Accepted elfutils 0.157-2 (source amd64)

2013-11-04 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 03 Nov 2013 15:20:06 +0100 Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.157-2 Distribution: unstable Urgency: low Maintainer: Kurt Roeckx k

Accepted openssl 1.0.1e-4 (source all amd64)

2013-11-01 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit

Re: Insufficient RAM on build-machines (was Bug#726009: yade: FTBFS on i386 (and others))

2013-10-11 Thread Kurt Roeckx
On Fri, Oct 11, 2013 at 12:32:27PM -0700, Steve Langasek wrote: severity 726009 serious thanks This remains a serious bug. Your package, which previously built on multiple architectures, is now failing to build due to memory exhaustion. While in some circumstances it is permissible to

Re: GPM and clickpad devices

2013-10-08 Thread Kurt Roeckx
On Tue, Oct 08, 2013 at 11:44:26PM +0200, Bill Allombert wrote: Dear developpers, Is there other people still using gpm intensively (the console mouse selection system) ? The Debian package is unmaintained and the upstream project is not very active either. I do, but I don't have any

Re: [RFC] multiarch and virtual packages

2013-10-04 Thread Kurt Roeckx
On Thu, Oct 03, 2013 at 11:54:55AM +0200, Vincent Danjean wrote: The current proposal about Depends/Conflicts/Provides is the following: ICD Loader: === Section: libs Multi-Arch: same Architecture: any Provides: libopencl1 Conflicts: libopencl1 Replaces: libopencl1 Suggests (or

Accepted elfutils 0.157-1 (source amd64)

2013-10-01 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 01 Oct 2013 18:21:23 +0200 Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.157-1 Distribution: unstable Urgency: low Maintainer: Kurt Roeckx k

Re: Upcoming stable point release (7.2)

2013-09-22 Thread Kurt Roeckx
On Sun, Sep 22, 2013 at 08:11:10PM +0100, Adam D. Barratt wrote: Hi, The next point release for wheezy (7.2) is scheduled for Saturday October 12th. Stable NEW will be frozen during the preceding weekend. Can you please clarify what is acceptable for uploads to proposed updates to get them

Re: tlsa for smtp to @bugs.debian.org

2013-09-13 Thread Kurt Roeckx
On Fri, Sep 13, 2013 at 09:29:30AM -0400, James Cloos wrote: The root problem (pardon the pun) is that cacert's root certificate is signed with md5 and gnutls doesn't like that. A self-signed cert's signature algorithm really isn't that important. You either trust that cert or you don't.

Re: tlsa for smtp to @bugs.debian.org

2013-09-13 Thread Kurt Roeckx
On Fri, Sep 13, 2013 at 10:51:06PM +0200, Kurt Roeckx wrote: The problem in the referenced URI is that gnutls refuses to tolerate a less secure DH key size. Here, gnutls refuses to tolerate a less secure hash algorithm. I think gnutls by default has a minimum size of 727 for the DH size

Re: tlsa for smtp to @bugs.debian.org

2013-09-13 Thread Kurt Roeckx
On Fri, Sep 13, 2013 at 11:31:38PM +0200, Paul Wise wrote: On Fri, Sep 13, 2013 at 10:51 PM, Kurt Roeckx wrote: A self-signed cert's signature algorithm really isn't that important. You either trust that cert or you don't. Surely this work would apply to self-signed certs too? http

Re: Less dinstall FTW?

2013-08-30 Thread Kurt Roeckx
On Fri, Aug 30, 2013 at 09:13:59AM +0200, Tollef Fog Heen wrote: I could see a *huge* load on this pool for this reason. If so, so what? We are not short of bandwidth and we do have contacts and offers from CDNs which will make serving this Not A Problem(TM). So should we take that as

Re: build warnings treated as failures

2013-08-07 Thread Kurt Roeckx
On Wed, Aug 07, 2013 at 09:07:48PM +0100, Neil Williams wrote: On Wed, 07 Aug 2013 22:01:33 +0530 Ritesh Raj Sarraf r...@researchut.com wrote: Taking this topic forward, I also reached out to upstream folks, asking them to fix these build errors on various architectures. I already did

