Bug#747543: marked as done (O: sitecopy -- program for managing a WWW site via FTP, SFTP, DAV or HTTP)

2014-07-12 Thread Debian Bug Tracking System
Your message dated Sun, 13 Jul 2014 06:48:28 +
with message-id 
and subject line Bug#747543: fixed in sitecopy 1:0.16.6-7
has caused the Debian Bug report #747543,
regarding O: sitecopy -- program for managing a WWW site via FTP, SFTP, DAV or 
HTTP
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
747543: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=747543
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: normal

I intend to orphan the sitecopy package.

The package description is:
 Sitecopy is for copying locally stored websites to remote servers. With a
 single command, the program will synchronize a set of local files to a remote
 server by performing uploads and remote deletes as required. The aim is to
 remove the hassle of uploading and deleting individual files using an FTP
 client. Sitecopy will also optionally try to spot files you move locally, and
 move them remotely.
 .
 Sitecopy is designed to not care about what is actually on the remote server -
 it simply keeps a record of what it THINKS is in on the remote server, and
 works from that.
--- End Message ---
--- Begin Message ---
Source: sitecopy
Source-Version: 1:0.16.6-7

We believe that the bug you reported is fixed in the latest version of
sitecopy, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 747...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christian Marillat  (supplier of updated sitecopy package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sun, 13 Jul 2014 08:38:39 +0200
Source: sitecopy
Binary: sitecopy
Architecture: source i386
Version: 1:0.16.6-7
Distribution: unstable
Urgency: medium
Maintainer: Christian Marillat 
Changed-By: Christian Marillat 
Description:
 sitecopy   - program for managing a WWW site via FTP, SFTP, DAV or HTTP
Closes: 747543
Changes:
 sitecopy (1:0.16.6-7) unstable; urgency=medium
 .
   * New maintainer (Closes: #747543)
Checksums-Sha1:
 c399037accadb2889483a36d389bc436e81fb252 1922 sitecopy_0.16.6-7.dsc
 e15ae8d96d3afa5154de831b839c67ad2e0dc0a5 24416 sitecopy_0.16.6-7.debian.tar.xz
 97be8d47296de0b2dd32c21e4638d0fdf04e52b1 126440 sitecopy_0.16.6-7_i386.deb
Checksums-Sha256:
 9810311c893d97760174b042e26b24365e7b949e22f497e8aa282e5afcde60e9 1922 
sitecopy_0.16.6-7.dsc
 d29c5fb052675cadcdce3de6c424b9e9297abbb9fe945b7c18562a256a70f42c 24416 
sitecopy_0.16.6-7.debian.tar.xz
 32a1583ecef8d47414bf3f6385238f1c105020eb25e58fd49ae6bc112e514fac 126440 
sitecopy_0.16.6-7_i386.deb
Files:
 163da7ece50e91cb25472fe86dc7be6d 126440 web extra sitecopy_0.16.6-7_i386.deb
 17860911299caef19dec085afecf8604 1922 web extra sitecopy_0.16.6-7.dsc
 755c1478487abbd7f25c24d11fed881f 24416 web extra 
sitecopy_0.16.6-7.debian.tar.xz

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIVAwUBU8Ip/VyAjCtlVYEXAQixXBAA3rRcmoL5G1VQEcRbkQzOd/nGuj3b4gAX
FPSHZBX1oaowJec7SH4HuOScpW7xjGKu3Mm8nqB5wgyXlkeUujFcb038zkGA9c1I
PugX9LeCeccsFgrzIZCMZSThKvJnsIhvllOnYsfPBsxOClkx7IVuQ3lAKyyVNQK7
PML40S1ztgDd799WHiITrJRImn0ZZ7rkqWlhZA62Uxkm7WlXz+rDd8QR053kBFuU
wEotiP/Z8edGg+ARaDj+tfjx9NbeLBGjXT9mLg9qULZc4651l5+KWw5nHlWPjONt
CaxDnvCucX09yJ5UvS+tzFsIMZsgeOT98pYcRmUSksCbWJgSrS7//zpW7Wxy1jy1
VJUnU5mn7bIBMKSmcdsjQ/yiFGJfJFl84nnyYuFHTA8lxSjI8u+ghflYDDt77vfW
8m0U8XmNp2AySG7k9rX6d9HS8X7ZK5iuNDAILqjyM50LpD4lcSc1Csn2ur35xMQL
RUuoqNwhGjDCAHiQtZYw6SBvjCFDJrCSmArdRYYldlg8fLqJCae+exg/qSYqW4mM
jlHzXLldPtlaW0k5spaZmbbs1Hhrx1+cwREN5IfwkZulUG/kKIHixacf24W0u6pq
Z0bKLQo+F+khaQSz950Powef8cRZfkNfQZ0KnEjGvDADjxjCEduUpnoSmm4dpzSk
maWpx6POets=
=V1sW
-END PGP SIGNATURE End Message ---


