[Bug 600851] Re: When trying to copy 1:1 CD asks me to manually install cdda2wav then quits

2010-09-09 Thread otzenpunk
** Changed in: brasero (Ubuntu) Status: Incomplete => Confirmed -- When trying to copy 1:1 CD asks me to manually install cdda2wav then quits https://bugs.launchpad.net/bugs/600851 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -

[Bug 600851] Re: When trying to copy 1:1 CD asks me to manually install cdda2wav then quits

2010-09-08 Thread otzenpunk
The program cdrdao is provided by the package cdrdao. cdda2wav is provided by the package icedax. Installing both packages resolved the problem for me. The package cdrdao is mentioned in the brasero package as a Suggest, but the icedax dependency is completely missing. Should be fixed. Maybe both

[Bug 537275] Re: Regression: Gimp has no progressbar

2010-04-23 Thread otzenpunk
Anybody willing (and able) to raise the importance of this bug? I really miss the zoom and length unit widgets. -- Regression: Gimp has no progressbar https://bugs.launchpad.net/bugs/537275 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 276384] Re: Thinkfinger doesn't unlock keyring

2010-02-23 Thread otzenpunk
** Changed in: gnome-keyring-manager Status: New => Invalid ** Changed in: gnome-keyring Status: New => Invalid -- Thinkfinger doesn't unlock keyring https://bugs.launchpad.net/bugs/276384 You received this bug notification because you are a member of Ubuntu Bugs, which is subscrib

[Bug 391884] Re: insufficient quoting in easy-rsa-2 vars script

2009-06-24 Thread otzenpunk
Similar problem in /usr/share/doc/openvpn/examples/easy-rsa/2.0/build- dh. Should be if [ -d "$KEY_DIR" ] && [ $KEY_SIZE ]; then $OPENSSL dhparam -out "${KEY_DIR}/dh${KEY_SIZE}.pem" ${KEY_SIZE} in line 6 ff. P.S.: Forgot to tell: Version is openvpn 2.1~rc11-1ubuntu3 as shipped with jaunty.

[Bug 391884] [NEW] insufficient quoting in easy-rsa-2 vars script

2009-06-24 Thread otzenpunk
Public bug reported: Binary package hint: openvpn The script /usr/share/doc/openvpn/examples/easy-rsa/2.0/vars does not quote the variable $EASY_RSA in line 29 properly and should be adjusted like this: export KEY_CONFIG=`"$EASY_RSA/whichopensslcnf" "$EASY_RSA"` The $EASY_RSA variable contains

[Bug 316550] Re: CVE-2008-5620- Roundcube vulnerable and actively exploited

2009-02-20 Thread otzenpunk
I'm afraid, but I that doesn't seem to work. (hardy-fix.debdiff) ~/src/roundcube-0.1~rc2$ patch -p1 < ../hardy-fix.debdiff patching file debian/control patching file debian/changelog patching file debian/control.in patching file debian/patches/series patching file debian/patches/cve-2008-5619.pat

[Bug 316550] Re: CVE-2008-5620- Roundcube vulnerable and actively exploited

2009-02-19 Thread otzenpunk
> CVE 2008-5619 states "html2text.php in RoundCube Webmail (roundcubemail) 0.2-1.alpha and 0.2-3.beta allows remote attackers to execute arbitrary code via crafted input that is processed by the preg_replace function with the eval switch. " These versions have never entered Ubuntu. I think, this i

[Bug 153438] Re: .desktop files provide simple infection vector for trojans

2009-02-18 Thread otzenpunk
Added Gnome bug #572203, because the other referenced Gnome bug is outdated. ** Changed in: nautilus Bugwatch: GNOME Bug Tracker #405052 => GNOME Bug Tracker #572203 Status: New => Unknown -- .desktop files provide simple infection vector for trojans https://bugs.launchpad.net/bugs/1

[Bug 316550] Re: CVE-2008-5619 - Roundcube vulnerable and actively exploited

2009-01-13 Thread otzenpunk
I've added the Debian Bug link. There is another security related bug fixed in http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=509596. The changeset mentioned above covers both. ** Bug watch added: Debian Bug tracker #508628 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508628 ** Also affe

[Bug 316550] Re: CVE-2008-5619 - Roundcube vulnerable and actively exploited

2009-01-13 Thread otzenpunk
Sorry, I'm not sure if I can provide a debdiff, because I've never done that before. Just in case there is somebody with a little more expertise sitting out there. The changeset is here: http://trac.roundcube.net/changeset/2162 The update notice here: http://sourceforge.net/forum/forum.php?forum_id