Accepted elfutils 0.156-1 (source amd64)

2013-08-07 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 28 Jul 2013 14:32:23 +0200 Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.156-1 Distribution: unstable Urgency: low Maintainer: Kurt Roeckx k

Accepted epic4 1:2.10.2-1 (source amd64)

2013-08-06 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 06 Aug 2013 20:50:22 +0200 Source: epic4 Binary: epic4 Architecture: source amd64 Version: 1:2.10.2-1 Distribution: unstable Urgency: low Maintainer: Kurt Roeckx k...@roeckx.be Changed-By: Kurt Roeckx k...@roeckx.be

Accepted epic5 1.1.6-1 (source amd64)

2013-08-06 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 06 Aug 2013 21:00:20 +0200 Source: epic5 Binary: epic5 Architecture: source amd64 Version: 1.1.6-1 Distribution: unstable Urgency: low Maintainer: Kurt Roeckx k...@roeckx.be Changed-By: Kurt Roeckx k...@roeckx.be Description

Re: getaddrinfo() return value chaos

2013-07-08 Thread Kurt Roeckx
On Mon, Jul 08, 2013 at 08:23:28AM +0200, Helmut Grohne wrote: Indeed. So maybe mdns is to blame here for part of the trouble? Can you verify that really the last mdns4 entry makes up for the difference? mdns has always been a problem in my expierence. I thought there was a bug open about

Re: getaddrinfo() return value chaos

2013-07-07 Thread Kurt Roeckx
On Sun, Jul 07, 2013 at 02:30:33PM +0200, Thomas Hood wrote: Continuing on from the boot ordering and resolvconf thread; cc:ed to Helmut in case this gets filtered again; bcc:ed to 683...@bugs.debian.org since this is relevant for how that issue is addressed... A related bug is #582916

Re: Mass bug filing for shared library broken symlinks detected by piuparts

2013-07-03 Thread Kurt Roeckx
On Wed, Jul 03, 2013 at 05:35:35PM +0200, Ondrej Surý wrote: fabien boucher fabien.dot.bouc...@gmail.com libjson0-dev : json-c /usr/lib/x86_64-linux-gnu/libjson.so Also a false positive - this is result of json to json-c library name transition made by upstream and the

Re: Reporting 1.2K crashes

2013-07-03 Thread Kurt Roeckx
On Thu, Jul 04, 2013 at 11:36:25AM +0800, Paul Wise wrote: On Tue, Jun 25, 2013 at 1:28 PM, Alexandre Rebert wrote: We found the bugs using Mayhem [1], an automatic bug finding system that we've been developing in David Brumley's research lab for a couple of years. We recently ran Mayhem

Re: Reporting 1.2K crashes

2013-07-03 Thread Kurt Roeckx
On Thu, Jul 04, 2013 at 12:39:05PM +0800, Paul Wise wrote: On Thu, Jul 4, 2013 at 12:28 PM, Kurt Roeckx wrote: I think any open source project can ask that Indeed, however, for a project like Debian it would probably require some changes in their service or at least an ack for the large

Re: Why not to let all DDs to execute gb-command

2013-06-09 Thread Kurt Roeckx
On Wed, Jun 05, 2013 at 09:10:39PM +0200, Anton Gladky wrote: Dear all, I have a proposal to give a permission to all DDs to restart builds on failing archs e.g. execute gb-command. I think, most of developers are clever enough to define, whether the built failed accidentally and needs to

Re: x32 halfarrived... now what?

2013-06-08 Thread Kurt Roeckx
On Fri, Jun 07, 2013 at 10:41:47PM +, Thorsten Glaser wrote: Kurt Roeckx dixit: If you add that requirement, it can be upto 24 bit smaller than time_t. But as far as I know, there is no such requirement. In Sure. As I was saying, software in practice wants that, such as the mktime

Re: NDEBUG when building packages?

