Re: [Tails-dev] [review'n'merge:1.2.2] liveusb-creator:bugfix/8353-update-status-when-device-appears

2015-01-13 Thread anonym
On 01/12/14 20:05, intrigeri wrote:
 Hi,
 
 I've had this usability issue on my personal todo list for (at least)
 months, along with a tentative patch. Now properly tested (by
 live-patching the code in a running Tails 1.2), so here we go =
 candidate for 1.2.2. I've described the steps to reproduce on
 the ticket.

Merged! Part of liveusb-creator 3.11.6+tails1-14.

Cheers!

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] Build failed in Jenkins: build_Tails_ISO_experimental #1574

2015-01-13 Thread tails-sysadmins
See https://jenkins.tails.boum.org/job/build_Tails_ISO_experimental/1574/

--
Started by an SCM change
Started by an SCM change
Building remotely on isobuilder2 in workspace 
https://jenkins.tails.boum.org/job/build_Tails_ISO_experimental/ws/

Deleting project workspace... done

[build_Tails_ISO_experimental] $ /bin/sh -xe /tmp/hudson9107276634886435147.sh
+ TAILS_RAM_BUILD=yes TAILS_CLEAN_BUILD=yes TAILS_BOOTSTRAP_CACHE= 
http_proxy=http://apt-proxy.lizard:3142 sh -x 
./vagrant/provision/assets/build-tails
sh: 0: Can't open ./vagrant/provision/assets/build-tails
Build step 'Execute shell' marked build as failure
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] [review'n'merge:1.2.3] #8404 -- bugfix/handle-website-CA-change

2015-01-13 Thread anonym
On 06/01/15 11:13, intrigeri wrote:
 hi,
 
  * bugfix/handle-website-CA-change branch in main Git repo now creates
the CA bundle without the CA that signed the old certificate, and
names the bundle file in a more generic way
  * bugfix/handle-website-CA-change in the IUK Git repo has the changes
needed to adjust to the above change
  * bugfix/handle-website-CA-change branch in main Git repo updates the
security check script to use the new CA bundle (which actually
isn't very useful, see #8536, but still)
 
 For testing purposes, the changes from the IUK repo were imported into
 the main one as a chroot_local-patch, which needs to be removed once
 a new version of tails-iuk is released and uploaded.

Merged in both Tails' main Git, and in tails-iuk's. Part of tails-iuk 1.18.

Cheers!

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] test question

2015-01-13 Thread Joe Spicha
Dear tails-dev:

I am fine with not knowing who you are. . .stay anonymous.  I am here
if you feel that I can somehow contribute to developing the windows
appearance.  I have used early versions (iceweasel browser) as well as
the current (which I feel does not have as good of a windows
appearance).
Sincerely,
-- 
Joe Spicha, B.Sc.
P.O. Box 7823
msla, mt 59807-7823
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] New mail address

2015-01-13 Thread spriver
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi to all,

this is my new mail address (moved from t...@dominik-pilatzki.de). I am
also able to speak GPG now. My public key can be found on the regular
keyservers, my fingerprint is: 179E 23A5 4D25 CF05 FC5F  A67A C914
7FC5 687A 380F.


Cheers,

spriver
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=79Gl
-END PGP SIGNATURE-
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] Question for administrator... WHAT process keeps FBI/CIA/NSA/others from volunteering and getting inside the organization?

2015-01-13 Thread Mike Rising
OR, worse scenario, they already are and are the owners of the TAILS
process, and have total ability to capture all data?

Just a concern that all participants need to be informed of THANK YOU !
*-Ernie*

*​ ​(864) 610-8021​Greenville, SC USA*
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] [review'n'merge: 1.2.3] bugfix/8571-fix-mac-spoof-panic-mode

2015-01-13 Thread intrigeri
anonym wrote (11 Jan 2015 12:58:57 GMT) :
 With commit 8156352 the notification was shown 10 out of 10 times, which
 seems like an improvement. :)

I've seen it fail to show up, but indeed it seems better.

Merged, tested the 4 combinations of:

  * macchanger = /bin/{true,false}
  * Tails 1.2.2, stable + your branch

... and got the expected results in all cases. Congrats!

Before testing, I've added commit
23ac1e0367514b7b81bb971069c4a0647c1e86dc on top, that anonym
has ACK'ed.

Cheers!
-- 
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] Build failed in Jenkins: build_Tails_ISO_stable #169

2015-01-13 Thread tails-sysadmins
See https://jenkins.tails.boum.org/job/build_Tails_ISO_stable/169/changes

Changes:

[amnesia] Do not exit upon macchanger error.

