Re: deb-ice -- violating the GPL since 2007-08-14

2007-09-02 Thread Joey Schulze
Robert Edmonds wrote:
> "deb-ice" is a custom Debian distribution, described in [0] and available from
> [1].  It appears to be a preseeded Debian 4.0 i386 business card ISO built
> using a web-based tool called LinuxCOE[2], and the aggregator has attempted to
> place the entire work under a license[3] which appears to be the GPLv2 with 
> the
> string "GNU GENERAL PUBLIC LICENSE" stripped out.

Ouch!  It appears to me that deb-ice is not a Debian project, though.
Therefore, it may be worth to take this to the deb-ice developer(s)
instead of the Debian project.  Otherwise debian-curiosa seems to be
a proper list for such comments.

Regards,

Joey

-- 
Testing? What's that? If it compiles, it is good, if it boots up, it is perfect.

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



DUG: Debian User Groups, and their status.

2007-09-02 Thread Junichi Uekawa

Hi,


I've noticed that there is: http://wiki.debian.org/LocalGroups
and added Japan to the list.

I think it would be better served if it were linked from
www.debian.org, or placed under www.debian.org.  Am I missing
something?




regards,
junichi
-- 
[EMAIL PROTECTED],netfort.gr.jp}   Debian Project


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



ITP: libmath-pari-perl

2007-09-02 Thread Deepak Tripathi

Package: wnpp
Severity: wishlist
Owner: Deepak Tripathi  <[EMAIL PROTECTED]>

* Package name : libmath-pari-perl
Version   : 2.010709
Upstream Author  :Ilya Zakharevich 
|* URL : 
http://search.cpan.org/~ilyaz/Math-Pari-2.010709/

* License : Perl License
Programming Lang   : Perl
Description: This package is a Perl interface to famous 
library PARI for numerical/scientific/number-theoretic calculations. It 
allows use of most PARI functions as Perl functions, and (almost) 
seamless merging of PARI and Perl data.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#440544: ITP: easyspice -- A graphical frontend to the Spice simulator

2007-09-02 Thread Gudjon I. Gudjonsson
Package: wnpp
Severity: wishlist
Owner: "Gudjon I. Gudjonsson" <[EMAIL PROTECTED]>


* Package name: easyspice
  Version : 0.6.7
  Upstream Author : Jean-Marc Routoure <[EMAIL PROTECTED]>
* URL : http://easy-spice.sourceforge.net
* License : GPL
  Programming Lang: C
  Description : A graphical frontend to the Spice simulator

 Easyspice is a graphical frontend for the electrical circuit simulator
 Spice. It is by default connected to the geda package and ngspice but 
 can be used as a frontend for other spice simulators programs as well.
 .
  Homepage: http://easy-spice.sourceforge.net


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.22-1-amd64 (SMP w/1 CPU core)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#440553: ITP: gspiceui -- A graphical user interface for gnucap and ngspice

2007-09-02 Thread Gudjon I. Gudjonsson
Package: wnpp
Severity: wishlist
Owner: "Gudjon I. Gudjonsson" <[EMAIL PROTECTED]>


* Package name: gspiceui
  Version : 0.9.33
  Upstream Author : Name Mike Waters <[EMAIL PROTECTED]>
* URL : http://www.geda.seul.org/tools/gspiceui
* License : GPL
  Programming Lang: C++
  Description : A graphical user interface for gnucap and ngspice

 Gspiceui is a graphichal user interface for the two freely available
 electronic circuit engines: GNU-Cap and Ng-Spice
 Current features are:
 * Import gschem schematic files using gentlist.
 * Load and parse circuit description (net list) files.
 * Provides a GUI interface for GNU-Cap OP, DC, AC and Transient analyses and
 generates appropriate simulator commands based on user input. 
 * Provides a GUI interface for Ng-Spice DC, AC and Transient analyses and
 generates appropriate simulator commands based on user input. 
 * The raw output may be viewed for any processes initiated by gspiceui. 
 * Formatting of simulator output so that it may be plotted using gwave
 .
  Homepage: http://www.geda.seul.org/tools/gspiceui/


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.22-1-amd64 (SMP w/1 CPU core)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



"Etch and a half" ( was Re: Bugfix/hardware support updates to stable releases?)