2013-06-07 Thread Kurt Roeckx
On Fri, Jun 07, 2013 at 07:34:21AM -0400, Kumar Appaiah wrote: On Fri, Jun 07, 2013 at 11:54:49AM +0200, Mathieu Malaterre wrote: cmake from sid makes it even harder. RelWithDebInfo now contains -DNDEBUG ... I have to source-upload all my packages :( $ grep NDEBUG ChangeLog.manual

Re: x32 halfarrived... now what?

2013-06-07 Thread Kurt Roeckx
On Fri, Jun 07, 2013 at 09:49:00AM +, Thorsten Glaser wrote: Russ Allbery rra at debian.org writes: Be aware that x32 has sizeof(time_t) sizeof(long), so you should expect So has MirBSD/i386 (since 2004-06-19) and NetBSD (since roughly a year). Most frequent thing is format

Re: x32 halfarrived... now what?

2013-06-07 Thread Kurt Roeckx
On Fri, Jun 07, 2013 at 09:37:45PM +, Thorsten Glaser wrote: Kurt Roeckx dixit: tm_year should be an int, not a time_t or long. Note that it POSIX says it must be a long... It doesn't say so here. It has it as an int. Also note that time_t didn't have a requirement to be an integer

Re: X.509 and CA certificates for other purposes (i.e. the IGTF)

2013-05-24 Thread Kurt Roeckx
On Fri, May 24, 2013 at 12:32:29PM +0200, Dennis van Dok wrote: The point I'd like to raise is that the current model of CA certificates seems to take an all-or-nothing approach: either a CA is trusted (for whatever purpose) or not. For the IGTF CAs, this may not be the right approach. One of

Re: systemd .service file conversion

2013-05-22 Thread Kurt Roeckx
On Wed, May 22, 2013 at 10:39:06PM +0200, Helmut Grohne wrote: On Tue, May 21, 2013 at 10:53:43PM +0200, Lucas Nussbaum wrote: There was a GSoC project in 2012 about generating sysvinit scripts from systemd .service files. Was there some communication about its outcome? I had a look at

Accepted openssl 1.0.1e-3 (source all amd64)

2013-05-22 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Accepted epic5 1.1.5-1 (source amd64)

2013-05-21 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 21 May 2013 22:10:21 +0200 Source: epic5 Binary: epic5 Architecture: source amd64 Version: 1.1.5-1 Distribution: unstable Urgency: low Maintainer: Kurt Roeckx k...@roeckx.be Changed-By: Kurt Roeckx k...@roeckx.be Description

Accepted lice5 1:5.2.5-1 (source all)

2013-05-21 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 21 May 2013 22:25:40 +0200 Source: lice5 Binary: epic5-script-lice Architecture: source all Version: 1:5.2.5-1 Distribution: unstable Urgency: low Maintainer: Kurt Roeckx k...@roeckx.be Changed-By: Kurt Roeckx k...@roeckx.be

Accepted ntp 1:4.2.6.p5+dfsg-3 (source all amd64)

2013-05-20 Thread Kurt Roeckx
...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: ntp- Network Time Protocol daemon and utility programs ntp-doc- Network Time Protocol documentation ntpdate- client for setting system time from NTP servers Closes: 696390 Changes: ntp (1:4.2.6.p5+dfsg-3) unstable

Accepted libmad 0.15.1b-8 (source amd64)

2013-05-20 Thread Kurt Roeckx
Changed-By: Kurt Roeckx k...@roeckx.be Description: libmad0- MPEG audio decoder library libmad0-dev - MPEG audio decoder development library Closes: 653676 700437 Changes: libmad (0.15.1b-8) unstable; urgency=low . * Add multiarch support. (Closes: #653676) Patch by Steve Langasek

Re: Debian development and release: always releasable (essay)

2013-05-16 Thread Kurt Roeckx
On Thu, May 16, 2013 at 08:03:33AM +0100, Lars Wirzenius wrote: I'd use a PPA-style package repository of some sort, and then advertise it to people might want to try that version of the package. Then it makes more sense to upload it to experimental to me. Kurt -- To UNSUBSCRIBE, email

Re: Debian development and release: always releasable (essay)

2013-05-15 Thread Kurt Roeckx
On Thu, May 09, 2013 at 08:49:51PM +0100, Lars Wirzenius wrote: Releases are important -- Releases are important to many, perhaps most, of our users. Hackers and hardcore powerusers don't necessarily care about them, of course, but most others do. A released version of

Re: epoch fix?

