Accepted ntp 1:4.2.8p7+dfsg-3 (source amd64 all) into unstable

2016-04-30 Thread Kurt Roeckx
ain...@lists.alioth.debian.org> Changed-By: Kurt Roeckx <k...@roeckx.be> Description: ntp- Network Time Protocol daemon and utility programs ntp-doc- Network Time Protocol documentation ntpdate- client for setting system time from NTP servers Closes: 805183 823024 Changes: ntp (1:4.

Accepted ntp 1:4.2.8p7+dfsg-2 (source amd64 all) into unstable

2016-04-29 Thread Kurt Roeckx
ain...@lists.alioth.debian.org> Changed-By: Kurt Roeckx <k...@roeckx.be> Description: ntp- Network Time Protocol daemon and utility programs ntp-doc- Network Time Protocol documentation ntpdate- client for setting system time from NTP servers Changes: ntp (1:4.2.8p7+dfsg-2) unstable; ur

Accepted ntp 1:4.2.8p7+dfsg-1 (source amd64 all) into unstable

2016-04-28 Thread Kurt Roeckx
ain...@lists.alioth.debian.org> Changed-By: Kurt Roeckx <k...@roeckx.be> Description: ntp- Network Time Protocol daemon and utility programs ntp-doc- Network Time Protocol documentation ntpdate- client for setting system time from NTP servers Closes: 315935 691672 778415 793926 804377 8

Accepted openssl 1.0.2g-2 (source amd64 all) into unstable, unstable

2016-04-22 Thread Kurt Roeckx
: medium Maintainer: Debian OpenSSL Team <pkg-openssl-de...@lists.alioth.debian.org> Changed-By: Kurt Roeckx <k...@roeckx.be> Description: libcrypto1.0.2-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-

Bug#819806: ITP: ntpsec - a secure, hardened and improved ntp daemon

2016-04-02 Thread Kurt Roeckx
Package: wnpp Severity: wishlist * Package name: ntpsec Version : 0.9.1 * URL : https://www.ntpsec.org * License : NTP / BSD 3-Clause / BSD 4-Clause Description : a secure, hardened, and improved ntp daemon I don't actually have the time to work on this

Accepted openssl 1.0.2g-1 (source amd64 all) into unstable

2016-03-01 Thread Kurt Roeckx
: Debian OpenSSL Team <pkg-openssl-de...@lists.alioth.debian.org> Changed-By: Kurt Roeckx <k...@roeckx.be> Description: libcrypto1.0.2-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure S

Accepted openssl 1.0.2f-2 (source amd64 all) into unstable

2016-01-28 Thread Kurt Roeckx
: Debian OpenSSL Team <pkg-openssl-de...@lists.alioth.debian.org> Changed-By: Kurt Roeckx <k...@roeckx.be> Description: libcrypto1.0.2-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure S

Accepted elfutils 0.165-3 (source amd64) into unstable

2016-01-16 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 16 Jan 2016 17:53:34 +0100 Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.165-3 Distribution: unstable Urgency: medium Maintainer: Kurt Roeckx &l

Accepted elfutils 0.165-2 (source amd64) into unstable

2016-01-13 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 13 Jan 2016 17:50:08 +0100 Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.165-2 Distribution: unstable Urgency: medium Maintainer: Kurt Roeckx &l

Accepted elfutils 0.165-1 (source amd64) into unstable

2016-01-11 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 11 Jan 2016 21:28:32 +0100 Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.165-1 Distribution: unstable Urgency: medium Maintainer: Kurt Roeckx &l

Accepted elfutils 0.164-1 (source amd64) into unstable

2015-12-26 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 26 Dec 2015 20:55:48 +0100 Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.164-1 Distribution: unstable Urgency: medium Maintainer: Kurt Roeckx &l

