Bug#955038: Staat_der_Nederlanden_Root_CA_-_G2.crt still in package

2020-06-02 Thread Hanno Böck
The ca-certificates version 20200601 removes various old/obsolete
certificates, but still contains one expired certificate:

Staat_der_Nederlanden_Root_CA_-_G2.crt

This expired on March 25 2020 and should probably also be removed.

-- 
Hanno Böck
https://hboeck.de/



Bug#893033: util-linux instead of bsdmainutils

2020-04-25 Thread Hanno Böck
Just wanted to add:

The util-linux package (upstream) also contains a "look" tool and it
doesn't have this filesize limitation.
But it seems Debian's util-linux package is not shipping that tool.

Maybe you should switch to provide look via util-linux instead of the
limited version from bsdmainutils.

-- 
Hanno Böck
https://hboeck.de/



Bug#921663: Please add python-certbot update to jessie-backports

2019-02-07 Thread Hanno Böck
Package: python-certbot

Regarding the Let's Encrypt / TLS-SNI-01 situation I think the
python-certbot 0.28.0 update should be added to jessie-backports (for
context see bugs #887399 and #888703).

It seems to be common that people on Jessie installed python-certbot
from the jessie-backports repository. Given that the version 0.10.2
will stop working in a few days I hope this can be sorted out quickly.

(Background: Let's Encrypt will finally disable the TLS-SNI-01 domain
validation method due to security issues, which in older certbot
versions was the standard for apache+nginx setups.)



Bug#887399: Question about stable-updates

2019-01-28 Thread Hanno Böck
From what I understand the "stable-updates suite" is not part of the
normal Debian stable distribution. I also don't see the update with an
"apt update; apt upgrade".

Is the plan to keep it that way?

In effect this means all "normal" stable users who don't do anything
extra will still have a broken setup in 2 weeks, because they relied on
an automation technology that they hoped would solve their cert
problems.

I don't think this is an acceptable solution TBH.



Bug#911289: ca-certificates should remove Symantec certs

2018-10-18 Thread Hanno Böck
Package: ca-certificates
Version: 20180409

I think most people are aware that browser vendors agreed to distrust
certificates by Symantec and they no longer issue certificates (their
business got sold to Digicert).

This should also be reflected in the ca-certificates package and the
Symantec roots should be removed (particularly as this package is
acting as a de-facto upstream for several other distros).

This needs some checking which certificates exactly shall be removed.
Symantec operated under various different brand names (Thawte, Geotrust,
and they also owned the old Verisign roots), and some of their roots
have changed the owner and are excluded from the distrust.



Bug#891907: memcached should disable UDP by default

2018-03-07 Thread Hanno Böck
On Tue, 6 Mar 2018 18:58:22 +0100
Guillaume Delacour  wrote:

> The version 1.5.6 will be uploaded in the archive in a few days.
> I'll try to propose a backport patch at least for versions in stretch
> and jessie (with upstream review, if possible).

Ubuntu has published fixes for several versions, maybe their patches
can be used:
https://bugs.launchpad.net/ubuntu/+source/memcached/+bug/1752831

-- 
Hanno Böck
https://hboeck.de/

mail/jabber: ha...@hboeck.de
GPG: FE73757FA60E4E21B937579FA5880072BBB51E42


pgpJTGC6BH_k5.pgp
Description: OpenPGP digital signature


Bug#891907: CVE-2018-1000115

2018-03-03 Thread Hanno Böck
This got CVE-2018-1000115 assigned.



Bug#891907: memcached should disable UDP by default

2018-03-02 Thread Hanno Böck
Package: memcached
Version: 1.4.33-1

Memcached is currently involved in some massive ddos attacks, see e.g.:
https://blog.cloudflare.com/memcrashed-major-amplification-attacks-from-port-11211/

The UDP protocol of memcached can be abused for very effective DDoS
amplification attacks and should therefore be considered dangerous.
Upstream memcached has reacted to this by disabling UDP by default:
https://github.com/memcached/memcached/wiki/ReleaseNotes156

In Debian memcached by default only listens to 127.0.0.1, but enables
UDP. While the localhost-only protects default settings, it's still
only a minor change away from creating an effective DDoS tool for a
protocol that is hardly in use today. I recommend that you backport
the upstream change and disable UDP by default.



