Re: [arch-dev-public] News item for openssh-7.0p1-1

2015-08-12 Thread Gaetan Bisson
[2015-08-13 12:34:07 +0900] Gaetan Bisson:
> Oh, sure. Here's a new proposal:

Better wording.


Title: openssh-7.0p1 deprecates ssh-dss keys

In light of recently discovered vulnerabilities, the new `openssh-7.0p1`
release deprecates keys of `ssh-dss` type, also known as DSA keys. See
the
[upstream 
announcement](http://lists.mindrot.org/pipermail/openssh-unix-announce/2015-August/000122.html)
for details.

Before updating and restarting `sshd` on a remote host, make sure you do
not rely on such keys for connecting to it. To enumerate DSA keys
granting access to a given account, use:

grep ssh-dss ~/.ssh/authorized_keys

If you have any, ensure you have alternative means of logging in, such
as key pairs of a different type, or password authentication.

Finally, host keys of `ssh-dss` type being deprecated too, you might
have to confirm a new fingerprint (for a host key of a different type)
when connecting to a freshly updated server.


-- 
Gaetan


signature.asc
Description: PGP signature


Re: [arch-dev-public] News item for openssh-7.0p1-1

2015-08-12 Thread Gaetan Bisson
[2015-08-12 20:24:07 +0200] Jens Adam:
> Thu, 13 Aug 2015 00:03:59 +0900
> Gaetan Bisson :
> 
> > Hi,
> > 
> > I'd like to suggest the following piece of news to be posted when
> > openssh-7.0p1-1 lands in [core]:
> > 
> > 
> > The new openssh-7.0p1 release deprecates certain types of SSH keys
> > that are now considered vulnerable. For details, see the
> > [upstream
> > announcement](http://lists.mindrot.org/pipermail/openssh-unix-announce/2015-August/000122.html).
> > 
> > Before updating and restarting sshd on remote hosts, if you rely on
> > SSH keys for authentication, please make sure that you have a recent
> > key pair set up, or alternative means of logging in (such as using
> > password authentication).
> 
> Perhaps you could clarify that this only affects people using ssh-dss
> keys for authentication and how to check for them, e.g. "use 'grep
> ssh-dss ~/.ssh/{known_hosts,authorized_keys*,*.pub}' to find legacy
> keys".

Oh, sure. Here's a new proposal:


The new `openssh-7.0p1` release deprecates keys of `ssh-dss` type (also
known as DSA) in light of recently discovered vulnerabilities. For
details, see the
[upstream 
announcement](http://lists.mindrot.org/pipermail/openssh-unix-announce/2015-August/000122.html).

Before updating and restarting sshd on remote hosts, make sure you do
not rely solely on DSA keys for connecting to it. You may enumerate DSA
keys that allow connecting to a remote account with:

grep ssh-dss ~/.ssh/authorized_keys

If you have any, ensure you have alternative means of logging in (such
a key pair of a different type, or password authentication).

Note that host keys of `ssh-dss` type are also deprecated; if you were
relying on them to connect to a server, after updating it, you will have
to confirm the fingerprint of a key of another type to reconnect.


-- 
Gaetan


signature.asc
Description: PGP signature


Re: [arch-dev-public] News item for openssh-7.0p1-1

2015-08-12 Thread Gaetan Bisson
[2015-08-12 23:15:34 +0200] Christian Hesse:
> Gaetan Bisson  on Thu, 2015/08/13 00:03:
> > Hi,
> > 
> > I'd like to suggest the following piece of news to be posted when
> > openssh-7.0p1-1 lands in [core]:
> > 
> > 
> > The new openssh-7.0p1 release deprecates certain types of SSH keys that
> > are now considered vulnerable. For details, see the
> > [upstream
> > announcement](http://lists.mindrot.org/pipermail/openssh-unix-announce/2015-August/000122.html).
> > 
> > Before updating and restarting sshd on remote hosts, if you rely on SSH
> > keys for authentication, please make sure that you have a recent key
> > pair set up, or alternative means of logging in (such as using password
> > authentication).
> 
> This does not only apply for public key authentication but for host keys as
> well. Do we want to add a note about that?