Accepted openssl 1.0.2e-1 (source amd64 all) into unstable

2015-12-03 Thread Kurt Roeckx
: Debian OpenSSL Team <pkg-openssl-de...@lists.alioth.debian.org> Changed-By: Kurt Roeckx <k...@roeckx.be> Description: libcrypto1.0.2-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure S

Accepted openssl 1.0.2d-3 (source amd64 all) into unstable

2015-11-01 Thread Kurt Roeckx
Maintainer: Debian OpenSSL Team <pkg-openssl-de...@lists.alioth.debian.org> Changed-By: Kurt Roeckx <k...@roeckx.be> Description: libcrypto1.0.2-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure S

Accepted ntp 1:4.2.8p4+dfsg-2 (source all amd64) into unstable

2015-10-22 Thread Kurt Roeckx
ain...@lists.alioth.debian.org> Changed-By: Kurt Roeckx <k...@roeckx.be> Description: ntp- Network Time Protocol daemon and utility programs ntp-doc- Network Time Protocol documentation ntpdate- client for setting system time from NTP servers Closes: 802638 Changes: ntp (1:4.2.8p4+dfsg

Accepted ntp 1:4.2.8p4+dfsg-3 (source all amd64) into unstable

2015-10-22 Thread Kurt Roeckx
ain...@lists.alioth.debian.org> Changed-By: Kurt Roeckx <k...@roeckx.be> Description: ntp- Network Time Protocol daemon and utility programs ntp-doc- Network Time Protocol documentation ntpdate- client for setting system time from NTP servers Closes: 793745 Changes: ntp (1:4.2.8p4+dfsg

Accepted ntp 1:4.2.8p4+dfsg-1 (source all amd64) into unstable

2015-10-21 Thread Kurt Roeckx
ain...@lists.alioth.debian.org> Changed-By: Kurt Roeckx <k...@roeckx.be> Description: ntp- Network Time Protocol daemon and utility programs ntp-doc- Network Time Protocol documentation ntpdate- client for setting system time from NTP servers Changes: ntp (1:4.2.8p4+dfsg-1) unstable;

Accepted openssl 1.0.2d-2 (source amd64 all) into experimental, experimental

2015-09-08 Thread Kurt Roeckx
Maintainer: Debian OpenSSL Team <pkg-openssl-de...@lists.alioth.debian.org> Changed-By: Kurt Roeckx <k...@roeckx.be> Description: libcrypto1.0.2-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure S

Accepted elfutils 0.163-5 (source amd64) into unstable

2015-08-08 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 08 Aug 2015 15:12:31 +0200 Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.163-5 Distribution: unstable Urgency: medium Maintainer: Kurt Roeckx k

Re: server certificates/key pairs and CA directories

2015-08-03 Thread Kurt Roeckx
On Tue, Jul 21, 2015 at 04:50:42PM +, Thorsten Glaser wrote: Daniel Pocock daniel at pocock.pro writes: I looked at the package ssl-cert to try and understand and there I found that it is using /etc/ssl/certs for server certs while other packages Do NOT do that. It's causing

Re: How to deal with fixed but open bugs

2015-08-03 Thread Kurt Roeckx
On Thu, Jul 30, 2015 at 04:06:51PM +0200, Simon Richter wrote: Hi, On 30.07.2015 05:12, Nikolaus Rath wrote: I'm looking at the bug overview page for src:python3-llfuse (https://bugs.debian.org/cgi-bin/pkgreport.cgi?src=python-llfuse). The first thing it lists is the apparently nasty

Accepted ntp 1:4.2.8p3+dfsg-1 (source all amd64) into unstable

2015-07-25 Thread Kurt Roeckx
...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: ntp- Network Time Protocol daemon and utility programs ntp-doc- Network Time Protocol documentation ntpdate- client for setting system time from NTP servers Changes: ntp (1:4.2.8p3+dfsg-1) unstable; urgency=medium

Accepted elfutils 0.163-4 (source amd64) into unstable

2015-07-21 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 21 Jul 2015 11:39:55 + Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.163-4 Distribution: unstable Urgency: medium Maintainer: Kurt Roeckx k