2013-05-07 Thread Kurt Roeckx
On Wed, May 08, 2013 at 05:27:01AM +0200, Adam Borowski wrote: On Wed, May 08, 2013 at 09:46:02AM +0800, Thomas Goirand wrote: What I think should be fixed is the fact that it doesn't appear in the filename. I never understood why they don't. Did I miss something? Having a colon in

Re: DPL 2013: Lats call for votes

2013-04-13 Thread Kurt Roeckx
On Sat, Apr 13, 2013 at 06:52:01AM -0300, Ben Armstrong wrote: - - -=-=-=-=-=- Don't Delete Anything Between These Lines =-=-=-=-=-=-=-=- [...] So you're the second person that doesn't follow the headers I've set: Reply-To: leader2...@vote.debian.org Mail-Followup-To: leader2...@vote.debian.org

Re: devotee (debian vote engine): predictable RNG allows recovery of secret monikers

2013-03-31 Thread Kurt Roeckx
On Sun, Mar 31, 2013 at 01:03:52PM +0300, Timo Juhani Lindfors wrote: Kurt Roeckx k...@roeckx.be writes: - md5_hex($name $alias obfuscate\n), \n; + hmac_sha256_hex($name, obfuscate), \n; part probably needs some further work. Should it be + hmac_sha256_hex

Re: devotee (debian vote engine): predictable RNG allows recovery of secret monikers

2013-03-30 Thread Kurt Roeckx
On Tue, Apr 24, 2012 at 12:56:19PM +0300, Timo Juhani Lindfors wrote: Hello, I think I found a bug in devotee (debian vote engine) that breaks the secrecy elections. I just pushed a change for this issue to my git repo at:

Re: devotee (debian vote engine): predictable RNG allows recovery of secret monikers

2013-03-30 Thread Kurt Roeckx
On Sat, Mar 30, 2013 at 05:13:23PM +0200, Timo Juhani Lindfors wrote: Kurt Roeckx k...@roeckx.be writes: I just pushed a change for this issue to my git repo at: http://anonscm.debian.org/gitweb/?p=users/kroeckx/devotee.git;a=summary I would be grateful if people can review

Re: devotee (debian vote engine): predictable RNG allows recovery of secret monikers

2013-03-30 Thread Kurt Roeckx
On Sat, Mar 30, 2013 at 03:41:09PM +0100, Kurt Roeckx wrote: I just pushed a change for this issue to my git repo at: http://anonscm.debian.org/gitweb/?p=users/kroeckx/devotee.git;a=summary I would be grateful if people can review that. I also still need to do something about the order

Accepted openssl 1.0.1e-2 (source all amd64)

2013-03-18 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Accepted openssl 1.0.1e-1 (source all amd64)

2013-02-11 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Re: hypothesis about the trouble I had with libc6 and multilib: extraneous libc6-amd64

2013-01-28 Thread Kurt Roeckx
On Fri, Jan 18, 2013 at 10:11:50AM -0600, Paul Johnson wrote: $ dpkg -l | grep libc6 ii libc6:amd64 2.13-37 amd64 ii libc6:i3862.13-37 i386 ii libc6-amd64 2.13-37 i386 ii libc6-i3862.13-37 amd64 So you basicly have libc6 installed 4 times, twice for i386 and twice for

Re: Debian should move away from MD5 (and at best also from SHA1) (in secure APT and friends)

2012-10-11 Thread Kurt Roeckx
On Thu, Oct 11, 2012 at 01:19:58AM +0200, Christoph Anton Mitterer wrote: Hi folks. AFAICS, secure APT and similar things (e.g. dpkg's file hash sums) still use even MD5. dpkg-genchanges and dak both generate md5, sha1 and sha256. So .deb files themself are hashed by all 3 of them. A as

Re: Debian should move away from MD5 (and at best also from SHA1) (in secure APT and friends)