If updating your openssh client breaks connectivity to an old SSH
server, that's fine, you can just roll back the openssh client, fix
things, and update later.

The only issue is updating servers. But host keys are not a problem
because sshdgenkeys.service generates all key types. If a user
deliberately chose to only trust a DSS key (by default, it would have
been RSA keys) then they just have to "blindly" trust a key of another
type to connect to the updated server. That does not sound like a big
issue to me.

Cheers.

-- 
Gaetan


signature.asc
Description: PGP signature


Re: [arch-dev-public] News item for openssh-7.0p1-1

2015-08-12 Thread Christian Hesse
Gaetan Bisson  on Thu, 2015/08/13 00:03:
> Hi,
> 
> I'd like to suggest the following piece of news to be posted when
> openssh-7.0p1-1 lands in [core]:
> 
> 
> The new openssh-7.0p1 release deprecates certain types of SSH keys that
> are now considered vulnerable. For details, see the
> [upstream
> announcement](http://lists.mindrot.org/pipermail/openssh-unix-announce/2015-August/000122.html).
> 
> Before updating and restarting sshd on remote hosts, if you rely on SSH
> keys for authentication, please make sure that you have a recent key
> pair set up, or alternative means of logging in (such as using password
> authentication).

This does not only apply for public key authentication but for host keys as
well. Do we want to add a note about that?

Old algorithms can be used when explicitly enabling them, though... ;)

The systemd unit sshdgenkeys.service still generates a dsa host key. Do we
want to change that?
-- 
main(a){char*c=/*Schoene Gruesse */"B?IJj;MEH"
"CX:;",b;for(a/*Chris   get my mail address:*/=0;b=c[a++];)
putchar(b-1/(/*   gcc -o sig sig.c && ./sig*/b/42*2-3)*42);}


pgpvErTMUl8p3.pgp
Description: OpenPGP digital signature


[arch-dev-public] News item for openssh-7.0p1-1

2015-08-12 Thread Gaetan Bisson
Hi,

I'd like to suggest the following piece of news to be posted when
openssh-7.0p1-1 lands in [core]:


The new openssh-7.0p1 release deprecates certain types of SSH keys that
are now considered vulnerable. For details, see the
[upstream 
announcement](http://lists.mindrot.org/pipermail/openssh-unix-announce/2015-August/000122.html).

Before updating and restarting sshd on remote hosts, if you rely on SSH
keys for authentication, please make sure that you have a recent key
pair set up, or alternative means of logging in (such as using password
authentication).


-- 
Gaetan


Re: [arch-dev-public] [core] build failures

2015-08-12 Thread Allan McRae
On 12/08/15 22:53, Gaetan Bisson wrote:
> [2015-08-12 20:42:21 +1000] Allan McRae:
>> Failure in package():
>>  FAIL: ldns - build failed
> 
> It works for me. Do you build from trunk?
> 

I built it from a checkout on the 8th.  I see you fixed the build since
then.  Works now.

A


Re: [arch-dev-public] [core] build failures

2015-08-12 Thread Gaetan Bisson
[2015-08-12 20:42:21 +1000] Allan McRae:
> Failure in package():
>   FAIL: ldns - build failed

It works for me. Do you build from trunk?

-- 
Gaetan


Re: [arch-dev-public] [core] build failures

2015-08-12 Thread Andrea Scarpino
On Wed, Aug 12, 2015 at 12:42 PM, Allan McRae  wrote:

> FAIL: gummiboot - build failed


IMHO this should just be dropped.

