Nog even genieten van het mooie weer, en dan...?

2016-09-20 Thread Ester | HiepHiepKado.be

Deze email nieuwsbrief werd in grafisch HTML formaat verzonden.
Als u deze tekstversie ziet, verkiest uw email programma "gewone tekst" emails.
U kan de originele nieuwsbrief online bekijken:
http://ymlp17.com/zHLXya



Een paraplu is nog steeds één van de populairste
relatiegeschenken. Bekijk de nieuwsbrief in de browser (
http://ymlp17.com/zHLXya )

Een paraplu is nog steeds één van de populairste relatiegeschenken.
Of u nu kiest voor een paraplu ter promotie van uw merk of als
relatiegeschenk; uw naamsbekendheid wordt vergroot en uw imago
verbeterd. Wij bieden u een ruim assortiment paraplu’s (
https://www.hiephiepkado.be/premiums/paraplus/?source=mailing200916 )
die allen te bedrukken zijn met uw logo. Van kleine handzame promotie
paraplu’s, kwalitatief hoogstaande stormparaplu’s of geheel op
maat. Een logo paraplu maakt uw merk zichtbaar in het straatbeeld en
is een uitstekend reclamemiddel!

 

HiepHiepKado · Maastrichterstraat 71 · 3500 Hasselt · België

Contact opnemen ( https://www.hiephiepkado.be/contact.php )

 

_
Uitschrijven / Gegevens wijzigen: http://ymlp17.com/ughymwuwgsgjbmjegemeggusqqb
Powered door YourMailingListProvider



Bug#838351: vlock: loading plugin 'nosysrq' failed: Permission denied

2016-09-20 Thread Jakub Wilk

Package: vlock
Version: 2.2.2-7
Usertags: serious

$ vlock -as
vlock: loading plugin 'nosysrq' failed: Permission denied


-- System Information:
Debian Release: stretch/sid
 APT prefers unstable
 APT policy: (990, 'unstable'), (500, 'experimental')
Architecture: i386 (x86_64)
Foreign Architectures: amd64

Kernel: Linux 4.7.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=pl_PL.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages vlock depends on:
ii  adduser 3.115
ii  libc6   2.24-3
ii  libpam-modules  1.1.8-3.3
ii  libpam0g1.1.8-3.3

--
Jakub Wilk



Bug#838351: vlock: loading plugin 'nosysrq' failed: Permission denied

2016-09-20 Thread Jakub Wilk

* Jakub Wilk , 2016-09-20, 10:35:

$ vlock -as
vlock: loading plugin 'nosysrq' failed: Permission denied


It turns out that after upgrading from -6 to -7 I'm no longer in the group 
vlock. :-O


And that's apparently because -6's postrm removes the vlock group, even on 
upgrade. Yay...


--
Jakub Wilk



Processing of vlock_2.2.2-8_source.changes

2016-09-20 Thread Debian FTP Masters
vlock_2.2.2-8_source.changes uploaded successfully to localhost
along with the files:
  vlock_2.2.2-8.dsc
  vlock_2.2.2-8.debian.tar.xz

Greetings,

Your Debian queue daemon (running on host franck.debian.org)



Bug#838351: marked as done (vlock: loading plugin 'nosysrq' failed: Permission denied)

2016-09-20 Thread Debian Bug Tracking System
Your message dated Tue, 20 Sep 2016 17:29:41 +
with message-id 
and subject line Bug#838351: fixed in vlock 2.2.2-8
has caused the Debian Bug report #838351,
regarding vlock: loading plugin 'nosysrq' failed: Permission denied
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
838351: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838351
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: vlock
Version: 2.2.2-7
Usertags: serious

$ vlock -as
vlock: loading plugin 'nosysrq' failed: Permission denied


-- System Information:
Debian Release: stretch/sid
 APT prefers unstable
 APT policy: (990, 'unstable'), (500, 'experimental')
Architecture: i386 (x86_64)
Foreign Architectures: amd64

Kernel: Linux 4.7.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=pl_PL.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages vlock depends on:
ii  adduser 3.115
ii  libc6   2.24-3
ii  libpam-modules  1.1.8-3.3
ii  libpam0g1.1.8-3.3

--
Jakub Wilk
--- End Message ---
--- Begin Message ---
Source: vlock
Source-Version: 2.2.2-8

We believe that the bug you reported is fixed in the latest version of
vlock, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 838...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Helmut Grohne  (supplier of updated vlock package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 20 Sep 2016 18:41:17 +0200
Source: vlock
Binary: vlock
Architecture: source
Version: 2.2.2-8
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Helmut Grohne 
Description:
 vlock  - Virtual Console locking program
Closes: 838351
Changes:
 vlock (2.2.2-8) unstable; urgency=medium
 .
   * QA upload.
   * Remove 2.2.2-6's postrm. Thanks to Jakub Wilk for spotting the fatal
 error. (Closes: #838351)
Checksums-Sha1:
 afc8e6c070dcd41c2d0f233f1516c762e895e56e 1639 vlock_2.2.2-8.dsc
 108d0668715c2315996e58a4b0e54ee78c1f4b40 9412 vlock_2.2.2-8.debian.tar.xz
Checksums-Sha256:
 9941d1e1cb052105edc4e6e3da69f78a9136aa0237662c3d44be65d2ed0e189e 1639 
vlock_2.2.2-8.dsc
 4040aadb06a08f29e755260f34e200ff2ec5425c69f0b876c134ca3a9129f5b1 9412 
vlock_2.2.2-8.debian.tar.xz
Files:
 e93acff79e2689504857847398587398 1639 utils optional vlock_2.2.2-8.dsc
 ca770ac075fe57781967133ce98ac042 9412 utils optional 
vlock_2.2.2-8.debian.tar.xz