2012-10-11 Thread Kurt Roeckx
On Fri, Oct 12, 2012 at 12:42:57AM +0600, Andrey Rahmatullin wrote: On Thu, Oct 11, 2012 at 08:18:55PM +0200, Kurt Roeckx wrote: There are also the md5sums files that are stored in the .deb file. I'm not really sure what the real use case for them is and wouldn't have a problem with them

Re: Changes to Debian Maintainer upload permissions

2012-09-24 Thread Kurt Roeckx
On Mon, Sep 24, 2012 at 07:33:03PM +0200, Joachim Breitner wrote: Hi, Am Montag, den 24.09.2012, 11:59 -0500 schrieb Peter Samuelson: [Joachim Breitner] Would it be possible to extend the syntax to specify lists of packages not by name, but by Maintainer, e.g.

Re: assumptions about the build environment.

2012-09-21 Thread Kurt Roeckx
On Fri, Sep 21, 2012 at 08:26:24PM +0100, peter green wrote: While working on debian one thing I have not managed to find is documentation on what packages can and can't assume about the build environment. Does such documentation exist and if not should it be created. One thing that is at

Accepted elfutils 0.153-2 (source amd64)

2012-09-18 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 18 Sep 2012 21:12:08 +0200 Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.153-2 Distribution: unstable Urgency: low Maintainer: Kurt Roeckx k

Re: packaging a tiny/trivial blob in a DFSG-clean way?

2012-09-14 Thread Kurt Roeckx
On Sat, Sep 15, 2012 at 12:15:51AM +0400, Michael Tokarev wrote: So we have the following options: 1) package just this single file, of 20 bytes long, in a separate Arch:all package, in it's own separate source. 2) drop ppc support where this file is required. 3) Just ship the

Re: packaging a tiny/trivial blob in a DFSG-clean way?

2012-09-14 Thread Kurt Roeckx
On Sat, Sep 15, 2012 at 01:11:47AM +0400, Michael Tokarev wrote: On 15.09.2012 01:03, Kurt Roeckx wrote: On Sat, Sep 15, 2012 at 12:15:51AM +0400, Michael Tokarev wrote: So we have the following options: 1) package just this single file, of 20 bytes long, in a separate Arch:all

Accepted lice5 1:5.2.4-1 (source all)

2012-08-31 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 31 Aug 2012 22:23:19 +0200 Source: lice5 Binary: epic5-script-lice Architecture: source all Version: 1:5.2.4-1 Distribution: unstable Urgency: low Maintainer: Kurt Roeckx k...@roeckx.be Changed-By: Kurt Roeckx k...@roeckx.be

Accepted epic5 1.1.4-1 (source amd64)

2012-08-06 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 06 Aug 2012 20:10:12 +0200 Source: epic5 Binary: epic5 Architecture: source amd64 Version: 1.1.4-1 Distribution: unstable Urgency: low Maintainer: Kurt Roeckx k...@roeckx.be Changed-By: Kurt Roeckx k...@roeckx.be Description

Accepted openssl 1.0.1c-4 (source all amd64)

2012-07-29 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Re: Fixing the mime horror ini Debian

2012-07-13 Thread Kurt Roeckx
On Fri, Jul 13, 2012 at 06:13:43PM +0900, Norbert Preining wrote: Hi everyone, can we somehome make $subject a target for the *next* release? It is ridiculous that it is in fact completely arbitrary what program is used to open files. Currently in my gnome-shell pdfs are opened with a

Accepted openssl 1.0.1c-3 (source all amd64)

2012-06-06 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Accepted openssl 1.0.1c-2 (source all amd64)

2012-06-05 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Accepted lice5 1:5.2.3-1 (source all)

2012-05-28 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 28 May 2012 13:02:52 +0200 Source: lice5 Binary: epic5-script-lice Architecture: source all Version: 1:5.2.3-1 Distribution: unstable Urgency: low Maintainer: Kurt Roeckx k...@roeckx.be Changed-By: Kurt Roeckx k...@roeckx.be

Accepted openssl 1.0.1c-1 (source all amd64)

2012-05-11 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Accepted openssl 1.0.1b-1 (source all amd64)

2012-04-26 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Accepted openssl 1.0.1a-1 (source all amd64)

