Bug#730848: postfix-ldap: Please allow SASL binds

2013-11-30 Thread Guilhem Moulin
Package: postfix-ldap Version: 2.10.2-1 Severity: wishlist Tags: patch Dear Maintainer, LDAP SASL binds have been added to Postfix back to v2.8, at the expense of a flag in the CCARGS [1]. It would be great if postfix-ldap included SASL support. As far as I can tell, the change boilds down to a

Bug#659971: /usr/bin/caff: Doesn't properly quote umlauts in $CONFIG{'owner'}

2014-02-05 Thread Guilhem Moulin
tags 659971 patch thanks One could use the (core) module I18N::Langinfo to decode $CONFIG{'owner'} from the user's locale to Perl's internal format. Also, since the template is expected to be in UTF-8, it needs to be converted as well. Cheers, -- Guilhem. --- a/usr/bin/caff +++

Bug#659971: /usr/bin/caff: Doesn't properly quote umlauts in $CONFIG{'owner'}

2014-02-05 Thread Guilhem Moulin
Oh, I forgot about UIDs, which may need to be converted as well. Patch updated, sorry for the noise. -- Guilhem. diff -ru a/caff/caff b/caff/caff --- a/caff/caff +++ b/caff/caff @@ -321,6 +321,7 @@ use Text::Template; use MIME::Entity; use Encode; +use I18N::Langinfo; use Fcntl; use

Bug#637222: caff does not produce proper mail for non-ascii domain names (IDN)

2014-02-05 Thread Guilhem Moulin
tags 637222 patch thanks IMHO an argument against fixing the issue in Mail::Mailer directly is that the Q-Encoding of the headers is typically done when constructing the MIME::Entity object. Mail::Mailer extracts the envelope from/to from the header (or delegated the extraction to eg,

Bug#734179: pinentry-curses: Fails to display multiline prompts

2014-01-04 Thread Guilhem Moulin
Package: pinentry-curses Version: 0.8.3-1 Severity: important Dear Maintainer, Since the upgrade to 0.8.3-1 pinentry-curses is no longer able to show multiline prompts. This is problematic when used with gpg-agent, since for instance the key ID that is being unlocked is no longer visible. Here

Bug#618781: signing-party: [gpgsigs] please support UTF-8-encoded files

2014-02-11 Thread Guilhem Moulin
tags 618781 patch thanks I think the problem is not with gpgsigs per se, but rather with the LaTeX output it produces. (As Tanguy hinted at, the text output of UTF-8 encoded input files seems to be rendered properly.) LaTeX is in fact known for its poor support of Unicode characters in input

Bug#738718: gpgsigs: should wrap long uids (when used with --latex) and digest lines

2014-02-12 Thread Guilhem Moulin
Package: signing-party Version: 1.1.5-1 Severity: normal Tags: patch Dear Maintainer, gpgsigs currently doesn't wrap long UIDs in its LaTeX output. This is a problem, because after compilation and printing, the full UID is not always visible on the printout. I propose the enclosed patch, which

Bug#736963: gpgsigs: Doesn't full fingerprint

2014-02-12 Thread Guilhem Moulin
tags 736963 patch thanks The enclosed patch allows the user's key(s) to be passed as gpg accepts it that is, as short, 0xshort, long or 0xlong format, as well as a (formatted or not) fingerprint: - 0x109E6244 - 109E6244 - 0x39278DA8109E6244 - 39278DA8109E6244 - 7420 DF86 BCE1 5A45 8DCE

Bug#666974: installs to /dev/sda when grub-installer/bootdev = /dev/sdb

2014-02-19 Thread Guilhem Moulin
Package: grub-installer Version: 1.85 Followup-For: Bug #666974 Tags: patch Dear Maintainer, The bug is still present in Wheezy's installer. The enclosed (naive) patch makes sure grub-installer jumps to state 2 (hence ignores $default_bootdev) if grub-installer/bootdev is known. It has been

Bug#739815: RFA: signing-party -- Various OpenPGP related tools

2014-02-22 Thread Guilhem Moulin
Hi, I'd also be happy to give a hand by becoming an adopter. Cheers, -- Guilhem. signature.asc Description: Digital signature

Bug#739815: RFA: signing-party -- Various OpenPGP related tools

2014-02-23 Thread Guilhem Moulin
Hi Thijs, On Sun, 23 Feb 2014 at 14:53:28 +0100, Thijs Kinkhorst wrote: Thank you both for your interest. And thanks for your trust :-) If you give me your alioth username I will arrange the commit access. My alioth username is guilhem-guest. By the way as far as I'm concerned I'll use

Bug#693906: gpgsigs: cannot find gpgsigs-eps-helper (when used with --latex)

2014-02-24 Thread Guilhem Moulin
Interesting. Since 2008-03-16 /usr/share/signing-party/ is explicitly added to the $PATH. Does your gpg.conf explicitly sets a value for exec-path? I'm just curious as I can't reproduce that bug in a clean sid chroot; But your solution is cleaner is cleaner and more robust since it doesn't

Bug#723024: caff: fails if stdin is not a TTY

2014-02-24 Thread Guilhem Moulin
That's cool! I cannot think of any side effect either, short of - that'll only work on POSIX systems (unsure if we care, but it'd still be possible to fallback to STDIN on non-POSIX systems), and - one would not longer be able to answer the questions with things like ‘yes | caff …’.