Bug#874034: Debian should disable legacy vsyscall

2017-09-02 Thread Hanno Böck
Package: kernel

The current Debian kernels support the legacy vsyscall method. This can
be a security risk and is not needed within a modern system.

Background:
vsyscall was a method to map commonly used kernel functions into
application space to a fixed address. It has been replaced by the more
secure and flexible vdso mechanism.

vsyscall is problematic, because it maps code to a fixed address, thus
making ASLR (Address Space Layout Randomization) less effective. Due to
this vsyscall has been redesigned into an "emulated" mode (which is
what Debian's current kernels support) that reduces the amount of code
and thus the attack surface. But still it's some code mapped to a fixed
address and a legacy feature that shouldn't be needed any more.

Currently Debian kernels have the option
CONFIG_LEGACY_VSYSCALL_EMULATE=y
This should be disabled and instead
CONFIG_LEGACY_VSYSCALL_NONE=y
should be set.

Please note that this would still not remove the functionality, it
would just disable it by default. By passing vsyscall=emulate to the
boot command line users could still reactivate it. (By setting
CONFIG_X86_VSYSCALL_EMULATION=n alternatively it could also be disabled
entirely.)

Compatibility risks:

Modern glibc versions don't use vsyscall, so dynamic binaries won't be
affected by this change (unless you happen to try to run a very old
glibc version within a modern debian).
Users trying to run very old static binaries may be negatively
affected, as these may no longer run if they try to use vsyscall.

Given that the release of Debian Buster is still some time away I think
now would be a good time to implement such a change in unstable/testing,
making it likely that potential problems would be discovered long
before Buster gets released.



Bug#873122: HTTP Link to Keyring

2017-08-24 Thread Hanno Böck
Package: www.debian.org

When downloading a Debian CD there's a webpage explaining how to verify
signatures:
https://www.debian.org/CD/verify

This recommends to check the signatures with the keys from the Debian
GPG keyring. However that link is HTTP, pointing to:
http://keyring.debian.org/

It will immediately redirect to HTTPS, but an attacker could intercept
that redirection and present a user with a malicious keyring instead.

This makes the verification kinda pointless, as the keyring is
delivered over a potentially insecure channel. The lack of HSTS on
debian.org makes this particularly worriesome. Please change that link
to HTTPS.



Bug#860256: chromium .desktop file Icon definition is not valid

2017-04-13 Thread Hanno Böck
Package: chromium
Version: 56.0.2924.76-5

The .desktop file in the chromium deb is not valid according to the
desktop-file-validate tool.

The error is pretty self-explaining, it's referencing
"chromium.png" for the Icon, it shouldn't do that (but only "chromium"):

/usr/share/applications/chromium.desktop:
error: (will be fatal in the future): value "chromium.png" for key
"Icon" in group "Desktop Entry" is an icon name with an extension, but
there should be no extension as described in the Icon Theme
Specification if the value is not an absolute path



Bug#832920: HSTS

2016-07-29 Thread Hanno Böck
Please also add an HSTS header to enforce future connections to be
HTTPS and avoid SSL Stripping attacks.



Bug#772765: fix

2015-04-24 Thread Hanno Böck
Just FYI: I also discovered this bug and tracked it down. It has
nothing to do with debian and is a dovecot upstream bug.

See here:
http://dovecot.org/pipermail/dovecot/2015-April/100618.html

Patch:
http://dovecot.org/pipermail/dovecot/attachments/20150424/bade681d/attachment.bin


pgpWrqnV69sBp.pgp
Description: OpenPGP digital signature


Bug#783174: Randomized timestamps

2015-04-23 Thread Hanno Böck
What's happening here is that some TLS implementations and
servers started randomizing their timestamps. Seems this happened on
www.ptb.de.

Other distributions sometimes have www.google.com set as their
timesource. This is more reliable because google itself is using
tlsdate for chromeos.

On the long term the tls timestamp will probably go away anyway. An
alternative is to use the HTTP header time. (or fix ntp, which is
currently being done, but that's another story)

I'd suggest debian patches tlsdate to use www.google.com.

Reported upstream as well:
https://github.com/ioerror/tlsdate/issues/172


pgpZ7KsNuERnr.pgp
Description: OpenPGP digital signature


Bug#766314: unp uses deprecated "have" keyword in bash completion

2014-10-22 Thread Hanno Böck
Package: unp
Version: 2.0~pre7+nmu1

The bash completion file in the package unp uses the deprecated "have"
keyword.