-- 
Andrea


[arch-dev-public] [core] build failures

2015-08-12 Thread Allan McRae
Hi all,

I have through the build failures I noticed in [core] when testing for
reproducible builds.  Most were PKGBUILDs missing the validpgpkey array,
which I have fixed.  Here are the details for the rest:

Failure in build:
FAIL: grub - build failed
FAIL: gummiboot - build failed
FAIL: isdn4k-utils - build failed
FAIL: ncurses - build failed
FAIL: reiserfsprogs - build failed

Failure in package():
FAIL: ldns - build failed
FAIL: perl - build failed

Source unavailble:
FAIL: ipw2100-fw - build failed
FAIL: ipw2200-fw - build failed
FAIL: lvm2 - build failed
FAIL: xinetd - build failed

Checksum failure:
FAIL: nilfs-utils - build failed

PGP failure:
FAIL: findutils - build failed
(PGP key is so old that gnupg refuses to retrieve it)


It would be great if these could be addressed.

Allan


[arch-dev-public] Signoff report for [testing]

2015-08-12 Thread Arch Website Notification
=== Signoff report for [testing] ===
https://www.archlinux.org/packages/signoffs/

There are currently:
* 22 new packages in last 24 hours
* 0 known bad packages
* 0 packages not accepting signoffs
* 28 fully signed off packages
* 35 packages missing signoffs
* 23 packages older than 14 days

(Note: the word 'package' as used here refers to packages as grouped by
pkgbase, architecture, and repository; e.g., one PKGBUILD produces one
package per architecture, even if it is a split package.)


== New packages in [testing] in last 24 hours (22 total) ==

* man-pages-4.02-1 (any)
* tzdata-2015f-1 (any)
* gnupg-2.1.7-1 (i686)
* linux-4.1.5-1 (i686)
* linux-lts-3.14.50-1 (i686)
* openssh-7.0p1-1 (i686)
* pacman-4.2.1-3 (i686)
* sqlite-3.8.11.1-2 (i686)
* gnupg-2.1.7-1 (x86_64)
* linux-4.1.5-1 (x86_64)
* linux-lts-3.14.50-1 (x86_64)
* openssh-7.0p1-1 (x86_64)
* pacman-4.2.1-3 (x86_64)
* sqlite-3.8.11.1-2 (x86_64)
* nvidia-352.30-3 (i686)
* nvidia-304xx-304.125-23 (i686)
* nvidia-340xx-340.76-14 (i686)
* polkit-0.113-2 (i686)
* nvidia-352.30-3 (x86_64)
* nvidia-304xx-304.125-23 (x86_64)
* nvidia-340xx-340.76-14 (x86_64)
* polkit-0.113-2 (x86_64)


== Incomplete signoffs for [core] (17 total) ==

* man-pages-4.02-1 (any)
0/2 signoffs
* tzdata-2015f-1 (any)
0/2 signoffs
* e2fsprogs-1.42.13-1 (i686)
0/1 signoffs
* efivar-0.21-1 (i686)
0/1 signoffs
* iproute2-4.1.1-1 (i686)
0/1 signoffs
* libidn-1.32-1 (i686)
0/1 signoffs
* libseccomp-2.2.3-1 (i686)
0/1 signoffs
* linux-4.1.5-1 (i686)
0/1 signoffs
* linux-lts-3.14.50-1 (i686)
0/1 signoffs
* pacman-4.2.1-3 (i686)
0/1 signoffs
* sqlite-3.8.11.1-2 (i686)
0/1 signoffs
* efivar-0.21-1 (x86_64)
0/2 signoffs
* ldns-1.6.17-3 (x86_64)
1/2 signoffs
* linux-4.1.5-1 (x86_64)
0/2 signoffs
* linux-lts-3.14.50-1 (x86_64)
0/2 signoffs
* pacman-4.2.1-3 (x86_64)
0/2 signoffs
* sqlite-3.8.11.1-2 (x86_64)
1/2 signoffs