Bug#597808: caff: SMTP errors are ignored

2014-02-24 Thread Guilhem Moulin
Well you've been warned :-P [WARN] You have set arguments to pass to Mail::Mailer. Better fix your MTA. (Also, Mail::Mailer's error reporting is non existant, so it won't tell you when it doesn't work.) As for the error itself, it has nothing to do with caff but with the “non

Bug#728543: caff: missing dependencie to libnet-smtp-ssl-perl

2014-02-24 Thread Guilhem Moulin
notfound 728543 1.1.5-1 thanks Hi Carsten, If anything should depend on libnet-smtp-ssl-perl it should probably be libmailtools-perl (which provides Mail::Mailer and which signing-party depends on), not signining-party itself. libmailtools-perl actually added the dependency somewhere between

Bug#625687: caff: Allow user to sign emails in addition to encryption.

2014-02-24 Thread Guilhem Moulin
Hi there, While adding signencrypt support to caff certainly wouldn't hurt, I'm unsure what is the threat model exactly and what what kind of vulnerability a message signature would patch. I mean, the only interesting thing in the messages caff sends is the attachment (encrypted together with

Bug#720413: caff key import from keyservers is broken

2014-02-24 Thread Guilhem Moulin
On Wed, 21 Aug 2013 at 10:40:38 -0400, Joey Hess wrote: caff seems to have its own hard-coded list of keyservers, rather than using the same ones I have gpg configured to use. This seems a gratuitous duplication of configuration. An alternative would be to grep ~/.gnupg/gpg.conf for

Bug#728543: caff: missing dependency to libnet-smtp-ssl-perl

2014-02-25 Thread Guilhem Moulin
Hi Carsten, On Tue, 25 Feb 2014 at 17:24:43 +0100, Carsten Schoenert wrote: So everything should be fine for Jessie or greater. But as I can't check Wheezy directly. So a quick search via packages.debian.org shows me the dependency is still missing in Wheezy

Bug#652686: caff: mail=no doesn't write messages to disk

2014-02-25 Thread Guilhem Moulin
Hi, Are you sure the issue was encountered using 1.1.4-1? According to the changelog a similar bug, #590666, was fixed during that release. I can't reproduce the bug anyway. Cheers, -- Guilhem. signature.asc Description: Digital signature

Bug#612178: caff: silently fails if .caff/gnupghome has wrong permissions

2014-02-26 Thread Guilhem Moulin
Hi, On Tue, 19 Mar 2013 15:47:18 +0100 Dominik George wrote: it actually tells you about the wrong permissions when you tell it to continue after the error. Which is really not very helpful. I pushed a patch to make it dump gpg's standard error after importing the keys, meaning you'd get

Bug#677718: [signing-party] pgp-clean seems to also remove encryption subkey, not only signatures.

2014-02-26 Thread Guilhem Moulin
Hi, In fact the manpage says (all) subkeys are removed by default unless pgp-clean is used with flag -s: -s --export-subkeys Do not remove subkeys. (Pruned by default.) Cheers, -- Guilhem. signature.asc Description: Digital signature

Bug#644472: caff: Support sending mails via MUA (such as mutt)

2014-02-27 Thread Guilhem Moulin
Hi, Ideally solving this bug would solve #637115 as well. But I couldn't find a nice way to integrate mutt (probably other MUAs as well) with caff. First I've got two questions: 1/ Do you want to interact with the MUA (for instance to edit the headers), or should it work in batch mode?

Bug#614981: allow option specification for dropbear in /etc/initramfs-tools/initramfs.conf

2014-03-01 Thread Guilhem Moulin
Control: found -1 2013.60-1 Hi, I fully second this patch. Would be great to see it applied in Jessie ;-) Another common use case is where the dropbear in the ramdisk should listen on a port other than 22: then a simple firewall rule can make it inaccessible from the whole world while keeping

Bug#622560: Bug#614981: signing-party: please include a way to parse gpgparticipants output for caff

2014-03-04 Thread Guilhem Moulin
Hi there, In case you would like to try it out and give feedback before the release, I pushed a fixed to the repository. svn://svn.debian.org/pgp-tools/trunk/ gpgparticipants formatted content is now accepted on caff's STDIN. (Only v4 keys annotated with Fingerprint OK and ID OK are

Bug#594907: kspsig -- Key Signing Party signature verification tool

2014-04-07 Thread Guilhem Moulin
Hi, While your tool would certainly be a valuable addition to signing-party, a blocker is that it gets the digest algorithm on certificate signatures by parsing the output of ‘--list-packets’, which as far as I can tell isn't documented. IMHO a better (and faster) approach would be, as you

Bug#722554: signing-party: please include key-report tool in package

2014-04-07 Thread Guilhem Moulin
Hi Jonas, This looks useful indeed, but after a quick look at the code it doesn't really appeal to me, as the script seems rather unfinished. Also, I find it rather confusing that it's not possible not to report expired/revoked subkeys in case the key has other valid subkey(s) covering the same

Bug#648991: include Serafeim's post keysigning-party scripts

2014-04-07 Thread Guilhem Moulin
Hi, I wonder if these scripts are still useful? As of 1.1.6-1 caff is able to parse key fingerprints directly from a gpgparticipants(1) format (and annotated) list. See also #622560: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622560 Cheers, -- Guilhem. signature.asc Description:

Bug#592787: caff: $CONFIG{'email'} is not being used for MAIL FROM command

2014-03-27 Thread Guilhem Moulin
Control: tag -1 wontfix Hi, On Thu, 20 Mar 2014 21:51:52 -0700, H. S. Teoh wrote: I'm also running into this problem, caff insists on sending email with MAIL FROM as username@localhost instead of the value I set in $CONFIG{'email'}. I've tried Todd Lyons' workaround but it still didn't work

Bug#747296: gpgparticipants: LC_CTYPES fallback causes non-UTF-8 output

2014-05-07 Thread Guilhem Moulin
Hi Stefan, On Wed, 07 May 2014 at 11:25:37 +0200, Stefan Huber wrote: gpgparticipants sets LC_CTYPE=C.UTF-8 for gpg when printing each key. On systems where C.UTF-8 is not available (e.g., Gentoo), the fallback locale causes the output not to be UTF-8 encoded, even if the overridden LC_CTYPE

Bug#747296: gpgparticipants: LC_CTYPES fallback causes non-UTF-8 output

2014-05-07 Thread Guilhem Moulin
On Wed, 07 May 2014 at 14:22:30 +0200, Stefan Huber wrote: Thank you for applying the patch. Since you apply LANGUAGE=en to gpg, you may want to look into using LC_TIME=en for /bin/date, such that the time on the first line is given in English? As ‘en’ is not a valid locale, I think date(1)

Bug#751782: signing-party: caff seems stuck after saving the signed key

2014-06-16 Thread Guilhem Moulin
Hi, On Mon, 16 Jun 2014 at 17:59:45 +0200, Olivier Berger wrote: False error : a result of my own customizations. Sorry about the bothering. No problem :-) It might still be useful to fix this (which looks like a race condition and/or unexpected output from gpg). Would you mind sharing your

Bug#753383: grub-legacy: grub-install(8) should honor $TMPDIR

2014-07-01 Thread Guilhem Moulin
Source: grub-legacy Version: 0.97-67 Severity: normal Tag: patch Dear Maintainer, It'd be convenient to place grub-install's temporary files in $TMPDIR when set. Right now they are placed in /tmp, which on a typical install is on the same partition as /; hence if for some reason / is mounted

Bug#758991: Seeveral Patch to fixed issue in signing-party-1.1.5

2014-08-23 Thread Guilhem Moulin
Hi Jochen, On Sat, 23 Aug 2014 at 17:31:06 +0200, Jochen Schmitt wrote: I would like to forward several patches which I have applied to the pgp-tools package in Fedora for upstream integration. Thanks! diff -urNp --exclude-from=/home/mdomsch/excludes --minimal

Bug#637222: caff cannot handle IDN domains

2014-08-26 Thread Guilhem Moulin
Hi Noël, On Tue, 26 Aug 2014 at 18:43:51 +0200, Noël Köthe wrote: caff doens not convert the IDN domains to punycode: Hmm, it's working fine here (signing-party 1.1.8-1): :~$ locale LANG=en_US.UTF-8 LANGUAGE=en LC_CTYPE=en_US.utf8 LC_NUMERIC=C LC_TIME=en_DK.utf8 LC_COLLATE=en_US.utf8

Bug#753671: caff: please support gpg2

2014-07-04 Thread Guilhem Moulin
I did file a bug against gpg2 a couple of weeks ago (#751266). I'm a bit reluctant to implement a dirty bugfix in caff, as one can fallback to gpg in the meantime. Cheers, -- Guilhem. signature.asc Description: Digital signature

Bug#750357: caff: Perl warning when sending mail

2014-06-02 Thread Guilhem Moulin
Hi Ralf, On Mon, 02 Jun 2014 at 22:22:15 +0200, Ralf Jung wrote: After setting up caff as described in https://wiki.debian.org/caff, I still get the following warnings when caff sends a mail Use of uninitialized value $name in pattern match (m//) at /usr/share/perl5/Mail/Internet.pm line

Bug#730848: postfix-ldap: Please compile it with -DUSE_LDAP_SASL to enable SASL binds

2014-06-03 Thread Guilhem Moulin
Hi, Is there a reason *not* to enable SASL binds in postfix-ldap? After all, dict_ldap.so is linked against libsasl and OpenLDAP's libldap, which does support SASL binds. Furthermore, ldap_table(5) and /usr/share/doc/postfix/LDAP_README.gz already mention SASL binds (OK it's written that their

Bug#750357: caff: Perl warning when sending mail

2014-06-06 Thread Guilhem Moulin
Control: retitle -1 Mail::Internet spews warnings for unnamed users Control: reassign -1 libmailtools-perl 2.12-1 Control: tag -1 patch (split /,/, $name)[0] is undefined when $name is the empty string. -- Guilhem. --- a/Mail/Internet.pm +++ b/Mail/Internet.pm @@ -532,7 +532,7 @@ #

Bug#751105: netcat-openbsd: New upstream version available

2014-06-10 Thread Guilhem Moulin
Package: netcat-openbsd Version: 1.105-7 Severity: normal Dear Maintainer, An interesting feature available in the new release is the addition of a ‘-F’ flag, to pass the first connected socket to the standard output and exit. (This is useful with the ‘ProxyUseFdPass’ option in OpenSSH 6.5 or