2007-09-02 Thread Tim Hull
Hi all,

The idea (mentioned in the prior thread) of having an "Etch and a half"
release with an updated X/kernel/installer sounds EXACTLY like what I was
hinting at.  Backports are great, but having a supported, Debian-tested
release that Debian can give to users with new/exotic hardware (which has
better support in newer kernels/X releases) would be much better.  I've been
wrestling with Etch this summer on my MacBook (first generation!), and such
a release would probably eliminate 99% of my complaints.  Many Debian users
are probably in the same boat - they don't mind having an old
GNOME/Emacs/coreutils, but do mind being stuck with a kernel/X/installer
that doesn't fully support their hardware.

Anyway, I'm curious - is this still a legitimate consideration within
Debian?  If it were to be done, it would have to be December/Januaryish (any
later and it would be too close to Lenny, unless of course Lenny is late).
I figure that this would be a new "branch" - much in the same sense as
sarge, etch, lenny, and sid are.  Thus, one wouldn't HAVE to upgrade, but
new users and anyone standing to benefit from a new X/kernel (and possibly
some other bugfixes) would want to consider using the new "etch and a
half".  I think this idea would definitely benefit Debian - more people
would be able to use it, and it would remain quite stable while still
supporting the latest hardware.

Obviously, there are issues with the whole plan.  For one, Debian would
effectively have one more development branch - at least while any such
"and-a-half" releases are developed.  Effectively, this may end up looking
like FreeBSD if such releases ever became common - albeit with less updates
to the "-stable" branch.   Furthermore, that would mean one more branch to
support with security updates, upgrades to lenny (or lenny+1 if a "lenny-and
a half" or a "lenny-and-two-thirds" are ever made), etc.  These are all
legitimate concerns.  However, I think it's worth consideration - in my
mind, this would fix Debian's greatest flaw in a way that's much better than
the Ubuntuish "we must release the full distro every 6 months" approach.

I'm curious to hear what everybody thinks regarding this whole concept, and
I'd love to see Debian seriously consider this.

Tim

P.S. I know I am not a Debian developer, and I don't even have a package in
the archive.  I totally understand if you feel like it's a bit overreaching
for me to bring things like this up.  Rest assured that I appreciate
everything Debian does, and I don't mean to detract from that AT ALL.

I will say that I'd definitely test any "and-a-half" release if this ever
came to fruition, and I'd work to help make it work out as I could.  Heck,
I've already been trying to work on making my own "and-a-half" to make Etch
work fully on my MacBook :)


RFC: changes to default password strength checks in pam_unix

2007-09-02 Thread Steve Langasek
Hi folks,

For years, the Debian pam packages have by default had a weaker password
length requirement than upstream.  I can think of no reason for this to be
the case, especially when upstream doesn't support a configurable minimum
password length and Debian does.

Does anyone else have a reasoned argument why Debian should have a weaker
password length check than upstream (4 chars instead of 6)?  If not, this
will be changed in the next upload of pam.

Cheers,
-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#440565: ITP: cereal -- automated, logged serial terminal management system

2007-09-02 Thread Daniel Kahn Gillmor
Package: wnpp
Severity: wishlist
Owner: Daniel Kahn Gillmor <[EMAIL PROTECTED]>


* Package name: cereal
  Version : 0.11
  Upstream Author : Jameson Rollins <[EMAIL PROTECTED]> and Daniel Kahn Gillmor 
<[EMAIL PROTECTED]>
* URL : http://cmrg.fifthhorseman.net/wiki/cereal
* License : GPLv3
  Programming Lang: Bash
  Description : automated, logged serial terminal management system

 cereal provides an easy way to set up and maintain automated,
 timestamped logs of serial lines, while simultaneously allowing end users
 to access them.  cereal can control an arbitrary number of logged lines,
 and each will be independently monitored.
 .
 Direct access to the monitored lines is allowed only to a specific
 user (who doesn't necessarily otherwise have access to the direct
 serial line), but logs can be made available to any group.  Logs
 are rotated automatically and their total space can be limited in
 size.
 .
  Homepage: http://cmrg.fifthhorseman.net/wiki/cereal

-

I'm not a debian developer, so i'll need someone to upload this.