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=3DF0
-END PGP SIGNATURE End Message ---


vlock_2.2.2-8_source.changes ACCEPTED into unstable

2016-09-20 Thread Debian FTP Masters


Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 20 Sep 2016 18:41:17 +0200
Source: vlock
Binary: vlock
Architecture: source
Version: 2.2.2-8
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Helmut Grohne 
Description:
 vlock  - Virtual Console locking program
Closes: 838351
Changes:
 vlock (2.2.2-8) unstable; urgency=medium
 .
   * QA upload.
   * Remove 2.2.2-6's postrm. Thanks to Jakub Wilk for spotting the fatal
 error. (Closes: #838351)
Checksums-Sha1:
 afc8e6c070dcd41c2d0f233f1516c762e895e56e 1639 vlock_2.2.2-8.dsc
 108d0668715c2315996e58a4b0e54ee78c1f4b40 9412 vlock_2.2.2-8.debian.tar.xz
Checksums-Sha256:
 9941d1e1cb052105edc4e6e3da69f78a9136aa0237662c3d44be65d2ed0e189e 1639 
vlock_2.2.2-8.dsc
 4040aadb06a08f29e755260f34e200ff2ec5425c69f0b876c134ca3a9129f5b1 9412 
vlock_2.2.2-8.debian.tar.xz
Files:
 e93acff79e2689504857847398587398 1639 utils optional vlock_2.2.2-8.dsc
 ca770ac075fe57781967133ce98ac042 9412 utils optional 
vlock_2.2.2-8.debian.tar.xz

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=3DF0
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Bug#828594: virtuoso-opensource: FTBFS with openssl 1.1.0

2016-09-20 Thread Sebastian Andrzej Siewior
control: tags -1 patch
control: forwarded -1 https://github.com/openlink/virtuoso-opensource/pull/583

On 2016-09-10 17:39:04 [+0200], Kurt Roeckx wrote:
> You already had to include that file to get it working, and that seems to be
> a message form 2001.  So you really can't say they haven't been warned.

okay.

> > That part where I replaced d2i_ASN1_BOOLEAN() looks like
> > they copied it from old openssl code.
> 
> I'm not sure that that code you replaced it with is correct or not.

this makes two people then.

> > @@ -854,16 +857,18 @@ bif_smime_sign (caddr_t * qst, caddr_t * err_ret, 
> > state_slot_t ** args)
> >  }
> >  
> >certs = sk_X509_new_null ();
> > +#if HALP
> >if (store && store->objs)
> >  {
> >for (inx = 0; inx < sk_X509_OBJECT_num (store->objs); inx++)
> > {
> >   X509_OBJECT *obj = sk_X509_OBJECT_value (store->objs, inx);
> > - if (obj->type == X509_LU_X509)
> > + if (X509_OBJECT_get_type(obj) == X509_LU_X509)
> > sk_X509_push (certs, X509_dup (obj->data.x509));
> > }
> >  
> >  }
> > +#endif
> 
> Are you looking for X509_STORE_get0_objects(store) instead of
> store->objs?

correct.

> > @@ -1488,6 +1496,7 @@ bif_get_certificate_info (caddr_t * qst, caddr_t * 
> > err_ret, state_slot_t ** args
> > int n, i, len;
> > char *s, *data_ptr;
> > BIO *mem = BIO_new (BIO_s_mem ());
> > +#if HALP
> > for (i = 0; NULL != subj && i < sk_X509_NAME_ENTRY_num(subj->entries); 
> > i++)
> >   {
> > ne = sk_X509_NAME_ENTRY_value(subj->entries,i);
> 
> I think you're looking for:
> for (i = 0; NULL != subj && i < X509_NAME_entry_count(subj); i++)
> {
> X509_NAME_ENTRY *ne = X509_NAME_get_entry(subj, i);
> 
exactly. Thank you.

The patch attached should contain the changes. And I forwarded ported to
their latest develop branch and created a pull request.

> 
> Kurt

Sebastian
>From 823092cccbd8e2ab9bfad6c3d3df791a7ffa76fc Mon Sep 17 00:00:00 2001
From: Sebastian Andrzej Siewior 
Date: Mon, 5 Sep 2016 10:49:54 +
Subject: [PATCH] virtuoso-opensource: build against openssl 1.1.0

Signed-off-by: Sebastian Andrzej Siewior 
---
 libsrc/Dk/Dkernel.c  |   6 +-
 libsrc/Wi/bif_crypto.c   | 120 ++
 libsrc/Wi/http.c |   2 +-
 libsrc/Wi/xmlenc.c   | 319 +++
 libsrc/Wi/xmlenc.h   | 193 ++--
 libsrc/Wi/xmlenc_algos.c | 132 +++-
 libsrc/util/sslengine.c  |   6 +-
 7 files changed, 524 insertions(+), 254 deletions(-)

diff --git a/libsrc/Dk/Dkernel.c b/libsrc/Dk/Dkernel.c
index c8dfbf7..82c77cb 100644
--- a/libsrc/Dk/Dkernel.c
+++ b/libsrc/Dk/Dkernel.c
@@ -4930,7 +4930,11 @@ ssl_server_init ()
 # if (OPENSSL_VERSION_NUMBER >= 0x00908000L)
   SSL_library_init ();
 # endif
-  SSLeay_add_all_algorithms ();
+#if OPENSSL_VERSION_NUMBER < 0x1010
+  SSLeay_add_all_algorithms();
+#else
+  OpenSSL_add_all_algorithms();
+#endif
   PKCS12_PBE_add ();		/* stub */
 
