Processing of codelite_2.8.0.4537~dfsg-4_amd64.changes

2011-08-30 Thread Debian FTP Masters
codelite_2.8.0.4537~dfsg-4_amd64.changes uploaded successfully to localhost
along with the files:
  codelite_2.8.0.4537~dfsg-4.dsc
  codelite_2.8.0.4537~dfsg-4.debian.tar.gz
  codelite_2.8.0.4537~dfsg-4_amd64.deb
  codelite-plugins_2.8.0.4537~dfsg-4_amd64.deb

Greetings,

Your Debian queue daemon (running on host franck.debian.org)


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1qylxg-0006w6...@franck.debian.org



codelite_2.8.0.4537~dfsg-4_amd64.changes ACCEPTED into unstable

2011-08-30 Thread Debian FTP Masters



Accepted:
codelite-plugins_2.8.0.4537~dfsg-4_amd64.deb
  to main/c/codelite/codelite-plugins_2.8.0.4537~dfsg-4_amd64.deb
codelite_2.8.0.4537~dfsg-4.debian.tar.gz
  to main/c/codelite/codelite_2.8.0.4537~dfsg-4.debian.tar.gz
codelite_2.8.0.4537~dfsg-4.dsc
  to main/c/codelite/codelite_2.8.0.4537~dfsg-4.dsc
codelite_2.8.0.4537~dfsg-4_amd64.deb
  to main/c/codelite/codelite_2.8.0.4537~dfsg-4_amd64.deb


Override entries for your package:
codelite-plugins_2.8.0.4537~dfsg-4_amd64.deb - optional devel
codelite_2.8.0.4537~dfsg-4.dsc - source devel
codelite_2.8.0.4537~dfsg-4_amd64.deb - optional devel

Announcing to debian-devel-chan...@lists.debian.org


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1qylcg-0007tj...@franck.debian.org



Processing of libast_0.7-6_amd64.changes

2011-08-30 Thread Debian FTP Masters
libast_0.7-6_amd64.changes uploaded successfully to localhost
along with the files:
  libast_0.7-6.dsc
  libast_0.7-6.debian.tar.gz
  libast2_0.7-6_amd64.deb
  libast2-dev_0.7-6_amd64.deb

Greetings,

Your Debian queue daemon (running on host franck.debian.org)


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1qyo7h-mu...@franck.debian.org



Bug#639560: marked as done (symbol changes)

2011-08-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Aug 2011 13:17:23 +
with message-id 
and subject line Bug#639560: fixed in libast 0.7-6
has caused the Debian Bug report #639560,
regarding symbol changes
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
639560: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=639560
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libast
Version: 0.7-5
Severity: serious

The package FTBFS'es on mips, powerpc, s390, sparc and the inofficial ports
s390x and powerpcspe because of changes in the symbol set wrt the symbols file:

--- debian/libast2.symbols (libast2_0.7-5_mips)
+++ dpkg-gensymbolsqBZbvb   2011-08-26 17:23:07.0 +
@@ -286,7 +286,7 @@
  spifhash_fnv@Base 0.7
  spifhash_jenkins32@Base 0.7
  spifhash_jenkins@Base 0.7
- spifhash_jenkinsLE@Base 0.7
+#MISSING: 0.7-5# spifhash_jenkinsLE@Base 0.7
  spifhash_one_at_a_time@Base 0.7
  spifhash_rotating@Base 0.7
  spifmem_calloc@Base 0.7
@@ -314,6 +314,8 @@
  spiftool_hex_dump@Base 0.7
  spiftool_join@Base 0.7
  spiftool_num_words@Base 0.7
+ spiftool_regexp_match@Base 0.7-5
+ spiftool_regexp_match_r@Base 0.7-5
  spiftool_safe_str@Base 0.7
  spiftool_safe_strncat@Base 0.7
  spiftool_safe_strncpy@Base 0.7
dh_makeshlibs: dpkg-gensymbols -plibast2 -Idebian/libast2.symbols 
-Pdebian/libast2 -edebian/libast2/usr/lib/mips-linux-gnu/libast.so.2.0.1