Processed: Debian bugs #754473, #754652

2014-07-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> block 754473 by 754652
Bug #754473 [wnpp] ITA: uriparser -- URI parsing library compliant with RFC
754473 was not blocked by any bugs.
754473 was not blocking any bugs.
Added blocking bug(s) of 754473: 754652
> --
Stopping processing here.

Please contact me if you need assistance.
-- 
754473: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754473
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/handler.s.c.140523340113419.transcr...@bugs.debian.org



Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-12 Thread Matthias Urlichs
Hi,

Thomas Goirand:
> Well, I don't agree with this view. If LibreSSL pretends to be a
> replacement for OpenSSL, then they should care about being ABI
> compatible, so we can easily switch from one implementation to the
> other.

That depends. If the ABI in question includes calls or constants which are
the security equivalent of gets() or scanf("%s") or …, then no.

> As Kurt wrote, GNUTLS becomes a better alternative then.

Does gnutls have an openssl shim which actually works as a generic
replacement? I dimly recall a couple of not-so-nice incompatibilities …

> Therefore, I'd very much prefer if we used OpenSSL *or* LibreSSL, but not
> have the choice between the 2, otherwise, that's a recipe for disaster.
> 
Well …

> Please don't upload LibreSSL to Sid *ever*, unless we collectively
> decide that we are switching away from OpenSSL (and for which a
> discussion would have to start).
> 
… while IMHO it's possible to safely mix openssl and libressl if we prepare
for that (i.e. make sure that _everything_ in libressl is only exported 
with properly versioned symbols), again IMHO the time and effort required
for _that_ would be better spent evaluating the changes both projects made
and then deciding which of the two shall be in Debian.

Both efforts have started fairly recently, so it's kind of premature to do
that now; and while IANARTM (Release Team Member) transitioning the whole
of Debian to libressl closer to the release would not be a good idea even
if we decide it's (going to be) the better alternative.

-- 
-- Matthias Urlichs


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140713061751.ga15...@smurf.noris.de



Processed: Debian Bugs #754473, #754515

2014-07-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> unblock 754473 by 754515
Bug #754473 [wnpp] ITA: uriparser -- URI parsing library compliant with RFC
754473 was blocked by: 754515
754473 was not blocking any bugs.
Removed blocking bug(s) of 754473: 754515
> --
Stopping processing here.

Please contact me if you need assistance.
-- 
754473: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754473
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/handler.s.c.14052316554156.transcr...@bugs.debian.org



Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-12 Thread Thomas Goirand
On 07/12/2014 08:46 PM, Toni Mueller wrote:
> As libressl is currently under
> heavy development, it is imho not to be expected to have that stable ABI
> you are asking for.

Well, I don't agree with this view. If LibreSSL pretends to be a
replacement for OpenSSL, then they should care about being ABI
compatible, so we can easily switch from one implementation to the
other. Just like for MariaDB / MySQL in fact (not sure if these are
still ABI compatible though). If that's not the case, then it looses a
lot of its purpose. As Kurt wrote, GNUTLS becomes a better alternative then.

> OTOH, one guy already switched his entire Linux
> system over, so far with no visible adverse effects.

And then? This gives no clue if he had to rebuild everything that
build-depended on OpenSSL...