The packaging is ready, though, and has been tested over the last
couple of versions on a handful of production machines.

Regards,

--dkg

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing'), (200, 'unstable'), (101, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.21-2-686 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: block 438885 with 440574

2007-09-02 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.9.26
> block 438885 with 440574
Bug#440574: memlockd postinst starts twice, doesn't use invoke-rc.d
Bug#438885: Mass bug filing: must use invoke-rc.d
Was blocked by: 341413 341415 348259 348263 353660 367722 367725 367727 367729 
367730 367731 367732 367733 367734 367737 367740 367745 367753 367754 367755 
367759 367760 367762 375183
Blocking bugs of 438885 added: 440574

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: RFC: changes to default password strength checks in pam_unix

2007-09-02 Thread Lars Wirzenius
su, 2007-09-02 kello 12:47 -0700, Steve Langasek kirjoitti:
> Does anyone else have a reasoned argument why Debian should have a weaker
> password length check than upstream (4 chars instead of 6)?  If not, this
> will be changed in the next upload of pam.

What's the justification of not using a minimum password length of 8?

-- 
Crappy tools are not worth it. Find or make better ones.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: RFC: changes to default password strength checks in pam_unix

2007-09-02 Thread Steve Langasek
On Mon, Sep 03, 2007 at 12:04:52AM +0300, Lars Wirzenius wrote:
> su, 2007-09-02 kello 12:47 -0700, Steve Langasek kirjoitti:
> > Does anyone else have a reasoned argument why Debian should have a weaker
> > password length check than upstream (4 chars instead of 6)?  If not, this
> > will be changed in the next upload of pam.

> What's the justification of not using a minimum password length of 8?

Given modern processor power availability, I can't think of one; but I would
prefer to deal with this in two parts, first establishing whether we have a
good reason to use a /lower/ default than upstream, and then discussing with
upstream whether that default should be raised.

The upstream default of 6 has been around for at least 5 years, possibly as
long as a decade; and the code in question is inactive when pam_unix is
linked to cracklib, which I think most distributors other than Debian are
doing (we confine the use of libcracklib to the separate pam_cracklib
module, to keep cracklib out of base); so there probably isn't any modern
justification for this default at all.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Backports now appearing on debian.org package listings?

2007-09-02 Thread Tim Hull
When browsing debian.org, I came across something rather interesting...

http://packages.debian.org/etch-backports/

Evidently, all of the backports.org backports are now listed on the
debian.org packages listing. They are still on the backports.org servers and
not on the debian.org mirrors, but they do indeed appear on the Debian
website.  Debian-volatile also appears there as well, as well as the
unofficial etch-m68k.

Does this mean anything with regards to how backports will operate?  I'm
just curious, as you probably know from my past posts that I'm quite
interested in stable release updates beyond simple security updates...

Tim


Re: Backports now appearing on debian.org package listings?

2007-09-02 Thread Pierre Habouzit
On Sun, Sep 02, 2007 at 09:46:56PM +, Tim Hull wrote:
> When browsing debian.org, I came across something rather interesting...
> 
> http://packages.debian.org/etch-backports/

  see last debian-devel-announce@ mail.

-- 
·O·  Pierre Habouzit
··O[EMAIL PROTECTED]
OOOhttp://www.madism.org


pgpekUTT8JD33.pgp
Description: PGP signature


Re: packages.debian.org updated

2007-09-02 Thread Jens Seidel
Hi,

On Sun, Sep 02, 2007 at 10:58:12PM +0200, Frank Lichtenheld wrote:
> packages.debian.org was finally updated to the new code base that
> was already available some time from packages.debian.net.

great! Thanks a lot.

> Some known regressions:
> 
>  - While DDTP translations are used, the translation of all other
>strings is mostly broken currently. Should be fixed someday...

Why? Is some kind of i18n process missing or are translations just
outdated? Feel free to ask on debian-i18n for updates.

> The new code can be found in my git repository. More information at
> http://packages.debian.org/about/

Does this mean http://cvs.debian.org/packages/?root=webwml is obsolete
or do you want to merge it?

