Bug#841999: ITP: node-trim-newlines -- Trim newlines from the start and/or end of a string

2016-10-24 Thread Sruthi Chandran
Package: wnpp Severity: wishlist Owner: Sruthi Chandran X-Debbugs-CC: debian-devel@lists.debian.org * Package name: node-trim-newlines Version : 1.0.0 Upstream Author : Sindre Sorhus (sindresorhus.com) * URL : https://github.com/sindresorhus/trim-newlines * License

Bug#841998: ITP: node-strip-indent -- Strip leading whitespace from each line in a string

2016-10-24 Thread Sruthi Chandran
Package: wnpp Severity: wishlist Owner: Sruthi Chandran X-Debbugs-CC: debian-devel@lists.debian.org * Package name: node-strip-indent Version : 2.0.0 Upstream Author : Sindre Sorhus (sindresorhus.com) * URL : https://github.com/sindresorhus/strip-indent#readme * Licen

Bug#841996: ITP: node-repeating -- Repeat a string fast

2016-10-24 Thread Sruthi Chandran
Package: wnpp Severity: wishlist Owner: Sruthi Chandran X-Debbugs-CC: debian-devel@lists.debian.org * Package name: node-repeating Version : 3.0.0 Upstream Author : Sindre Sorhus (sindresorhus.com) * URL : https://github.com/sindresorhus/repeating#readme * License

Re: client-side signature checking of Debian archives (Re: When should we https our mirrors?)

2016-10-24 Thread Russ Allbery
Paul Wise writes: > Debian has Tor onion service frontends to various Debian services, > including several Debian machines with archive mirrors, this is > implemented in an automated way using Puppet and onionbalance. So we do > not rely on Tor exit nodes, just relays and the onion service system

"PIE by default" transition is underway -- wiki needs updating

2016-10-24 Thread Steve M. Robbins
Hi, I haven't been paying close attention to the "PIE by default" [1] discussions, so I may have missed the memo, but: it seems the transition is underway? I've seen two bugs already claiming "static library foo must be compiled with -fPIC" -- because some reverse dependency now fails to buil

Re: client-side signature checking of Debian archives (Re: When should we https our mirrors?)

2016-10-24 Thread Paul Wise
On Tue, Oct 25, 2016 at 7:33 AM, Russ Allbery wrote: > Tor is easier for us as a project, since we don't really have to do > anything (assuming we just rely on existing exit nodes). Debian has Tor onion service frontends to various Debian services, including several Debian machines with archive m

Re: client-side signature checking of Debian archives (Re: When should we https our mirrors?)

2016-10-24 Thread Russ Allbery
Adrian Bunk writes: > The government operating or having access to the mirror you are using is > a lot more realistic and easier than the MITM with a fake certificate > you were talking about. Both of those were also in the category of things that I think are unlikely attacks unless the governme

Re: client-side signature checking of Debian archives (Re: When should we https our mirrors?)

2016-10-24 Thread Adrian Bunk
On Mon, Oct 24, 2016 at 09:22:39AM -0700, Russ Allbery wrote: > Adrian Bunk writes: > > On Sun, Oct 23, 2016 at 07:28:23PM -0700, Russ Allbery wrote: > > >>... > >> The value of HTTPS lies in its protection against passive snooping. Given > >> the sad state of the public CA infrastructure, you c

Bug#841978: ITP: opcua-client-gui -- simple OPC-UA GUI client

2016-10-24 Thread W. Martin Borgert
Package: wnpp Severity: wishlist Owner: "W. Martin Borgert" * Package name: opcua-client-gui Version : 0.4.5 Upstream Author : Olivier Roulet-Dubonnet * URL : https://github.com/FreeOpcUa/opcua-client-gui * License : GPL3 Programming Lang: Python Descripti

Bug#841976: ITP: puppet-module-camptocamp-kmod -- Puppet module for managing kmod configuration

2016-10-24 Thread Thomas Goirand
Package: wnpp Severity: wishlist Owner: Thomas Goirand * Package name: puppet-module-camptocamp-kmod Version : 2.1.1 Upstream Author : Raphaël Pinson * URL : https://github.com/camptocamp/puppet-kmod * License : Apache-2.0 Programming Lang: Puppet Descript

FTP Master move, second try | Upload queue

2016-10-24 Thread Joerg Jaspert
Hi first a short announce: Saturday (that is, 29th of October) we give it another shot of moving the ftp-master host, so expect another bit of downtime there. More importantly: With the changes to the upload queues I announced just yesterday, we turned off ftpd on the ftp-master host. Anyone who

Re: When should we https our mirrors?