2012-04-19 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Accepted openssl 1.0.1a-2 (source all amd64)

2012-04-19 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Accepted openssl 1.0.1a-3 (source all amd64)

2012-04-19 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Re: state of security hardening build flag efforts

2012-04-07 Thread Kurt Roeckx
On Sat, Apr 07, 2012 at 11:27:46AM +0200, Raphael Hertzog wrote: Hi, On Sat, 07 Apr 2012, Julien Cristau wrote: On Sat, Apr 7, 2012 at 02:17:21 +0200, Kurt Roeckx wrote: However, I wonder why bindnow isn't on by default. I thought we had a discussion about this, and didn't really

Accepted dutch 1:2.10-1 (source all)

2012-04-07 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 07 Apr 2012 15:54:29 +0200 Source: dutch Binary: idutch wdutch aspell-nl myspell-nl Architecture: source all Version: 1:2.10-1 Distribution: unstable Urgency: low Maintainer: Thijs Kinkhorst th...@debian.org Changed-By: Kurt

Accepted madplay 0.15.2b-8 (source amd64)

2012-04-07 Thread Kurt Roeckx
-By: Kurt Roeckx k...@roeckx.be Description: madplay- MPEG audio player in fixed point Closes: 619341 625649 Changes: madplay (0.15.2b-8) unstable; urgency=high . * Fix buffer overflow in the alsa output code (Closes: #619341) Thanks to Ben Winslow r...@bluecherry.net * Only build

Re: state of security hardening build flag efforts

2012-04-06 Thread Kurt Roeckx
On Sun, Apr 01, 2012 at 11:29:42AM -0700, Kees Cook wrote: Note that the default flags in both Ubuntu and Debian lack PIE (where as Gentoo's hardening patchset includes PIE by default). The Debian hardening documentation has encouraged maintainers to enable PIE too if they have a sensitive

Re: Non-copyrightable work with non-free license.

2012-04-02 Thread Kurt Roeckx
On Mon, Apr 02, 2012 at 11:00:11PM +0900, Charles Plessy wrote: Nevertheless, facts such as protein sequences are not copyrightable. This is somewhat confirmed by the UniProt consortium itself on their website (http://www.uniprot.org/help/license), and my conclusion is that, in isolation

Accepted openssl 1.0.1-3 (source all amd64)

2012-03-31 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Accepted openssl 1.0.1-4 (source all amd64)

2012-03-31 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Accepted openssl 1.0.1-1 (source all amd64)

2012-03-19 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Accepted openssl 1.0.1-2 (source all amd64)

2012-03-19 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Accepted openssl 1.0.0h-1 (source all amd64)

2012-03-13 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Accepted elfutils 0.153-1 (source amd64)

2012-02-24 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 24 Feb 2012 20:23:08 +0100 Source: elfutils Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev Architecture: source amd64 Version: 0.153-1 Distribution: unstable Urgency: low Maintainer: Kurt Roeckx k

Re: what is the quality of abi-compliance-checker ?

2012-02-21 Thread Kurt Roeckx
On Mon, Feb 20, 2012 at 12:47:31PM +0100, Jérémy Lal wrote: Hi, i am not able to tell if abi-compliance-checker is serious enough to be able to use its results to ensure ABI-compatibility of C++ libs. It gives informations like : http://www.upstream-tracker.org/versions/v8.html It's the best

Re: -fPIE and stuff

2012-02-15 Thread Kurt Roeckx
On Tue, Feb 14, 2012 at 11:09:44PM +, Sune Vuorela wrote: On 2012-02-14, Kurt Roeckx k...@roeckx.be wrote: It was always my understanding that protected wasn't useful, because it's even more expensive. Can you come with a bit pointers or numbers about 'expensive' ? So as far as I

Re: -fPIE and stuff

2012-02-15 Thread Kurt Roeckx
On Wed, Feb 15, 2012 at 12:09:41AM +, Uoti Urpala wrote: Anyway, the C standard says that there is a requirement that both the DSO itself as all other objects must be able to take the address of it and still get the same pointer. And this obviously fails in your example. Yes, it