Jens


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: RFC: changes to default password strength checks in pam_unix

2007-09-02 Thread Roberto C . Sánchez
On Sun, Sep 02, 2007 at 02:39:25PM -0700, Steve Langasek wrote:
> 
> The upstream default of 6 has been around for at least 5 years, possibly as
> long as a decade; and the code in question is inactive when pam_unix is
> linked to cracklib, which I think most distributors other than Debian are
> doing (we confine the use of libcracklib to the separate pam_cracklib
> module, to keep cracklib out of base); so there probably isn't any modern
> justification for this default at all.
> 
Just curious, what is the rationale for wanting to keep cracklib out of
base?

Regards,

-Roberto

-- 
Roberto C. Sánchez
http://people.connexer.com/~roberto
http://www.connexer.com


signature.asc
Description: Digital signature


Re: RFC: changes to default password strength checks in pam_unix

2007-09-02 Thread Steve Langasek
On Sun, Sep 02, 2007 at 07:38:23PM -0400, Roberto C. Sánchez wrote:
> On Sun, Sep 02, 2007 at 02:39:25PM -0700, Steve Langasek wrote:

> > The upstream default of 6 has been around for at least 5 years, possibly as
> > long as a decade; and the code in question is inactive when pam_unix is
> > linked to cracklib, which I think most distributors other than Debian are
> > doing (we confine the use of libcracklib to the separate pam_cracklib
> > module, to keep cracklib out of base); so there probably isn't any modern
> > justification for this default at all.

> Just curious, what is the rationale for wanting to keep cracklib out of
> base?

Size and complexity.  Adding libpam-cracklib to base would be a 2MB increase
in the size of a minimal Debian system on i386, and add 5 packages to the
list of what has to be installed before the user can do something as simple
as set the initial root password.  Also, in terms of modularity, I don't
think it makes sense for pam_unix to link to cracklib anyway when we have a
separate pam_cracklib module for that (whether it's in a separate package or
not).

I also think that enabling cracklib password checking is probably not a
reasonable default for single-user systems, because however much we might
like users to use secure passwords, the hassle of disabling cracklib if the
user disagrees with us on this point is enough to make this a very
unpleasant user experience.  Maybe if and when we have better up-front
documentation of what the password requirements are we could consider this
as a default, but I don't want users to go through the experience of hitting
five different password strength rules, one-by-one, in the
ever-more-frustrating process of trying to set a password.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: RFC: changes to default password strength checks in pam_unix

2007-09-02 Thread Roberto C . Sánchez
On Sun, Sep 02, 2007 at 05:20:42PM -0700, Steve Langasek wrote:
> On Sun, Sep 02, 2007 at 07:38:23PM -0400, Roberto C. Sánchez wrote:
> 
> > Just curious, what is the rationale for wanting to keep cracklib out of
> > base?
> 
> Size and complexity.  Adding libpam-cracklib to base would be a 2MB increase
> in the size of a minimal Debian system on i386, and add 5 packages to the
> list of what has to be installed before the user can do something as simple
> as set the initial root password.  Also, in terms of modularity, I don't
> think it makes sense for pam_unix to link to cracklib anyway when we have a
> separate pam_cracklib module for that (whether it's in a separate package or
> not).
> 
> I also think that enabling cracklib password checking is probably not a
> reasonable default for single-user systems, because however much we might
> like users to use secure passwords, the hassle of disabling cracklib if the
> user disagrees with us on this point is enough to make this a very
> unpleasant user experience.  Maybe if and when we have better up-front
> documentation of what the password requirements are we could consider this
> as a default, but I don't want users to go through the experience of hitting
> five different password strength rules, one-by-one, in the
> ever-more-frustrating process of trying to set a password.
> 
OK.  Good to know.

Thanks,

-Roberto

-- 
Roberto C. Sánchez
http://people.connexer.com/~roberto
http://www.connexer.com


signature.asc
Description: Digital signature


Re: conflicting gssapi libraries

2007-09-02 Thread Aníbal Monsalve Salazar
http://linux-nfs.org/pipermail/nfsv4/2007-September/006695.html

The following message belongs to the thread listed above.