2016-10-24 Thread David Kalnischkies
On Mon, Oct 24, 2016 at 07:26:37PM +0200, Tollef Fog Heen wrote: > ]] Paul Tagliamonte > > On Mon, Oct 24, 2016 at 04:00:39PM +0100, Ian Jackson wrote: > > > It is also evident that there are some challenges for deploying TLS on > > > a mirror network and/or CDN. I don't think anyone is suggestin

signature checking in libcupt (Re: client-side signature checking of Debian archives (Re: When should we https our mirrors?))

2016-10-24 Thread Eugene V. Lyubimkin
Hi Kristian, To one of your side questions, On 24.10.2016 02:33, Kristian Erik Hermansen wrote: >> 1) Checking chain (e.g. gpgv and its callers) have bugs. True, same as >> checking layer for secure transports also have bugs. > > Agreed. Please let me know of a good test case to validate that y

Re: Bug#841852: Bug#841851: ITP: bind-key -- simple way to manage personal keybindings

2016-10-24 Thread Lev Lamberov
Hi Sean, 24.10.2016 22:27, Sean Whitton пишет: > Dear Lev, > > On Mon, Oct 24, 2016 at 09:55:50AM +0500, Lev Lamberov wrote: >> (3) users will rather see their elpa-{bind-key,use-package} >> counterparts > I don't understand this reasoning. I don't get what you don't understand. 1. use-package

Re: Keysafe dynamic UID

2016-10-24 Thread Sean Whitton
On Mon, Oct 24, 2016 at 08:58:49AM +0200, Christian Seiler wrote: > The requirement to have this for dynamically allocated IDs also > probably stems from the fact that the users created in postinst scripts > should not conflict. But wouldn't it be far easier to just create a > page on the Debian Wi

Bug#841943: ITP: bootstrap-datetimepicker -- Date/time picker widget based on twitter bootstrap

2016-10-24 Thread Michael Fladischer
Package: wnpp Severity: wishlist Owner: Michael Fladischer -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 * Package name: bootstrap-datetimepicker Version : 4.17.43 Upstream Author : Jonathan Peterson * URL : https://github.com/Eonasdan/bootstrap-datetimepicker * Lic

Re: Bug#841851: ITP: bind-key -- simple way to manage personal keybindings

2016-10-24 Thread Sean Whitton
Dear Lev, On Mon, Oct 24, 2016 at 09:55:50AM +0500, Lev Lamberov wrote: > (3) users will rather see their elpa-{bind-key,use-package} > counterparts I don't understand this reasoning. The source package name is based on upstream's project name. The elpa package name is based on the package.el p

Re: When should we https our mirrors?

2016-10-24 Thread Tollef Fog Heen
]] Paul Tagliamonte > On Mon, Oct 24, 2016 at 04:00:39PM +0100, Ian Jackson wrote: > > It is also evident that there are some challenges for deploying TLS on > > a mirror network and/or CDN. I don't think anyone is suggesting > > tearing down our existing mirror network. > > https://deb.debian.

Re: awesome, it's done! (Re: When should we https our mirrors?)

2016-10-24 Thread Holger Levsen
On Mon, Oct 24, 2016 at 06:52:41PM +0200, Ansgar Burchardt wrote: > deb.debian.org has a debian-security area, so security updates should > also be available via https:// now. yes, they are, thanks! -- cheers, Holger signature.asc Description: Digital signature

Re: When should we https our mirrors?

2016-10-24 Thread Ian Jackson
Adrian Bunk writes ("Re: When should we https our mirrors?"): > My point is that for the problem Kristian is describing, > using https is just snake oil. Since you haven't stopped being rude just because I asked, I have emailed listmaster. Russ's recent posting is a useful contribution to the sub

Re: when should we esmtps our mxes?