 #ifdef NO_THREAD
diff --git a/libsrc/Wi/bif_crypto.c b/libsrc/Wi/bif_crypto.c
index c759d11..3bfc588 100644
--- a/libsrc/Wi/bif_crypto.c
+++ b/libsrc/Wi/bif_crypto.c
@@ -181,21 +181,26 @@ box_hmac (caddr_t box, caddr_t key, int alg)
   unsigned char temp[EVP_MAX_MD_SIZE];
   unsigned int size = 0;
   caddr_t res = NULL;
-  HMAC_CTX ctx;
+  HMAC_CTX *ctx;
   const EVP_MD *md = EVP_sha1 ();
 
   if (alg == 1)
 md = EVP_ripemd160 ();
 
-  HMAC_Init (&ctx, key, box_length (key) - DV_STRINGP (key) ? 1 : 0, md);
-  box_hmac_1 (box, &ctx);
-  HMAC_Final (&ctx, temp, &size);
+  ctx = HMAC_CTX_new();
+  if (!ctx)
+	  return res;
+
+  HMAC_Init_ex (ctx, key, box_length (key) - DV_STRINGP (key) ? 1 : 0, md, NULL);
+  box_hmac_1 (box, ctx);
+  HMAC_Final (ctx, temp, &size);
   if (size)
 {
   res = dk_alloc_box (size + 1, DV_SHORT_STRING);
   memcpy (res, temp, size);
   res[size] = 0;
 }
+  HMAC_CTX_free(ctx);
   return res;
 }
 
@@ -347,14 +352,12 @@ asn1_parse_to_xml (BIO * bp, unsigned char **pp, long length, int offset, int de
 	{
 	  int ii;
 
-	  opp = op;
-	  ii = d2i_ASN1_BOOLEAN (NULL, &opp, len + hl);
-	  if (ii < 0)
+	  if (len + hl < 1)
 		{
 		  if (BIO_write (bp, "Bad boolean\n", 12))
 		goto end;
 		}
-	  BIO_printf (bp, "%d", ii);
+	  BIO_printf (bp, "%d", p[0]);
 	}
 	  else if (tag == V_ASN1_BMPSTRING)
 	{
@@ -415,7 +418,7 @@ asn1_parse_to_xml (BIO * bp, unsigned char **pp, long length, int offset, int de
 		}
 	  if (os != NULL)
 		{
-		  M_ASN1_OCTET_STRING_free (os);
+		  ASN1_STRING_free (os);
 		  os = NULL;
 		}
 	}
@@ -448,7 +451,7 @@ asn1_parse_to_xml (BIO * bp, unsigned char **pp, long length, int offset, int de
 		  if (BIO_write (bp, "BAD INTEGER", 11) <= 0)
 		goto end;
 		}
-	  M_ASN1_INTEGER_free (bs);
+	  ASN1_STRING_free (bs);
 	}
 	  else if (tag == V_ASN1_ENUMERATED)
 	{
@@ -479,7 +482,7 @@ asn1_parse_to_xml (BIO

Processed: Re: Bug#828594: virtuoso-opensource: FTBFS with openssl 1.1.0

2016-09-20 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 patch
Bug #828594 [src:virtuoso-opensource] virtuoso-opensource: FTBFS with openssl 
1.1.0
Added tag(s) patch.
> forwarded -1 https://github.com/openlink/virtuoso-opensource/pull/583
Bug #828594 [src:virtuoso-opensource] virtuoso-opensource: FTBFS with openssl 
1.1.0
Set Bug forwarded-to-address to 
'https://github.com/openlink/virtuoso-opensource/pull/583'.

-- 
828594: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=828594
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processing of fruit_2.1.dfsg-7_source.changes

2016-09-20 Thread Debian FTP Masters
fruit_2.1.dfsg-7_source.changes uploaded successfully to localhost
along with the files:
  fruit_2.1.dfsg-7.dsc
  fruit_2.1.dfsg-7.debian.tar.xz

Greetings,

Your Debian queue daemon (running on host franck.debian.org)



Processing of root-tail_1.2-4_amd64.changes

2016-09-20 Thread Debian FTP Masters
root-tail_1.2-4_amd64.changes uploaded successfully to localhost
along with the files:
  root-tail_1.2-4.dsc
  root-tail_1.2-4.debian.tar.xz
  root-tail-dbgsym_1.2-4_amd64.deb
  root-tail_1.2-4_amd64.deb