Accepted elfutils 0.163-3 (source amd64) into unstable

2015-07-21 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 21 Jul 2015 13:01:57 +0200 Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.163-3 Distribution: unstable Urgency: medium Maintainer: Kurt Roeckx k

Accepted lice5 1:5.2.7-1 (source all) into unstable

2015-07-20 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 19 Jul 2015 21:46:44 +0200 Source: lice5 Binary: epic5-script-lice Architecture: source all Version: 1:5.2.7-1 Distribution: unstable Urgency: medium Maintainer: Kurt Roeckx k...@roeckx.be Changed-By: Kurt Roeckx k

Accepted elfutils 0.163-1 (source amd64) into unstable

2015-07-20 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 20 Jul 2015 14:30:21 +0200 Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.163-1 Distribution: unstable Urgency: medium Maintainer: Kurt Roeckx k

Accepted elfutils 0.163-2 (source amd64) into unstable

2015-07-20 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 20 Jul 2015 15:49:09 +0200 Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.163-2 Distribution: unstable Urgency: medium Maintainer: Kurt Roeckx k

Accepted epic5 1.1.11-1 (source amd64) into unstable

2015-07-19 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 19 Jul 2015 20:40:12 +0200 Source: epic5 Binary: epic5 Architecture: source amd64 Version: 1.1.11-1 Distribution: unstable Urgency: medium Maintainer: Kurt Roeckx k...@roeckx.be Changed-By: Kurt Roeckx k...@roeckx.be

Accepted openssl 1.0.2d-1 (source amd64 all) into unstable

2015-07-09 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit

Accepted openssl 1.0.2c-1 (source amd64 all) into unstable

2015-06-12 Thread Kurt Roeckx
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit

Accepted openssl 1.0.2b-1 (source amd64 all) into unstable

2015-06-11 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit

Re: Facilitating external repositories

2015-06-07 Thread Kurt Roeckx
On Thu, Jun 04, 2015 at 06:18:16PM +0200, Wouter Verhelst wrote: - There is no trust path from your already-installed distribution to the archive package (yes, I did sign the gpg keys; no, I don't consider that enough). There are 2 popular methods for this: - Have an app store. We would

Accepted openssl 1.0.2a-1 (source all amd64) into unstable

2015-04-30 Thread Kurt Roeckx
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit

Re: Results for Debian Project Leader 2015 Election

2015-04-15 Thread Kurt Roeckx
On Wed, Apr 15, 2015 at 01:59:16PM +0100, Ian Jackson wrote: You can see the `options' file I passed, below. I have not verified the Secretary's quorum calculation. devotee did a quorum calculation, but i will need to recalculate it since there are DDs that don't have a key in the keyring.

Accepted openssl 1.0.1k-3 (source all amd64) into unstable

2015-03-24 Thread Kurt Roeckx
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit

Accepted openssl 1.0.1k-2 (source all amd64) into unstable

2015-03-20 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit

Accepted ntp 1:4.2.6.p5+dfsg-5 (source all amd64) into unstable

2015-02-07 Thread Kurt Roeckx
...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: ntp- Network Time Protocol daemon and utility programs ntp-doc- Network Time Protocol documentation ntpdate- client for setting system time from NTP servers Changes: ntp (1:4.2.6.p5+dfsg-5) unstable; urgency=high

Accepted ntp 1:4.2.6.p5+dfsg-4 (source all amd64) into unstable

2015-02-04 Thread Kurt Roeckx
...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: ntp- Network Time Protocol daemon and utility programs ntp-doc- Network Time Protocol documentation ntpdate- client for setting system time from NTP servers Changes: ntp (1:4.2.6.p5+dfsg-4) unstable; urgency=medium

Accepted openssl 1.0.2-1 (source all amd64) into experimental

2015-01-23 Thread Kurt Roeckx
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer

Accepted openssl 1.0.1k-1 (source all amd64) into unstable

2015-01-08 Thread Kurt Roeckx
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit

Re: Architectures where unaligned access is (not) OK?

