Re: [SECURITY] [DSA 3389-1] elasticsearch end-of-life

2015-11-03 Thread Vincent Bernat
❦ 2 novembre 2015 20:00 +0100, Moritz Mühlenhoff  : >> There are many tradeoffs recently with projects that do not want to >> provide a sensible security track for stable releases: >> >> - always package the latest release (Chromium) > > For chromium and iceweasel the vast amount of security is

Re: [SECURITY] [DSA 3389-1] elasticsearch end-of-life

2015-11-01 Thread Vincent Bernat
❦ 1 novembre 2015 23:22 +0100, Moritz Muehlenhoff  : > Security support for elasticsearch in jessie is hereby discontinued. The > project no longer releases information on fixed security issues which > allow backporting them to released versions of Debian and actively > discourages from doing so

Re: [pkg-lighttpd] [SECURITY] [DSA 2368-1] lighttpd security update

2011-12-22 Thread Vincent Bernat
tion available is to fallback to RC4 and that's what happen with the provided configuration. -- Vincent Bernat ☯ http://vincent.bernat.im panic("Attempted to kill the idle task!"); 2.2.16 /usr/src/linux/kernel/exit.c pgppr0EkB7n7u.pgp Description: PGP signature

Re: [SECURITY] [DSA 2368-1] lighttpd security update

2011-12-20 Thread Vincent Bernat
utput of "openssl ciphers") I also think that "this will break older clients" is a bit alarming. Even IE6 supports RC4-SHA. It would be better to say "it may break very old clients". -- Vincent Bernat ☯ http://vincent.bernat.im panic("bad_

Re: Accepted openssh-blacklist 0.3 (source all)

2008-05-20 Thread Vincent Bernat
OoO En cette nuit nuageuse du mercredi 21 mai 2008, vers 01:32, Kees Cook <[EMAIL PROTECTED]> disait: > * Add empty DSA-2048, since they weren't any bad ones. How is it possible? Thanks. -- BOFH excuse #63: not properly grounded, please bury computer pgp3twM6bO48f.pgp Description: PGP sig

Re: openssh remote upgrade procedure?

2008-05-20 Thread Vincent Bernat
OoO En ce début de soirée du mardi 20 mai 2008, vers 21:45, "Alexandros Papadopoulos" <[EMAIL PROTECTED]> disait: > 3. Testing to see if you can still get on to a server is exactly what > I would have done, if my connection had not been killed by the server > itself a few seconds after upgrading

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-17 Thread Vincent Bernat
OoO En ce début d'après-midi nuageux du samedi 17 mai 2008, vers 14:15, Nico Golde <[EMAIL PROTECTED]> disait: >> are there updates for this issue for old stable - sarge? > sarge is not affected I suppose that people may still be interested in blacklist support. > and besides that the security

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Vincent Bernat
OoO En cette soirée bien amorcée du mardi 13 mai 2008, vers 22:38, "John Keimel" <[EMAIL PROTECTED]> disait: >> Restarting OpenSSH do not close existing connections. > Yes, that's correct. I agree. > But the instructions I saw were for 'shutting down the SSHD server' - > not just 'restarting it

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Vincent Bernat
OoO En cette soirée bien amorcée du mardi 13 mai 2008, vers 22:21, "John Keimel" <[EMAIL PROTECTED]> disait: >> Since some keys are generated automatically, (e.g. ssh host keys) users will >> have to regenerate keys,they haven't generated in the first place and might >> not be aware of their exist

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Vincent Bernat
OoO En ce début d'après-midi nuageux du mardi 13 mai 2008, vers 14:06, Florian Weimer <[EMAIL PROTECTED]> disait: > Package: openssl > Vulnerability : predictable random number generator Some other random questions: - It seems that firefox does not handle CRL unless manually imported

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Vincent Bernat
On Tue, 13 May 2008 14:06:39 +0200, Florian Weimer <[EMAIL PROTECTED]> wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > - > Debian Security Advisory DSA-1571-1 [EMAIL PROTECTED] > http://www.debi

