Apologies for the top posting, I'm writing this from my phone.
I get a 403 when trying to access via Orbot/Orweb on Android 4.1 phone.
Amusing.
Lesley
On 24 Apr 2014 03:58, Paul Wise p...@debian.org wrote:
Hi all,
I have written a non-exhaustive list of goals for hardening the Debian
On 10:57 Thu 24 Apr 2014, Paul Wise wrote:
..[snip]..
https://wiki.debian.org/Hardening/Goals
Regarding the line (at that page):
Refuse to install packages that are known to have X number of unplugged
exploits (i.e. X number of open security bugs in the bug tracker) unless
e.g.
I suggest it might be better if exploits were each given a quick/approximate
ranking in terms of severity (and if the severity is unknown it could be
assigned a default median ranking), so that the algorithm you mention wouldn't
just add number of unplugged exploits, but add them by weight
On 24/04/2014 5:49 PM, Lesley Binks wrote:
Apologies for the top posting, I'm writing this from my phone.
I get a 403 when trying to access via Orbot/Orweb on Android 4.1 phone.
Amusing.
It works for me [Orbot/Orweb -- 4.3 on both i9300 and i9505], did you
get the case right?
Strangely though
On Thu, 24 Apr 2014, Paul Wise wrote:
On Thu, 2014-04-24 at 02:53 -0007, Cameron Norman wrote:
Would the inclusion of more AppArmor profiles be applicable?
Thanks, added along with SELinux/etc.
I second that. Actually, some time ago I tried using both AppArmor and
SELinux, but gave up
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 04/22/2014 11:25 AM, Moritz Muehlenhoff wrote:
-
Debian Security Advisory DSA-2911-1 secur...@debian.org
http://www.debian.org/security/
On 24. huhtikuuta 2014 12.57.45 EEST, Andrew McGlashan
andrew.mcglas...@affinityvision.com.au wrote:
It works for me [Orbot/Orweb -- 4.3 on both i9300 and i9505], did you
get the case right?
wiki.d.o seems to be blocking at least some Tor exit nodes. IMHO it should not
do that, at least for
Hi,
On Thu, Apr 24, 2014 at 10:05:08AM -0400, charlie derr wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 04/22/2014 11:25 AM, Moritz Muehlenhoff wrote:
-
Debian Security Advisory DSA-2911-1
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 04/24/2014 11:21 AM, Salvatore Bonaccorso wrote:
This is indeed seem a typo in the DSA-2911-1. The fixed version
for the unstable distribution for the given CVEs is
icedove/24.4.0-1.
For reference see also [1].
[1]
On Thu, Apr 24, 2014 at 11:45:46AM +0200, Giacomo Mulas wrote:
On Thu, 24 Apr 2014, Paul Wise wrote:
Would the inclusion of more AppArmor profiles be applicable?
Thanks, added along with SELinux/etc.
I second that. Actually, some time ago I tried using both AppArmor and
SELinux, but gave up
On Thu, 24 Apr 2014, Steve Langasek wrote:
The apparmor policies in Debian apply a principle of minimal harm, confining
only those services for which someone has taken the time to verify the
correct profile. There are obviously pros and cons to each approach to MAC,
which I'm not interested in
Verstehe.
Am 25. April 2014 00:07:51 schrieb Diegmann, Bjoern b.diegm...@syborg.de:
Einfach nur weils grad so schoen passt ,)
!-- sent from a dumbphone --
--- Ursprüngl. Mitteilung ---
Von: Moritz Muehlenhoff
Gesend.: 24.04.2014, 23:38
An: debian-security-annou...@lists.debian.org
Betreff:
CVE-2014-0188: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
13 matches
Mail list logo