--- End Message ---
--- Begin Message ---
Source: libast
Source-Version: 0.7-6

We believe that the bug you reported is fixed in the latest version of
libast, which is due to be installed in the Debian FTP archive:

libast2-dev_0.7-6_amd64.deb
  to main/liba/libast/libast2-dev_0.7-6_amd64.deb
libast2_0.7-6_amd64.deb
  to main/liba/libast/libast2_0.7-6_amd64.deb
libast_0.7-6.debian.tar.gz
  to main/liba/libast/libast_0.7-6.debian.tar.gz
libast_0.7-6.dsc
  to main/liba/libast/libast_0.7-6.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 639...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Regis Boudin  (supplier of updated libast package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 30 Aug 2011 13:55:36 +0100
Source: libast
Binary: libast2 libast2-dev
Architecture: source amd64
Version: 0.7-6
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group 
Changed-By: Regis Boudin 
Description: 
 libast2- Library of Assorted Spiffy Things
 libast2-dev - libast2 development files
Closes: 639560
Changes: 
 libast (0.7-6) unstable; urgency=low
 .
   * QA upload.
   * Pass --with-regexp=posix to have have a consistent build with the
 spiftool_regexp_match and spiftool_regexp_match_r symbols exported.
   * Stop shipping libast2.symbols for now, as the symbols list is not
 consistent between little and big endian architectures, and there
 is no official way to deal with it yet. Closes: #639560.
Checksums-Sha1: 
 545e17baa99dcb07010f7ca7d5e54e3836e7dfb5 1071 libast_0.7-6.dsc
 545bf1ee76c30629874f2efed2d3f368c22bb81c 4527 libast_0.7-6.debian.tar.gz
 0fa966eadc9f4c68cd60f3738f77087bd11a7c9c 101782 libast2_0.7-6_amd64.deb
 6f5185946ce582aa0ca8037e298b2583ea32b3aa 174764 libast2-dev_0.7-6_amd64.deb
Checksums-Sha256: 
 9998fe499d42eef477ae32ebc62562c7f553b7ab659f9bec0d114eabdca6d91d 1071 
libast_0.7-6.dsc
 5d7296eef2d812de3d69e3a0f6ec80866678821c189ef4f805490aa9d1f01cf0 4527 
libast_0.7-6.debian.tar.gz
 e15636cdd66c9a4f06bf09a0211ba36761be4806b31e42c93e2a18c457e6e8eb 101782 
libast2_0.7-6_amd64.deb
 6b53b445c1ad9a24213c6b179793d2d7b36a2f332defd7da2ee5a8bd76febb93 174764 
libast2-dev_0.7-6_amd64.deb
Files: 
 2cd1a7030c17ef410b1e61713e4273b0 1071 libs optional libast_0.7-6.dsc
 75bc9ede735661bd0ffb8494db6efa8b 4527 libs optional libast_0.7-6.debian.tar.gz
 93707f7aaa61e5a61ef03103b5d5abef 101782 libs optional libast2_0.7-6_amd64.deb
 68556105c66e907e125f71304b4836c9 174764 libdevel optional 
libast2-dev_0.7-6_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk5c4GUACgkQVE17sLEtWVrR3QCg1zlcpM4T38/LBHTdOHrOpXZa
atkAoMGnqNpn66fWtZeT92EeGWhN2xX9
=mZWw
-END PGP SIGNATURE-


--- End Message ---


libast_0.7-6_amd64.changes ACCEPTED into unstable

2011-08-30 Thread Debian FTP Masters



Accepted:
libast2-dev_0.7-6_amd64.deb
  to main/liba/libast/libast2-dev_0.7-6_amd64.deb
libast2_0.7-6_amd64.deb
  to main/liba/libast/libast2_0.7-6_amd64.deb
libast_0.7-6.debian.tar.gz
  to main/liba/libast/libast_0.7-6.debian.tar.gz
libast_0.7-6.dsc
  to main/liba/libast/libast_0.7-6.dsc


Override entries for your package:
libast2-dev_0.7-6_amd64.deb - optional libdevel
libast2_0.7-6_amd64.deb - optional libs
libast_0.7-6.dsc - source libs

Announcing to debian-devel-chan...@lists.debian.org
Closing bugs: 639560 


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1qyobv-fp...@franck.debian.org



Bug#625411: tla: I can't reproduce this bug

2011-08-30 Thread Mònica Ramírez Arceda
Hi,

This package is building ok for me. I am using gcc version 4.6.1-8 in a
pbuilder environment. 

Lookink at the logs, I think it is not using -Werror option.

Maybe I'm missing something or we can close this bug?

Thanks for your work!
Mònica




--
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/1314719263.8508.44.camel@celpetit



News about unixcw?

2011-08-30 Thread Kamil Ignacak

Hi Simon,

Recently I've started using cwcp program from unixcw package to learn 
Morse code. I find it very useful, but I have also noticed that the 
program has some problems. Some of them have been addressed by patches 
created by Kamal Mostafa 
(https://launchpad.net/~kamalmostafa/+archive/unixcw-fixes). I have 
implemented some changes in my local copy of cwlib myself as well.