[Bug 276384] Re: Thinkfinger doesn't unlock keyring

2009-01-03 Thread otzenpunk
I'm not sure if it would be a good idea to actively encourage this. Maybe just create a new README file under /usr/share/doc/libpam- thinkfinger? -- Thinkfinger doesn't unlock keyring https://bugs.launchpad.net/bugs/276384 You received this bug notification because you are a member of Ubuntu Bugs

[Bug 276384] Re: Thinkfinger doesn't unlock keyring

2009-01-02 Thread otzenpunk
> But I think you missed something about the encryption, and the > fingerprint data, which indeed would be some kind of hash or string. > Then why can the fingerprint data itself not be a key, Because of what Milan wrote. Your fingerprint isn't exactly the same, whenever you scan it. Maybe you tur

[Bug 276384] Re: Thinkfinger doesn't unlock keyring

2009-01-02 Thread otzenpunk
@loke: NO, IT CAN'T! Sorry, maybe I'm just too stupid to explain this in a comprehensible way. Last try: Authentication and encryption are two fundamental different things. You can't "unlock" an encrypted thing(tm) with a fingerprint. To decrypt an encrypted thing you need to know the secret, w

[Bug 119358] Re: Weak default authentication mode

2008-12-05 Thread otzenpunk
> Is this still an issue for anyone? I think so. I myself use another mail client, but the issue is still present in Intrepid. Just tested it, and it used SASL LOGIN although CRAM-MD5 was available. Of course, there is an option in the wizard now, where you can disable downloading mail immediatel

[Bug 276384] Re: Thinkfinger doesn't unlock keyring

2008-11-17 Thread otzenpunk
> Ah. Been digging around and found some wonderful insight on this issue. That's essentially what I wrote. And I also wrote, that you could use a null passphrase for your gnome keyring, if you don't mind storing your passwords in an unencrypted, unsecure way because you want to save your 1 minute

[Bug 276384] Re: Thinkfinger doesn't unlock keyring

2008-10-05 Thread otzenpunk
Of course everything less than full harddisk encryption is "security theater", if you've got knowledgable enemies with unmonitored physical access to your laptop. But that was not my point. Everybody has to decide for himself, which level of security is appropriate for him, and what is overkill, b

[Bug 276384] Re: Thinkfinger doesn't unlock keyring

2008-10-05 Thread otzenpunk
I think, placing the wireless passwords out of the keyring is not the ideal solution, because the keyring is being used for other passwords as well. (Like Samba shares or various instant messengers.) So just dealing with network-manager decreases security but doesn't solve the problem at all. If y

[Bug 183486] Re: gnome-screensaver locks up randomly when unlocking screen

2008-07-11 Thread otzenpunk
I've also experienced this behaviour. But typing the password blindly into this partial unlock dialog does in fact unlock the screen. -- gnome-screensaver locks up randomly when unlocking screen https://bugs.launchpad.net/bugs/183486 You received this bug notification because you are a member of

[Bug 235297] Re: Fingerprints stored in unsafe location

2008-07-01 Thread otzenpunk
A quick workaround (if your home partition lives on an ext2/3 filesystem) is to use sudo chattr +i .thinkfinger.bir. -- Fingerprints stored in unsafe location https://bugs.launchpad.net/bugs/235297 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 243339] Re: README.Debian contains error

2008-06-30 Thread otzenpunk
** Changed in: thinkfinger (Ubuntu) Status: New => Confirmed -- README.Debian contains error https://bugs.launchpad.net/bugs/243339 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubu

[Bug 214404] Re: thinkfinger-tools acquire fails on usb_bulk_read error

2008-06-30 Thread otzenpunk
** Changed in: thinkfinger (Ubuntu) Status: New => Confirmed -- thinkfinger-tools acquire fails on usb_bulk_read error https://bugs.launchpad.net/bugs/214404 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing

[Bug 239891] Re: README.Debian gives incorrect path for pam-thinkfinger-enable script

2008-06-30 Thread otzenpunk
*** This bug is a duplicate of bug 243339 *** https://bugs.launchpad.net/bugs/243339 I've marked this as a duplicate of https://bugs.launchpad.net/ubuntu/+source/thinkfinger/+bug/243339 although this one is the older bug report. The reason is, that the other one does already have a patch attac