On 07/13/2014 01:15 AM, Russ Allbery wrote:
> If you start using both for different packages, then you end up with
> shared libraries conflicting over which libssl they want to use, and
> then bad things start happening.

Exactly! I fully agree with you on this. This reminds me issues I had
with mod-log-sql linked to MySQL and php as well, and when they were
built against different versions... BOOM! I certainly do *not* want this
kind of things to happen in Debian. Therefore, I'd very much prefer if
we used OpenSSL *or* LibreSSL, but not have the choice between the 2,
otherwise, that's a recipe for disaster.

Please don't upload LibreSSL to Sid *ever*, unless we collectively
decide that we are switching away from OpenSSL (and for which a
discussion would have to start).

Cheers,

Thomas Goirand (zigo)


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/53c20278.1010...@debian.org



Bug#673750: marked as done (O: gnade -- GNat Ada Database Environment)

2014-07-12 Thread Debian Bug Tracking System
Your message dated Sun, 13 Jul 2014 01:34:47 +
with message-id 
and subject line Bug#754525: Removed package(s) from unstable
has caused the Debian Bug report #673750,
regarding O: gnade -- GNat Ada Database Environment
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
673750: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=673750
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: wnpp

Stephen Leake writes on [1]:

I don't have time or energy for this anymore. Someone will need to
take over maintenance of my packages.

[1] http://lists.debian.org/debian-ada/2012/04/msg00043.html

--
Ludovic Brenta.



--- End Message ---
--- Begin Message ---
Version: 1.6.2-9+rm

Dear submitter,

as the package gnade has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/754525

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmas...@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Scott Kitterman (the ftpmaster behind the curtain)--- End Message ---


Bug#754622: ITP: google-android-sdk-docs-installer -- Install Google build-tools for Android

2014-07-12 Thread Hans-Christoph Steiner
Package: wnpp
Severity: wishlist
Owner: "Hans-Christoph Steiner" 

* Package name: google-android-sdk-docs-installer
  Version : 20.0.0
  Upstream Author : Google, Inc.
* URL : https://developer.android.com/sdk/index.html
* License : public domain
  Programming Lang: make
  Package source  :
http://anonscm.debian.org/gitweb/?p=android-tools/google-android-sdk-docs-installer
-- Install Google build-tools for Android.git
  Description : Android SDK Documentation from Google

 This package will download the Android SDK Documentation from Google and
 create a Debian package.  This package also aims to strip out all calls to
 the networking, including tracking services like Google Analytics and
 Doubleclick. These documentation files still require the Google "jsapi",
 which is only available by fetching it each time from
 http://www.google.com/jsapi.  This package forces it to use https://, but
 otherwise, these docs have to phone home in order for any of the javascript
 to work.
 .
 WARNING: Installing this Debian package causes docs-L_r01.zip to be
 downloaded from dl-ssl.google.com. The End User License Agreement of this
 binary package is available at developer.android.com.  The code in the
 documentation is licensed under the Apache 2.0, and the content is licensed
 under Creative Commons CC-BY 2.5.  The CC-BY 2.5 license is non-free but can
 be legally distributed by Debian.  This package avoids the issue all together
 since each user directly downloads the files from Google, and must agree to
 Google's license.



signature.asc
Description: OpenPGP digital signature


Bug#754595: RFP: easymercurial -- Easy to use mercurial GUI

2014-07-12 Thread D Haley
Package: wnpp
Severity: wishlist

* Package name: easymercurial
  Version : 1.3.0
  Upstream Author : Chris Cannam , Jari Korhonen 
* URL : http://easyhg.org/
* License : GPL
  Programming Lang: Python
  Description : Easy to use mercurial GUI

EasyMercurial is a simple user interface for the Mercurial distributed
version control system. The program is designed for non-advanced users
of distributed version control.

I'm happy to put in a bit of effort in getting this Debian-ised, 
assuming there are no issues i have overlooked. I don't think
I can provide stable maintenance, as I am not sufficiently python
proficient - particularly .


