Non-working GNOME SSH keys

2008-05-16 Thread Olav Vitters
Read this if you have a GNOME (ssh) account and it isn’t working and you
want to know why.

Due to Debian security issue we’ve locked down the machines for public
key authentication. See the announcement by Guilherme de S. Pastore to
devel-announce-list below. Please ensure you’re subscribed to that list
(as we expect people to be)! Generally announcements are spread via
Planet GNOME as well, but that is more of an extra service.

Please contact [EMAIL PROTECTED] if you have either:
* Used a DSA key on a Debian/Ubuntu machine affected by the security
* issue
* Generated a DSA/RSA key on an affected Debian/Ubuntu machine

Note: If you have a DSA key generated on a non-Debianb/Ubuntu (e.g. Red
Hat) distribution (or whatever) and used it on a affected Debian/Ubuntu
machine (meaning: ssh’ed from that machine, not to such a machine), you
are affected as well. So please replace your key in such cases as well.

Current plan: We’ll (well, Owen) remove all blacklisted SSH keys that we
can find and inform affected people. This to avoid greatest security
issues. Not sure yet what we’ll do about the DSA keys (they could be
compromised now or in future whenever they’re used on an affected
Debian/Ubuntu machine).

Closing: I’m unfortunately way too busy to really help the sysadmins
working on this.. plus the accounts people replacing the SSH keys.
Thanks to everyone who’s helping.

On Wed, May 14, 2008 at 10:52:29PM -0500, Guilherme de S. Pastore wrote:
 As some of you have probably been made aware of somehow by now, the 
 Debian openssl package introduced an incorrect change in version 
 0.9.8c-1, available since September 2007 and distributed with the 
 current stable release etch, which resulted in the output of the 
 random number generator being predictable, as per CVE-2008-0166.
 
 That directly affects openssh, and any key generated on Debian or 
 Debian-derived systems from then until the recent security updates (on 
 Debian, versions 0.9.8c-4etch3 or 0.9.8g-9) is deemed potentially 
 compromised.
 
 It should be obvious from the start that we are exposed to risk by the 
 number of developers we have that use Debian or Ubuntu systems, and we
 have run individual tests to reach the conclusion that we do, indeed,
 have this kind of key installed on the GNOME servers. Hence, I regret to 
 inform that key authentication to GNOME machines has been disabled some 
 minutes ago for safety. We will be working into putting mechanisms into 
 place that allow for blacklisting upon authentication, so that the
 insecure keys are selectively disabled and we can resume normal operation
 as soon as possible.
 
 It is worth noting, however, that, for all we currently know, not all 
 cases can be detected by the algorithms we have, which would make it 
 insufficient to just remove the keys we know to be broken or blacklist 
 them. Therefore, it is EXTREMELY important that, if you think your key 
 has been generated in a system affected by this bug at the time, you 
 have your system updated, regenerate your SSH keys and get them replaced 
 by mailing [EMAIL PROTECTED]
 
 The Infrastructure Team may see a need to go a bit further than I have 
 described in due course, but new announcements will be sent out if that
 is the case.
 
 We are sorry for the inconvenience, and hope not to have to disturb 
 development for long or delay the next tarballs due date.
 
 Yours,
 
 --
 Guilherme de S. Pastore
 The GNOME Sysadmin Team
 ___
 gnome-hackers mailing list
 [EMAIL PROTECTED]
 http://mail.gnome.org/mailman/listinfo/gnome-hackers

-- 
Regards,
Olav
___
gnome-i18n mailing list
gnome-i18n@gnome.org
http://mail.gnome.org/mailman/listinfo/gnome-i18n


Re: Non-working GNOME SSH keys

2008-05-16 Thread Åsmund Skjæveland
Olav Vitters skreiv:
 Due to Debian security issue we’ve locked down the machines for public
 key authentication. See the announcement by Guilherme de S. Pastore to
 devel-announce-list below. Please ensure you’re subscribed to that list
 (as we expect people to be)! 

Translators, too?


-- 
Åsmund Skjæveland

___
gnome-i18n mailing list
gnome-i18n@gnome.org
http://mail.gnome.org/mailman/listinfo/gnome-i18n


Re: Non-working GNOME SSH keys

2008-05-16 Thread Djihed Afifi
Hi


I had my keys revoked and I replaced them  through accounts gnome org ,
but the new ones are still not working.

Is there anything I'm not aware of before contacting accounts again?