Greetings,

Your Debian queue daemon (running on host franck.debian.org)



fruit_2.1.dfsg-7_source.changes ACCEPTED into unstable

2016-09-20 Thread Debian FTP Masters


Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 16 Sep 2016 16:41:42 -0300
Source: fruit
Binary: fruit
Architecture: source
Version: 2.1.dfsg-7
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Samuel Henrique 
Description:
 fruit  - chess engine, to calculate chess moves
Closes: 742479
Changes:
 fruit (2.1.dfsg-7) unstable; urgency=medium
 .
   * QA upload.
   * Bump DH to 9.
   * Bump Standards-Version to 3.9.8.
   * Set Debian QA Group as maintainer (see #835305).
   * wrap-and-sort -a.
   * debian/control: Homepage: Use new address, thanks to Mario Lang
 (closes: #742479).
   * debian/copyright: Switch to DEP-5.
   * debian/dirs: Remove file, upstream already creates needed dirs.
   * debian/patches:
 - 01-makefile.patch: Update to use DH flags (hardening + no-stripping).
 - 01-simple_go.patch:
   ~ Refactor short description.
   ~ Remove trailing whitespaces and remove comma from the author field.
   ~ Rename to 02-simple_go.patch.
   * debian/README.source: Create file to explain what is missing from the
 upstream's tarball, as one file got removed to comply with DFSG.
   * debian/rules:
 - Export DEB_BUILD_MAINT_OPTIONS = hardening=+all, to enable all hardening
   flags.
 - Export DEB_LDFLAGS_MAINT_APPEND = -Wl,--as-needed, in order to disable
   useless dependencies.
 - Remove trailing whitespace and comments.
Checksums-Sha1:
 f8f5870639ea05ecd30da1a634807876787adb76 1668 fruit_2.1.dfsg-7.dsc
 47715048574b66f1456adcbcfbd8f9e36d37fe9b 5604 fruit_2.1.dfsg-7.debian.tar.xz
Checksums-Sha256:
 b028ab2e01a0fe6c7d27b4a29c73c81e2e3437b3f5bb970dd3d730838b0245db 1668 
fruit_2.1.dfsg-7.dsc
 e296498542df5c43c40a0065e224e37bbddbdd1ab0ec675735017618fc872acf 5604 
fruit_2.1.dfsg-7.debian.tar.xz
Files:
 6cbc51d72cb301753d918ef2d629eafb 1668 games optional fruit_2.1.dfsg-7.dsc
 16e6901c215a87764d7a0861ea7ed7c7 5604 games optional 
fruit_2.1.dfsg-7.debian.tar.xz

-BEGIN PGP SIGNATURE-

iQIcBAEBCAAGBQJX4dzYAAoJEN5juccE6+nvrVUP/1rFJhxKtTZ0FUeSVA+fOTrm
ig2RxcUfgFN4S64F0ta9XwVbfLgVb8e6U9JqHIsV/KQgIelHmbiS9V8ghxb732mM
0qVS/ksbyZPtW1OaanXVHXxU95WqFgilcsK57otRcr/d7l9xwqew3qvTkSg22TMK
GdvNXqdDIMck0uZb8WycA7tonP0cdh4zNf8yGg71VyO2lU5VCn65osrjT8J90ebx
1zcJ335BlNymBHGZqCpq3GUytMhZRnR1d0KN4VlTmRU5aJt/CsMd6s9rz/CgdCQs
Y4i7Uwcmf+TuwM7RmUBXyrfZNdIJwtKQRDIkblgqzz5LWqla4ZvKzhY4nAkPU9PL
z+mBpETHwPkAu8sxoeQoVkm9fps1/nEL+XiuFry1p0mZrNQYCv4EK3irgxNKbpIm
wR8NxlJ0u3h2rfQ+I7UXqYRJbmZbXqllYotmj7tgzRDW+MMT6VqmEcqgOYmt47yJ
qqqacWRHiYlk76uFRLXoiLcDUTnhuqP+B7EmfmK+Y7qLdT8doOfGD5LzNPSlFVS7
DpFVarb4Hrj9EJRXI1Yii4026PnryEdjXlPVDjC0E4mQLCn+quVKW41Xd2NsX52B
HbSrQnt0aj6FWZ91B/yjIH699zP8yUpbo+BJzGM0obe/yzrG7aXqjJy4YFGby3MI
4wI/F5mvJG3qd78KEVD2
=GVEI
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