2014-11-21 Thread Kurt Roeckx
On Fri, Nov 21, 2014 at 12:42:34PM +, Simon McVittie wrote: A couple of questions for people who know low-level things: * Of Debian's architectures (official and otherwise), which ones are known/defined/designed to be OK with unaligned accesses from user-space, and which ones (can be

Re: REISSUED CfV: General Resolution: Init system coupling

2014-11-10 Thread Kurt Roeckx
On Mon, Nov 10, 2014 at 06:12:46PM +, Ian Jackson wrote: Neil McGovern writes (Re: REISSUED CfV: General Resolution: Init system coupling): Indeed, unfortunately so. Given the rather rushed nature though, it would be nice to try and work out a way of avoiding having to do this manual

Accepted openssl 1.0.2~beta3-1 (source all amd64) into experimental

2014-11-06 Thread Kurt Roeckx
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer

Re: Determining, ad hoc, whether someone is a DD

2014-10-18 Thread Kurt Roeckx
On Fri, Oct 17, 2014 at 11:41:15AM +0100, Ian Jackson wrote: Manuel A. Fernandez Montecelo writes (Re: Determining, ad hoc, whether someone is a DD): Not a primary source, but perhaps this is of some use, it is in general a nice overview and easy to lookup by name or username. In

Accepted openssl 1.0.1j-1 (source all amd64) into unstable

2014-10-15 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit

Accepted python-mysqldb 1.2.3-2.1 (source amd64) into unstable

2014-08-29 Thread Kurt Roeckx
-modules-t...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: python-mysqldb - Python interface to MySQL python-mysqldb-dbg - Python interface to MySQL (debug extension) Closes: 718699 Changes: python-mysqldb (1.2.3-2.1) unstable; urgency=medium . * Non-maintainer

Re: raising an issue about static linking policy

2014-08-28 Thread Kurt Roeckx
On Thu, Aug 28, 2014 at 11:38:49PM +0200, Salvo Tomaselli wrote: Hello, I've recently packaged subsurface 4.2 for experimental, because it depends on libgit2 which is in experimental... I think you might want to read these posts:

Accepted libid3tag 0.15.1b-11 (source amd64) into unstable

2014-08-19 Thread Kurt Roeckx
...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libid3tag0 - ID3 tag reading library from the MAD project libid3tag0-dev - ID3 tag reading library from the MAD project Closes: 755532 Changes: libid3tag (0.15.1b-11) unstable; urgency=medium . [ Fernando Seiti Furusato ferse

Accepted openssl 1.0.1i-2 (source all amd64) into unstable

2014-08-11 Thread Kurt Roeckx
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit

Accepted openssl 1.0.1i-1 (source all amd64) into unstable

2014-08-06 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit

Accepted epic4 1:2.10.5-2 (source amd64) into unstable

2014-08-02 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 02 Aug 2014 16:10:59 +0200 Source: epic4 Binary: epic4 Architecture: source amd64 Version: 1:2.10.5-2 Distribution: unstable Urgency: medium Maintainer: Kurt Roeckx k...@roeckx.be Changed-By: Kurt Roeckx k...@roeckx.be

Re: First steps towards source-only uploads

2014-08-01 Thread Kurt Roeckx
On Fri, Aug 01, 2014 at 10:16:12AM +0200, Ondrej Surý wrote: On Fri, Aug 1, 2014, at 09:54, Michael Tokarev wrote: 01.08.2014 11:37, Ansgar Burchardt wrote: Hi, as a first step towards source-only uploads, the archive will now accept source-only uploads provided the following

Re: DD's cheat card (was Re: Bug#754416: makefs: FTBFS on mips: Must set MACHINE_ARCH to one of mipseb or mipsel)