[Bug 243935] [NEW] nautilus sftp doesn't honor remote group permissions correctly

2008-06-29 Thread otzenpunk
Public bug reported: Binary package hint: nautilus When connecting to a remote server via the ssh protocol, nautilus doesn't recognize group write permissions on the remote server. I noticed this when I wanted to create a new folder in a remote /var/www directory with group write permissions for

[Bug 209084] Re: no run as root in menu in hardy

2008-06-15 Thread otzenpunk
That's ok for me, of course. -- no run as root in menu in hardy https://bugs.launchpad.net/bugs/209084 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mai

[Bug 209084] Re: no run as root in menu in hardy

2008-06-15 Thread otzenpunk
> su-to-root "will automatically call either gksu (default) or kdesu (when being launched under KDE) for better integration into the running desktop environment." Yes, I know that. I've just put it on top of my selection, because it tries to detect the currently running desktop environment, and so

[Bug 222264] Re: wireshark grey window since Hardy

2008-06-15 Thread otzenpunk
*** This bug is a duplicate of bug 198884 *** https://bugs.launchpad.net/bugs/198884 ** This bug has been marked a duplicate of bug 198884 Wireshark 0.99.7 halted in Hardy -- wireshark grey window since Hardy https://bugs.launchpad.net/bugs/64 You received this bug notification becaus

[Bug 236346] Re: wireshark capture interfaces woks only with sudo

2008-06-15 Thread otzenpunk
*** This bug is a duplicate of bug 209084 *** https://bugs.launchpad.net/bugs/209084 ** This bug has been marked a duplicate of bug 209084 no run as root in menu in hardy -- wireshark capture interfaces woks only with sudo https://bugs.launchpad.net/bugs/236346 You received this bug notif

[Bug 209084] Re: no run as root in menu in hardy

2008-06-15 Thread otzenpunk
So my proposal is this: The attachment is supposed to be installed as /usr/bin/wireshark-root. It tries su-to-root, gksu and kdesudo in this order, (although I don't know if I got the options for kdesudo right), and when nothing's there it opens x-terminal-emulator with plain sudo. wireshark-root

[Bug 209084] Re: no run as root in menu in hardy

2008-06-15 Thread otzenpunk
@Hewus: If menu will be the standard for that in the future, say in Intrepid, then it will certainly be o.k, and maybe a better solution than now. But currently, this would be a weird exception. Everything else uses gksu in their .desktop files on Ubuntu, be it wireshark-comparable tools like et

[Bug 209084] Re: no run as root in menu in hardy

2008-06-15 Thread otzenpunk
I think, this thread may be of interest: http://www.mail-archive.com/debian- [EMAIL PROTECTED]/msg20136.html -- no run as root in menu in hardy https://bugs.launchpad.net/bugs/209084 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- u

[Bug 209084] Re: no run as root in menu in hardy

2008-06-15 Thread otzenpunk
> If we are replacing gksu with menu, then menu should probably be a recommended package instead of a dependency. I think, I don't like that very much. I, for example, regularly disable automatic installation of recommended packages, and I'm sure I'm not alone. This is in this case no problem, bec

[Bug 107107] Re: KMail prevents encryption, if the target key is not ultimately trusted or (locally) signed

2008-01-30 Thread otzenpunk
@LimCore: No, I didn't. As it's written in the corresponding KDE bug there are two ways to send mail to random people you meet on the internet. Either you sign their keys without actually verifying their identity, or you set the trust level to "ultimate" although you'd really trust them just par

[Bug 120867] Re: does not show any fetched data

2007-12-02 Thread otzenpunk
I can confirm this, too. Urlsnarf works, though. -- does not show any fetched data https://bugs.launchpad.net/bugs/120867 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com htt

[Bug 162508] nfs-user-server destroys files

2007-11-13 Thread otzenpunk
Public bug reported: Binary package hint: nfs-user-server Two users in the German Loco-Forum ubuntuusers.de have reported, that the nfs-user-server has truncated files to 0 bytes after they upgraded from Feisty to Gutsy. Both say that NFS worked fine under Feisty and this phenomenon is new after

[Bug 116939] Re: Properties window weirdness

2007-10-29 Thread otzenpunk
I can confirm this behaviour for Feisty and Gutsy. I didn't test other Ubuntu releases. -- Properties window weirdness https://bugs.launchpad.net/bugs/116939 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing l