Bug#751252: caff: doesn't send email found no signed uids

2014-06-11 Thread Guilhem Moulin
Control: severity -1 important Hi Ilario, First off, thanks for this thorough report :-) This seems to be due to gpg ignoring signatures under the cutoff certification level (2 by default) when exporting with the ‘export-clean’ option. Compare the output of the following two lines: gpg

Bug#737128: gpg exits with a fatal error about missing trustdb despite successfully having imported a key

2014-06-11 Thread Guilhem Moulin
Control: notfound -1 1.4.16-1.1 Contol: merge -1 735363 This seems to be working now: gpg --export $keyID | gpg --homedir $(mktemp -d --tmpdir gpg.XX) --trust-model=always --import -- Guilhem. -- System Information: Debian Release: jessie/sid APT prefers unstable APT policy: (990,

Bug#751266: gnupg2: Fatal error/non-zero exit code returned when --trust-model=always used

2014-06-11 Thread Guilhem Moulin
Package: gnupg2 Version: 2.0.23-1 Severity: important Dear Maintainer, gnupg2 is also affected by #735363 (and #737128). $ gpg --export $keyID | gpg2 --homedir $(mktemp -d) --trust-model=always --import gpg: keyring `/tmp/tmp.CgvawKyhkU/secring.gpg' created gpg: keyring

Bug#751252: caff: doesn't send email found no signed uids

2014-06-11 Thread Guilhem Moulin
On Wed, 11 Jun 2014 at 17:56:50 +0200, Ilario Gelmetti wrote: I have to retire my statement on Key2: the problem is present also with this key. To verify this I created a new gpg key with an empty pubring and tried to sign with caff that Key2 and it didn't work. With my main key I didn't see

Bug#751394: busybox: please provide a way to disable buffering in STDOUT

2014-06-12 Thread Guilhem Moulin
Package: busybox Version: 1:1.22.0-6 Severity: wishlist Dear Maintainer, In udebs, it is common to redirect the standard output of a command to a fifo, and use that to display progress bars in the installer. trap 'kill $pid' EXIT /path/to/command $fifo while read -u 7 n; do

Bug#751485: pinentry-curses: concurent calls mess up the terminal (locking missing)

2014-06-13 Thread Guilhem Moulin
Package: pinentry-curses Version: 0.8.3-2 Severity: normal Tags: upstream Dear Maintainer, When two parallel instance gpg(1) prompt the user for a passphrase, there should be a locking mechanism to avoid both pinentry to try to modify the TTY at the same time. The problem is visible in the

Bug#741213: mutt: pgpring displays an incorrect length for DSA and Elgamal keys

2014-03-09 Thread Guilhem Moulin
Package: mutt Version: 1.5.22-1 Severity: normal Tags: patch Dear Maintainer, As signing-party's pgpring, Mutt's does not look at the right field as key lengh for DSA and Elgamal keys, which results to an incorrect output similar to that reported in #602284. The attached patch, adapted from

Bug#602284: pgpring displays wrong key length for some key

2014-03-09 Thread Guilhem Moulin
On Tue, 21 Nov 2010 at 20:51:12 +0100, Franck Joncourt wrote: Is there a proper document which explains to us how the fields are organized in a keyblock according to the algorithm used? I have looked at the gnupg sources, and found a bit of information in build_packet.c, but this is still

Bug#703355: signing-party: include gpg-import-imap script

2014-03-17 Thread Guilhem Moulin
Control: tag -1 moreinfo Hi Nik, mutt is capable of tagging messages matching a given pattern, and of applying an action on all tagged messages, hence your second motivating point is untrue IMHO. That said, I believe your tool can be of interest, and possibly to mutt users as well. I've got a

Bug#742046: mysql-server: please add a debconf variable to identify root using the 'auth_socket' plugin

2014-03-18 Thread Guilhem Moulin
Package: mysql-server Version: 5.5.35+dfsg-2 Severity: normal Dear Maintainer, When installing a MySQL server in a non-interactive environment (for instance using a configuration manager): DEBIAN_FRONTEND=noninteractive apt-get install mysql-server The post-install hook currently creates a

Bug#742056: slapd: please add a debconf variable to disable RootPW and use unix permissions instead

2014-03-18 Thread Guilhem Moulin
Package: slapd Version: 2.4.39-1 Severity: wishlist Dear Maintainer, When installing slapd in a non-interactive environment (for instance using a configuration manager): DEBIAN_FRONTEND=noninteractive apt-get install slapd Currently a new database ‘olcDatabase={1}hdb,cn=config’ is

Bug#759784: debian-maintainers: Please add Guilhem Moulin as a Debian Maintainer

2014-09-02 Thread Guilhem Moulin
Oh by the way, please note that the email address I use for packaging, namely guil...@guilhem.org, is not that of the primary UID of my OpenPGP key 7420 DF86 BCE1 5A45 8DCE 9976 3927 8DA8 109E 6244. Thanks! -- Guilhem. signature.asc Description: Digital signature