Re: -fPIE and stuff

2012-02-15 Thread Kurt Roeckx
On Wed, Feb 15, 2012 at 07:39:50PM +, Uoti Urpala wrote: The most obvious way how the non-fPIE case could theoretically work would be having such text relocations for main executable; without them you can't expect things to work without special tricks. Yes, and I expect the toolchain

Re: -fPIE and stuff

2012-02-14 Thread Kurt Roeckx
On Mon, Feb 13, 2012 at 10:29:23PM +, Uoti Urpala wrote: Kurt Roeckx kurt at roeckx.be writes: So my understanding is that you want to build libraries with -fPIE instead of -fPIC, and that that creates a different ABI? What affects the ABI is compiling the library in a way that does

Re: -fPIE and stuff

2012-02-14 Thread Kurt Roeckx
On Tue, Feb 14, 2012 at 08:17:09PM +, Uoti Urpala wrote: Kurt Roeckx kurt at roeckx.be writes: What affects the ABI is compiling the library in a way that does not support copy relocations. This can be done with visibility attributes or linker It was always my understanding

Re: -fPIE and stuff

2012-02-13 Thread Kurt Roeckx
On Sun, Jan 29, 2012 at 11:06:27PM +, Sune Vuorela wrote: Hi One of my upstreams of a collection of shared libraries is about to make a change that is going to require all executables built against these shared libraries to be built with -fPIE (and libraries with -fPIC). Is there

Accepted libmad 0.15.1b-7 (source amd64)

2012-01-22 Thread Kurt Roeckx
Changed-By: Kurt Roeckx k...@roeckx.be Description: libmad0- MPEG audio decoder library libmad0-dev - MPEG audio decoder development library Closes: 656814 Changes: libmad (0.15.1b-7) unstable; urgency=low . * Fix arm's MAD_F_MLN thumb case causing problems on arhmf. Patch by Dave

Accepted openssl 1.0.0g-1 (source all amd64)

2012-01-18 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Accepted openssl 1.0.0f-1 (source all amd64)

2012-01-12 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Accepted openssl 1.0.0e-3 (source all amd64)

2011-11-28 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Re: Increasing minimum 'i386' processor

2011-11-24 Thread Kurt Roeckx
On Sun, Nov 20, 2011 at 08:48:08PM +, Ben Hutchings wrote: /usr/lib/i386-linux-gnu/i486/libcrypto.so.1.0.0: cpuid /usr/lib/i386-linux-gnu/i486/libcrypto.so.1.0.0: rdtsc I should probably drop that i486 variant anyway, since i486 is already the default. I should also consider dropping the

Re: Increasing minimum 'i386' processor

2011-11-20 Thread Kurt Roeckx
On Sun, Nov 20, 2011 at 07:36:43PM +, Ben Hutchings wrote: So far as I'm aware, none of the above will be generated directly by compilers (though they may be available through 'intrinsics'). So it may be that there is little to be gained by moving to 586-class as a minimum. If that is

Accepted libtool 2.4.2-1 (source all amd64)

2011-10-29 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 29 Oct 2011 20:08:48 +0200 Source: libtool Binary: libtool libtool-doc libltdl7 libltdl-dev Architecture: source all amd64 Version: 2.4.2-1 Distribution: unstable Urgency: low Maintainer: Kurt Roeckx k...@roeckx.be Changed

Accepted aptitude 0.6.4-1.2 (source all amd64)

2011-10-29 Thread Kurt Roeckx
: 0.6.4-1.2 Distribution: unstable Urgency: low Maintainer: Daniel Burrows dburr...@debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: aptitude - terminal-based package manager (terminal interface only) aptitude-dbg - Debug symbols for the aptitude package manager aptitude-doc-cs

Accepted ircd-irc2 2.11.2p2+dfsg-2 (source amd64)

2011-09-26 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 26 Sep 2011 23:04:40 +0200 Source: ircd-irc2 Binary: ircd-irc2 Architecture: source amd64 Version: 2.11.2p2+dfsg-2 Distribution: unstable Urgency: low Maintainer: Kurt Roeckx k...@roeckx.be Changed-By: Kurt Roeckx k

