Package: wnpp
Severity: wishlist
Owner: Benjamin Drung
X-Debbugs-Cc: debian-devel@lists.debian.org, bdr...@debian.org
* Package name: nvme-stas
Version : 2.3.1
Upstream Author : Martin Belanger
* URL : https://github.com/linux-nvme/nvme-stas
* License : Apache
Encryption per se does not protect against modification, I am aware of
that. That is even more true for disk encryption where the encrypted
data block has to fit into the physical disk block, so there is no room
for a MAC or signature. However, in combination with a filesystem like
btrfs which chec
On Mar 10, Stephan Verbücheln wrote:
> Apart from the fact that UEFI Secure Boot is an overly complex monster
> which is basically broken[1] by design, my understanding of it is also
> that it does not protect configs, initramfs etc. in /boot. It only
> protects the kernel image and loaded module
On 2023-03-10 13:48:21 + (+), Stephan Verbücheln wrote:
> Encryption per se does not protect against modification, I am aware of
> that. That is even more true for disk encryption where the encrypted
> data block has to fit into the physical disk block, so there is no room
> for a MAC or si
On Fri, 2023-03-10 at 14:28 +, Jeremy Stanley wrote:
> Okay, so you're wanting to rely on encrypted /boot as an incomplete
> alternative to checking file signatures, because the current
> attestation solutions are also imperfect. Keep in mind that
> checksumming isn't providing protection from
Package: wnpp
Severity: wishlist
Owner: Mark E. Fuller
* Package name: go-task
Version : 3.21.0-1
Upstream Author : Task
* URL : https://github.com/go-task/task
* License : MIT
Programming Lang: Go
Description : A task runner / simpler Make alternative
On Fri, 2023-03-10 at 15:12 +0100, Marco d'Itri wrote:
> In the future the initramfs will (usually) be static as well.
Can you provide more information on that?
Thanks and regards
Stephan
signature.asc
Description: This is a digitally signed message part
Package: wnpp
Severity: wishlist
Owner: Mark E. Fuller
* Package name: golang-github-sajari-fuzzy
Version : 1.0.0-1
Upstream Author : Search.io
* URL : https://github.com/sajari/fuzzy
* License : MIT
Programming Lang: Go
Description : Spell checking an
Package: wnpp
Severity: wishlist
Owner: Mark E. Fuller
* Package name: golang-github-go-task-slim-sprig
Version : 2.20.0-1
Upstream Author : Andrey Nering
* URL : https://github.com/go-task/slim-sprig
* License : MIT
Programming Lang: Go
Description :
Package: wnpp
Severity: wishlist
Owner: Mark E. Fuller
* Package name: golang-github-radovskyb-watcher
Version : 1.0.7-1
Upstream Author : Benjamin Radovsky
* URL : https://github.com/radovskyb/watcher
* License : BSD-3-clause
Programming Lang: Go
Descript
Package: wnpp
Severity: wishlist
Owner: Oliver Wilkes
X-Debbugs-Cc: debian-devel@lists.debian.org
* Package name : eludris
Version : 0.3.2
Upstream Author : Oliver Wilkes
* URL : https://github.com/eludris/eludris/tree/main/cli/
* License : MIT
Programming Lang: Rust
Description : A simple CLI
On Mar 10, Stephan Verbücheln wrote:
> On Fri, 2023-03-10 at 15:12 +0100, Marco d'Itri wrote:
> > In the future the initramfs will (usually) be static as well.
> Can you provide more information on that?
Due to multiple reasons, mostly related to secure boot and boot
attestation, there is signif
Package: wnpp
Severity: wishlist
Owner: Anthony Fok
* Package name: gitleaks
Version : 8.16.0-1
Upstream Author : Zachary Rice
* URL : https://github.com/gitleaks/gitleaks
* License : Expat
Programming Lang: Go
Description : protect and discover secrets
13 matches
Mail list logo