Bug#753671: caff: please support gpg2

2014-10-01 Thread Guilhem Moulin
gnupg2 2.0.26-3 has been packaged today, and includes a fix for #751266. Setting $CONFIG{'gpg'} to be 'gpg2' in the .caffrc is working again. -- Guilhem. signature.asc Description: Digital signature

Bug#316131: gpg-key2latex (replacement for gpg-key2ps)

2014-11-06 Thread Guilhem Moulin
Hi there, FYI, the soon to be 1.1.11 release of signing-party includes a new script ‘gpg-key2latex’, which hopefully will solve the following limitations inherent to the PS format: - Support for Unicode in User ID (xelatex might be required for CJK characters, though). - Support for UAT

Bug#768503: unblock: signing-party/1.1.10-1+deb8u1

2014-11-07 Thread Guilhem Moulin
-party (1.1.10-1+deb8u1) unstable; urgency=medium + + [ Guilhem Moulin ] + * caff: ++ Fix RCF 2822 violation: Never localize the Date header, regarless of + the LC_ALL, LC_TIME and LANG in use. Regression introduced in r698. + (Closes: #767371) + + -- Guilhem Moulin guil

Bug#768503: unblock: signing-party/1.1.10-1+deb8u1

2014-11-07 Thread Guilhem Moulin
Control: retitle -1 unblock: signing-party/1.1.10-2 unblock signing-party/1.1.10-2 On Fri, 07 Nov 2014 at 23:26:24 +0100, Niels Thykier wrote: On 2014-11-07 22:36, Guilhem Moulin wrote: I would like to upload the attached changes: a regression bug has been introduced in signing-party 1.1.10-1

Bug#768579: unblock: signing-party/1.1.10-3

2014-11-08 Thread Guilhem Moulin
@@ +signing-party (1.1.10-3) unstable; urgency=medium + + [ Guilhem Moulin ] + * caff: ++ Fix RCF 2822 violation: Never localize the Date header, regarless of + the LC_ALL, LC_TIME and LANG in use. Regression introduced in r698. + (Closes: #767371) + + -- Guilhem Moulin guil

Bug#769890: caff: Does not show fingerprint for verification when multiple uids are present

2014-11-17 Thread Guilhem Moulin
Control: severity -1 wishlist Hi Matthijs, If no UID(s) is (are) selected, gpg wants to make sure you really intend to sign all UIDs. So a workaround is to preselect all UIDs; with gpg2 it's can be done in one go with a single command in the prompt: ‘uid *’ (OTOH if you use the 1.4 branch, as

Bug#769954: signing-party: Support homedir

2014-11-17 Thread Guilhem Moulin
Hej Nelson, On Mon, 17 Nov 2014 at 19:15:58 -0200, Nelson A. de Oliveira wrote: Couldn't gpg-key2* support a homedir option like gpg? In indeed, and so could caff, gpglist, gpgsigs and probably other tools in the signing-party package ;-) But is there really a use case that's not covered

Bug#771857: signing-party: using gpg2, signing is skipped with 'No secret key'

2014-12-02 Thread Guilhem Moulin
Control: severity -1 wishlist Control: retitle -1 Please support GnuPG 2.1 Hi Brian, On Tue, 02 Dec 2014 at 17:23:21 -0500, Brian Minton wrote: If I have the gpg config entry set to gpg2 (with or without the path) version 2.1, I get the following message: (I'm assuming you're talking about

Bug#771436: caff: Support e-mail subject customization

2014-12-02 Thread Guilhem Moulin
Control: tags -1 + pending Hi Nelson, On Sat, 29 Nov 2014 at 13:17:35 -0200, Nelson A. de Oliveira wrote: caff has a hardcoded e-mail subject. It would be good if we could also customize it (in .caffrc) Done in r739: https://anonscm.debian.org/viewvc/pgp-tools?view=revisionrevision=739 There

Bug#771857: signing-party: using gpg2, signing is skipped with 'No secret key'

2014-12-02 Thread Guilhem Moulin
On Tue, 02 Dec 2014 at 17:23:21 -0500, Brian Minton wrote: If I have the gpg config entry set to gpg2 (with or without the path) version 2.1, I get the following message: gpg: skipped 0424DC19B678A1A9: No secret key 0424DC19B678A1A9 is my key, the private key of which is usable by gpg2

Bug#771857: 771857

2014-12-02 Thread Guilhem Moulin
On Tue, 02 Dec 2014 at 19:20:22 -0500, Brian Minton wrote: Update: That did not in fact fix the problem. I had removed the gpg2 line from the config file. When I put it back in, it still gives the message. I just pushed a fix (r741) for the branches 1.4 and 2.0 of GnuPG. The 2.1 branch has a

Bug#772854: signing-party: QR code: too small quiet zone on large QR code

2014-12-11 Thread Guilhem Moulin
Control: tags -1 + pending Hi Peter, On Thu, 11 Dec 2014 at 19:28:29 +0100, Peter Lebbing wrote: I noticed that the quiet zone is only about 2 modules, and that's assuming you cut it exactly at the lines. My phone had no problem scanning the picture even on a starkly contrasting background,

Bug#771857: caff: Please support GnuPG 2.1

2014-12-29 Thread Guilhem Moulin
This is due to GnuPG 2.1 ignoring --secret-keyring: --secret-keyring file This is an obsolete option and ignored. All secret keys are stored in the private-keys-v1.d directory below the GnuPG home directory. But caff has its own GnuPG home (~/.caff/gnupghome by