Djihed

في ج، 16-05-2008 عند 09:46 +0200 ، كتب Olav Vitters:
 Read this if you have a GNOME (ssh) account and it isn’t working and you
 want to know why.
 
 Due to Debian security issue we’ve locked down the machines for public
 key authentication. See the announcement by Guilherme de S. Pastore to
 devel-announce-list below. Please ensure you’re subscribed to that list
 (as we expect people to be)! Generally announcements are spread via
 Planet GNOME as well, but that is more of an extra service.
 
 Please contact [EMAIL PROTECTED] if you have either:
 * Used a DSA key on a Debian/Ubuntu machine affected by the security
 * issue
 * Generated a DSA/RSA key on an affected Debian/Ubuntu machine
 
 Note: If you have a DSA key generated on a non-Debianb/Ubuntu (e.g. Red
 Hat) distribution (or whatever) and used it on a affected Debian/Ubuntu
 machine (meaning: ssh’ed from that machine, not to such a machine), you
 are affected as well. So please replace your key in such cases as well.
 
 Current plan: We’ll (well, Owen) remove all blacklisted SSH keys that we
 can find and inform affected people. This to avoid greatest security
 issues. Not sure yet what we’ll do about the DSA keys (they could be
 compromised now or in future whenever they’re used on an affected
 Debian/Ubuntu machine).
 
 Closing: I’m unfortunately way too busy to really help the sysadmins
 working on this.. plus the accounts people replacing the SSH keys.
 Thanks to everyone who’s helping.
 
 On Wed, May 14, 2008 at 10:52:29PM -0500, Guilherme de S. Pastore wrote:
  As some of you have probably been made aware of somehow by now, the 
  Debian openssl package introduced an incorrect change in version 
  0.9.8c-1, available since September 2007 and distributed with the 
  current stable release etch, which resulted in the output of the 
  random number generator being predictable, as per CVE-2008-0166.
  
  That directly affects openssh, and any key generated on Debian or 
  Debian-derived systems from then until the recent security updates (on 
  Debian, versions 0.9.8c-4etch3 or 0.9.8g-9) is deemed potentially 
  compromised.
  
  It should be obvious from the start that we are exposed to risk by the 
  number of developers we have that use Debian or Ubuntu systems, and we
  have run individual tests to reach the conclusion that we do, indeed,
  have this kind of key installed on the GNOME servers. Hence, I regret to 
  inform that key authentication to GNOME machines has been disabled some 
  minutes ago for safety. We will be working into putting mechanisms into 
  place that allow for blacklisting upon authentication, so that the
  insecure keys are selectively disabled and we can resume normal operation
  as soon as possible.
  
  It is worth noting, however, that, for all we currently know, not all 
  cases can be detected by the algorithms we have, which would make it 
  insufficient to just remove the keys we know to be broken or blacklist 
  them. Therefore, it is EXTREMELY important that, if you think your key 
  has been generated in a system affected by this bug at the time, you 
  have your system updated, regenerate your SSH keys and get them replaced 
  by mailing [EMAIL PROTECTED]
  
  The Infrastructure Team may see a need to go a bit further than I have 
  described in due course, but new announcements will be sent out if that
  is the case.
  
  We are sorry for the inconvenience, and hope not to have to disturb 
  development for long or delay the next tarballs due date.
  
  Yours,
  
  --
  Guilherme de S. Pastore
  The GNOME Sysadmin Team
  ___
  gnome-hackers mailing list
  [EMAIL PROTECTED]
  http://mail.gnome.org/mailman/listinfo/gnome-hackers
 
-- 
Have a project you would like to be translated to Arabic?
Let us know:
http://wiki.arabeyes.org/Translation_requests

Blog: http://djihed.com

___
gnome-i18n mailing list
gnome-i18n@gnome.org
http://mail.gnome.org/mailman/listinfo/gnome-i18n


Re: Non-working GNOME SSH keys

2008-05-16 Thread Olav Vitters
On Fri, May 16, 2008 at 10:41:39AM +0100, Djihed Afifi wrote:
 I had my keys revoked and I replaced them  through accounts gnome org ,
 but the new ones are still not working.
 
 Is there anything I'm not aware of before contacting accounts again?

Currently access is still locked down due to amount of non-secure SSH
keys. Owen is planning to remove those asap so we can open it up again.