[Bug 107107] Re: KMail prevents encryption, if the target key is not ultimately trusted or (locally) signed

2007-10-16 Thread otzenpunk
> It would be great if the patch could get improved and applied for Kubuntu. I second that. The point of the KDE developers is really annoying: Because there is the small possibillity of a mitm-attack you shouldn't be allowed to send encrypted mail to keys you didn't sign, but if you really want t

[Bug 119259] Re: Numlock turns off at login and misses first keystroke

2007-06-21 Thread otzenpunk
Although I can't reproduce this myself, but there are several users in the German community forum who have the same problem: http://forum.ubuntuusers.de/topic/94206/ (Language: German) http://forum.ubuntuusers.de/topic/99484/ (Language: German) Some of them use gdm and others kdm. ** Changed in:

[Bug 115787] Re: First Xubuntu login always fail

2007-06-21 Thread otzenpunk
*** This bug is a duplicate of bug 119259 *** https://bugs.launchpad.net/bugs/119259 ** This bug has been marked a duplicate of bug 119259 Numlock turns off at login and misses first keystroke -- First Xubuntu login always fail https://bugs.launchpad.net/bugs/115787 You received this bug

[Bug 108379] Re: Feisty - /etc/hosts.allow and /etc/hosts.deny are missing

2007-06-17 Thread otzenpunk
Is there any reason, why these files are created by tcpd and not by libwrap0? I find it a little bit weird to install the tcpd-packet by default just because other packets - which depend on libwrap0 - need these two little text files. -- Feisty - /etc/hosts.allow and /etc/hosts.deny are missing h

[Bug 103232] Re: sysklogd init-script arguments

2007-06-10 Thread otzenpunk
smaug said: >>oh - that was what confused me in the first post ... running syslogd as root >>may be a potential security issue, is it ?<< I think it is. I'll flag this as a security bug. ** This bug has been flagged as a security issue ** Changed in: sysklogd (Ubuntu) Status: Unconfirmed

[Bug 117309] Re: remote syslog in feisty not working - syslogd running as root

2007-06-10 Thread otzenpunk
*** This bug is a duplicate of bug 103232 *** https://bugs.launchpad.net/bugs/103232 Thank you for the information. I've marked this one as duplicate. ** This bug has been marked a duplicate of bug 103232 sysklogd init-script arguments -- remote syslog in feisty not working - syslogd run

[Bug 119358] Re: Weak default authentication mode

2007-06-09 Thread otzenpunk
https://bugzilla.mozilla.org/show_bug.cgi?id=383841 -- Weak default authentication mode https://bugs.launchpad.net/bugs/119358 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.co

[Bug 119358] Re: Weak default authentication mode

2007-06-08 Thread otzenpunk
I've got version 1.5.0.12-0ubuntu0.7.04 from the feisty repos here. Although the password dialog is not part of the wizard, i am not asked if i want to start downloading mail, but the wizard ends and the password dialog opens immediately. Anyway - that's not my main point. It is that Thunderbird

[Bug 119358] Weak default authentication mode

2007-06-08 Thread otzenpunk
Public bug reported: Binary package hint: mozilla-thunderbird When starting Thunderbird the first time, the account wizard neither asks for nor provides by default any attempt to secure the password. SSL/TLS is off and so is "secure authentication" via CRAM-MD5 or such. So the password is sent in

[Bug 117309] Re: remote syslog in feisty not working

2007-05-28 Thread otzenpunk
The reason is, that in /etc/init.d/sysklogd /etc/default/syslogd is sourced after the definition of SYSLOGD, overwriting it. So /etc/default/syslogd is the place where the "-r" belongs. But apart from that, this is a real security bug, because it causes to start syslogd as root and not as user sys

[Bug 86234] Re: 2 swap partitions each mounted twice in 2.6.20-8

2007-05-26 Thread otzenpunk
Just backed up my theory a little bit. I dumped swapon -s into a file near the end of checkroot.sh and confirmed that there was only one swap entry (/dev/sda9) at this time. When the system was fully up and running, there were the two entrys with and without 'mapper' again. -- 2 swap partitions

[Bug 86234] Re: 2 swap partitions each mounted twice in 2.6.20-8

2007-05-26 Thread otzenpunk
Replacing the UUID in the fstab with the "real" devicename รก la /dev/sda2 fixes this problem for me, too. The swapon command is called twice during the boot process. Once in checkroot.sh and once in mountall.sh, the latter because: # Execute swapon command again, in case we want to swap t