2016-10-24 Thread Ben Hutchings
On Mon, 2016-10-24 at 15:15 +, Ivan Shmakov wrote: > > > > > > > > > > Ben Hutchings writes: > > > […] > >  > Those certificates look as expected.  Since TLS encryption of SMTP >  > between servers is opportunistic, there's no particular reason to use >  > a widely trusted CA for server c

Re: awesome, it's done! (Re: When should we https our mirrors?)

2016-10-24 Thread Ansgar Burchardt
On Mon, 2016-10-24 at 16:30 +, Holger Levsen wrote: > On Mon, Oct 24, 2016 at 11:51:00AM -0400, Paul Tagliamonte wrote: > > https://deb.debian.org/ is now set up (thanks, folks!) > > whoohooo, & it works on stable too! apt install apt-transport-https > was > all it took. (and changing the entr

Re: Bug#820036: No bug mentioning a Debian KEK and booting use it.

2016-10-24 Thread Theodore Ts'o
On Tue, Oct 18, 2016 at 07:52:13PM +0800, Paul Wise wrote: > > It was posted to bug #820036, which is tracking Debian support for > secure boot. Peter was advocating quite correctly that as well as > having our copy of shim (the first-stage bootloader on secure boot > systems) signed by Microsoft,

awesome, it's done! (Re: When should we https our mirrors?)

2016-10-24 Thread Holger Levsen
On Mon, Oct 24, 2016 at 11:51:00AM -0400, Paul Tagliamonte wrote: > https://deb.debian.org/ is now set up (thanks, folks!) whoohooo, & it works on stable too! apt install apt-transport-https was all it took. (and changing the entries in sources.list to that…) Just security.d.o (or rather, it's su

Re: client-side signature checking of Debian archives (Re: When should we https our mirrors?)

2016-10-24 Thread Russ Allbery
Adrian Bunk writes: > On Sun, Oct 23, 2016 at 07:28:23PM -0700, Russ Allbery wrote: >>... >> The value of HTTPS lies in its protection against passive snooping. Given >> the sad state of the public CA infrastructure, you cannot really protect >> against active MITM with HTTPS without certificate

Re: When should we https our mirrors?

2016-10-24 Thread Adrian Bunk
On Mon, Oct 24, 2016 at 04:00:39PM +0100, Ian Jackson wrote: > Adrian Bunk writes ("Re: When should we https our mirrors?"): >... > Adrian: > > Noone is arguing that switching to https would be a bad thing, > > but whether or not it will happen depends solely on whether or > > not people like you w

Re: When should we https our mirrors?

2016-10-24 Thread Paul Tagliamonte
On Mon, Oct 24, 2016 at 04:00:39PM +0100, Ian Jackson wrote: > It is also evident that there are some challenges for deploying TLS on > a mirror network and/or CDN. I don't think anyone is suggesting > tearing down our existing mirror network. https://deb.debian.org/ is now set up (thanks, folks!

Re: when should we esmtps our mxes?

2016-10-24 Thread Ivan Shmakov
> Ben Hutchings writes: […] > Those certificates look as expected. Since TLS encryption of SMTP > between servers is opportunistic, there's no particular reason to use > a widely trusted CA for server certificates. A MITM can just as > easily block STARTTLS as substitute their own key.

Re: when should we esmtps our mxes?

2016-10-24 Thread Ivan Shmakov
> Julien Cristau writes: > On Mon, Oct 24, 2016 at 11:45:33 +, Ivan Shmakov wrote: […] >> Speaking of which. Does the gnutls-cli transcript MIMEd signify of >> an ongoing MitM attack, or is it just a misconfiguration? > Neither. > _25._tcp.bendel.debian.org. 3600 IN RRSIG TLSA

Re: When should we https our mirrors?

2016-10-24 Thread Ian Jackson
Adrian Bunk writes ("Re: When should we https our mirrors?"): > On Mon, Oct 24, 2016 at 04:00:49AM -0700, Kristian Erik Hermansen wrote: > > so I also probably > > shouldn't consider your TLS knowledge very highly... > > Your incorrect claims won't become better by personal attacks against me. C

Re: when should we esmtps our mxes?