>Date: Sun, 2 Sep 2007 18:57:24 -0400
>From: Kevin Coffman <[EMAIL PROTECTED]>
>To: [EMAIL PROTECTED], Russ Allbery <[EMAIL PROTECTED]>
>Cc: [EMAIL PROTECTED]
>Subject: Re: conflict between heimdal and umich gssapi library and their 
>consequences
>
>On 9/1/07, Russ Allbery <[EMAIL PROTECTED]> wrote:
>>
>>I'm fairly sure that for right now Debian is just living with the problem
>>and conflicting the libraries.  That makes Heimdal almost unusable in
>>Debian since the UMich GSS-API indirection layer gets pulled in by the
>>NFSv4 support, which is part of standard.
>>
>>I'm still of the opinion that UMich was at fault here and they need to 
>>rename their GSS-API library to something else.  Heimdal was using that
>>library name first, and regardless of how much more "generic" they think
>>their indirection layer is, taking a shared library name that's already in
>>use is frankly rather rude.  Picking a different SONAME version to start
>>with clearly isn't sufficient, as we now see.
>
>I regret any inconvenience our libgssapi library has caused.  We used
>the obvious name and had no malicious intent.
>
>I will rename our library to libgssglue which will require a change in
>librpcsecgss and will require nfs-utils to be reconfigured and
>recompiled (no source changes required).  I will put out new versions
>on Tuesday.

I'll package libgssglue and change nfs-utils to depend on libgssglue.

>K.C.
>___
>NFSv4 mailing list
>[EMAIL PROTECTED]
>http://linux-nfs.org/cgi-bin/mailman/listinfo/nfsv4

On Wed, Aug 15, 2007 at 12:51:13PM +1000, Brian May wrote:
>So in summary, what is the verdict?
>
>I am inclined to add a non-versioned conflicts for now, as I suspect
>it might be a while before this can be solved in a better way.
>
>Also: No, I don't want to maintain a patch in Heimdal that renames the
>library.
>
>If upstream could be convinced to rename the library that would be OK
>though.

Upstream decided to rename the UMich libgssapi library.

>-- 
>Brian May <[EMAIL PROTECTED]>

Best Regards,

Aníbal Monsalve Salazar
-- 
http://v7w.com/anibal


signature.asc
Description: Digital signature


Re: conflicting gssapi libraries

2007-09-02 Thread Aníbal Monsalve Salazar
On Mon, Sep 03, 2007 at 12:03:47PM +1000, Anibal Monsalve Salazar wrote:
>I'll package libgssglue and change nfs-utils to depend on libgssglue.

The {build-,}dependencies of both librpcsecgss and libgssapi are:

source package librpcsecgss

  depends:

nfs-common librpcsecgss3
nfs-kernel-server librpcsecgss3

  build-depends:

nfs-utils librpcsecgss-dev

source package libgssapi

  depends:

nfs-common libgssapi2
nfs-kernel-server libgssapi2

  build-depends:

fetchmail libgssapi-dev
librpcsecgss libgssapi-dev
nfs-utils libgssapi-dev (>= 0.11)

Best Regards,

Aníbal Monsalve Salazar
-- 
http://v7w.com/anibal


signature.asc
Description: Digital signature


Re: RFC: changes to default password strength checks in pam_unix

2007-09-02 Thread Daniel Jacobowitz
On Sun, Sep 02, 2007 at 02:39:25PM -0700, Steve Langasek wrote:
> On Mon, Sep 03, 2007 at 12:04:52AM +0300, Lars Wirzenius wrote:
> > su, 2007-09-02 kello 12:47 -0700, Steve Langasek kirjoitti:
> > > Does anyone else have a reasoned argument why Debian should have a weaker
> > > password length check than upstream (4 chars instead of 6)?  If not, this
> > > will be changed in the next upload of pam.
> 
> > What's the justification of not using a minimum password length of 8?
> 
> Given modern processor power availability, I can't think of one;

How about modern brain availability?  You'll just get a lot of annoyed
people changing it back; for example, makepasswd still uses a minimum
length of six.