-- 
Regards,
Olav
___
gnome-i18n mailing list
gnome-i18n@gnome.org
http://mail.gnome.org/mailman/listinfo/gnome-i18n


Re: Non-working GNOME SSH keys

2008-05-16 Thread Olav Vitters
On Fri, May 16, 2008 at 10:51:09AM +0200, Åsmund Skjæveland wrote:
 Olav Vitters skreiv:
  Due to Debian security issue we’ve locked down the machines for public
  key authentication. See the announcement by Guilherme de S. Pastore to
  devel-announce-list below. Please ensure you’re subscribed to that list
  (as we expect people to be)! 
 
 Translators, too?

Those with an SSH account + coordinators, yes. Otherwise, no.

-- 
Regards,
Olav
___
gnome-i18n mailing list
gnome-i18n@gnome.org
http://mail.gnome.org/mailman/listinfo/gnome-i18n


ssh to svn.gnome.org/master.gnome.org back

2008-05-16 Thread Olav Vitters


NOTE: still can't log in? you'll get mail shortly







On Fri, May 16, 2008 at 09:46:08AM +0200, Olav Vitters wrote:
 Read this if you have a GNOME (ssh) account and it isn’t working and you
 want to know why.
 
 Due to Debian security issue we’ve locked down the machines for public
 key authentication. See the announcement by Guilherme de S. Pastore to
 devel-announce-list below. Please ensure you’re subscribed to that list
 (as we expect people to be)! Generally announcements are spread via
 Planet GNOME as well, but that is more of an extra service.
 
 Please contact [EMAIL PROTECTED] if you have either:
 * Used a DSA key on a Debian/Ubuntu machine affected by the security
 * issue
 * Generated a DSA/RSA key on an affected Debian/Ubuntu machine
 
 Note: If you have a DSA key generated on a non-Debianb/Ubuntu (e.g. Red
 Hat) distribution (or whatever) and used it on a affected Debian/Ubuntu
 machine (meaning: ssh’ed from that machine, not to such a machine), you
 are affected as well. So please replace your key in such cases as well.
 
 Current plan: We’ll (well, Owen) remove all blacklisted SSH keys that we
 can find and inform affected people. This to avoid greatest security
 issues. Not sure yet what we’ll do about the DSA keys (they could be
 compromised now or in future whenever they’re used on an affected
 Debian/Ubuntu machine).
 
 Closing: I’m unfortunately way too busy to really help the sysadmins
 working on this.. plus the accounts people replacing the SSH keys.
 Thanks to everyone who’s helping.
 
 On Wed, May 14, 2008 at 10:52:29PM -0500, Guilherme de S. Pastore wrote:
  As some of you have probably been made aware of somehow by now, the 
  Debian openssl package introduced an incorrect change in version 
  0.9.8c-1, available since September 2007 and distributed with the 
  current stable release etch, which resulted in the output of the 
  random number generator being predictable, as per CVE-2008-0166.
  
  That directly affects openssh, and any key generated on Debian or 
  Debian-derived systems from then until the recent security updates (on 
  Debian, versions 0.9.8c-4etch3 or 0.9.8g-9) is deemed potentially 
  compromised.
  
  It should be obvious from the start that we are exposed to risk by the 
  number of developers we have that use Debian or Ubuntu systems, and we
  have run individual tests to reach the conclusion that we do, indeed,
  have this kind of key installed on the GNOME servers. Hence, I regret to 
  inform that key authentication to GNOME machines has been disabled some 
  minutes ago for safety. We will be working into putting mechanisms into 
  place that allow for blacklisting upon authentication, so that the
  insecure keys are selectively disabled and we can resume normal operation
  as soon as possible.
  
  It is worth noting, however, that, for all we currently know, not all 
  cases can be detected by the algorithms we have, which would make it 
  insufficient to just remove the keys we know to be broken or blacklist 
  them. Therefore, it is EXTREMELY important that, if you think your key 
  has been generated in a system affected by this bug at the time, you 
  have your system updated, regenerate your SSH keys and get them replaced 
  by mailing [EMAIL PROTECTED]
  
  The Infrastructure Team may see a need to go a bit further than I have 
  described in due course, but new announcements will be sent out if that
  is the case.
  
  We are sorry for the inconvenience, and hope not to have to disturb 
  development for long or delay the next tarballs due date.
  
