Project Secretary - Kurt Roeckx wrote: > > > - - -=-=-=-=-=- Don't Delete Anything Between These Lines =-=-=-=-=-=-=-=- > 4bfd7999-2252-4a5f-8f4e-e10ea7b8fdf8 > [ 2 ] Choice 1: Mehdi Dogguy > [ 1 ] Choice 2: Chris Lamb > [ ] Choice 3: None Of The Above > - - -=-=-=-=-=- Don't Delete Anything Between These Lines =-=-=-=-=-=-=-=- > > -- > > The responses to a valid vote shall be signed by the vote key created > for this vote. The public key for the vote, signed by the Project > secretary, is appended below. > > -BEGIN PGP PUBLIC KEY BLOCK- > > mQINBFjf/WsBEADDFHtoejre4AsAH29go+PPL1/W2pGjVii5pbjyDnzsRJ72cWes > oZ0RVPjEc8zEcD4oKODoFoZ+YFxd89Xl44zI7Y3KV4popAjWVbdEwnSao7dFLsim > 6c+HXAQmPX8ualHBM3CdP5QGUP5cROs6xIUrRSFIVvyLwP8N9LiVwupGj1NiOE73 > /f9/OSxjm05XQT10fy44q3hag+44Xpxn6JmybAesAymvbo2IIB7BmR3ekNx1NUSl > I2DUmRHB7rgKXSc8KpxccXi0U+2luQnRAaIBjKM6g+suoOS+Y+nXFLGotZWoIlGg > 94dykBaX987g6Al9P5KcwUHn8P9uQ589fMrapl7ZdRwXdjUEA7qZ9IZq6hsf/E50 > hjAVk+dNs6UPwKBa+uuSmJPuI1Yvsj0SM55jN6FK2d8MBFHm8BXkIhHpTT7gvbeC > i8bnKzH9KFlKnGF3nWBjUljyHYiB9f+I8n0gXLElbLn20+n9uZQ+uDCvowjcwLfF > wb5G6Gbv1UkWtrNbNPtMAvFeUauy9APHmYba3V8uh9PdAPauqnqCwdLbjaeI0s8G > InwPRjmoRVsM+be35mo7sR42h8dRocbUJosQrcjjeYoyJSheoxKq3E2kUTxNZfjS > Jn+huk3yPa3iUtl/vzS7lSX/zQ8bmb/8lCtWMYn91koM/RicJvg/SE5vZQARAQAB > tCpEUEwgdm90ZSAyMDE3IDxsZWFkZXIyMDE3QHZvdGUuZGViaWFuLm9yZz6JAj4E > EwECACgFAljf/WsCGwMFCQAVGAAGCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJ > EDYSpgypEBP4MWcP/0BltDmP/z+mq27bbRIO7CLG5LN1wXbkQ4+aUIuo+Sl3oDRc > drYN7zNzpxFUabYIZYpI1uGrM0egzRgMaYWd0busKMiq680WhcQvs2+MCBxZdTHE > 4MU4HRvm9+4SGAauSdxIwhK6ueglTLc/qaXBnLgyBsJUbFWcTqeh9ojbx4tT785E > Mi3sFS76Wr+cCBgMrDFjuR2I1v0gkEB3keqBH5AFakSZAXtjMeQOAP9qcmWOQuYl > pJpmtR3j8QYHnDdHlolkFhl+AhyC2STIjcQBnbG4xzMKnFDZUGSknn98YsY57t01 > mm6JTYhS41eFV3dT1DTY3DxQ5c3cpYG2ocB79/OADanTkYf80aDXNy+J8PKYeIMw > 0qfokH8mUcU1Kr78xMCZDdcRF0gVJiu0xG5+WNu8EvpiRSKi6CLKTA82mDKIUVb4 > P2xQgYyL409hiu1dhTQV5Zf5CxNuy/D1Xp3AR4Y/Hcj+LmIoCfs39m3TbtyElGGZ > oZWR+LcdEyMnSFJnXbjPQRigxEgGC3NVKHyC3AoIB+EK+L8m3pOvXb+KE2bySUtu > c0HhaR4EoOlTJr6neJ4bivxT2yaG87o+0MpGbgGxbE/82y0fy0T/qrdQsx+DrMfX > JwnlimqGOcbKYLqm6sFy6AvG2h2ichz0bR90ljllIJiRsE6cxgvTbs9hsCVviQIz > BBABCgAdFiEE5eUlYN2RxVbdvaXQIGTFNkHCXl0FAljf/cgACgkQIGTFNkHCXl0s > hA/+NZzRXWUgGiKyCvKw6XeUWyPYFiJrJe1JGRYHSCoh+6dHzlldscyM1PfWy8yh > ivV5pXKikTsmWG9ki+zXNL+mpFmmrXh+ELID6kX9oWnrULVgjxoVIPZaZhNqjnWr > xwVrHyFrB8pywkWp7L7DdwKe1oRyxSsGHErQ8kKEq7P5dBp4eqVGuTOvaD0eJcMY > C1ljdBNMUrR29ceHsUi18z+f7f8LWQ0Xj761C2Y9vijPfMAYbAxmFX3TA34jXkUN > ZqkyTg6dXuv+QbLCrPHoWqdcb00ixwR/g8n8Qs9/r4I3x8TNW6x4uIjqewA3o/4d > eyF8ATEkSSlqVeTHbEs9JMceNhjK460LQ5MyIZNW9TH0FjPrY5zjvIjbP/SirCjh > s9sz9zpj0QGSEDY12H/uloJ8uKKlO6l7J65koFPe7feIJFDEANc2zn7BH+r6/LLu > mSQ5wiQCInbsEVhxB1xsLqasv1OS9CGebs73liL5Kj66H/IP8R5hPK+rHhOnNPnD > OkDY5/55PYgKPdrJJ1c/rul4/CfvXGQiiJInqXPoqkP13s9ywtGPYdVRIcIRKgM7 > zjPNdIQseA7hd0P+zyaqSWa93DHEGOG+cDhdyFYvRn2DKXhlzbIfOZrwInRg2PRA > niCd3NkETmPh4d/NPSuIUIKDXH3UKbzEIFBNdnC76FdldnW5Ag0EWN/9awEQAMTj > hcYUmH7qCI/69Bz9E7rhiDFXEORY+/58wEyPC7eofNVxDDZuLwXXMmtqaIBN8xMF > ZOCk94MouORJkO2ENJhVmW3d+5u2OWsRPd+Axlk3Hpa6H20BJ/KscvOdq22Eh+VB > nFBWCJ2v/TuWeQC92hdGNSAnl22Ng1CL9j5Z/H6gVscaFRck5xwJMyILUigNNdjD > hJzFD30i6596rxRl8fzMoEaBb+jxrtAoYU+7mya7wRjLirqhyp+Zrit9Hl+VCAu2 > O+TPt72hMG96tdeZWdJkKTkBcNpZKEtQOKxWsIvu1Oxch6UbU/LJI5xBeGFHBp6D > UGB196zkOzZz/JOjIdfPs8pxLO2mGmCh2UnpSpjLkzOWaqY8GXjx9SazvS99dDAJ > DsOMEmsVK4YzRlQXDDQQYybxGbrWbPSwWQI9rct7uEwcLBvuimiTp1UP+KSvqWGb > Ozbh/jFrtCg+xkRmziDcgVFNY9YIf2kUDikPNnx4kJPNiMg0jkWpDqL/qJBlXGgL > vBrzB7UN/pRGfQoq05VtkbS8UGkG9yDy0OI0FATMbTqf2XRAJt0PAzxeKWWXJ0nR > L3Nqtpqw2Qj632b4K88f0IG+XzNNyByUdvJcgLL56ADMkZMKkcrZfTOiZzM3vkAu > QanmiID+aMCGV109i/y6oVX+V67WF/E/Ix915iifABEBAAGJAiUEGAECAA8FAljf > /WsCGwwFCQAVGAAACgkQNhKmDKkQE/iE8g/+NqJPPmwVLOgPtiqEsz4u9ckvvuEf > wjg0Ds0JsTxj2c1x5HoBEnkzVDiTzko8mij6k7he8xYR9IWatMUCkeX9q9dLSe9s > s16CEwft/NbH6BMxxLdKgkTbqDpkCw8mofMqw4NU6dfcU33cTXRIOpt9tU+Y7XRr > taXHNBL703rn0kFSajQzYU8xFJoDeDuBkg2xgu+tLe4emXi6j3TT6O4nlY0CGBwM > ODPFJYdqVaAbAfBfEYtDbiSu1FL8/h2elEVdAtXW62h2Yi2xVw+W4QT6qqkKy7uG > 740fyno4uiSVPBxKeX9Kjp3oUZK3pVw1LmuB0CccEgl6lctSW+3X8mNG8zbIiVEo > 9S57NOg8KhFDQKYx6MnvHn5+SsJeVvtuG8ViQmuf3e56HaR/xRQO40KixDPgMYOy > 4UCnWtIYMEjBznCLKMhEzwQrcdmwBTqUilxRLQMscYXPqQzAHLz5iJYd0qLNYnNn > 4lpCGG/8nn+6tt43oGSzhnD9+xoZKMNwxP/k7rrfLBbERk+YZIte1PV8Tg6B4ekt > 6lZndQ6e8PmhWo24K8mNU8E1cOlCwW1uqpVApIxSgy5BrZi6Ty5bBto4/pkBlCzB > h/gZMNDb5Swvv//7GU8rTBfm3GUuYx4jh7nWmTzHtBVnczcMfTrjwfXIpGK0bZH8 > PskH3di8dUPObdQ= > =SKnD > -END PGP PUBLIC KEY BLOCK- > -- Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico mailto/sip: a...@inittab.org | en GNU/Linux y software libre Encrypted mail preferred| http://inittab.com Key fingerprint = 5347 CBD8 3E30 A9EB 4D7D 4BF2 009B 3375 6B9A AA55 signature.asc Description: PGP signature