Re: [SECURITY] [DSA 1254-1] New bind9 packages fix denial of service

2007-01-28 Thread Vincent Bernat
OoO En cette soirée bien amorcée du dimanche 28 janvier 2007, vers 22:44, "Alison Hobbs" <[EMAIL PROTECTED]> disait: > What on earth does this all mean. Please may I "unsubscribe"? Yes, follow the instructions at the end of every email you receive. -- NO ONE WANTS TO HEAR FROM MY ARMPITS NO

Re: [SECURITY] [DSA 1111-1] New Linux kernel 2.6.8 packages fix privilege escalation

2006-07-17 Thread Vincent Bernat
OoO En ce début d'après-midi ensoleillé du lundi 17 juillet 2006, vers 15:45, Arnd Hannemann <[EMAIL PROTECTED]> disait: > Why is the package name still "kernel-image-2.6.8-3-686" instead of > "kernel-image-2.6.8-4-686"? Because there is no change in ABI. This number is increased only in this

Proftpd and bug #319849

2005-08-11 Thread Vincent Bernat
Hi ! proftpd in Sarge is vulnerable to a format string vulnerability. The corresponding bug is marked as fixed in 1.2.10-20 and found in 1.2.10-15 (which is the Sarge version). This means that the Sarge version is still vulnerable. However, the bug is closed and not tagged security.

Re: On Mozilla-* updates

2005-07-31 Thread Vincent Bernat
OoO Pendant le journal télévisé du dimanche 31 juillet 2005, vers 20:29, "Nikita V. Youshchenko" <[EMAIL PROTECTED]> disait: > Requiring users to install an important component (which Mozilla is) from > other sources is a bad idea in this context. I think it should not be the > way how Debian

Re: Please announce current lack of security support

2005-07-27 Thread Vincent Bernat
OoO En cette fin de matinée radieuse du mercredi 27 juillet 2005, vers 11:21, martin f krafft <[EMAIL PROTECTED]> disait: >> security-announce seems unavailable too. > How so? lists.debian.org is up and a message sent and signed by the > security team to -security-announce should show up. Or am I

Re: Please announce current lack of security support

2005-07-26 Thread Vincent Bernat
OoO En cette fin de matinée radieuse du mardi 26 juillet 2005, vers 11:02, martin f krafft <[EMAIL PROTECTED]> disait: > However, I feel that our users should be told about the problem, and > not just through Joey's blog entry. Thus, can I please urge the > security team to release an appropria

Re: Disk Encryption on bf2.4

2004-03-08 Thread Vincent Bernat
OoO Peu avant le début de l'après-midi du dimanche 07 mars 2004, vers 13:13, E&Erdem <[EMAIL PROTECTED]> disait: > I've searched, but couldn't find kernel patch for bf2.4. Is there a > patch for this or i have to change kernel. You should use cryptoloop patches. They are available as Debian pack

Re: Disk Encryption on bf2.4

2004-03-08 Thread Vincent Bernat
OoO Peu avant le début de l'après-midi du dimanche 07 mars 2004, vers 13:13, E&Erdem <[EMAIL PROTECTED]> disait: > I've searched, but couldn't find kernel patch for bf2.4. Is there a > patch for this or i have to change kernel. You should use cryptoloop patches. They are available as Debian pack

Chrooting named by default (was: Re: chrooting apache[ssl,php,perl] and some mta)

2002-11-09 Thread Vincent Bernat
OoO En cette nuit striée d'éclairs du samedi 09 novembre 2002, vers 02:02, Michael Ablassmeier <[EMAIL PROTECTED]> disait: > i did some apache chroot environment (php,perl,ssl), and now > some users want to use the php "mail" command, so i have to > include some mta into the chroot. > As far as i

Chrooting named by default (was: Re: chrooting apache[ssl,php,perl]and some mta)

2002-11-09 Thread Vincent Bernat
OoO En cette nuit striée d'éclairs du samedi 09 novembre 2002, vers 02:02, Michael Ablassmeier <[EMAIL PROTECTED]> disait: > i did some apache chroot environment (php,perl,ssl), and now > some users want to use the php "mail" command, so i have to > include some mta into the chroot. > As far as i