root-tail_1.2-4_amd64.changes ACCEPTED into unstable

2016-09-20 Thread Debian FTP Masters


Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Wed, 21 Sep 2016 03:01:00 +0200
Source: root-tail
Binary: root-tail
Architecture: source amd64
Version: 1.2-4
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Axel Beckert 
Description:
 root-tail  - Displays select log files in the X root window
Closes: 641561 817656
Changes:
 root-tail (1.2-4) unstable; urgency=medium
 .
   * QA upload.
 + Set Maintainer to Debian QA Group. (See #838406)
 + Add Vcs-* headers for newly created collab-maint Git repo.
   * Apply wrap-and-sort.
   * Add Homepage header.
   * Bump debhelper compatibility level to 9. (Closes: #817656)
 + Update versioned build-dependency on debhelper accordingly.
   * Add dependency on ${misc:Depends}.
   * Rewrite debian/rules in minimal dh v7 style.
   * Enable all hardening build flags.
   * Convert to source format "3.0 (quilt)" using diff2patches.
 + Add DEP3 patch headers to all of them.
 + Drop patch against mkdist. (CVS-related, obsolete)
   * Update Makefile so that
 + all hardening flags are passed properly
 + $(DESTDIR) is honoured (no more need for override_dh_auto_install)
 + Upstream Changes file is no more installed (done by
   dh_installchangelogs automatically)
 + the package no more FTBFS with "ld --as-needed" (Closes: #641561, LP:
   #770864)
   * debian/clean: Make clean target work even when no patches are applied.
   * Extend long package description a bit.
   * Add a watch file.
   * Declare compliance with Debian Policy 3.9.8.
   * Convert debian/copyright to machine-readable DEP5 format.
   * Fix typos in 0.0.10-1 and 0.0.10-2 debian/changelog entries.
Checksums-Sha1:
 a4d3a67b866d3854fe7f2164d80c744da1a4e2ee 1854 root-tail_1.2-4.dsc
 f6232288970d569566b673d540e96f43e67150f7 5156 root-tail_1.2-4.debian.tar.xz
 1b054ceb2067af2ebb62eb9d9a589f408e1c956d 27640 root-tail-dbgsym_1.2-4_amd64.deb
 e897d010ccc162e578354d4e937640c490cf42c7 20940 root-tail_1.2-4_amd64.deb
Checksums-Sha256:
 5d82b71a8ded87b584df3a7ca07bfa6f7810b2f7da56c3e2eb07b456b847a1f8 1854 
root-tail_1.2-4.dsc
 6a7d73e08ef9a3d55e6bd418b96a90c0195bb85d9a6dc8b0204618854ab7e553 5156 
root-tail_1.2-4.debian.tar.xz
 203c1332869925234c6180e19427024e4abbe33b3ab29b88816142964dd8beed 27640 
root-tail-dbgsym_1.2-4_amd64.deb
 6bb3c6939b1b92321a5b8340b890b19c2d8da2635593c4fac2bc71ca07494bd3 20940 
root-tail_1.2-4_amd64.deb
Files:
 bacc9fa67f75a24109740122f2271061 1854 x11 optional root-tail_1.2-4.dsc
 5397e49b47e2ce5bef28c7efc5dae8f8 5156 x11 optional 
root-tail_1.2-4.debian.tar.xz
 dac6a1dc0ca35d574ca86fe540a929dc 27640 debug extra 
root-tail-dbgsym_1.2-4_amd64.deb
 d94c89e35824b76750c9ee8d81a6 20940 x11 optional root-tail_1.2-4_amd64.deb

-BEGIN PGP SIGNATURE-
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=UO7r
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Bug#729813: marked as done (jessie/testing pam_unix2 (2.6-1) module is compiled without blowfish support)

2016-09-20 Thread Debian Bug Tracking System
Your message dated Wed, 21 Sep 2016 02:39:29 +
with message-id 
and subject line Bug#628848: Removed package(s) from unstable
has caused the Debian Bug report #729813,
regarding jessie/testing pam_unix2 (2.6-1) module is compiled without blowfish 
support
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
729813: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729813
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libpam-unix2
Version: 2.6-1
Severity: grave
Justification: package is unusable as its main feature is not supported


Module libpam_unix2 is compiled without blowfish support. Password change 
finishes with error:

root@straightXedge:/usr/share/pam-configs# passwd
New Password:
Reenter New Password:
crypt_r: Don't know 0
Error: Password NOT changed.
passwd: Authentication token manipulation error
passwd: password unchanged

Lack of blowfish support is shown in debugs:

root@straightXedge:/lib/security# cat /var/log/auth.log | grep "19:12"
Nov 17 18:19:12 straightXedge sshd[3638]: Failed password for root from 
192.168.40.1 port 65354 ssh2
Nov 17 19:12:02 straightXedge passwd[6686]: pam_unix2(passwd:chauthtok): 
Unknown option: `blowfish'
Nov 17 19:12:02 straightXedge passwd[6686]: pam_unix2(passwd:chauthtok): 
pam_sm_chauthtok() called
Nov 17 19:12:02 straightXedge passwd[6686]: pam_unix2(passwd:chauthtok): 
username=[root]
Nov 17 19:12:02 straightXedge passwd[6686]: pam_unix2(passwd:chauthtok): No old 
password found.
Nov 17 19:12:02 straightXedge passwd[6686]: pam_unix2(passwd:chauthtok): 
Unknown option: `blowfish'
Nov 17 19:12:02 straightXedge passwd[6686]: pam_unix2(passwd:chauthtok): 
pam_sm_chauthtok() called
Nov 17 19:12:02 straightXedge passwd[6686]: pam_unix2(passwd:chauthtok): 
username=[root]
Nov 17 19:12:02 straightXedge passwd[6686]: pam_unix2(passwd:chauthtok): No old 
password found.
Nov 17 19:12:05 straightXedge passwd[6686]: pam_unix2(passwd:chauthtok): No 
blowfish support compiled in

I am using the most up-to-date versions of libpam-unix2 and libxcrypt packages.

root@straightXedge:/lib/security# dpkg -l | grep -e "unix2 \| libxcrypt \| 
libpam0g"
ii  libpam-unix21:2.6-1   i386 
Blowfish-capable PAM module
ii  libxcrypt1  1:2.4-3   i386 
Crypt library for DES, MD5, and blowfish
ii  libpam0g:i386   1.1.3-9   i386 
Pluggable Authentication Modules library

This bug was previously reported in as #487487.