2016-10-24 Thread Ben Hutchings
On Mon, 2016-10-24 at 13:00 +, Ivan Shmakov wrote: > > > > Andrey Rahmatullin writes: > > On Mon, Oct 24, 2016 at 11:45:33AM +, Ivan Shmakov wrote: > > >  >> $ gnutls-cli --starttls -p 25 bendel.debian.org  > > […] > >  >> Connecting to '82.195.75.100:443'... > >  > I cannot reproduc

Re: when should we esmtps our mxes?

2016-10-24 Thread Julien Cristau
On Mon, Oct 24, 2016 at 11:45:33 +, Ivan Shmakov wrote: > > Kristian Erik Hermansen writes: > > On Mon, Oct 24, 2016 at 1:59 AM, Adrian Bunk wrote: > > […] > > >> For the kind of attacks you are describing, https is just snake oil. > > > Profusely disagree and so do other member

Re: when should we esmtps our mxes?

2016-10-24 Thread Ivan Shmakov
> Andrey Rahmatullin writes: > On Mon, Oct 24, 2016 at 11:45:33AM +, Ivan Shmakov wrote: >> $ gnutls-cli --starttls -p 25 bendel.debian.org […] >> Connecting to '82.195.75.100:443'... > I cannot reproduce gnutls-cli connecting to :443 when asked :25. Indeed, my mistake

Bug#841920: ITP: gnome-shell-extension-hide-activities -- gnome shell extension that hides the activities button

2016-10-24 Thread Jonathan Carter
Package: wnpp Severity: wishlist Owner: Jonathan Carter * Package name: gnome-shell-extension-hide-activities Version : 0.00~git20131024.1.6574986-1 Upstream Author : Shay Elkin * URL : https://github.com/shayel/gnome-hide-activities * License : PD Programmin

Re: when should we esmtps our mxes?

2016-10-24 Thread Andrey Rahmatullin
On Mon, Oct 24, 2016 at 11:45:33AM +, Ivan Shmakov wrote: > $ gnutls-cli --starttls -p 25 bendel.debian.org > Processed 173 CA certificate(s). > Resolving 'bendel.debian.org'... > Connecting to '2001:41b8:202:deb:216:36ff:fe40:4002:443'... > Connecting to '82.195.75.100:443'... I cannot repro

Bug#841913: ITP: gnome-shell-extension-refresh-wifi -- keep wifi access point list current in GNOME shell

2016-10-24 Thread Jonathan Carter
Package: wnpp Severity: wishlist Owner: Jonathan Carter * Package name: gnome-shell-extension-refresh-wifi Version : 6-1 Upstream Author : Gopi Sankar Karmegam * URL : https://github.com/kgshank/gse-refresh-wifi * License : GPL-3 Programming Lang: Javascript

Re: When should we https our mirrors?

2016-10-24 Thread Adrian Bunk
On Mon, Oct 24, 2016 at 04:00:49AM -0700, Kristian Erik Hermansen wrote: > On Mon, Oct 24, 2016 at 1:59 AM, Adrian Bunk wrote: > but also I should point out that your email is being routed > insecurely via welho.com and lacks TLS in transit, so I also probably > shouldn't consider your TLS knowled

when should we esmtps our mxes?

2016-10-24 Thread Ivan Shmakov
> Kristian Erik Hermansen writes: > On Mon, Oct 24, 2016 at 1:59 AM, Adrian Bunk wrote: […] >> For the kind of attacks you are describing, https is just snake oil. > Profusely disagree and so do other members of this list. I'll leave > it at that, but also I should point out that y

Re: client-side signature checking of Debian archives

2016-10-24 Thread David Kalnischkies
(Disclaimer: I am a maintainer of apt-transport-tor… but also of -https and apt itself, so I am biased beyond hope in this matter) On Sun, Oct 23, 2016 at 07:20:35PM -0700, Russ Allbery wrote: > Paul Wise writes: > > On Mon, Oct 24, 2016 at 7:21 AM, Kristian Erik Hermansen wrote: > >> The point i

Re: client-side signature checking of Debian archives (Re: When should we https our mirrors?)