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140712210522.6227.42074.reportbug@midipc



Processed: limit package to wnpp, tagging 754564

2014-07-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> limit package wnpp
Limiting to bugs with field 'package' containing at least one of 'wnpp'
Limit currently set to 'package':'wnpp'

> tags 754564 + pending
Bug #754564 [wnpp] ITP: libinline-c-perl -- C Language Support for Inline
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
754564: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754564
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/handler.s.c.140518053320596.transcr...@bugs.debian.org



Bug#754574: ITP: node-uid-safe -- UIDs generator for URL and Cookie middlewares - Node.js module

2014-07-12 Thread Leo Iannacone
Package: wnpp
Severity: wishlist
Owner: Leo Iannacone 
X-Debbugs-CC: debian-de...@lists.debian.org

* Package name: node-uid-safe
  Version : 1.0.1
  Upstream Author : Jonathan Ong  (http://jongleberry.com)
* URL : https://github.com/crypto-utils/uid-safe
* License : Expat
  Programming Lang: JavaScript
  Description : UIDs generator for URL and Cookie middlewares - Node.js 
module
 This modules provides a generator to create cryptographically secure UIDs
 safe for both cookie and URL usage.
 .
 This is in contrast to modules such as rand-token whose UIDs are actually 
skewed
 due to the use of `%` and unnecessarily truncate the UID
 .
 Node.js is an event-based server-side JavaScript engine.


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/53c1553d.49c6b40a.4fc9.e...@mx.google.com



Bug#754573: ITP: python-rfc3986 -- validating URI references per RFC 3986

2014-07-12 Thread Thomas Goirand
Package: wnpp
Severity: wishlist
Owner: Thomas Goirand 

* Package name: python-rfc3986
  Version : 0.2.0
  Upstream Author : Ian Cordasco 
* URL : https://github.com/sigmavirus24/rfc3986
* License : Apache-2.0
  Programming Lang: Python
  Description : validating URI references per RFC 3986

 This package provides a Python implementation of RFC 3986, including
 validation and authority parsing.


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20140712152021.16558.62224.report...@buzig.gplhost.com



Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-12 Thread Steven Chamberlain
On Jul 12, Toni Mueller  wrote:
> On Sat, Jul 12, 2014 at 07:43:44AM +0200, Marco d'Itri wrote:
> > On Jul 12, Toni Mueller  wrote:
> > > * Package name: libressl
> > I am highly doubtful at best.
> 
> in which respect, and why?

I think some people are jumping ahead to "oh no!  we're replacing
OpenSSL?".  That's something to be have some rough plan for in case
we eventually want to do that.  But for now I don't think it's a
reason not to package it or even allow it into sid/testing.

> > What are your plans exactly?
> 
> My plan is to first build the package(s) and upload to experimental, so
> people can start to play with it.

It is definitely an interesting piece of software, with some different
design choices being made here and there.  It even adds some new
features (new ciphers and elliptic curves for example) and the utilities
are useful standalone (such as for an SSL CA).

People can start to play around with it and maybe to try to rebuild
packages against it locally.  It couldn't be a drop-in replacement
for OpenSSL's libssl and libcrypto because the ABI will differ.  The
source API is being kept as similar as possible so in theory:

> Packages currently build-depending on openssl should be able to
> build-depend on "openssl-dev | libressl-dev".

that sounds like it should just work.  Or otherwise, it could reveal
if a package uses some 'unsafe' part of the API that OpenBSD has removed
during their cleanup.  Any incompatibilities or run-time differences are
likely interesting to both SSL libraries as it could indicate a bug
somewhere.

Probably only a minority of people would want to rebuild many packages
on their system against LibreSSL.  But having it packaged, and
co-installable helps people who want to do this.  Similarly there is
support in the Exim packaging to rebuild with OpenSSL instead of GnuTLS.

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140712140150.ga15...@squeeze.pyro.eu.org



Bug#754564: ITP: libinline-c-perl -- C Language Support for Inline

2014-07-12 Thread gregor herrmann
Package: wnpp
Owner: gregor herrmann 
Severity: wishlist
X-Debbugs-CC: debian-de...@lists.debian.org,debian-p...@lists.debian.org

* Package name: libinline-c-perl
  Version : 0.58
  Upstream Author : Ed J 
* URL : https://metacpan.org/release/Inline-C
* License : Artistic or GPL-1+
  Programming Lang: Perl
  Description : C Language Support for Inline

Inline::C is a module that allows one to write Perl subroutines in C.