2014-07-26 Thread Kurt Roeckx
On Mon, Jul 14, 2014 at 08:49:26AM +, Thorsten Glaser wrote: Kibi wrote: Joachim Breitner nome...@debian.org (2014-07-13): Am Sonntag, den 13.07.2014, 13:02 +0200 schrieb Cyril Brulebois: [10]https://www.debian.org/intro/organization not really helpful. It links to

Accepted openssl 1.0.2~beta2-1 (source all amd64)

2014-07-23 Thread Kurt Roeckx
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer

Re: Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-19 Thread Kurt Roeckx
On Sat, Jul 19, 2014 at 05:41:41AM -0400, Theodore Ts'o wrote: I take a somewhat different philosophical position, which is that it's impossible to make something moron-proof, because morons are incredibly ingenious :-), and there are legitimate times when you might indeed want more than 256

Re: Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-18 Thread Kurt Roeckx
On Fri, Jul 18, 2014 at 08:54:14AM -0400, Theodore Ts'o wrote: On Fri, Jul 18, 2014 at 02:03:06PM +0200, Johannes Schauer wrote: maybe this will help in the future: http://lists.openwall.net/linux-kernel/2014/07/17/235 Latest version of the patch:

Re: Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-14 Thread Kurt Roeckx
On Mon, Jul 14, 2014 at 02:09:55PM -0300, Henrique de Moraes Holschuh wrote: On Mon, 14 Jul 2014, Kurt Roeckx wrote: I plan to try and get them to use symbol versioning, at least on those platforms that support it. This will probably be just like Thank you. the patch currently

Re: Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-13 Thread Kurt Roeckx
On Sun, Jul 13, 2014 at 08:36:30PM +0200, Matthias Urlichs wrote: Hi, Mike Hommey: Well, it kind of is. Because those versioned symbols in openssl come from a debian patch, afaict. So while debian may be fine (as long as all build-rdeps have been rebuilt since openssl got those versioned

Re: Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-12 Thread Kurt Roeckx
On Sat, Jul 12, 2014 at 01:53:45PM +0200, Toni Mueller wrote: Hi Kurt, On Sat, Jul 12, 2014 at 01:25:47PM +0200, Kurt Roeckx wrote: What are you doing with the binaries, include files, man pages, ...? Will they conflict with the ones from openssl? my intention is to package

Re: Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-12 Thread Kurt Roeckx
On Sat, Jul 12, 2014 at 02:15:13PM +0200, Kurt Roeckx wrote: On Sat, Jul 12, 2014 at 01:53:45PM +0200, Toni Mueller wrote: There are a number of reasons for that, but one has been that I was unhappy about the perceived 'closedness' of the project I was never very happy with it either

Re: possible MBF: automatically detecting unused build dependencies

2014-07-08 Thread Kurt Roeckx
On Mon, Jul 07, 2014 at 01:51:00PM +0200, Johannes Schauer wrote: Kurt Roeckx k...@roeckx.be libtool == libtool_2.4.2-1.7.arch-all.unusedbd == gfortran=4:4.8.2-4 gfortran Depends on gfortran-4.8, and that is being used. openssl (U) == openssl_1.0.1g-4.arch-all.unusedbd == m4=1.4.17-4

Accepted elfutils 0.159-4 (source amd64)

2014-07-06 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 06 Jul 2014 15:21:48 +0200 Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.159-4 Distribution: unstable Urgency: medium Maintainer: Kurt Roeckx k

Re: Sources licensed under PHP License and not being PHP are not distributable

2014-06-28 Thread Kurt Roeckx
On Thu, Jun 26, 2014 at 02:32:27PM +0200, Ondrej Surý wrote: Hi Charles, On Thu, Jun 26, 2014, at 14:27, Charles Plessy wrote: If your disagreement with the FTP team is unresolvable, and if you have time, maybe you can try to open a ticket for a resolution by the Technical Comittee ?