I would like to ask you whether you still actively maintain this 
package, and if you accept any patches or other kind of help with the 
package.


I'm adding in CC some people who may be interested in any news about the 
package.


Have a nice day!

Best regards,
Kamil Ignacak


--
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4e5d1867.4050...@wp.pl



Bug#639744: Compromised certificates for *.google.com issued by DigiNotar Root CA

2011-08-30 Thread Raphael Geissert
On Tuesday 30 August 2011 01:08:29 Yves-Alexis Perez wrote:
> On lun., 2011-08-29 at 20:24 -0700, Josh Triplett wrote:
> > I understand that they'd have to manually load the lists, but perhaps it
> > would make sense to standardize a location from which they should load
> > them?  Does OpenSSL or GnuTLS have any concept of a "revocation store"
> > format, similar to a "certificate store", or would this need some
> > special-purpose custom format?

AFAIR they only know about CRL (Certificate Revocation List,) which only allows 
for one issuer per-file.

What I can't tell for sure from the documentation is whether OpenSSL and 
GnuTLS do check the CRL's validity (signature and time.) It doesn't seem like 
they do.
This is relevant if we were to ship them in ca-certificates.


> And it'd be nice if nss could share that store...
[...]
> 
> By the way, shouldn't this bug be clone to libnss3-1d (and maybe
> iceweasel and icedove if they ship the certificates themselves)?

Perhaps it's time to start a discussion as to how we can properly deal with 
all this mess:
* Multiple packages shipping their own certificates list
* Probably no app except web browsers support CRLs and/or OCSP
* configuration

Yves, do you know how the CRL stuff is handled in nss?

Cheers,
-- 
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net



-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/201108301229.26239.geiss...@debian.org



Processing of tijmp_0.8+dfsg-5_amd64.changes

2011-08-30 Thread Debian FTP Masters
tijmp_0.8+dfsg-5_amd64.changes uploaded successfully to localhost
along with the files:
  tijmp_0.8+dfsg-5.dsc
  tijmp_0.8+dfsg-5.debian.tar.gz
  tijmp_0.8+dfsg-5_amd64.deb

Greetings,

Your Debian queue daemon (running on host franck.debian.org)


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1qys70-0005fz...@franck.debian.org



tijmp_0.8+dfsg-5_amd64.changes ACCEPTED into unstable

2011-08-30 Thread Debian FTP Masters



Accepted:
tijmp_0.8+dfsg-5.debian.tar.gz
  to main/t/tijmp/tijmp_0.8+dfsg-5.debian.tar.gz
tijmp_0.8+dfsg-5.dsc
  to main/t/tijmp/tijmp_0.8+dfsg-5.dsc
tijmp_0.8+dfsg-5_amd64.deb
  to main/t/tijmp/tijmp_0.8+dfsg-5_amd64.deb


Override entries for your package:
tijmp_0.8+dfsg-5.dsc - source devel
tijmp_0.8+dfsg-5_amd64.deb - extra devel

Announcing to debian-devel-chan...@lists.debian.org


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1qysav-00074z...@franck.debian.org



Bug#639744: Compromised certificates for *.google.com issued by DigiNotar Root CA

2011-08-30 Thread Yves-Alexis Perez
On mar., 2011-08-30 at 12:29 -0500, Raphael Geissert wrote:
> On Tuesday 30 August 2011 01:08:29 Yves-Alexis Perez wrote:
> > On lun., 2011-08-29 at 20:24 -0700, Josh Triplett wrote:
> > > I understand that they'd have to manually load the lists, but perhaps it
> > > would make sense to standardize a location from which they should load
> > > them?  Does OpenSSL or GnuTLS have any concept of a "revocation store"
> > > format, similar to a "certificate store", or would this need some
> > > special-purpose custom format?
> 
> AFAIR they only know about CRL (Certificate Revocation List,) which only 
> allows 
> for one issuer per-file.
> 
> What I can't tell for sure from the documentation is whether OpenSSL and 
> GnuTLS do check the CRL's validity (signature and time.) It doesn't seem like 
> they do.
> This is relevant if we were to ship them in ca-certificates.
> 
> 
> > And it'd be nice if nss could share that store...
> [...]
> > 
> > By the way, shouldn't this bug be clone to libnss3-1d (and maybe
> > iceweasel and icedove if they ship the certificates themselves)?
> 
> Perhaps it's time to start a discussion as to how we can properly deal with 
> all this mess:
> * Multiple packages shipping their own certificates list
> * Probably no app except web browsers support CRLs and/or OCSP
> * configuration
> 
> Yves, do you know how the CRL stuff is handled in nss?
> 

(my first name is Yves-Alexis :)

I have no idea.