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487487

I replaced the .so library with the previous wheezy 2.4.1 version and the 
problem is solved. 

root@straightXedge:/lib/security# passwd
New Password:
Reenter New Password:
Password changed.
passwd: password updated successfully


Please recompile it with blowfish support.

regards,
Lukasz
--- End Message ---
--- Begin Message ---
Version: 1:2.6-2+rm

Dear submitter,

as the package libpam-unix2 has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/628848

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmas...@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Chris Lamb (the ftpmaster behind the curtain)--- End Message ---


Bug#359896: marked as done (libpam-unix2: Authentication always fail if uidNumber=0 and the user is in LDAP)

2016-09-20 Thread Debian Bug Tracking System
Your message dated Wed, 21 Sep 2016 02:39:29 +
with message-id 
and subject line Bug#628848: Removed package(s) from unstable
has caused the Debian Bug report #359896,
regarding libpam-unix2: Authentication always fail if uidNumber=0 and the user 
is in LDAP
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
359896: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=359896
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libpam-unix2
Version: 1.25-1
Severity: important


I have strange problem with pam_unix2.  I have looked at documentation
and searched google, but I can't figure out what's wrong.

I am setting up a server where I use ldap for authentication.
The root account is not in ldap, so it will be possible to log in
even if I get trouble with the ldap server.

I also need a uid=0 account available in ldap though,
samba need this.

And this is the problem.  I can log in as any
ldap user - except the one with uidNumber=0. That user is named
Administrator.

I believe there is nothing wrong with the Administrator account,
if I change its uidNumber to soemthing else - such as 1, then
logging in (using "login" or "su") works. Change the
uidNumber back to 0 - and suddenly the password is invalid. Very
strange.

Also, this cannot be a case of /etc/securetty or other protection against
privileged users, for I can log in as "root" with no problems
at all.  But "root" exists in /etc/passwd, so "root" doesn't have
the extra sambaAccount fields that samba needs.  That is only available
in ldap, but logging in with uidNumber=0 using ldap is impossible.

I tried removing the normal root account, to see if the problem
had something to do with duplicate users.  This did not help at all.

Am I missing something, is there a trivial config option that makes
this work? Or have I found a bug?

Some auth.log traces:

"su root" from a user account succeeds:
Mar 26 12:53:44 buanserver su[11663]: pam_unix2: pam_sm_authenticate() called
Mar 26 12:53:44 buanserver su[11663]: pam_unix2: username=[root]
Mar 26 12:53:46 buanserver su[11663]: pam_unix2: pam_sm_authenticate: 
PAM_SUCCESS
Mar 26 12:53:46 buanserver su[11663]: pam_unix2: pam_sm_acct_mgmt() called
Mar 26 12:53:46 buanserver su[11663]: pam_unix2: username=[root]
Mar 26 12:53:46 buanserver su[11663]: pam_unix2: expire() returned with 0
Mar 26 12:53:46 buanserver su[11663]: Successful su for root by helge
Mar 26 12:53:46 buanserver su[11663]: + pts/2 helge:root
Mar 26 12:53:46 buanserver su[11663]: pam_unix2: pam_sm_setcred() called
Mar 26 12:53:46 buanserver su[11663]: pam_unix2: username=[root]
Mar 26 12:53:46 buanserver su[11663]: pam_unix2: pam_sm_setcred: PAM_SUCCESS

"su Administrator" from a user account rejected (I used the correct passwd)
Mar 26 12:54:26 buanserver su[11672]: pam_unix2: pam_sm_authenticate() called
Mar 26 12:54:26 buanserver su[11672]: pam_unix2: username=[Administrator]
Mar 26 12:54:30 buanserver su[11672]: pam_unix2: wrong password, return 
PAM_AUTH_ERR
Mar 26 12:54:30 buanserver su[11672]: pam_authenticate: Authentication failure
Mar 26 12:54:30 buanserver su[11672]: FAILED su for Administrator by helge
Mar 26 12:54:30 buanserver su[11672]: - pts/2 helge:Administrator

"su Administrator" from a user account works when Administrator is
modified to use a uidNumber other than 0:
Mar 26 12:30:49 buanserver su[11603]: pam_unix2: pam_sm_authenticate() called
Mar 26 12:30:49 buanserver su[11603]: pam_unix2: username=[Administrator]
Mar 26 12:30:55 buanserver su[11603]: pam_unix2: pam_ldap/pam_sm_authenticate() 
returned 0
Mar 26 12:30:56 buanserver su[11603]: pam_unix2: pam_sm_acct_mgmt() called
Mar 26 12:30:56 buanserver su[11603]: pam_unix2: username=[Administrator]
Mar 26 12:30:56 buanserver su[11603]: pam_unix2: pam_ldap/pam_sm_acct_mgmt() 
returned 0
Mar 26 12:30:56 buanserver su[11603]: Successful su for Administrator by joe
Mar 26 12:30:56 buanserver su[11603]: + pts/0 joe:Administrator
Mar 26 12:30:56 buanserver su[11603]: pam_unix2: pam_sm_setcred() called
Mar 26 12:30:56 buanserver su[11603]: pam_unix2: username=[Administrator]
Mar 26 12:30:56 buanserver su[11603]: pam_unix2: pam_ldap/pam_sm_setcred() 
returned 0
Mar 26 12:30:56 buanserver su[11603]: pam_unix2: pam_sm_setcred: PAM_SUCCESS

Deliberately using a wrong password for "Administrator" when the uid is not 0:
Mar 26 13:27:09 buanserver su[11780]: pam_unix2: pam_sm_authenticate() called
Mar 26 13:27:09 buanserver su[11780]: pam_unix2: username=[Administrator]
Mar 26 13:27:13 buanserver su[11780]: pam_ldap: error trying to bind as user 
"uid=Administrator

Bug#714779: marked as done (CVE-2011-2483: Bug in blowfish handling in the pam module)

2016-09-20 Thread Debian Bug Tracking System
Your message dated Wed, 21 Sep 2016 02:39:29 +
with message-id 
and subject line Bug#628848: Removed package(s) from unstable
has caused the Debian Bug report #714779,
regarding CVE-2011-2483: Bug in blowfish handling in the pam module
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
714779: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714779
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: libpam-unix2
Version:2.4.1-6
Tags: security

Via https://build.opensuse.org/package/show/Linux-PAM/pam-modules >
I discovered a patch for libpam-unix2 that seem to be security
related.  The patch is attached.  I am not sure how serious it is, so I
set severity to normal, but the patch mentioned CVE-2011-2483 which
affected quite a lot of packages.  I suspect libpam-unix2 was forgotten
in Debian.