The Inline module supports multiple programming languages and each language
has its own support module. This module allows one to use Inline with the C
programming language.


signature.asc
Description: Digital Signature


Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-12 Thread Toni Mueller
Hi,

On Sat, Jul 12, 2014 at 07:43:44AM +0200, Marco d'Itri wrote:
> On Jul 12, Toni Mueller  wrote:
> > * Package name: libressl
> I am highly doubtful at best.

in which respect, and why?

> What are your plans exactly?

My plan is to first build the package(s) and upload to experimental, so
people can start to play with it.

> Would it have the same SONAME of openssl and conflict+provide it?

I would like to make it co-installable with OpenSSL, but in general,
this should be a drop-in replacement until APIs really diverge in a
visible way. Yes, it would provide 'openssl', but I intend to place them
into a different directory, so you might have to use LD_PATH to get
them. Whether it has to conflict with openssl, I'll figure out that
later, if otherwise the case would arise that a binary might get libssl
from one package, and libcrypto from the other.

So far, it looks like a recompile could be necessary. But since the
upstream package has seen the light of day only yesterday (see
http://article.gmane.org/gmane.os.openbsd.announce/186 for the
announcement), things are not yet stable. For the technical side of the
discussion, you can read http://dir.gmane.org/gmane.os.openbsd.tech).

> Would it be a totally different library which packages would 
> build-depend on?

Packages currently build-depending on openssl should be able to
build-depend on "openssl-dev | libressl-dev". For recent versions of
OpenSSH, it already works, and another user writes: "Just switched my
slackware 14.1 box over to libressl instead of openssl and it's working
great so far, no problems at all." So I guess usability is already good.
But imho, it does have to stand the test of time, and receive
independent review, and much more exposure. Which is one reason why I
think it is a very good idea to expose it to the Debian and related
communities.


Kind regards,
--Toni++


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140712130429.gc10...@spruce.wiehl.oeko.net



Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-12 Thread Toni Mueller


Hi Kurt,

[ I have trimmed the Cc list - we are all on devel@, anyway, right? ]

On Sat, Jul 12, 2014 at 02:15:13PM +0200, Kurt Roeckx wrote:
> On Sat, Jul 12, 2014 at 01:53:45PM +0200, Toni Mueller wrote:
> > On Sat, Jul 12, 2014 at 01:25:47PM +0200, Kurt Roeckx wrote:
> > > What are you doing with the binaries, include files, man pages,
> > > ...?  Will they conflict with the ones from openssl?
> > 
> > my intention is to package this stuff so one can have both openssl and
> > libressl installed in parallel. libressl currently has libraries with
> > these sonames:
> > 
> > libssl.so.26
> > libcrypto.so.29
> 
> I don't really like it, since it could potentionally clash with
> the ones provided by openssl.  But it seems unlikely that openssl
> will ever use that as soname.
> 
> I had the feeling openbsd didn't care much about ABI stability,
> and that being at 26 and 29 already doesn't give me a good feeling
> either.  I hope you don't have to go and change the binary package
> names each time you upload a new version.

Actually, these version numbers typically correspond with the version
numbers in the rest of their system. As libressl is currently under
heavy development, it is imho not to be expected to have that stable ABI
you are asking for. OTOH, one guy already switched his entire Linux
system over, so far with no visible adverse effects.

> I was never very happy with it either.  But it has very recently
> changed, and I think it's going in the right direction.  I'm now
> also in the openssl development team.

Good. That does help to improve my trust with it.

> I'm not really sure what you mean by this.  I'm pretty sure the
> openssl development team has a pretty good understanding of
> security and I don't see anybody adding a backdoor in it.

Ok, but for whatever reason, they have an imho not as shiny track
record, as has OpenBSD. Which is no wonder, given all the revelations we
have had recently, but hey, sometimes one has to make a decision.

> > FWIW, I have well over a decade of very good experience with OpenBSD
> 
> Not everybody has the same experience with them.