There's a crlutil
(http://www.mozilla.org/projects/security/pki/nss/tools/crlutil.html)
but it works on previous database version (bdb, cert8.db and key3.db)
while at least evolution now uses the shared sqlite db (cert9.db and
key4.db, see https://wiki.mozilla.org/NSS_Shared_DB).

Maybe Mike has some more ideas (adding him to CC:)

Regards,
-- 
Yves-Alexis


signature.asc
Description: This is a digitally signed message part


Processing of javatar_2.5+dfsg-5_amd64.changes

2011-08-30 Thread Debian FTP Masters
javatar_2.5+dfsg-5_amd64.changes uploaded successfully to localhost
along with the files:
  javatar_2.5+dfsg-5.dsc
  javatar_2.5+dfsg-5.debian.tar.gz
  libjavatar-java_2.5+dfsg-5_all.deb
  libjavatar-java-doc_2.5+dfsg-5_all.deb

Greetings,

Your Debian queue daemon (running on host franck.debian.org)


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1qyusb-0007yy...@franck.debian.org



Bug#639744: Compromised certificates for *.google.com issued by DigiNotar Root CA

2011-08-30 Thread Mike Hommey
On Tue, Aug 30, 2011 at 09:58:18PM +0200, Yves-Alexis Perez wrote:
> On mar., 2011-08-30 at 12:29 -0500, Raphael Geissert wrote:
> > On Tuesday 30 August 2011 01:08:29 Yves-Alexis Perez wrote:
> > > On lun., 2011-08-29 at 20:24 -0700, Josh Triplett wrote:
> > > > I understand that they'd have to manually load the lists, but perhaps it
> > > > would make sense to standardize a location from which they should load
> > > > them?  Does OpenSSL or GnuTLS have any concept of a "revocation store"
> > > > format, similar to a "certificate store", or would this need some
> > > > special-purpose custom format?
> > 
> > AFAIR they only know about CRL (Certificate Revocation List,) which only 
> > allows 
> > for one issuer per-file.
> > 
> > What I can't tell for sure from the documentation is whether OpenSSL and 
> > GnuTLS do check the CRL's validity (signature and time.) It doesn't seem 
> > like 
> > they do.
> > This is relevant if we were to ship them in ca-certificates.
> > 
> > 
> > > And it'd be nice if nss could share that store...
> > [...]
> > > 
> > > By the way, shouldn't this bug be clone to libnss3-1d (and maybe
> > > iceweasel and icedove if they ship the certificates themselves)?
> > 
> > Perhaps it's time to start a discussion as to how we can properly deal with 
> > all this mess:
> > * Multiple packages shipping their own certificates list
> > * Probably no app except web browsers support CRLs and/or OCSP
> > * configuration
> > 
> > Yves, do you know how the CRL stuff is handled in nss?
> > 
> 
> (my first name is Yves-Alexis :)
> 
> I have no idea.
> 
> There's a crlutil
> (http://www.mozilla.org/projects/security/pki/nss/tools/crlutil.html)
> but it works on previous database version (bdb, cert8.db and key3.db)
> while at least evolution now uses the shared sqlite db (cert9.db and
> key4.db, see https://wiki.mozilla.org/NSS_Shared_DB).

The NSS tools are supposed to work with whatever database version you
use, since they use NSS ;)

That being said, there is a huge problem with mitigation in basically
all the SSL libraries. There simply is no way to handle the current
situation[1] without modifying applications.

Mike

1. Several fraudulent certificates whose fingerprint is unknown signed
with several different intermediate certs that are cross-signed by other
"safe" CAs (aiui).



-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110830204811.ga17...@glandium.org



Bug#639744: Compromised certificates for *.google.com issued by DigiNotar Root CA

2011-08-30 Thread Yves-Alexis Perez
On mar., 2011-08-30 at 22:48 +0200, Mike Hommey wrote:
> 
> 1. Several fraudulent certificates whose fingerprint is unknown signed
> with several different intermediate certs that are cross-signed by other
> "safe" CAs (aiui). 