Accepted elfutils 0.159-3 (source amd64)

2014-06-24 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 24 Jun 2014 22:14:25 +0200 Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.159-3 Distribution: unstable Urgency: medium Maintainer: Kurt Roeckx k

Re: HTTPS everywhere!

2014-06-17 Thread Kurt Roeckx
On Tue, Jun 17, 2014 at 02:34:27PM +0200, Jakub Wilk wrote: * Simon McVittie s...@debian.org, 2014-06-17, 13:20: It should be possible to make a CA certificate that is only considered to be valid for the spi-inc.org and debian.org subtrees, and then trust the assertion that SPI control that

Accepted elfutils 0.159-2 (source amd64)

2014-06-15 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 15 Jun 2014 16:15:55 +0200 Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.159-2 Distribution: unstable Urgency: medium Maintainer: Kurt Roeckx k

Accepted openssl 1.0.1h-3 (source all amd64)

2014-06-14 Thread Kurt Roeckx
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit

Re: use of RDRAND in $random_library

2014-06-12 Thread Kurt Roeckx
On Thu, Jun 12, 2014 at 10:23:58AM +0200, Thorsten Glaser wrote: On Wed, 11 Jun 2014, Josh Triplett wrote: device is inferiour to the random devices on OpenBSD/MirBSD, so you should seed the aRC4 state with additional random bytes: As far as I know, OpenBSD stopped using (A)RC4 for their

Re: dh_shlibdeps warnings on buildd about undefined OpenMP symbols

2014-06-10 Thread Kurt Roeckx
On Tue, Jun 10, 2014 at 06:01:19PM +0200, Jakub Wilk wrote: * Vincent Danjean vdanjean...@free.fr, 2014-06-10, 16:27: In healpix-cxx, I'm getting warnings from dh_shlibdeps about missing OpenMP symbols. See, for example, this excerpt from

Accepted openssl 1.0.1h-2 (source all amd64)

2014-06-09 Thread Kurt Roeckx
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit

Accepted epic4 1:2.10.5-1 (source amd64)

2014-06-09 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 09 Jun 2014 13:40:30 +0200 Source: epic4 Binary: epic4 Architecture: source amd64 Version: 1:2.10.5-1 Distribution: unstable Urgency: medium Maintainer: Kurt Roeckx k...@roeckx.be Changed-By: Kurt Roeckx k...@roeckx.be

Accepted epic5 1.1.10-1 (source amd64)

2014-06-09 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 09 Jun 2014 14:18:30 +0200 Source: epic5 Binary: epic5 Architecture: source amd64 Version: 1.1.10-1 Distribution: unstable Urgency: medium Maintainer: Kurt Roeckx k...@roeckx.be Changed-By: Kurt Roeckx k...@roeckx.be

Accepted openssl 1.0.1h-1 (source all amd64)

2014-06-05 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit

Re: Proposed mass bug filing: /usr/lib/perl5 is changing with Perl 5.20

2014-06-01 Thread Kurt Roeckx
On Sun, Jun 01, 2014 at 11:39:34AM -0700, Russ Allbery wrote: How can we make the transition smooth ? I have a package.install file that contains a line /usr/lib/perl5/ Build-Depends on perl (= 5.20) would make the transition smooth for users and the buildds. The only drawback I can

Accepted elfutils 0.159-1 (source amd64)

2014-05-26 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 26 May 2014 22:03:29 +0200 Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.159-1 Distribution: unstable Urgency: medium Maintainer: Kurt Roeckx k

Accepted openssl 1.0.1g-4 (source all amd64)

2014-05-12 Thread Kurt Roeckx
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit

Accepted elfutils 0.158-2 (source amd64)

2014-05-01 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 01 May 2014 19:04:06 +0200 Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.158-2 Distribution: unstable Urgency: medium Maintainer: Kurt Roeckx k