-- 
Daniel Jacobowitz
CodeSourcery


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: RFC: changes to default password strength checks in pam_unix

2007-09-02 Thread Christian Perrier
> > Given modern processor power availability, I can't think of one;
> 
> How about modern brain availability?  You'll just get a lot of annoyed
> people changing it back; for example, makepasswd still uses a minimum
> length of six.


My weak English makes me think your comment is rude. Please excuse
me then if this is not.

I don't really understand the need for turning your comment this way,
which indeed doesn't make your point clear, whether you agree or
disagree with the idea of default enforcement of 8 characters length
for passwords. 

It seems you disagree, but don't really give a rationale for it except
"some other programs we have in Debian default to 6 chars". Am I right?

(BTW, this "makepasswd" doesn't seem to be isntalled by default)



signature.asc
Description: Digital signature


Bug#440607: ITP: steam-powered -- Valve's steam game content delivery system

2007-09-02 Thread Michael Gilbert
Package: wnpp
Severity: wishlist
Owner: Michael Gilbert <[EMAIL PROTECTED]>

* Package name: steam-powered
  Version : 6 
  Upstream Author : Michael Gilbert
* URL : no website
* License : GPL
  Programming Lang: shell
  Description : Valve's steam game content delivery system

This package is a wrapper that makes it easy to install and run Valve's
Steam program via wine.  The intent will be for this package to be a
part of the contrib archive.  A preliminary version of the package has 
been uploaded to debian-mentors for review and testing, [1].  There has 
already been some interesting discussion on the mentors list.  Please
read [2], [3], and [4] to get up to speed.  I am looking forward to the
discussion and getting this package added to the archive.

Steam (www.steampowered.com) is a game content delivery system
developed by Valve software (http://www.valvesoftware.com).  This is
a windows application, which is supported on your Debian system via
wine (http://www.winehq.org).  Not all steam games work at this time,
but many do.  Games that work very well include half-life,
counter-strike, half-life 2, and counter-strike: source. More
information about steam can be found at  http://www.steampowered.com.

[1] http://mentors.debian.net/debian/pool/contrib/s/steam-powered/
[2] http://lists.debian.org/debian-mentors/2007/08/msg00592.html
[3] http://lists.debian.org/debian-mentors/2007/08/msg00599.html
[4] http://lists.debian.org/debian-mentors/2007/08/msg00601.html

Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing'), (400, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.22-1-686 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: RFC: changes to default password strength checks in pam_unix

2007-09-02 Thread Stefano Zacchiroli
On Mon, Sep 03, 2007 at 07:01:38AM +0200, Christian Perrier wrote:
> It seems you disagree, but don't really give a rationale for it except
> "some other programs we have in Debian default to 6 chars". Am I right?
> 
> (BTW, this "makepasswd" doesn't seem to be isntalled by default)

And can also be easily patched (I bet).

Also, as a makepasswd user, I often have to invoke it as
"makepasswd --minchars 8" since several passwords I have to generate
require a minimum of 8 characters anyway.

Cheers.

-- 
Stefano Zacchiroli -*- PhD in Computer Science ... now what?
[EMAIL PROTECTED],debian.org,bononia.it} -%- http://www.bononia.it/zack/
(15:56:48)  Zack: e la demo dema ?/\All one has to do is hit the
(15:57:15)  Bac: no, la demo scema\/right keys at the right time


signature.asc
Description: Digital signature


Re: RFC: changes to default password strength checks in pam_unix

2007-09-02 Thread Bas Zoetekouw
Hi Christian!

You wrote:

> I don't really understand the need for turning your comment this way,
> which indeed doesn't make your point clear, whether you agree or
> disagree with the idea of default enforcement of 8 characters length
> for passwords. 
> 
> It seems you disagree, but don't really give a rationale for it except
> "some other programs we have in Debian default to 6 chars". Am I right?

And what's the rationale to change the minimum length to 8?  It won't
help security, as people who pick weak passwords now, will still pick
weak, but longer, passwords.  

-- 
Kind regards,
++
| Bas Zoetekouw  | GPG key: 0644fab7 |
|| Fingerprint: c1f5 f24c d514 3fec 8bf6 |
| [EMAIL PROTECTED] |  a2b1 2bae e41f 0644 fab7 |
++ 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]