2016-10-24 Thread Kristian Erik Hermansen
On Mon, Oct 24, 2016 at 2:33 AM, Adrian Bunk wrote: > You are implicitely assuming that mirrors can be trusted, > and even that is not true. No, not actually. Just presuming that NSA doesn't operate ALL mirrors. Of course they can operate single servers or a number of servers, but that increases

Re: When should we https our mirrors?

2016-10-24 Thread Kristian Erik Hermansen
On Mon, Oct 24, 2016 at 1:59 AM, Adrian Bunk wrote: > It is a common misconception that https could help against these kinds > of attacks. > > https is an improvement over http and it would be good if Debian could > switch to https by default in stretch, but for the problem you are > talking about

Re: Keysafe dynamic UID

2016-10-24 Thread W. Martin Borgert
Quoting Tollef Fog Heen : I'd prefer if user creation was just done declaratively and then we could scan the archive. If we have a manually-maintained list, it will get out of sync with reality pretty quickly. +1 and +1 It would be nice to have some progress on this: https://wiki.debian.org/Te

Re: client-side signature checking of Debian archives (Re: When should we https our mirrors?)

2016-10-24 Thread Adrian Bunk
On Sun, Oct 23, 2016 at 07:28:23PM -0700, Russ Allbery wrote: >... > The value of HTTPS lies in its protection against passive snooping. Given > the sad state of the public CA infrastructure, you cannot really protect > against active MITM with HTTPS without certificate pinning. You are implicite

Assado de Tira com Purê de Mandioquinha

2016-10-24 Thread Pague Menos
html {width: 100%} body {background-color: #ff; margin: 0px; padding: 0px; font-family: Arial, Helvetica, sans-serif;} Caso não esteja visualizando as imagens, acesse aqui

Bug#841905: ITP: golang-github-dhowett-go-plist -- pure Go Apple Property List transcoder

2016-10-24 Thread Sascha Steinbiss
Package: wnpp Severity: wishlist Owner: Sascha Steinbiss * Package name: golang-github-dhowett-go-plist Version : 0.0~git20160708.0.fec78c8-1 Upstream Author : Dustin L. Howett * URL : https://github.com/dhowett/go-plist * License : BSD Programming Lang: Go

Bug#841902: ITP: golang-github-voxelbrain-goptions -- flexible Go parser for command line options

2016-10-24 Thread Sascha Steinbiss
Package: wnpp Severity: wishlist Owner: Sascha Steinbiss * Package name: golang-github-voxelbrain-goptions Version : 2.5.11-1 Upstream Author : voxelbrain * URL : https://github.com/voxelbrain/goptions * License : BSD-3-clause Programming Lang: Go Descripti

Bug#841901: ITP: golang-github-thecreeper-go-notify -- implementation of the GNOME DBus Notifications Specification

2016-10-24 Thread Sascha Steinbiss
Package: wnpp Severity: wishlist Owner: Sascha Steinbiss * Package name: golang-github-thecreeper-go-notify Version : 0.0~git20160203.0.b5cd147-1 Upstream Author : * URL : https://github.com/TheCreeper/go-notify * License : BSD-2-clause Programming Lang: Go

Re: When should we https our mirrors?

2016-10-24 Thread Adrian Bunk
On Sun, Oct 23, 2016 at 06:04:50AM -0700, Kristian Erik Hermansen wrote: >... > The main issue is that a well positioned attacker, such as the NSA or > Chinese router admins, have the ability to collect and analyze in > real-time what systems have installed what patches installed by > monitoring th

Bug#841898: ITP: golang-github-hydrogen18-stalecucumber -- Reader and writer for Python's pickle format in Golang

2016-10-24 Thread Sascha Steinbiss
Package: wnpp Severity: wishlist Owner: Sascha Steinbiss * Package name: golang-github-hydrogen18-stalecucumber Version : 0.0~git20161012.0.cd9ec28-1 Upstream Author : Eric Urban * URL : https://github.com/hydrogen18/stalecucumber * License : BSD-2-clause Pro

