Re: Transparency into private keys of Debian

2024-02-05 Thread Simon khng
Hello there, I have read a little on this discussion and feel like sharing my thoughts. I think the current lacking procedures are number 3 and 4 from my summarization based on the current standards adopted for PKI: 1) Chain of trust from developer, [intermediaries,] to root CA. 2) Ensure multiple

Re: postgresql-16; wrong NMU versions (Re: 64-bit time_t transition in progress)

2024-02-05 Thread Otto Kekäläinen
> $ grep mariadb results/* > results/results_dumped.txt:libmariadb-dev > results/results_failed.txt:libmariadbd-dev > results/results_none.txt:libmariadb-dev > $ > > There was nothing unintentional here. libmariadb-dev is clean wrt time_t. > libmariadbd-dev failed to be analyzed because it has hea

Re: postgresql-16; wrong NMU versions (Re: 64-bit time_t transition in progress)

2024-02-05 Thread Steve Langasek
On Sun, Feb 04, 2024 at 04:08:43PM -0800, Otto Kekäläinen wrote: > +1 for MariaDB for the above. Also I think the package name change was > done for the wrong package, it should probably have been done for > libmariadb3 and not for libmariabd19. > apt-cache rdepends --no-recommends --no-suggests l

Bug#1063269: ITP: python-respx -- Utility for mocking out the Python HTTPX and HTTP Core libraries.

2024-02-05 Thread Yogeswaran Umasankar
Package: wnpp Severity: wishlist Owner: Yogeswaran Umasankar X-Debbugs-Cc: debian-devel@lists.debian.org, kd8...@gmail.com * Package name: python-respx Version : 0.20.2 Upstream Contact: Jonas Lundberg * URL : https://github.com/lundberg/respx * License : BSD

Bug#1063230: ITP: QtTinySA -- QT Gui for a tiny SA Spectrum Analyser

2024-02-05 Thread Patrick Winnertz
Package: wnpp Severity: whishlist Owner: Patrick Winnertz X-Debbugs-Cc: debian-devel@lists.debian.org Package name: qttinysa Version : 0.9.1 Upstream Author : Ian (g4ixt) URL : https://github.com/g4ixt/QtTinySA License : GPL-v3 Programming Lang: Python Descrip

Re: Transparency into private keys of Debian

2024-02-05 Thread Philipp Kern
On 2024-02-05 08:58, Simon Josefsson wrote: What would be involved is to 1) during signing of artifacts, also sign and upload into Sigstore/Sigsum, and 2) during verification in the f-droid app, also verify that the signature has been committed to the Sigstore/Sigsum logs. Both projects have cli

Re: Transparency into private keys of Debian

2024-02-05 Thread Stephan Verbücheln
Your work is valuable. Many of the things have probably evolved over time and could use some analysis based on modern cryptography and security practices. I just wanted to point out that there are subtle but important differences outside of the key and signature formats. The most important distinc

Re: Transparency into private keys of Debian

2024-02-05 Thread Simon Josefsson
Stephan Verbücheln writes: > II. Typical Debian case > > 1. Debian developer signs source tarballs and upload them > 2. The signature only has to be secure until the code lands in the FTP > 3. Debian builds the binary packages > 4. Debian creates Release files with hashes of the packages > 5. The

Re: Transparency into private keys of Debian

2024-02-05 Thread Stephan Verbücheln
Code signing is not equal to code signing. There are a lot of differences between different code-signing strategies, many of which are often overlooked. Example: I. Typical Windows case 1. Third-party developer gets a key from a CA. 2. Third-party developer signs a program binary. 3. The user ob

Re: O: nvi - 4.4BSD re-implementation of vi

2024-02-05 Thread Tobias Heider
On Sat, Jan 26, 2013 at 12:38:07AM +, Stuart Prescott wrote: > Package: wnpp > Severity: normal > > The maintainer for the "nvi" package has indicated that he is unable to > maintain this package for the time being. I'm marking this package as orphaned > now. If you want to be the new maintain

Re: Transparency into private keys of Debian

2024-02-05 Thread Simon Josefsson
Bill Allombert writes: > On Mon, Feb 05, 2024 at 08:49:09AM +0100, Simon Josefsson wrote: >> Bill Allombert writes: >> >> > Le Thu, Feb 01, 2024 at 10:38:03AM +0100, Simon Josefsson a écrit : >> >> Hi >> >> >> >> I'm exploring how to defend against an attacker who can create valid >> >> signat

Re: Transparency into private keys of Debian

2024-02-05 Thread Bill Allombert
On Mon, Feb 05, 2024 at 08:49:09AM +0100, Simon Josefsson wrote: > Bill Allombert writes: > > > Le Thu, Feb 01, 2024 at 10:38:03AM +0100, Simon Josefsson a écrit : > >> Hi > >> > >> I'm exploring how to defend against an attacker who can create valid > >> signatures for cryptographic private key

Re: 64-bit time_t transition in progress

2024-02-05 Thread Andrius Merkys
Hi, On 2024-02-05 09:05, Steve Langasek wrote: On Mon, Feb 05, 2024 at 08:57:50AM +0200, Andrius Merkys wrote: Given libfoo1 in unstable and libfoo2 in experimental, I assume libfoo1t64 will be NMU'd directly to unstable. After that happens, will it be OK to upload libfoo2 to unstable (as part