Bug#771857: caff: Please support GnuPG 2.1

2015-01-03 Thread Guilhem Moulin
Following http://lists.gnupg.org/pipermail/gnupg-devel/2015-January/029301.html caff's $CONFIG{'secret-keyring'} has been deprecated, and the symlinks are automatically created when the secret keyrings are not present. -- Guilhem. signature.asc Description: Digital signature

Bug#644472: caff: Support sending mails via MUA (such as mutt)

2015-02-03 Thread Guilhem Moulin
I'm a bit reluctant to make caff non-interactive by default, and would rather let users specify the MUA and their options themselves, rather than hardcoding a bunch of supported MUAs in caff. My 'mail-cmd' proposal above seems to achieve the same thing (let users interact with their MUA to add

Bug#775702: caff: Using gpg-agent without GPG_TTY causes silent caff failures

2015-01-20 Thread Guilhem Moulin
Hi Ewen, Your report says you have signing-party 1.1.4-1, but your patch seems to be against a more recent version :-P But anyway I agree that the standard output shouldn't be thrown away like that. That said the absence of GPG_TTY in the environment doesn't seem to bother my gpg(1); doesn't

Bug#775702: caff: Using gpg-agent without GPG_TTY causes silent caff failures

2015-01-20 Thread Guilhem Moulin
Control: retitle -1 caff: The absence of GPG_TTY causes silent caff failures in OSX Control: tag -1 + pending On Wed, 21 Jan 2015 at 11:12:44 +1300, Ewen McNeill wrote: - MacPorts (OS X) (gpg 1.4.18): works _without_ sderr redirected, fails with stderr redirected (no output, exit code 1),

Bug#775702: caff: Using gpg-agent without GPG_TTY causes silent caff failures

2015-01-22 Thread Guilhem Moulin
On Wed, 21 Jan 2015 at 15:52:45 +1300, Ewen McNeill wrote: if (defined($ENV{MACHTYPE}) $ENV{MACHTYPE} =~ /apple/ ! defined($ENV{'GPG_TTY'})) { warn warning: Certain gpg actions may fail if GPG_TTY is not set, , causing silent caff failures.\n; } But maybe there should

Bug#771857: caff: Please support GnuPG 2.1

2015-02-20 Thread Guilhem Moulin
In fact I changed that (r773) to symlink the agent's socket(s) instead; it's much cleaner as it doesn't spawn multiple agent in ~/.caff/gnupghome and the temporary directories. However caff won't work with gpg = 2.1.2, due to gpg not flushing its standard output before the status prompts during

Bug#784982: mysql-server: False positive when checking for insecure root accounts

2015-05-11 Thread Guilhem Moulin
Package: mysql-server Version: 5.5.42-1 Severity: normal Dear Maintainer, When checking for insecure root accounts, ‘debian-start.inc.sh’ merely lists root accounts with an empty password: SELECT COUNT(*) FROM mysql.user WHERE user='root' and password=''; However, such an account can be

Bug#785343: linux-image-4.0.0-1-686-pae: /@/initrd.img not found, due to the symlink /initrd.img having an absolute target

2015-05-14 Thread Guilhem Moulin
Package: src:linux Version: 4.0.2-1 Severity: important Dear Maintainer, I have the following — probably not so common — configuration: - libreboot BIOS (a deblobed coreboot) with a GRUB2 payload - root is BTRFS, with rootflags=subvol=@ Since I don't want to flash a new payload onto the

Bug#785343: linux-image-4.0.0-1-686-pae: /@/initrd.img not found, due to the symlink /initrd.img having an absolute target

2015-05-15 Thread Guilhem Moulin
On Fri, 15 May 2015 at 13:47:59 +0100, Ben Hutchings wrote: On Fri, 2015-05-15 at 05:24 +0200, Guilhem Moulin wrote: On Fri, 15 May 2015 at 03:57:35 +0100, Ben Hutchings wrote: GRUB knows how to do this properly, so you're just making things difficult for yourself. Since there is always

Bug#785343: linux-image-4.0.0-1-686-pae: /@/initrd.img not found, due to the symlink /initrd.img having an absolute target

2015-05-14 Thread Guilhem Moulin
On Fri, 15 May 2015 at 03:57:35 +0100, Ben Hutchings wrote: GRUB knows how to do this properly, so you're just making things difficult for yourself. Since there is always a risk of bricking the board when flashing the BIOS chip, I don't want to add a hook add flash it whenever I upgrade the

Bug#782696: dput: Please give a way to specify the path to the gpg(1) binary

2015-04-16 Thread Guilhem Moulin
Package: dput Version: 0.9.6.4 Severity: normal Dear Maintainer, dput uses a hardcoded ‘/usr/bin/gpg’ when checking signatures. This no longer works if the user uses GnuPG 2.1 (currently available in experimental) has migrated her keyring to the keybox format, since this format is not readable

Bug#790125: RFS: dropbear/2015.67-1.1 NMU

2015-06-27 Thread Guilhem Moulin
upstream release. (Closes: #775222.) [ Guilhem Moulin ] * debian/source/format: 3.0 (quilt) * debian/compat: 9 * debian/control: bump Standards-Version to 3.9.6 (no changes necessary). * debian/copyright: add machine-readable file. * Split up package in dropbear-bin (binaries