Bug#841900: ITP: node-builtin-modules -- List of the Node.js builtin modules

2016-10-24 Thread Sruthi Chandran
Package: wnpp Severity: wishlist Owner: Sruthi Chandran X-Debbugs-CC: debian-devel@lists.debian.org * Package name: node-builtin-modules Version : 1.1.1 Upstream Author : Sindre Sorhus (sindresorhus.com) * URL : https://github.com/sindresorhus/builtin-modules#readme *

Bug#841899: ITP: golang-github-twstrike-gotk3adapter -- adapters and interfaces for gotk3

2016-10-24 Thread Sascha Steinbiss
Package: wnpp Severity: wishlist Owner: Sascha Steinbiss * Package name: golang-github-twstrike-gotk3adapter Version : 0.0~git20160819.0.3499960-1 Upstream Author : STRIKE Team * URL : https://github.com/twstrike/gotk3adapter * License : GPL-3.0 Programming L

Bug#841893: ITP: golang-github-gotk3-gotk3 -- Go bindings for GTK3

2016-10-24 Thread Sascha Steinbiss
Package: wnpp Severity: wishlist Owner: Sascha Steinbiss * Package name: golang-github-gotk3-gotk3 Version : GOTK3_0_2_0+git20161020.501.2caa15f-1 Upstream Author : Conformal Systems LLC. * URL : https://github.com/gotk3/gotk3 * License : ISC Programming Lang

Bug#841892: ITP: golang-github-twstrike-otr3 -- Go implementation of the OTR 3 protocol

2016-10-24 Thread Sascha Steinbiss
Package: wnpp Severity: wishlist Owner: Sascha Steinbiss * Package name: golang-github-twstrike-otr3 Version : 0.0~git20161015.0.744856d-1 Upstream Author : STRIKE Team * URL : https://github.com/twstrike/otr3 * License : GPL-3.0 Programming Lang: Go Descri

Re: Keysafe dynamic UID

2016-10-24 Thread Vincent Bernat
❦ 24 octobre 2016 09:12 +0200, Tollef Fog Heen  : >> The requirement to have this for dynamically allocated IDs also >> probably stems from the fact that the users created in postinst scripts >> should not conflict. But wouldn't it be far easier to just create a >> page on the Debian Wiki and tra

Re: [Pkg-dns-devel] Bug#833309: "Browserified" stuff (knot-resolver-module-http: please package embedded epoch.js separately)

2016-10-24 Thread Bas Wijnen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Fri, Oct 21, 2016 at 07:26:43AM +0200, Vincent Bernat wrote: > It would be as easy for the security team to modify the unminified version > than the "upper" upstream version of the source. The release team has just decided that "browserified" files

Re: Keysafe dynamic UID

2016-10-24 Thread Christian Seiler
On 10/24/2016 09:12 AM, Tollef Fog Heen wrote: > I'd prefer if user creation was just done declaratively and then we > could scan the archive. If we have a manually-maintained list, it will > get out of sync with reality pretty quickly. Doing this declaratively would definitely be the ideal solut

Re: When should we https our mirrors?

2016-10-24 Thread Tollef Fog Heen
]] Philipp Kern > On 10/18/2016 06:47 PM, Marco d'Itri wrote: > > On Oct 17, Ian Campbell wrote: > >> Have we gotten to the point where we consider deb.d.o suitable for > >> production use? The web page still says Experimental (so I would assume > > I do not think that it is appropriate for gene

Re: client-side signature checking of Debian archives (Re: When should we https our mirrors?)

2016-10-24 Thread Eugene V. Lyubimkin
Hi Russ, Kristian, On 24.10.2016 07:19, Kristian Erik Hermansen wrote: > On Sun, Oct 23, 2016 at 7:28 PM, Russ Allbery wrote: >> The idea is to *add* HTTPS protection on top of the protections we already >> have. You're correct that it doesn't give you authentication of the >> packages without a

Re: Keysafe dynamic UID

2016-10-24 Thread Tollef Fog Heen
]] Christian Seiler > On 10/24/2016 12:42 AM, Colin Watson wrote: > > On Sat, Oct 22, 2016 at 02:57:23PM -0700, Sean Whitton wrote: > >> I am packaging Keysafe,[1] and the binary package keysafe-server needs > >> to create a new system user with a dynamically allocated UID. > >> > >> I am using t