[HS]_deloptes_(was https etc.)

2018-01-15 Thread sejobud33
[HS]_deloptes_
From: deloptes  debian-user@lists.debian.org
the subject is how to set up in https gpg & the source-list : it works of
course but not in 443.
it is not safe in http because the port:80 must be opened ; using https i
could close it ;)

So, it is a trick for closing the port:80 (i do not need it, i always
download & surf on https:443).

i open a new topic because you have a gmail adress.
* i do not answer to gmail/yahoo/gmx user.
(it should be prohibited but you could answer that it suits you & it is
safe to use of course & i should answer that you are heavily wrong)

sorry for this new [HS]topic (anyway i have no response and i do not
understand why my settings are not accepted : it does not run in 443 _ i
installed 9.3 few days ago_ and i do not understand what is wrong in my
settings/install).
Unsolved.



setting gpg keyserver & source-list in 443-https

2018-01-14 Thread sejobud33
how-to setting gpg keyserver & source-list in 443-https

- gpg (2.1.18) was installed by default without .conf & .dirmngr
i followed this how-to but it does not work.
https://sks-keyservers.net/overview-of-pools.php
hkps.pool.sks-keyservers.net
This is a pool containing only servers available using hkps.


- the sources-list (stable 9.3) was installed by default without https.
installing apt-transport-http should solve it.
https://packages.debian.org/stretch/apt-transport-https
If you specify https:// URLs in /etc/apt/sources.list and
/etc/apt/sources.list.d/*, then APT will use HTTPS.


but it does not work ...
gpg is still set in hkp & the sources-list are downloaded in http.
do you know an updated how-to or the reason why it does not work using
443/https ?



sks_deb-https

2018-01-14 Thread sejobud33
malgré plusieurs essais, la liason crypté ne s'effectue pas :

ni pour sks:443
.gpg n'a ni .drmngr ni de .conf (donc plus de tweak mais une configuration
standard ?)
sks ne fonctionnant pas j'ai rajouté un .dirmngr et inscrit les lignes
référencées.
cela ne fonctionne pas plus.
[ Notez le . dossier caché svp pour éviter toutes confusions ]

ni pour deb https:
apt-transport-https est recommandé.
j'ai changé le source-list http en https.
cela ne fonctionne pas plus.
[ Notez que apt-transport-https ne serait plus recommandé ]

pourtant les serveurs acceptant le cryptage sécurisé sont disponibles et
le firewall a bien comme option 443/tcp out.


est-ce que quelqu'un(e) a une idée de ce qui bloque ?




processor_unfixable security flaws

2018-01-05 Thread sejobud33
processor_unfixable security flaws

I cannot answer these questions myself:
- are "melton" & "spectre" related at the ime hidden features
(linustorwald said it is not a bug but a function not yet
discovered/exploited | 40 flaws) ?


* Replacing the cpu should solve these 'bugs'.
- does it mean that Intel is incompetent & sell low quality at a high price ?
Their industry is supported by their commercial monopoly but when a
product is defectuous , it should be replaced/repaired without
charge/gratis no ?
On their site, a microcode (firmware update) is provided for linux.

I understand these bugs like a bad conception of the cpu and not like an
operating system weakness so why the guys behind are still recruited by
intel and why they wait that 'someone else' do their job ?
Is it not a bizarre management of an international company ?
It sounds that building a closed product means that the
holes/bugs/flaws/vulnerabilities were implemented according on a
plan,following orders at a high level as a requirement for/at the
creation/benefit of intel.

ryzen (amd) should be compromised too.
Should gpu & 5g not be it ?

A remedy from google is like an article from a blog (which tor) where
propaganda & censure are the vectors of the sponsors : corruption.


Could these undefinable security flaws change the politic/policy of a
company building a clean, open, neat processor in a near future - assuming
they do know how to do that ... fake reputation - ?
(i mean near of the home/end-user without ime etc.)


thx.



lumina/mono

2018-01-03 Thread sejobud33
I read that "gnome-desktop-environment" does NOT include Tomboy (or
mono), "gnome" however does (at the installation step do not choose one)
so i wonder  if lumina should not be a better choice.

It is a bsd desktop which does not depends on/runs mono.
does it work well with debian ?

thx.



happy new year 2018

2017-12-31 Thread sejobud33
fortunes

ref : Requesting for help (fortunes)
thanks to edua...@kalinowski.com.br for his #436.

Style Excuse Server : outage

BOFH excuse #3:electromagnetic radiation from satellite debris
BOFH excuse #10:hardware stress fractures
BOFH excuse #14:sounds like a Windows problem, try calling Microsoft support
BOFH excuse #16:somebody was calculating pi on the server
BOFH excuse #20:divide-by-zero error
BOFH excuse #24:network packets travelling uphill (use a carrier pigeon)
BOFH excuse #31:cellular telephone interference
BOFH excuse #34:(l)user error
BOFH excuse #39:terrorist activities
BOFH excuse #43:boss forgot system password
BOFH excuse #50:Change in Earth's rotational speed
BOFH excuse #58:high pressure system failure
BOFH excuse #61:not approved by the FCC
BOFH excuse #72:Satan did it
BOFH excuse #73:Daemons did it
BOFH excuse #74:You're out of memory
BOFH excuse #78:Yes, yes, its called a design limitation
BOFH excuse #138:BNC (brain not connected)
BOFH excuse #148:Insert coin for new game
BOFH excuse #157:Incorrect time synchronization
BOFH excuse #174:Backbone adjustment
BOFH excuse #206:Police are examining all internet packets in the search
for a narco-net-trafficker
BOFH excuse #210:We didn't pay the Internet bill and it's been cut off.
BOFH excuse #215:High nuclear activity in your area.
BOFH excuse #256:You need to install an RTFM interface.
BOFH excuse #260:We're upgrading /dev/null
BOFH excuse #392:It's union rules. There's nothing we can do about it. Sorry.
BOFH excuse #394:Jupiter is aligned with Mars.

Take care : Tor blog team & foss dev uses all these one.



Happy new year !




bios/aes_vt

2017-12-30 Thread sejobud33
i have an option in my new pc/bios : vt virtualization
does it help the pc to work 'better' or is it used only when i run a vm ?
i have an option in my new pc/bios : aes
does it help the pc to work 'better' or is it used only when i run the
disk encryption feature ?

- are these feature related at the network (vpn/https/tor e.g.) ?

- should it not be better secured with both uncheck ?

it is a lot of question, i know , but the documentation is so
unclear/bizarre ...
- are these 'option' considered as dependencies of a cpu or as special
functions independent of the pc (controlled by the ime ? ) ?

i do not understand , sorry for my lack of intelligence , if someone could
bring a bit of light in this grey zone i should be less perplex.

(happy new year ! )