Bug#715048: Patch to add support for an indpendendent initramfs networking config

2015-06-16 Thread Guilhem Moulin
On Mon, 01 Jun 2015 at 07:53:28 -0500, Karl O. Pinc wrote: On Mon, 1 Jun 2015 13:46:26 +0200 Guilhem Moulin guil...@guilhem.org wrote: On Sun, 31 May 2015 at 21:30:25 -0500, Karl O. Pinc wrote: On Mon, 1 Jun 2015 03:30:36 +0200 Guilhem Moulin guil...@guilhem.org wrote: I'd rather

Bug#584780: dropbear script for initramfs-tools breaks DNS (and any fixed-address) server

2015-06-16 Thread Guilhem Moulin
‘configure_networking’ was moved to the background in commit a3b7a7d6. According to debian/changelog it was meant to be a fix for #514213 and #524728. I'd say the proper fix would be to follow Simon McVittie's suggestion [0] and split the dropbear package as follows: * dropbear-bin

Bug#558115: dropbear: uses root fs mountpoint for root's home

2015-06-16 Thread Guilhem Moulin
Control: tags -1 patch Here is a patch setting the homedir to $(mktemp -d /root-XX). -- Guilhem. --- /home/guilhem/initramfs-tools/hooks/dropbear 2014-08-12 00:15:40.0 +0200 +++ /usr/share/initramfs-tools/hooks/dropbear 2015-06-16 23:11:27.060710678 +0200 @@ -31,8 +31,9 @@ for so

Bug#692932: dropbear: no support for a different initramfs network config from that of the normal system

2015-06-16 Thread Guilhem Moulin
On Fri, 29 May 2015 at 19:47:43 +0200, Guilhem Moulin wrote: I believe the issue it that the init-premount script sets $IPOPTS while ‘configure_networking’ uses $IP to pick and configure interfaces. Forget about that. IP is assigned properly by the ‘init’ script, and IPOPTS isn't used anywhere

Bug#632656: dropbear: duplicate mount /dev/pts in initramfs

2015-06-16 Thread Guilhem Moulin
In fact /dev/pts is mounted in the ‘init’ initramfs script since commit 261811b5 [0], so we could simply remove ‘scripts/init-premount/devpts’. -- Guilhem. [0] https://anonscm.debian.org/cgit/kernel/initramfs-tools.git/commit/init?id=261811b5d0524c7fe579bf4ca22915c2dc4b636f signature.asc

Bug#735203: dropbear does not exit properly in initrd

2015-06-15 Thread Guilhem Moulin
Control: tags -1 patch Control: retitle -1 Stalled SSH connections after existing initrd due to remaining dropbear children processes To terminate all existing SSH sessions, it's somewhat cleaner to kill all children before exiting the server. Cheers, -- Guilhem. --- dropbear/dropbear

Bug#715048: Patch to add support for an indpendendent initramfs networking config

2015-05-31 Thread Guilhem Moulin
On Fri, 29 May 2015 at 23:35:26 -0500, Karl O. Pinc wrote: Or maybe adding a flush after the ipconfig brings the interface down. Hopefully this would remove the old boot-temporary ip netmask, routes, etc. and leave the interface clean and ready to get it's normal configuration.

Bug#715048: Patch to add support for an indpendendent initramfs networking config

2015-06-01 Thread Guilhem Moulin
On Sun, 31 May 2015 at 21:30:25 -0500, Karl O. Pinc wrote: On Mon, 1 Jun 2015 03:30:36 +0200 Guilhem Moulin guil...@guilhem.org wrote: I'll see if the linux-initramfs-tool would be willing to accept an ‘unconfigure_networking’ function using ip(1). I haven't looked at all the pieces

Bug#632656: dropbear: duplicate mount /dev/pts in initramfs

2015-05-29 Thread Guilhem Moulin
An arguably simpler alternative to copying mountpoint(1) is to grep through /proc/mounts. -- Guilhem. signature.asc Description: Digital signature

Bug#632656: dropbear: duplicate mount /dev/pts in initramfs

2015-05-29 Thread Guilhem Moulin
On Fri, 29 May 2015 at 19:18:04 +0200, Guilhem Moulin wrote: An arguably simpler alternative to copying mountpoint(1) is to grep through /proc/mounts. Forgot the patch, sorry. -- Guilhem. --- a/usr/share/initramfs-tools/scripts/init-premount/devpts +++ b/usr/share/initramfs-tools/scripts/init

Bug#692932: dropbear: no support for a different initramfs network config from that of the normal system

2015-05-29 Thread Guilhem Moulin
tags -1 patch thanks I believe the issue it that the init-premount script sets $IPOPTS while ‘configure_networking’ uses $IP to pick and configure interfaces. -- Guilhem. --- a/usr/share/initramfs-tools/scripts/init-premount/dropbear +++

Bug#715048: Patch to add support for an indpendendent initramfs networking config

2015-05-29 Thread Guilhem Moulin
Hi, The problem is that, while klibc can bring up and down network interfaces, the interface configuration does not go away. What doesn't go away exactly? (What do you mean by “interface configuration”?) I wonder if ip(8) could help, by the way. It's included in the initrd, can flush routes