  Yours,
  
  --
  Guilherme de S. Pastore
  The GNOME Sysadmin Team
  ___
  gnome-hackers mailing list
  [EMAIL PROTECTED]
  http://mail.gnome.org/mailman/listinfo/gnome-hackers
 
 -- 
 Regards,
 Olav
 ___
 gnome-hackers mailing list
 [EMAIL PROTECTED]
 http://mail.gnome.org/mailman/listinfo/gnome-hackers

-- 
Regards,
Olav
___
gnome-i18n mailing list
gnome-i18n@gnome.org
http://mail.gnome.org/mailman/listinfo/gnome-i18n


gbrainy 0.7 string freeze

2008-05-16 Thread Jordi Mas
Hello,

We are getting near the release of gbrainy 0.7. It is currently in 
string freeze for a stable 0.7 series.

You have translation status at:

http://l10n.gnome.org/module/gbrainy

I please ask you to update your translations before the 26th of May 
midnight.

I just want to remark that to have updated translations is very 
important to make gbrainy available to more people in more cultures.

Thanks a lot for your effort

-- 

Jordi Mas i Hernàndez, HomePage http://www.softcatala.org/~jmas/
Bloc personal http://www.softcatala.org/~jmas/bloc/
Planeta Softcatalà: http://www.softcatala.org/planet/


___
gnome-i18n mailing list
gnome-i18n@gnome.org
http://mail.gnome.org/mailman/listinfo/gnome-i18n


damned lies, anjuta documentation and encoding bug

2008-05-16 Thread Simos Xenitellis
Hi All,
When viewing the status pages such as
http://l10n.gnome.org/languages/zh_HK/gnome-2-24
one can see the error:

Download po file 
http://l10n.gnome.org/POT/anjuta.HEAD/docs/help.HEAD.pot anjuta 
http://l10n.gnome.org/module/anjuta [Error regenerating POT file for 
document help.HEAD: precd ] doSerialize(doc) File /usr/bin/xml2po, 
line 602, in doSerialize outtxt += doSerialize(child) File 
/usr/bin/xml2po, line 596, in doSerialize (starttag, content, endtag, 
translation) = processElementTag(node, repl, 1) File /usr/bin/xml2po, 
line 496, in processElementTag myrepl.append(processElementTag(child, 
myrepl, 1)) File /usr/bin/xml2po, line 496, in processElementTag 
myrepl.append(processElementTag(child, myrepl, 1)) File 
/usr/bin/xml2po, line 496, in processElementTag 
myrepl.append(processElementTag(child, myrepl, 1)) File 
/usr/bin/xml2po, line 496, in processElementTag 
myrepl.append(processElementTag(child, myrepl, 1)) File 
/usr/bin/xml2po, line 534, in processElementTag translation = 
translation.replace(u'' % (i), replacement) UnicodeDecodeError: 'ascii' 
codec can't decode byte 0xe2 in position 95: ordinal not in range(128) /

Source file:
http://l10n.gnome.org/POT/anjuta.HEAD/docs/help.HEAD.pot

It appears that the mere fact the POT file has a non-ascii character 
causes damned-lies to break.
The offending character apparently is … (ellipsis character), due to the 
0xe2 hint.
It is strange because other POT/PO files have non-ASCII characters as 
well, such as evince and epiphany.

If someone can figure out what's wrong, it would be great.

Talking about encodings in POT files, here is a recent discussion going on,
http://blogs.gnome.org/simos/2008/05/14/should-ui-strings-in-source-code-have-non-ascii-characters/

Simos
___
gnome-i18n mailing list
gnome-i18n@gnome.org
http://mail.gnome.org/mailman/listinfo/gnome-i18n


Re: A coordinator with very long response time

2008-05-16 Thread Mohammad Foroughi
On Fri, 2008-05-16 at 00:03 +0100, Simos Xenitellis wrote:
 This guy, Mohammad, is such a negative force that

We are civilized persons and civilized persons do not scurrile, they
provide reason.

 I would hate to have on my team.

Me, Mr. Poornader, Mr. Esfahbod, and all other iranians are related to
Persian translation. But I can not see any relation between Greek and
Persian teams. Also I am not interested in Greek translation, or joining
your translation team.

 I would refuse to accept translations, or worse, direct him 
 to KDE I18n.
 
 Simos

With the best respects,
Mohammad Foroughi.


___
gnome-i18n mailing list
gnome-i18n@gnome.org
http://mail.gnome.org/mailman/listinfo/gnome-i18n