Yes. Not everybody has an intention to use LibreSSL, either, but
regarding crypto, they usually know their stuff well above average. See
eg. their OpenSSH, which has seen very widespread adoption.

> I think GnuTLS is actually a better alternative and wish there
> were more people developing and using it.

But developing GnuTLS is a full-time job, and then there's the control
problem with the FSF - you are certainly aware about the problems the
original upstream ran into when he wanted to break loose from the FSF
(for a reason I have forgotten). LibreSSL is a much lower-hanging fruit,
as it is supposed to be mostly, or entirely, plug-compatible with
OpenSSL. To me, the playing field largely looks like this atm:

 * GnuTLS, with an API incompatible with OpenSSL, thus requiring huge
   amounts of work to make significant use of it.
 * MatrixSSL, which once had a dubious license, and which still did not
   come out too well in the SSL lib comparison I recently saw (see the
   list archive),
 * the now newly staffed OpenSSL project, with their mixed track
   record (eg. "FIPS"), and now
 * LibreSSL, which sounds much like an OpenSSL on a diet, and with some
   exercise, and promising thrust behind it, but mostly simply a
   drop-in.

And I guess the BoringSSL people will chime in sooner or later, too...


Kind regards,
--Toni++


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140712124645.gb10...@spruce.wiehl.oeko.net



Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-12 Thread Kurt Roeckx
On Sat, Jul 12, 2014 at 02:15:13PM +0200, Kurt Roeckx wrote:
> On Sat, Jul 12, 2014 at 01:53:45PM +0200, Toni Mueller wrote:
> > There are a number of reasons for that, but one has been that I was
> > unhappy about the perceived 'closedness' of the project
> 
> I was never very happy with it either.  But it has very recently
> changed, and I think it's going in the right direction.  I'm now
> also in the openssl development team.

I'm not sure that you saw this, but we recently published a
roadmap document:
https://www.openssl.org/about/roadmap.html


Kurt


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140712122257.ga19...@roeckx.be



Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-12 Thread Kurt Roeckx
On Sat, Jul 12, 2014 at 01:53:45PM +0200, Toni Mueller wrote:
> 
> Hi Kurt,
> 
> On Sat, Jul 12, 2014 at 01:25:47PM +0200, Kurt Roeckx wrote:
> > What are you doing with the binaries, include files, man pages,
> > ...?  Will they conflict with the ones from openssl?
> 
> my intention is to package this stuff so one can have both openssl and
> libressl installed in parallel. libressl currently has libraries with
> these sonames:
> 
> libssl.so.26
> libcrypto.so.29

I don't really like it, since it could potentionally clash with
the ones provided by openssl.  But it seems unlikely that openssl
will ever use that as soname.

I had the feeling openbsd didn't care much about ABI stability,
and that being at 26 and 29 already doesn't give me a good feeling
either.  I hope you don't have to go and change the binary package
names each time you upload a new version.

> > If you're interested in maintaining such a package, why did you
> > never respond to the RFH for openssl?
> 
> There are a number of reasons for that, but one has been that I was
> unhappy about the perceived 'closedness' of the project

I was never very happy with it either.  But it has very recently
changed, and I think it's going in the right direction.  I'm now
also in the openssl development team.

> I generally trust
> the OpenBSD folks, who are the vast majority behind LibreSSL, much more
> with respect to their ability to understand security and pursuing a "no
> backdoors" philosophy than most other people.

I'm not really sure what you mean by this.  I'm pretty sure the
openssl development team has a pretty good understanding of
security and I don't see anybody adding a backdoor in it.

> FWIW, I have well over a
> decade of very good experience with OpenBSD

Not everybody has the same experience with them.

> although I prefer Debian
> for most purposes, including a general slant towards "copyleft" (GPL)
> instead of "copyright" (BSD). They simply provide one of the, or the
> one, most viable alternatives to OpenSSL, thus helping to break down the
> obviously unhealthy monopoly that currently is OpenSSL.

I think GnuTLS is actually a better alternative and wish there
were more people developing and using it.

> @Kurt: That should imho go to devel@, not only to you and the BTS.

I did intend to send it to the list, but forgot to Cc it, so doing
that now.