[amnesia] Fail safe by entering panic mode if macchanger exits with an error.

[amnesia] Wait for notification-daemon to run before showing notifications.

[amnesia] Log that we're going to step NM before trying to do it.

--
[...truncated 11611 lines...]
Adding debian:NetLock_Qualified_=Class_QA=_Root.pem
Adding debian:NetLock_Notary_=Class_A=_Root.pem
Adding debian:NetLock_Express_=Class_C=_Root.pem
Adding debian:NetLock_Business_=Class_B=_Root.pem
Adding debian:NetLock_Arany_=Class_Gold=_Főtanúsítvány.pem
Adding debian:Microsec_e-Szigno_Root_CA_2009.pem
Adding debian:Microsec_e-Szigno_Root_CA.pem
Adding debian:Juur-SK.pem
Adding debian:Izenpe.com.pem
Adding debian:IGC_A.pem
Adding debian:Hongkong_Post_Root_CA_1.pem
Adding debian:Hellenic_Academic_and_Research_Institutions_RootCA_2011.pem
Adding debian:Go_Daddy_Root_Certificate_Authority_-_G2.pem
Adding debian:Go_Daddy_Class_2_CA.pem
Adding debian:Global_Chambersign_Root_-_2008.pem
Adding debian:GlobalSign_Root_CA_-_R3.pem
Adding debian:GlobalSign_Root_CA_-_R2.pem
Adding debian:GlobalSign_Root_CA.pem
Adding debian:GeoTrust_Universal_CA_2.pem
Adding debian:GeoTrust_Universal_CA.pem
Adding debian:GeoTrust_Primary_Certification_Authority_-_G3.pem
Adding debian:GeoTrust_Primary_Certification_Authority_-_G2.pem
Adding debian:GeoTrust_Primary_Certification_Authority.pem
Adding debian:GeoTrust_Global_CA_2.pem
Adding debian:GeoTrust_Global_CA.pem
Adding debian:GTE_CyberTrust_Global_Root.pem
Adding debian:Equifax_Secure_eBusiness_CA_1.pem
Adding debian:Equifax_Secure_Global_eBusiness_CA.pem
Adding debian:Equifax_Secure_CA.pem
Adding debian:Entrust_Root_Certification_Authority.pem
Adding debian:Entrust.net_Secure_Server_CA.pem
Adding debian:Entrust.net_Premium_2048_Secure_Server_CA.pem
Adding debian:EE_Certification_Centre_Root_CA.pem
Adding debian:EC-ACC.pem
Adding debian:EBG_Elektronik_Sertifika_Hizmet_Sağlayıcısı.pem
Adding debian:E-Tugra_Certification_Authority.pem
Adding debian:E-Guven_Kok_Elektronik_Sertifika_Hizmet_Saglayicisi.pem
Adding debian:Digital_Signature_Trust_Co._Global_CA_3.pem
Adding debian:Digital_Signature_Trust_Co._Global_CA_1.pem
Adding debian:DigiCert_High_Assurance_EV_Root_CA.pem
Adding debian:DigiCert_Global_Root_CA.pem
Adding debian:DigiCert_Assured_ID_Root_CA.pem
Adding debian:Deutsche_Telekom_Root_CA_2.pem
Adding debian:DST_Root_CA_X3.pem
Adding debian:DST_ACES_CA_X6.pem
Adding debian:D-TRUST_Root_Class_3_CA_2_EV_2009.pem
Adding debian:D-TRUST_Root_Class_3_CA_2_2009.pem
Adding debian:Cybertrust_Global_Root.pem
Adding debian:Comodo_Trusted_Services_root.pem
Adding debian:Comodo_Secure_Services_root.pem
Adding debian:Comodo_AAA_Services_root.pem
Adding debian:ComSign_Secured_CA.pem
Adding debian:ComSign_CA.pem
Adding debian:China_Internet_Network_Information_Center_EV_Certificates_Root.pem
Adding debian:Chambers_of_Commerce_Root_-_2008.pem
Adding debian:Certum_Trusted_Network_CA.pem
Adding debian:Certum_Root_CA.pem
Adding debian:Certplus_Class_2_Primary_CA.pem
Adding debian:Certinomis_-_Autorité_Racine.pem
Adding debian:Certigna.pem
Adding debian:Camerfirma_Global_Chambersign_Root.pem
Adding debian:Camerfirma_Chambers_of_Commerce_Root.pem
Adding debian:COMODO_ECC_Certification_Authority.pem
Adding debian:COMODO_Certification_Authority.pem
Adding debian:CNNIC_ROOT.pem
Adding debian:CA_Disig_Root_R2.pem
Adding debian:CA_Disig_Root_R1.pem
Adding debian:CA_Disig.pem
Adding debian:Buypass_Class_3_Root_CA.pem
Adding debian:Buypass_Class_3_CA_1.pem
Adding debian:Buypass_Class_2_Root_CA.pem
Adding debian:Buypass_Class_2_CA_1.pem
Adding debian:Baltimore_CyberTrust_Root.pem
Adding debian:Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem
Adding debian:Atos_TrustedRoot_2011.pem
Adding debian:ApplicationCA_-_Japanese_Government.pem
Adding debian:America_Online_Root_Certification_Authority_2.pem
Adding debian:America_Online_Root_Certification_Authority_1.pem
Adding debian:AffirmTrust_Premium_ECC.pem
Adding debian:AffirmTrust_Premium.pem
Adding debian:AffirmTrust_Networking.pem
Adding debian:AffirmTrust_Commercial.pem
Adding debian:AddTrust_Qualified_Certificates_Root.pem
Adding debian:AddTrust_Public_Services_Root.pem
Adding debian:AddTrust_Low-Value_Services_Root.pem
Adding debian:AddTrust_External_Root.pem
Adding debian:Actalis_Authentication_Root_CA.pem
Adding debian:AC_Raíz_Certicámara_S.A..pem
Adding debian:ACEDICOM_Root.pem
Adding debian:ACCVRAIZ1.pem
Adding debian:A-Trust-nQual-03.pem
Adding debian:ca.pem
Adding debian:cacert.org.pem
done.
Setting up libreoffice-base-core (1:3.5.4+dfsg2-0+deb7u2) ...
Setting up libreoffice-calc (1:3.5.4+dfsg2-0+deb7u2) ...
Setting up libreoffice-draw (1:3.5.4+dfsg2-0+deb7u2) ...
Setting up libreoffice-gtk (1:3.5.4+dfsg2-0+deb7u2) ...
Setting up libreoffice-gnome (1:3.5.4+dfsg2-0+deb7u2) ...
Setting up libreoffice-impress 