According to bash completion this should no longer be used:
http://anonscm.debian.org/cgit/bash-completion/bash-completion.git/tree/bash_completion#n125

Bash completion rules should just apply unconditionally.

See attached patch for latest unp 2.0~pre7+nmu1diff -Naur unp-2.0~pre7+nmu1/bash_completion.d/unp unp-2.0~pre7+nmu1-1/bash_completion.d/unp
--- unp-2.0~pre7+nmu1/bash_completion.d/unp	2012-05-16 22:05:13.0 +0200
+++ unp-2.0~pre7+nmu1-1/bash_completion.d/unp	2014-10-22 10:34:20.343233166 +0200
@@ -1,6 +1,5 @@
 # bash completion for unp
 
-have unp &&
 _unp()
 {
 local cur


Bug#688383: Add audio/opus mimetype for .opus extension to mime.types

2012-09-22 Thread Hanno Böck
Package: mime-support
Version: 3.53
Severity: wishlist

Please add a line to mime.types for the new IETF opus audio codec.
According to xiph, this should be audio/ogg with the extension .opus:
https://wiki.xiph.org/OggOpus#Content_Type
Or if one wants to be more precise, 'audio/ogg; codecs=opus'.

This is also what the draft rfc here indicates:
https://www.ietf.org/id/draft-terriberry-oggopus-01.txt

There also exists the audio/opus mimetype, but it's considered to be
only used for RTP streams:
https://tools.ietf.org/html/draft-spittka-payload-rtp-opus-01

As far as I can see, there's no audio/opus fileextension, it's only
used for streams.


signature.asc
Description: PGP signature


Bug#492369: xz support

2009-12-22 Thread Hanno Böck
I modified your last patch so it also includes .tar.xz-support. What's 
probably missing is xz/lzma-support without .tar, I was too lazy to figure out 
the gz/bzip2-logic.
diff -Naur unp-1.0.15/unp unp-1.0.15-1/unp
--- unp-1.0.15/unp	2008-05-18 02:55:54.0 +0200
+++ unp-1.0.15-1/unp	2009-12-22 14:01:13.0 +0100
@@ -38,20 +38,23 @@
 }
 
 %pkgmap = (
-   cpio, "afio $or cpio",
-   afio, "afio $or cpio",
-   rpm2cpio, "rpm, afio $or cpio",
-   unshar, sharutils,
-   uudecode, sharutils,
-   PPMd, ppmd,
-   rar, "rar $or unrar $or unrar-free",
-   ar, binutils,
-   unarj, "unarj $or arj", 
-   hexbin, macutils,
+   "xz", "xz-utils",
+   "lzma", "lzma",
+   "7z", "p7zip $or p7zip-full",
+   "cpio", "afio $or cpio",
+   "afio", "afio $or cpio",
+   "rpm2cpio", "rpm, afio $or cpio",
+   "unshar", "sharutils",
+   "uudecode", "sharutils",
+   "PPMd", "ppmd",
+   "rar", "rar $or unrar $or unrar-free",
+   "ar", "binutils",
+   "unarj", "unarj $or arj",
+   "hexbin", "macutils",
#macunpack, macunpack,
-   gunzip, gzip,
-   bunzip2, bzip2,
-   formail, "formail, mpack"
+   "gunzip", "gzip",
+   "bunzip2", "bzip2",
+   "formail", "formail, mpack"
 );
 
 &print_usage if ($#ARGV<0 || $ARGV[0] eq "-h");
@@ -153,6 +156,7 @@
if ($UNP_FILEstr =~ /CAB file/i) { set_command 'cabextract $UNP_FILE'; }
if ($UNP_FILEstr =~ /cpio/i) { set_command('afio -Z -v -i $UNP_FILE','cpio -i -d	--verbose  $UNP_ARGS < $UNP_FILE'); }
if ($UNP_FILEstr =~ /Zip.*archive/i) { set_command 'unzip $UNP_ARGS $UNP_FILE'; }
+   if ($UNP_FILEstr =~ /7-zip.*archive/i) { set_command '7z x $UNP_ARGS $UNP_FILE'; }
if ($UNP_FILEstr =~ /Zoo.*archive/i) { set_command 'unzoo -x $UNP_ARGS $UNP_FILE'; }
if ($UNP_FILEstr =~ /shell.*archive/i) { set_command 'unshar $UNP_ARGS $UNP_FILE'; }
if ($UNP_FILEstr =~ /Transport Neutral Encapsulation Format/i) { set_command 'tnef -v $UNP_ARGS $UNP_FILE'; }
@@ -214,12 +218,13 @@
 	