-- 
Happy hacking
Petter Reinholdtsen
>From 7a3e5fd2d79657674e72212ad13ea350d72e8306 Mon Sep 17 00:00:00 2001
From: Ludwig Nussel 
Date: Wed, 13 Jul 2011 08:50:58 +0200
Subject: [PATCH 4/4] add workarounds for blowfish signedness bug

The option BLOWFISH_2a2x allows to enable compat modes.
---
 configure.in  |   18 +-
 etc/passwd|   16 
 src/get_options.c |   11 +++
 src/public.h  |4 
 src/support.c |   30 ++
 src/unix_auth.c   |8 +---
 src/unix_passwd.c |   10 +++---
 7 files changed, 86 insertions(+), 11 deletions(-)

diff --git a/configure.in b/configure.in
index f4cdcd1..10c4e1f 100644
--- a/configure.in
+++ b/configure.in
@@ -48,13 +48,29 @@ dnl Should we compile with SELinux support? default: yes
 AC_ARG_ENABLE([selinux],
AC_HELP_STRING([--disable-selinux],[Enable SELinux support (default=yes)]),
WITH_SELINUX=$enableval, WITH_SELINUX=yes)
-if test "$WITH_SELINUX" == "yes" ; then
+if test "$WITH_SELINUX" = "yes" ; then
AC_CHECK_LIB(selinux,is_selinux_enabled,
 [AC_DEFINE(WITH_SELINUX,1,
 [Define if you want to compile in SELinux support])
  LIBS="$LIBS -lselinux"])
 fi
 
+AC_ARG_ENABLE([blowfish-bug-workaround],
+   AC_HELP_STRING([--disable-blowfish-bug-workaround],[Enable workarounds for blowfish signedness bug]),
+   CRYPT_BLOWFISH_SIGNEDNESS_BUG_WORKAROUNDS=$enableval, CRYPT_BLOWFISH_SIGNEDNESS_BUG_WORKAROUNDS=yes)
+if test "$CRYPT_BLOWFISH_SIGNEDNESS_BUG_WORKAROUNDS" = "yes" ; then
+AC_DEFINE(CRYPT_BLOWFISH_SIGNEDNESS_BUG_WORKAROUNDS,1,
+[Define if you want to enable workarounds for blowfish signedness bug])
+fi
+
+AC_ARG_ENABLE([blowfish-bug-compatmode],
+   AC_HELP_STRING([--enable-blowfish-bug-compatmode],[Enable blowfish compat mode by default]),
+   CRYPT_BLOWFISH_COMPATMODE=$enableval, CRYPT_BLOWFISH_COMPATMODE=no)
+if test "$CRYPT_BLOWFISH_COMPATMODE" = "yes" ; then
+	AC_DEFINE(CRYPT_BLOWFISH_COMPATMODE,1,
+		[Define if you want to enable blowfish compat mode by default])
+fi
+
 dnl Check standard headers
 AC_HEADER_STDC
 AC_CHECK_HEADERS(crypt.h)
diff --git a/etc/passwd b/etc/passwd
index bd86963..ec6f0d4 100644
--- a/etc/passwd
+++ b/etc/passwd
@@ -36,3 +36,19 @@ CRYPT=
 # sha256/sha512: 1000-999
 # SHA512_CRYPT_FILES=1000
 
+# In June 2011 it was discovered that the Linux crypt_blowfish
+# implementation contained a bug that made passwords with non-ASCII
+# characters easier to crack (CVE-2011-2483). Affected passwords are
+# also incompatible with the original, correct OpenBSD
+# implementation. Therefore the $2a hash identifier previously used
+# for blowfish now is ambiguous as it could mean the hash was
+# generated with the correct implementation on OpenBSD or the buggy
+# one on Linux. To avoid the ambiguity two new identifier were
+# introduced. $2x now explicitly identifies hashes that were
+# generated with the buggy algorithm while $2y is used for hashes
+# generated with the correct algorithm. New passwords are now
+# generated with the $2y identifier.
+#
+# Setting the following option to "yes" tells the sytem that $2a
+# hashes are to be treated as generated with the buggy algorithm.
+BLOWFISH_2a2x=
diff --git a/src/get_options.c b/src/get_options.c
index faf8aa0..f899155 100644
--- a/src/get_options.c
+++ b/src/get_options.c
@@ -138,6 +138,17 @@ get_options (pam_handle_t *pamh, options_t *options, const char *type,
   /* Set some default values, which could be overwritten later.  */
   options->use_crypt = NONE;
 
+#ifdef CRYPT_BLOWFISH_SIGNEDNESS_BUG_WORKAROUNDS
+  options->blowfish_2a2x = getlogindefs_bool("BLOWFISH_2a2x",
+#ifdef CRYPT_BLOWFISH_COMPATMODE
+1
+#else
+0
+#

Bug#714901: marked as done (libpam-unix2: (wishlist) make it clearer that the wrong password was entered)

2016-09-20 Thread Debian Bug Tracking System
Your message dated Wed, 21 Sep 2016 02:39:29 +
with message-id 
and subject line Bug#628848: Removed package(s) from unstable
has caused the Debian Bug report #714901,
regarding libpam-unix2: (wishlist) make it clearer that the wrong password was 
entered
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
714901: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714901
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: libpam-unix2
Version: 1:2.4.1-4
Severity: wishlist
Tags: patch

*** Please type your report below this line ***
Hi

I am using this module to help users change passwords on a mixed file & NIS
system.

