Re: holes in secure apt

2014-06-11 Thread Thijs Kinkhorst
Hi Chris, On Thu, June 12, 2014 01:06, Christoph Anton Mitterer wrote: > reopen 749795 > stop A better way would be to add more 'found' versions so the BTS version tracking shows this bug as affecting stable. > Anyone who believed in getting trusted sources might have been attacked > with forged

Re: use of RDRAND in $random_library

2014-06-11 Thread Matthias Urlichs
Hi, Steve Langasek: > Debian should do the right thing, regardless of what upstreams may believe. > I don't trust the hardware random generator. At all. Given what's been revealed about the NSA so far, being extra paranoid about anything we cannot verify to be secure is the right thing to do. Th

Re: use of RDRAND in $random_library

2014-06-11 Thread Josh Triplett
Joey Hess wrote: > Josh Triplett wrote: > > However, just as we encourage projects to reuse libraries rather than > > copying code around, we *should* encourage projects to use standardized > > randomness libraries rather than hardcoding rdrand (or, for that matter, > > hardcoding /dev/urandom). >

Re: holes in secure apt

2014-06-11 Thread Joey Hess
Christoph Anton Mitterer wrote: > reopen 749795 > I'm reopening this for now, even if the issue is solved from a technical > point of view (see below why). AAICS, #749795 talked about bringing this to the security team's attention, but they never seem to have been CCed. So the security team may n

Re: use of RDRAND in $random_library

2014-06-11 Thread Joey Hess
Jacob Appelbaum wrote: > On 6/11/14, Joey Hess wrote: > > I stumbled over a library which has switched to using RDRAND in a new > > upsteam version (not yet packaged), instead of /dev/urandom[1]. > > Which library is using it? I didn't want to name names and am more interested in the general que

Re: use of RDRAND in $random_library

2014-06-11 Thread Joey Hess
Josh Triplett wrote: > However, just as we encourage projects to reuse libraries rather than > copying code around, we *should* encourage projects to use standardized > randomness libraries rather than hardcoding rdrand (or, for that matter, > hardcoding /dev/urandom). Performance aside, why is a

Votre cheque-cadeau PriceMinister est toujours valable

2014-06-11 Thread PriceMinister
Changer votre adresse email dans votre profil de compte http://www.newsletter-priceminister.com/_c.aspx?i=19302589&en=7090770669&m=1684&e=debian-devel@lists.debian.org&r=46 Bonjour, Brahemi Makouri vous a offert un chèque cadeau de 7 € sans minimum à utiliser pour votre premier achat su

Re: Bits from the systemd + GNOME sprint

2014-06-11 Thread Nobuhiro Iwamatsu
Hi, 2014-05-02 8:26 GMT+09:00 Jordi Mallach : > Hi! > > Below is a report from the recently held systemd + GNOME sprint in > Antwerp. Enjoy! > > > > We finally discussed how to tackle Bluez5. Bluez 4 is the current release > available in Debian, which is dead upstream and deprecated since late

Re: use of RDRAND in $random_library

2014-06-11 Thread Steve Langasek
On Wed, Jun 11, 2014 at 03:46:07PM -0700, Josh Triplett wrote: > > Would it make sense to scan for the opcode? > No, let's not propagate this issue outside the kernel. Anyone wishing to > complain about the use of hardware-accelerated randomness should argue that > upstream with projects that ado

holes in secure apt

2014-06-11 Thread Christoph Anton Mitterer
reopen 749795 stop Hi. I'm reopening this for now, even if the issue is solved from a technical point of view (see below why). In my opinion this is really some horrible bug... probably it could have been very easily found by others, and we have no idea whether it was exploited already or not.

Re: use of RDRAND in $random_library

2014-06-11 Thread Jacob Appelbaum
On 6/11/14, Joey Hess wrote: > I stumbled over a library which has switched to using RDRAND in a new > upsteam version (not yet packaged), instead of /dev/urandom[1]. Which library is using it? > > I don't have a stong opinion on the security of RDRAND, which is a > contentious topic in a domain

Re: use of RDRAND in $random_library

2014-06-11 Thread Josh Triplett
Joey Hess wrote: > I stumbled over a library which has switched to using RDRAND in a new > upsteam version (not yet packaged), instead of /dev/urandom[1]. > > I don't have a stong opinion on the security of RDRAND, which is a > contentious topic in a domain I am not expert in. However, I would muc

use of RDRAND in $random_library

2014-06-11 Thread Joey Hess
I stumbled over a library which has switched to using RDRAND in a new upsteam version (not yet packaged), instead of /dev/urandom[1]. I don't have a stong opinion on the security of RDRAND, which is a contentious topic in a domain I am not expert in. However, I would much rather rely on linux deve

Re: Bug#745872: ITP: profanity -- a console based XMPP client

2014-06-11 Thread Andrey Rahmatullin
On Tue, Jun 10, 2014 at 09:32:05PM +0200, Stefano Rossi wrote: > Hello Dariusz and Andrey, > > I'd love to see a Profanity package for Debian. Are you, Dariusz, still > working on it? > I also would like to know, why would the OpenSSL requirement make it > impossible to distribute the binary? Op