 	# check also for _tar, because of broken filenames
   if ($UNP_FILE =~ /(\.|_)tar$/i) { set_command 'tar -xvf $UNP_FILE $UNP_ARGS'; }
-	if ($UNP_FILE =~ /(\.|_)rpm$/i) { set_command 'rpm2cpio < $UNP_FILE | cpio -i -d	--verbose $UNP_ARGS';}
-	if ($UNP_FILE =~ /(\.|_)tar\.gz$/i) { set_command 'tar -xvzf $UNP_FILE $UNP_ARGS'; }
+  if ($UNP_FILE =~ /(\.|_)rpm$/i) { set_command 'rpm2cpio < $UNP_FILE | cpio -i -d	--verbose $UNP_ARGS';}
+  if ($UNP_FILE =~ /(\.|_)tar\.gz$/i) { set_command 'tar -xvzf $UNP_FILE $UNP_ARGS'; }
   if ($UNP_FILE =~ /(\.|_)tar\.bz2$/i) { set_command 'bunzip2 -c $UNP_FILE | tar -xvf - $UNP_ARGS'; }
-	
-	if ($UNP_FILE =~ /\.tgz$/i) { set_command 'tar -xvzf $UNP_FILE $UNP_ARGS'; }
-	if ($UNP_FILE =~ /\.(tzo|tar\.lzop)$/i) { set_command 'lzop -v -d $UNP_FILE | tar -xv $UNP_ARGS'; }
+  if ($UNP_FILE =~ /\.tgz$/i) { set_command 'tar -xvzf $UNP_FILE $UNP_ARGS'; }
+  if ($UNP_FILE =~ /\.(tzo|tar\.lzop)$/i) { set_command 'lzop -v -d $UNP_FILE | tar -xv $UNP_ARGS'; }
+  if ($UNP_FILE =~ /(\.|_)tar\.xz$/i) { set_command 'tar -xvJf $UNP_FILE $UNP_ARGS'; }
+  if ($UNP_FILE =~ /(\.|_)tar\.lzma$/i) { set_command 'lzma -cd $UNP_FILE | tar -xvf - $UNP_ARGS'; }
   if ($UNP_FILE =~ /\.rar$/i) { set_command('rar x $UNP_ARGS $UNP_FILE || rar x -av- $UNP_ARGS $UNP_FILE','unrar x $UNP_ARGS $UNP_FILE || unrar x -av- $UNP_ARGS $UNP_FILE'); }
   if ($UNP_FILE =~ /\.(ar|deb)$/i) { set_command 'ar -x -v $UNP_FILE $UNP_ARGS'; }
   if ($UNP_FILE =~ /\.l(ha|zh)$/i) { set_command 'lha x $UNP_ARGS $UNP_FILE'; }


signature.asc
Description: This is a digitally signed message part.


Bug#440318: Hybrid auth available in svn snapshot

2009-11-17 Thread Hanno Böck
Hybrid auth based on gnutls is available in the svn version of vpnc. So 
bumping to an svn snapshot fixes this issue without license implications. You 
can find an svn snapshot here:
http://distfiles.gentoo.org/distfiles/vpnc-0.5.3_p449.tar.bz2

-- 
Hanno Böck  Blog:   http://www.hboeck.de/
GPG: 3DBD3B20   Jabber/Mail:ha...@hboeck.de

http://schokokeks.org - professional webhosting


signature.asc
Description: This is a digitally signed message part.


Bug#492369: Patch does not work

2008-11-05 Thread Hanno Böck
I get this when using your patch:

[EMAIL PROTECTED] /tmp $ unp /usr/portage/distfiles/eix-0.14.2.tar.lzma
Bareword found where operator expected at /usr/bin/unp line 42, near "7z"
(Missing operator before z?)
syntax error at /usr/bin/unp line 42, near "7z"
Execution of /usr/bin/unp aborted due to compilation errors.


signature.asc
Description: This is a digitally signed message part.