Bug#786415: /usr/bin/caff: missing perl module PavamVal.pm

2015-05-21 Thread Guilhem Moulin
The MIME::Field::ParamVal module is provided by libmime-tools-perl, on which caff depends. $ dpkg -L libmime-tools-perl | grep ParamVal.pm /usr/share/perl5/MIME/Field/ParamVal.pm $ dpkg -l | grep libmime-tools-perl ii libmime-tools-perl 5.505-1 all Perl5

Bug#790125: RFS: dropbear/2015.67-1.1 NMU

2015-08-08 Thread Guilhem Moulin
applied as well. http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2015q3/001777.html However, this time I didn't pull in the changes (although Debian is now 3 releases behind…) On Fri, Jul 31, 2015 at 05:44:09AM +0200, Guilhem Moulin wrote: Alright, this one is new to me. I'm not sure how

Bug#790125: RFS: dropbear/2015.67-1.1 NMU

2015-08-19 Thread Guilhem Moulin
Hi there, On Thu, 30 Jul 2015 at 22:21:21 +0200, Helmut Grohne wrote: In general, I'd find sponsoring this NMU much easier if the package split and the fixing of those many bugs could happen in separate uploads. Each part is complex and the fallout is hard to estimate. I understand that such

Bug#790125: RFS: dropbear/2015.67-1.1 NMU

2015-08-21 Thread Guilhem Moulin
Hi Gianfranco, On Thu, 20 Aug 2015 at 07:23:55 +, Gianfranco Costamagna wrote: I didn't follow the thread, and seems that other DDs are already caring of this one, so I would just put my .02$ (and let me know if you need a review or help). Thanks! So far only Helmut has given feedback

Bug#796664: signing-party: gpglist does not show all valid identities

2015-08-24 Thread Guilhem Moulin
Control: tags -1 pending Hi Tomasz, On Sun, 23 Aug 2015 at 12:47:01 +0200, Tomasz Buchert wrote: my gpg key is paticular: it has an uid that has been revoked and then subsequently recreated. As a result, it does not show up in the output of gpglist. I've created a patch that fixes that. It

Bug#793917: dropbear FTCBFS: runs wrong arch strip

2015-07-29 Thread Guilhem Moulin
Hi Helmut, On Tue, 28 Jul 2015 at 23:01:57 +0200, Helmut Grohne wrote: dropbear has two problems concerning cross compilation: * It runs a build arch strip which cannot handle the crossed binaries. Thus the build fails (see attached log). * It does not run dpkg-shlibdeps, thus Depends are

Bug#790125: RFS: dropbear/2015.67-1.1 NMU

2015-07-30 Thread Guilhem Moulin
. On Sat, Jul 11, 2015 at 03:20:52PM +0200, Guilhem Moulin wrote: Note that while the current maintainer (Gerrit, CC'ed) told me to go ahead and proceed with a NMU, they are not able to sponsor me at the moment. Furthermore I'm currently a DM and would be open to co-maintenance once time is ripe

Bug#790125: RFS: dropbear/2015.67-1.1 NMU

2015-07-17 Thread Guilhem Moulin
Hi Vincent, Gerrit, On Tue, 14 Jul 2015 at 18:42:53 -0700, Vincent Cheng wrote: NMUs are intended to be minimally intrusive and be targeted to fix specific bugs (and usually RC/important ones); that means that in general, you should avoid things like new upstream releases and extensive

Bug#793006: dropbear: please make build reproducible

2015-07-20 Thread Guilhem Moulin
Hi, On Mon, 20 Jul 2015 at 13:55:35 +0200, Maria Valentina Marin wrote: While working on the “reproducible builds” effort [1], we have noticed that dropbear could not be built reproducibly. There is an ongoing effort to refactor and split the dropbear package in order to isolate the binary,

Bug#805327: irssi-plugin-otr: Can't configure the statusbar templates with `/format OTR stb_*`

2015-11-16 Thread Guilhem Moulin
Package: irssi-plugin-otr Version: 1.0.0-1+b2 Severity: normal Dear Maintainer, ‘src/otr-formats.c’ defines a couple of irssi templates to be configured with ‘/format otr ’. The list of templates and their current values is listed by the ‘/format otr’ command: [Statusbar] stb_plaintext

Bug#803993: RFS: netmask/2.4.3-1 - helps determine network masks

2015-11-03 Thread Guilhem Moulin
ackage with dget using this command: dget -x http://mentors.debian.net/debian/pool/main/n/netmask/netmask_2.4.3-1.dsc Changes since the last upload: [ Robert Stone ] * New upstream release. (Closes: #802884.) [ Guilhem Moulin ] * debian/patches: + Make the build reproducible: s

Bug#801973: error 255 on package configuration

2015-10-16 Thread Guilhem Moulin
Hi, On Fri, 16 Oct 2015 at 16:01:21 +0200, e-mmanuel wrote: > During upgrade of roundcube (from 1.1.2+dfsg.1-4 to 1.1.2+dfsg.1-5), > aptitude reports errors and upgrade stops. Hmm odd. The 1.1.2+dfsg.1-4 → 1.1.2+dfsg.1-5 upgrade works just file in a clean(+dialog) sid chroot: ~# echo 'deb

  1   2   3   4   5   6   7   8   9   10   >