== Incomplete signoffs for [extra] (18 total) ==

* exiv2-0.25-2 (i686)
0/1 signoffs
* graphite-1:1.3.0-1 (i686)
0/1 signoffs
* nvidia-352.30-3 (i686)
0/1 signoffs
* nvidia-304xx-304.125-23 (i686)
0/1 signoffs
* nvidia-340xx-340.76-14 (i686)
0/1 signoffs
* polkit-0.113-2 (i686)
0/1 signoffs
* sddm-0.11.0-2 (i686)
0/1 signoffs
* subversion-1.9.0-1 (i686)
0/1 signoffs
* twisted-15.3.0-1 (i686)
0/1 signoffs
* exiv2-0.25-2 (x86_64)
0/2 signoffs
* graphite-1:1.3.0-1 (x86_64)
0/2 signoffs
* nvidia-352.30-3 (x86_64)
0/2 signoffs
* nvidia-304xx-304.125-23 (x86_64)
0/2 signoffs
* nvidia-340xx-340.76-14 (x86_64)
0/2 signoffs
* polkit-0.113-2 (x86_64)
0/2 signoffs
* sddm-0.11.0-2 (x86_64)
0/2 signoffs
* subversion-1.9.0-1 (x86_64)
0/2 signoffs
* twisted-15.3.0-1 (x86_64)
0/2 signoffs


== Completed signoffs (28 total) ==

* wireless-regdb-2015.06.05-1 (any)
* ed-1.12-1 (i686)
* gettext-0.19.5-1 (i686)
* gnupg-2.1.7-1 (i686)
* gpgme-1.5.5-1 (i686)
* hdparm-9.48-1 (i686)
* kbd-2.0.3-1 (i686)
* ldns-1.6.17-3 (i686)
* libassuan-2.2.1-1 (i686)
* openssh-7.0p1-1 (i686)
* pam-1.2.1-1 (i686)
* pinentry-0.9.5-1 (i686)
* xfsprogs-3.2.3-1 (i686)
* e2fsprogs-1.42.13-1 (x86_64)
* ed-1.12-1 (x86_64)
* gettext-0.19.5-1 (x86_64)
* gnupg-2.1.7-1 (x86_64)
* gpgme-1.5.5-1 (x86_64)
* hdparm-9.48-1 (x86_64)
* iproute2-4.1.1-1 (x86_64)
* kbd-2.0.3-1 (x86_64)
* libassuan-2.2.1-1 (x86_64)
* libidn-1.32-1 (x86_64)
* libseccomp-2.2.3-1 (x86_64)
* openssh-7.0p1-1 (x86_64)
* pam-1.2.1-1 (x86_64)
* pinentry-0.9.5-1 (x86_64)
* xfsprogs-3.2.3-1 (x86_64)


== All packages in [testing] for more than 14 days (23 total) ==

* hdparm-9.48-1 (i686), since 2015-07-09
* hdparm-9.48-1 (x86_64), since 2015-07-09
* libassuan-2.2.1-1 (i686), since 2015-07-09
* libassuan-2.2.1-1 (x86_64), since 2015-07-09
* pinentry-0.9.5-1 (i686), since 2015-07-09
* pinentry-0.9.5-1 (x86_64), since 2015-07-09
* gpgme-1.5.5-1 (i686), since 2015-07-09
* gpgme-1.5.5-1 (x86_64), since 2015-07-09
* wireless-regdb-2015.06.05-1 (any), since 2015-07-09
* xfsprogs-3.2.3-1 (i686), since 2015-07-10
* xfsprogs-3.2.3-1 (x86_64), since 2015-07-10
* ed-1.12-1 (i686), since 2015-07-10
* ed-1.12-1 (x86_64), since 2015-07-10
* gettext-0.19.5-1 (i686), since 2015-07-11
* gettext-0.19.5-1 (x86_64), since 2015-07-11
* kbd-2.0.3-1 (i686), since 2015-07-14
* kbd-2.0.3-1 (x86_64), since 2015-07-14
* efivar-0.21-1 (i686), since 2015-07-16
* efivar-0.21-1 (x86_64), since 2015-07-16
* pam-1.2.1-1 (i686), since 2015-07-18
* pam-1.2.1-1 (x86_64), since 2015-07-18
* libseccomp-2.2.3-1 (i686), since 2015-07-20
* libseccomp-2.2.3-1 (x86_64), since 2015-07-20


== Top five in signoffs in last 24 hours ==

1. bisson - 4 signoffs
2. foutrelis - 3 signoffs
3. eworm - 2 signoffs