Re: [Tails-dev] Question for administrator... WHAT process keeps FBI/CIA/NSA/others from volunteering and getting inside the organization?

2015-01-13 Thread intrigeri
Mike Rising wrote (13 Jan 2015 14:44:25 GMT) :
 OR, worse scenario, they already are and are the owners of the TAILS
 process, and have total ability to capture all data?

 Just a concern that all participants need to be informed of THANK YOU !

Nothing prevents adversaries to contribute to Tails. Let's not assume
that all Tails contributors have the same goals and
adversaries anyway.

However: the review and QA processes we have, that are primarily meant
to catch human errors, should work just as fine to catch problems that
someone would try to introduce intentionally.

Cheers,
-- 
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] [review'n'merge:1.2.2] bugfix/6538-Tails-Installer-tries-to-install-to-too-small-devices

2015-01-13 Thread intrigeri
Alan wrote (12 Jan 2015 12:10:35 GMT) :
  I reviewed the new patch but had a few concerns with it. Please
  have a look at https://labs.riseup.net/code/issues/6538
 
 Ok I have made the required changes.
 
 
 Thanks! I'm not sure to have time to take care of that in the next few
 days thought. If someone else feels like it, don't hesitate.

Done, review posted on Redmine = postponed to 1.3.

Cheers,
-- 
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] Jenkins build is back to normal : build_Tails_ISO_stable #170

2015-01-13 Thread tails-sysadmins
See https://jenkins.tails.boum.org/job/build_Tails_ISO_stable/170/changes

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] [review'n'merge:1.2.1] bugfix/7678-Tails-Installer-crashes-on-upgrade

2015-01-13 Thread intrigeri
Hi,

this branch was obviously not tested in its proposed form, as it
breaks at least the Clone and upgrade feature that it's supposed to
improve = postponed to Tails 1.3. See details on Redmine.

Cheers,
-- 
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] Shared screen locking solution for live distributions in Debian

2015-01-13 Thread Micah Lee
On 01/12/2015 03:58 PM, Klaus Knopper wrote:
 Also, screen locking makes only sense if there is the apparent
 possibility that someone else has physical access to the computer while
 the user is not paying attention. Why would I lock the screen if I'm the
 only one using the computer in a safe environment, and shut it down and
 remove the live medium when I'm done with my work.