Re: Hardened OpenSSL fork

2014-04-21 Thread Kurt Roeckx
On Mon, Apr 21, 2014 at 02:38:52AM +0100, Steven Chamberlain wrote: They've ripped out this whole PRNG now to use the one from their own libc: http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/crypto/rand/rand_lib.c.diff?r1=1.14;r2=1.15 And I think just a change like that might work

Re: Hardened OpenSSL fork

2014-04-21 Thread Kurt Roeckx
On Mon, Apr 21, 2014 at 12:34:12AM +0100, Kevin Chadwick wrote: previously on this list people contributed: On Sun, Apr 20, 2014 at 07:07:45PM +0100, Steven Chamberlain wrote: Hi, But meanwhile, OpenBSD developers are extensively cleaning up OpenSSL 1.0.1g. One of the

Accepted elfutils 0.158-1 (source amd64)

2014-04-21 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 21 Apr 2014 12:59:25 +0200 Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.158-1 Distribution: unstable Urgency: medium Maintainer: Kurt Roeckx k

Re: Hardened OpenSSL fork

2014-04-20 Thread Kurt Roeckx
On Sun, Apr 20, 2014 at 07:07:45PM +0100, Steven Chamberlain wrote: Hi, But meanwhile, OpenBSD developers are extensively cleaning up OpenSSL 1.0.1g. One of the problems with anything from OpenBSD is that they only care about OpenBSD, and if you want to use that fork you'll actually have to

Accepted openssl 1.0.1g-3 (source all amd64)

2014-04-19 Thread Kurt Roeckx
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit

Accepted openssl 1.0.1g-2 (source all amd64)

2014-04-08 Thread Kurt Roeckx
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer

Accepted openssl 1.0.1g-1 (source all amd64)

2014-04-07 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit

Re: RSA vs ECDSA (Was: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!)

2014-03-05 Thread Kurt Roeckx
On Wed, Mar 05, 2014 at 08:29:37AM +0100, Ondrej Surý wrote: On Tue, Mar 4, 2014, at 21:33, Gunnar Wolf wrote: Ondrej Surý dijo [Tue, Mar 04, 2014 at 08:10:47PM +0100]: On Mon, Mar 3, 2014, at 19:13, Gunnar Wolf wrote: As keyring maintainers, we no longer consider 1024D keys to be

Re: RSA vs ECDSA (Was: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!)

2014-03-04 Thread Kurt Roeckx
On Tue, Mar 04, 2014 at 08:10:47PM +0100, Ondrej Surý wrote: On Mon, Mar 3, 2014, at 19:13, Gunnar Wolf wrote: As keyring maintainers, we no longer consider 1024D keys to be trustable. We are not yet mass-removing them, because we don't want to hamper the project's work, but we definitively

Accepted openssl 1.0.2~beta1-1 (source all amd64)

2014-02-24 Thread Kurt Roeckx
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets

Re: default init on non-Linux platforms

2014-02-18 Thread Kurt Roeckx
On Tue, Feb 18, 2014 at 03:15:24PM +0100, Ondrej Surý wrote: Hi, I don't really want to open another can of worms, but what's the opinion of non-Linux ports maintainers on default init? Or maybe I should turn it another way: If we have working OpenRC on kFreeBSD and GNU Hurd, can I do:

Re: SSDs have extra unused space???

2014-01-21 Thread Kurt Roeckx
On Tue, Jan 21, 2014 at 08:31:56AM -0500, The Wanderer wrote: On 01/20/2014 09:34 PM, Paul Wise wrote: On Tue, Jan 21, 2014 at 1:22 AM, Holger Levsen wrote: wait, what? Do you have any vendor statements to support this 20% extra space? Flash is basically probabilistic storage and

Re: GnuTLS in Debian

2014-01-12 Thread Kurt Roeckx
On Sun, Dec 22, 2013 at 08:12:40PM +0100, Andreas Metzler wrote: Hello, Debian ist still relying heavily on GnuTLS 2.12.x, and I do not think this is sustainable for much longer. State of Play: - In July 2011 with version 3.0 [1] GnuTLS switched to Nettle as only supported