Kurt


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140712121513.ga18...@roeckx.be



Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-12 Thread Toni Mueller

Hi Kurt,

On Sat, Jul 12, 2014 at 01:25:47PM +0200, Kurt Roeckx wrote:
> What are you doing with the binaries, include files, man pages,
> ...?  Will they conflict with the ones from openssl?

my intention is to package this stuff so one can have both openssl and
libressl installed in parallel. libressl currently has libraries with
these sonames:

libssl.so.26
libcrypto.so.29
 
> If you're interested in maintaining such a package, why did you
> never respond to the RFH for openssl?

There are a number of reasons for that, but one has been that I was
unhappy about the perceived 'closedness' of the project, and my general
feeling that I would like to have an alternative to openssl, which has
been festering for several years now. For a while, I was hoping for
libgnutls, but after the wakeup call, sent by heartbeat, I tried to
figuere out which would be the best way forward, and I generally trust
the OpenBSD folks, who are the vast majority behind LibreSSL, much more
with respect to their ability to understand security and pursuing a "no
backdoors" philosophy than most other people. FWIW, I have well over a
decade of very good experience with OpenBSD, although I prefer Debian
for most purposes, including a general slant towards "copyleft" (GPL)
instead of "copyright" (BSD). They simply provide one of the, or the
one, most viable alternatives to OpenSSL, thus helping to break down the
obviously unhealthy monopoly that currently is OpenSSL.

@Marco et al: I'll answer your other questions RSN, but the first
portable release has only appeared yesterday, so it'll take some time
until the dust settles. And no, I don't think we should go into
production and switch to LibreSSL right now. But we should definitely
have it.

@Kurt: That should imho go to devel@, not only to you and the BTS.


Kind regards,
--Toni++


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140712115345.ga10...@spruce.wiehl.oeko.net



Bug#754556: ITP: python-mpop -- Meteorological Post-Processing Package (MPoP)

2014-07-12 Thread Antonio Valentino
Package: wnpp
Severity: wishlist
Owner: Antonio Valentino 

* Package name: python-mpop
  Version : 1.0.0
  Upstream Author : Martin Raspaud 
* URL : https://github.com/mraspaud/mpop
* License : GPL
  Programming Lang: Python
  Description : Meteorological Post-Processing Package (MPoP)

The Meteorological Post-Processing package is a Python library for
generating RGB products for meteorological remote sensing.
As such it can create RGB composites directly from satellite instrument
channels, or take advantage of precomputed PGEs.

It is designed to be easily extendable to support any meteorological
satellite by the creation of plugins. In the base distribution,
it is provided support for Meteosat 7, 8, 9, MTSAT1R, MTSAT2, GOES 11,
GOES 12, GOES 13 through the use of mipp, and Noaa 15, 16, 17, 18, 19,
and Metop A through the use of aapp and ahamap.

Reprojection of data is also available through the use of the pyresample
package.

This package is part of the PyTroll toolset.


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/53c11c4d.7080...@tiscali.it



Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-12 Thread Kurt Roeckx
On Sat, Jul 12, 2014 at 12:06:27AM +0200, Toni Mueller wrote:
> Package: wnpp
> Severity: wishlist
> Owner: Toni Mueller 
> 
> * Package name: libressl
>   Version : 2.0.0
>   Upstream Author : The OpenBSD project, the OpenSSL project et al.
> * URL : http://www.libressl.org/
> * License : BSD, OpenSSL, SSLeay, Public Domain.
>   Programming Lang: C
>   Description : SSL library, forked from OpenSSL
> 
> 
> LibreSSL strives to maintain API compatibility with OpenSSL, but
> do away with all the cruft.
> 
> After a long series of OpenSSL problems, recently highlighted by
> the infamous Heartbleed bug, a group inside OpenBSD decided to
> fork OpenSSL and adapt the code to modern coding standards.
> Along the way, a lot of compatibility with older architectures
> and toolchains was discarded.

I assume that since it's named libressl that the soname will
contain "libressl.so"?  What about the crypto library?
librecrypto.so?

What are you doing with the binaries, include files, man pages,
...?  Will they conflict with the ones from openssl?