If they happen to enter the wrong string for the old password, they get a
somewhat
inscrutable message:

  % passwd
  Old Password:
  passwd: Authentication token manipulation error
  passwd: password unchanged

Which usually leads them to keep trying the same, wrong, password.

Unless there is some way to configure PAM to give a friendlier error message
than the default text for PAM_AUTHTOK_ERR, the patch below would fix the
problem for me.

Patch is against 1:2.6-1, but I compiled & tested with 1:2.4.1-4.

debian/patches/07_wrong_pass_warning.diff
--- a/src/unix_passwd.c
+++ b/src/unix_passwd.c
@@ -257,6 +257,8 @@
   if ((getuid () || (flags & PAM_CHANGE_EXPIRED_AUTHTOK)) && strcmp
(data->oldpassword,
crypt_r (oldpass, data->oldpassword, &output)) != 0)
{
+ __write_message (pamh, flags, PAM_ERROR_MSG,
+_("Wrong password."));
  if (options.debug)
pam_syslog (pamh, LOG_DEBUG,
"old password is wrong -> abort.");



-- System Information:
Debian Release: 6.0.7
  APT prefers oldstable
  APT policy: (990, 'oldstable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages libpam-unix2 depends on:
ii  libc6 2.11.3-4   Embedded GNU C Library: Shared lib
ii  libpam0g  1.1.1-6.1+squeeze1 Pluggable Authentication Modules l
ii  libxcrypt11:2.4-1Crypt library for DES, MD5, and bl

libpam-unix2 recommends no packages.

libpam-unix2 suggests no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---
Version: 1:2.6-2+rm

Dear submitter,

as the package libpam-unix2 has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/628848

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmas...@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Chris Lamb (the ftpmaster behind the curtain)--- End Message ---


Bug#628848: Removed package(s) from unstable

2016-09-20 Thread Debian FTP Masters
We believe that the bug you reported is now fixed; the following
package(s) have been removed from unstable:

libpam-unix2 |1:2.6-2 | source, amd64, arm64, armel, armhf, i386, 
kfreebsd-amd64, kfreebsd-i386, mips, mips64el, mipsel, powerpc, ppc64el, s390x

--- Reason ---
RoQA; orphaned, dead upstream, not in stable, broken
--

Note that the package(s) have simply been removed from the tag
database and may (or may not) still be in the pool; this is not a bug.
The package(s) will be physically removed automatically when no suite
references them (and in the case of source, when no binary references
it).  Please also remember that the changes have been done on the
master archive and will not propagate to any mirrors until the next
dinstall run at the earliest.

Packages are usually not removed from testing by hand. Testing tracks
unstable and will automatically remove packages which were removed
from unstable when removing them from testing causes no dependency
problems. The release team can force a removal from testing if it is
really needed, please contact them if this should be the case.

We try to close bugs which have been reported against this package
automatically. But please check all old bugs, if they were closed
correctly or should have been re-assigned to another package.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 628...@bugs.debian.org.

The full log for this bug can be viewed at https://bugs.debian.org/628848

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmas...@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Chris Lamb (the ftpmaster behind the curtain)



Bug#628848: Removed package(s) from unstable

2016-09-20 Thread Debian FTP Masters
Version: 1:2.6-2+rm

Dear submitter,

as the package libpam-unix2 has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/628848

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmas...@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Chris Lamb (the ftpmaster behind the curtain)



Bug#838430: volti: traceback on startup

2016-09-20 Thread Toni Mueller
Package: volti
Version: 0.2.3-7
Severity: important

Dear Maintainer,

I can't use volti because everytime I try to start it, it crashes:

$ volti
[alsactrl.py:__init__:41] can't open Master control for card HDMI,
trying to select first available mixer channel

[alsactrl.py:__init__:49] can't open first available control for card
HDMI
error: list index out of range
Traceback (most recent call last):
  File "/usr/bin/volti", line 52, in 
volti = main.VolumeTray()
  File "/usr/lib/volti/volti/main.py", line 124, in __init__
self.watchid = gobject.io_add_watch(fd, eventmask, self.update)
TypeError: an integer is required
$ 

This happens on a Dell Latitude E7440, which I have installed with
Jessie and then immediately upgraded to Stretch.


Cheers,
Toni



-- System Information:
Debian Release: stretch/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.6.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages volti depends on:
ii  python-alsaaudio  0.7-1
ii  python-dbus   1.2.4-1
ii  python-gobject3.21.92-1
ii  python-gtk2   2.24.0-5
ii  python-xlib   0.14+20091101-5
pn  python:any

volti recommends no packages.

volti suggests no packages.

-- no debconf information