Re: Bug#682045: libtool: please mark libtool multi-arch: allowed

2014-01-09 Thread Kurt Roeckx
On Thu, Jan 09, 2014 at 07:20:40PM +, Colin Watson wrote: On Thu, Jan 02, 2014 at 06:14:07PM +, Dimitri John Ledkov wrote: The correct solution is for libtool package to be marked as multi-arch: allowed without splitting this tiny package into two even smaller packages. This

Re: Bug#682045: libtool: please mark libtool multi-arch: allowed

2014-01-09 Thread Kurt Roeckx
On Thu, Jan 09, 2014 at 07:20:40PM +, Colin Watson wrote: Overall, I would therefore prefer option 1 (not the option I expected to prefer when I started analysing this!), because as far as I can see it will unblock cross-building for both packages that need /usr/bin/libtool and those

Accepted openssl 1.0.1f-1 (source all amd64)

2014-01-06 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit

Re: GPLv2-only considered harmful [was Re: GnuTLS in Debian]

2013-12-31 Thread Kurt Roeckx
On Tue, Dec 31, 2013 at 08:59:53AM -0600, Matt Zagrabelny wrote: On Tue, Dec 31, 2013 at 8:54 AM, Clint Adams cl...@debian.org wrote: On Sun, Dec 29, 2013 at 03:50:06AM +0100, David Weinehall wrote: Apart from the termination clause, the GPLv2 is far more concise, I don't see tivoization as

Re: GPLv2-only considered harmful [was Re: GnuTLS in Debian]

2013-12-28 Thread Kurt Roeckx
On Sat, Dec 28, 2013 at 04:11:18PM -0500, Stephen M. Webb wrote: On 12/28/2013 03:53 PM, Clint Adams wrote: On Sat, Dec 28, 2013 at 09:45:09AM +0100, David Weinehall wrote: As one of the GPL v2 only proponents, I take affront. I choose to license what little software I release as GPL v2

Re: GPLv2-only considered harmful [was Re: GnuTLS in Debian]

2013-12-28 Thread Kurt Roeckx
On Sat, Dec 28, 2013 at 05:59:35PM -0500, Stephen M. Webb wrote: On 12/28/2013 04:15 PM, Kurt Roeckx wrote: On Sat, Dec 28, 2013 at 04:11:18PM -0500, Stephen M. Webb wrote: On 12/28/2013 03:53 PM, Clint Adams wrote: On Sat, Dec 28, 2013 at 09:45:09AM +0100, David Weinehall wrote: As one

Re: GnuTLS in Debian

2013-12-27 Thread Kurt Roeckx
On Fri, Dec 27, 2013 at 02:38:50PM +, Thorsten Glaser wrote: Steve Langasek dixit: of GPLv3, and explicitly did not. In fact, the system library exception is now defined even more narrowly than for GPLv2, so that it now covers only language runtime libraries. I think this was a poor

Accepted openssh 1:6.4p1-1.1 (source amd64 all)

2013-12-23 Thread Kurt Roeckx
: unstable Urgency: medium Maintainer: Debian OpenSSH Maintainers debian-...@lists.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: openssh-client - secure shell (SSH) client, for secure access to remote machines openssh-client-udeb - secure shell client for the Debian installer (udeb

Accepted openssl 1.0.1e-6 (source all amd64)

2013-12-23 Thread Kurt Roeckx
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit

Accepted openssl 1.0.1e-5 (source all amd64)

2013-12-22 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit

Accepted elfutils 0.157-3 (source amd64)

2013-11-17 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 17 Nov 2013 22:54:31 +0100 Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.157-3 Distribution: unstable Urgency: low Maintainer: Kurt Roeckx k

<    1   2   3   4   5   6   7   8   >