I outlined some reasons for it here [1], but TL;DR is so you can step
out of your office for a minute to refill your cup of coffee without
having to close all your work, tell everyone you're chatting with that
you'll brb, shut down your computer, and then boot it up again to get
back to work.

[1] https://labs.riseup.net/code/issues/5684#note-11

-- 
Micah Lee
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] Shared screen locking solution for live distributions in Debian

2015-01-13 Thread Klaus Knopper
Hello Sajolida,

On Wed, Dec 31, 2014 at 02:03:15PM +, sajolida wrote:
 Hi,
 
 I'm part of the people working on Tails, a live distribution that aims
 at preserving privacy and anonymity: https://tails.boum.org/. Tails is
 currently lacking a screen locker and this has been a frequent feature
 request. See https://labs.riseup.net/code/issues/5684.
 
 For example, as Tails is been adopted more and more by journalists,
 they want to be able to leave their computer unattended in their
 office to go to the toilets for a minute and have their screen locked.
 
 I'm writing this emails to various Live distributions based on Debian
 (Knoppix, Grml, Jondo, Kali, Debian Live, and Tanglu). I'm also
 putting Micah Lee in copy as he has shown particular interest in this
 feature.
 
 I've been investigating the screen locking mechanism of those various
 Debian based live distributions, and I found out that none of them had
 a real mechanism to do so. They either:
 
   - Do not provide any screen locking mechanism (Knoppix, Grml,
 Jondo Live).

Actually, Knoppix disables/circumvents the standard Debian screen
locking mechanism because there is no unlocking possible once the
screenlock is active. All passwords are invalid and locked.

   - Either rely on their default password to unlock the screen (Kali,
 Tanglu, Debian Live).
 
 The purpose of this email is to know whether you would be interested
 in working on a common Debian package to provide a generic screen
 locking solution for Debian based live distributions.
 
 The core usability issue that we are facing here is the one of the
 unlocking password. As we are live distributions, there either is no
 password or a default one.

no password in the sense of there is no valid authentication
password, i.e. no backdoor. Sometimes, people mean ANY password if
they say no password, which is not the case for Knoppix. Again, all
passwords are invalid and locked.

 Still, screen locking only make sense if
 the user is able to use a custom password.

Also, screen locking makes only sense if there is the apparent
possibility that someone else has physical access to the computer while
the user is not paying attention. Why would I lock the screen if I'm the
only one using the computer in a safe environment, and shut it down and
remove the live medium when I'm done with my work.

 As an interesting exception,
 note that in Jondo Live, the user is prompted for a user password on
 boot.

Knoppix design is not to ask anything from the boot screen till the
running graphical desktop, with the possible exception of an encrypted
personal overlay.

 In Tails the user can set up an administration password but this
 is disabled by default for security reasons so we cannot rely on this
 for screen locking.
 
 During our last monthly meeting we came up with the idea of asking for
 a custom password *in the process of locking the screen* for the first
 time.

So, when is the right time to lock the screen? Debian does this by
default when the computer goes to standby or the notebook lid is closed.
In this case, the user will hardly pay attention to a dialog asking for
a password.

 For example, in GNOME, when doing Meta+L for the first time, the
 user would be prompted to enter a screen locking password, then only
 the screen would get locked. If she locks the screen again, the same
 password would be reused.

A voluntary screenlock button, asking for a new screenlock (not
necessarily a login) password could be worth a try.

Regards
-Klaus
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] [review'n'merge:1.2.2] test/8359-check-po

2015-01-13 Thread anonym
On 05/12/14 23:32, intrigeri wrote:
 Hi,
 
 in the same vein as #8360, here's now PO checking in our automated
 test suite, so that we check PO files in other branches than
 master too. One small commit, only adds stuff to the test suite
 = candidate for 1.2.2.

Merged!

Cheers!

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] Jenkins build is back to normal : build_Tails_ISO_experimental #1575

2015-01-13 Thread tails-sysadmins
See 
https://jenkins.tails.boum.org/job/build_Tails_ISO_experimental/1575/changes

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] [review'n'merge:1.2.1] bugfix/7678-Tails-Installer-crashes-on-upgrade

2015-01-13 Thread kurono
Hi,

 this branch was obviously not tested in its proposed form, as it
 breaks at least the Clone and upgrade feature that it's supposed to
 improve = postponed to Tails 1.3. See details on Redmine.

Sorry for the very dummy error, I tested and it works now.

Cheers,

Kurono
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.