If you're interested in maintaining such a package, why did you
never respond to the RFH for openssl?


Kurt


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140712112547.ga17...@roeckx.be



Processed: your mail

2014-07-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> owner 652029 !
Bug #652029 [wnpp] O: ddns3-client -- Issues dynamic DNS v3 requests
Owner recorded as Sidharth Krishnan <91s...@gmail.com>.
> retitle 652029 ITA:ddns3-client -- Issues dynamic DNS v3 requests
Bug #652029 [wnpp] O: ddns3-client -- Issues dynamic DNS v3 requests
Changed Bug title to 'ITA:ddns3-client -- Issues dynamic DNS v3 requests' from 
'O: ddns3-client -- Issues dynamic DNS v3 requests'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
652029: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652029
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/handler.s.c.140516014826547.transcr...@bugs.debian.org



Bug#754551: ITP: node-ms -- milliseconds conversion utility

2014-07-12 Thread Leo Iannacone
Package: wnpp
Severity: wishlist
Owner: Leo Iannacone 
X-Debbugs-CC: debian-de...@lists.debian.org

* Package name: node-ms
  Version : 0.6.2
  Upstream Author : Guillermo Rauch 
* URL : https://github.com/guille/ms.js
* License : Expat
  Programming Lang: JavaScript
  Description : milliseconds conversion utility - Node.js module
 This module provides a tiny milliseconds conversion utility able to
 transorm a string with a valid time unit to the equivalent number
 of milliseconds and vice versa.
 .
 Node.js is an event-based server-side JavaScript engine.

 .
 Node.js is an event-based server-side JavaScript engine.


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/53c10a02.c759b40a.5c57.9...@mx.google.com



Bug#754547: ITP: python-oslo.i18n -- Oslo Internationalization Utilities

2014-07-12 Thread Thomas Goirand
Package: wnpp
Severity: wishlist
Owner: Thomas Goirand 

* Package name: python-oslo.i18n
  Version : 0.1.0
  Upstream Author : OpenStack Development Mailing List 

* URL : https://github.com/openstack/oslo.i18n
* License : Apache-2.0
  Programming Lang: Python
  Description : Oslo Internationalization Utilities

 The oslo.i18n library contain utilities for working with internationalization
 (i18n) features, especially translation for text strings in an application or
 library.


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20140712091756.9745.4070.report...@buzig.gplhost.com



Bug#754541: ITA: mrxvt

2014-07-12 Thread Sidharth Krishnan
Package: wnpp
Severity: normal


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20140712084740.7184.57369.report...@debiansid.dell-inspiron-1525



Bug#754539: ITA: vdesk

2014-07-12 Thread Sidharth Krishnan
Package: wnpp
Severity: normal


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20140712082322.6281.2111.report...@debiansid.dell-inspiron-1525



Bug#754537: ITP: python-requests-mock -- mock out responses from the requests package

2014-07-12 Thread Thomas Goirand
Package: wnpp
Severity: wishlist
Owner: Thomas Goirand 

* Package name: python-requests-mock
  Version : 0.4.0
  Upstream Author : Jamie Lennox 
* URL : https://github.com/jamielennox/requests-mock
* License : Apache-2.0
  Programming Lang: Python
  Description : mock out responses from the requests package

 requests-mock provides a building block to stub out the HTTP requests_
 portions of your testing code. Everything in requests_ eventually goes through
 an adapter to do the transport work. requests-mock creates a custom adatper
 that allows you to predefine responses when certain URIs are called. There are
 then a number of methods provided to get the adapter used.


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20140712075620.3430.55167.report...@buzig.gplhost.com



Bug#754534: ITA: b43-fwcutter -- Utility for extracting Broadcom 43xx firmware

2014-07-12 Thread Sidharth Krishnan
Package: wnpp
Severity: normal

I intend to orphan the b43-fwcutter package.

The package description is:
 fwcutter is a tool which can extract firmware from various source files.
 It's written for BCM43xx driver files.
 It grabs firmware for BCM43xx from website and install it.


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20140712073236.4228.51029.report...@debiansid.dell-inspiron-1525