Re: Maintainers, porters, and burden of porting

2011-09-10 Thread Kurt Roeckx
On Thu, Sep 08, 2011 at 07:34:41PM +0200, Andreas Barth wrote: - Being able to judge whether the maintainers have done their part in reaching out to porters is a requisite for the above. And to do so, we really need more visibility of those exchanges. According to devref [1], the

Re: Maintainers, porters, and burden of porting

2011-09-10 Thread Kurt Roeckx
On Sat, Sep 10, 2011 at 05:50:29PM +, brian m. carlson wrote: On Sat, Sep 10, 2011 at 01:27:01PM +, Felipe Sateler wrote: On Thu, 08 Sep 2011 19:34:41 +0200, Andreas Barth wrote: I disagree with let's first remove things. If a package like ruby doesn't build on sparc this bug

Accepted openssl 1.0.0e-1 (source all amd64)

2011-09-10 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Accepted openssl 1.0.0e-2 (source all amd64)

2011-09-10 Thread Kurt Roeckx
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org Changed-By: Kurt Roeckx k...@roeckx.be Description: libcrypto1.0.0-udeb - crypto shared library - udeb (udeb) libssl-dev - SSL development libraries, header files and documentation libssl-doc - SSL development documentation

Re: Maintainers, porters, and burden of porting

2011-08-31 Thread Kurt Roeckx
On Wed, Aug 31, 2011 at 04:30:56AM +, Felipe Sateler wrote: I think some clarification needs to be done for these types of errors. I sometimes get a (serious) bug reported against one of my packages because: 1. python errored out with a glibc-detected error 2. gcc broke in some way

Re: Maintainers, porters, and burden of porting [and 1 more messages]

2011-08-31 Thread Kurt Roeckx
On Wed, Aug 31, 2011 at 02:52:53PM +0100, Ian Jackson wrote: Let me make an alternative proposal: * The root cause bug in the BTS would be given a special tag (arch-blocker:arch or something). I will call such a bug which is open and has existed in this state for 30 days a ripe arch

Re: Maintainers, porters, and burden of porting

2011-08-31 Thread Kurt Roeckx
On Tue, Aug 30, 2011 at 11:05:03AM +0200, Bernhard R. Link wrote: (And try to imagine how hard it would have been to introduce amd64 if alpha had not elliminated in many years work most of the subtle 64 bit bugs found in most software, I doubt porters alone could have completed this in that

Re: Maintainers, porters, and burden of porting

2011-08-31 Thread Kurt Roeckx
On Wed, Aug 31, 2011 at 02:42:41PM +0200, Lucas Nussbaum wrote: On 31/08/11 at 12:58 +0100, Ben Hutchings wrote: On Wed, 2011-08-31 at 11:57 +0200, Lucas Nussbaum wrote: [...] But a different thread library that has clear POSIX compliance bugs[*] is the kind of things that make me fear

Re: Maintainers, porters, and burden of porting

2011-08-30 Thread Kurt Roeckx
On Mon, Aug 29, 2011 at 01:06:15PM +0200, Lucas Nussbaum wrote: Sorry, but I disagree here. I don't think it is reasonable to expect porters to check for build failures in general, especially as many of them just happen because of generic maintainer errors and cross-architectures.

Accepted libtool 2.4-4 (source all amd64)

2011-08-24 Thread Kurt Roeckx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 24 Aug 2011 14:10:54 + Source: libtool Binary: libtool libtool-doc libltdl7 libltdl-dev Architecture: source all amd64 Version: 2.4-4 Distribution: unstable Urgency: low Maintainer: Kurt Roeckx k...@roeckx.be Changed

Re: mplayer2 is a very poor fork name used to confuse users.

2011-08-19 Thread Kurt Roeckx
On Thu, Aug 18, 2011 at 11:56:41PM -0400, compn wrote: mplayer2 is a very poor fork name used to confuse users. So you think Debian should rename the package to confuse people even more? Or is there some other reason you mailed this to the Debian list? I suggest you take it up with the people

<    1   2   3   4   5   6   7   8   >