I missed that. What is the source for that? (i looked at the mozilla bug
earlier but it lacks that level of precision)
-- 
Yves-Alexis


signature.asc
Description: This is a digitally signed message part


javatar_2.5+dfsg-5_amd64.changes ACCEPTED into unstable

2011-08-30 Thread Debian FTP Masters



Accepted:
javatar_2.5+dfsg-5.debian.tar.gz
  to main/j/javatar/javatar_2.5+dfsg-5.debian.tar.gz
javatar_2.5+dfsg-5.dsc
  to main/j/javatar/javatar_2.5+dfsg-5.dsc
libjavatar-java-doc_2.5+dfsg-5_all.deb
  to main/j/javatar/libjavatar-java-doc_2.5+dfsg-5_all.deb
libjavatar-java_2.5+dfsg-5_all.deb
  to main/j/javatar/libjavatar-java_2.5+dfsg-5_all.deb


Override entries for your package:
javatar_2.5+dfsg-5.dsc - source java
libjavatar-java-doc_2.5+dfsg-5_all.deb - optional doc
libjavatar-java_2.5+dfsg-5_all.deb - optional java

Announcing to debian-devel-chan...@lists.debian.org


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1qyvsh-0006ai...@franck.debian.org



Bug#465900: Removed package(s) from unstable

2011-08-30 Thread Debian FTP Masters
We believe that the bug you reported is now fixed; the following
package(s) have been removed from unstable:

  perlsgml | 1:19970918-13 | source, all

--- Reason ---
RoQA; orphaned
--

Note that the package(s) have simply been removed from the tag
database and may (or may not) still be in the pool; this is not a bug.
The package(s) will be physically removed automatically when no suite
references them (and in the case of source, when no binary references
it).  Please also remember that the changes have been done on the
master archive (ftp-master.debian.org) and will not propagate to any
mirrors (ftp.debian.org included) until the next cron.daily run at the
earliest.

Packages are usually not removed from testing by hand. Testing tracks
unstable and will automatically remove packages which were removed
from unstable when removing them from testing causes no dependency
problems. The release team can force a removal from testing if it is
really needed, please contact them if this should be the case.

We try to close Bugs which have been reported against this package
automatically.  But please check all old bugs, if they where closed
correctly or should have been re-assign to another package.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 465...@bugs.debian.org.

The full log for this bug can be viewed at http://bugs.debian.org/465900

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmas...@debian.org.

Debian distribution maintenance software
pp.
Luca Falavigna (the ftpmaster behind the curtain)


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1qyvsz-0006hp...@franck.debian.org



Bug#639859: apt-build fails to build packages ; it conflicts with apt

2011-08-30 Thread Laurent Dard
Package: apt-build
Version: 0.12.38
Severity: grave
Tags: sid wheezy patch
Justification: renders package unusable

Trying to install a package with apt-build, for example:
# apt-build install hello
it fails with:
>W: Failed to fetch 
>file:/var/cache/apt-build/repository/dists/apt-build/Release  Unable to find 
>expected entry 'main/binary-amd64/Packages' in Release file (Wrong 
>sources.list entry or malformed file)
>
>E: Some index files failed to download. They have been ignored, or old ones 
>used instead.
>Reading package lists... Done
>E: The value 'apt-build' is invalid for APT::Default-Release as such a release 
>is not available in the sources

Subsequently, 'apt-get update' gives:
W: Failed to fetch file:/var/cache/apt-build/repository/dists/apt-build/Release 
 Unable to find expected entry 'main/binary-amd64/Packages' in Release file 
(Wrong sources.list entry or malformed file)

E: Some index files failed to download. They have been ignored, or old ones 
used instead.

I erased "/var/cache/apt-build" and applied the following patch to get rid
of this problem:
---
diff -Naur apt-build-0.12.38.orig/apt-build apt-build-0.12.38/apt-build
--- apt-build-0.12.38.orig/apt-build2008-07-01 08:29:43.0 +0200
+++ apt-build-0.12.38/apt-build 2011-08-30 23:55:39.0 +0200
@@ -101,9 +101,9 @@
   update-source - Update all sources and rebuild them
   remove- Remove packages
   build-repository  - Rebuild the repository
-  clean-sources - Clean up all object files in source directories
   clean-build   - Erase downloaded packages and temporary build files
-  clean-repository  - Erase downloaded packages and temporary build files
+  clean-repository  - Erase built packages
+  clean-sources - Clean up all object files in source directories
   world - Rebuild and reinstall all packages on your system
   info  - Build-related package information
 
@@ -337,10 +337,10 @@
 chdir $conf->repository_dir;
 my $arch = $_config->get("APT::Architecture");
 
-system "ln -s . main" unless -e "main";
-system "ln -s . apt-build" unless -e "apt-build";
-system "ln -s . dists" unless -e "dists";
-system "ln -s . binary-$arch" unless -e "binary-$arch";
+system "mkdir dists" unless -e "dists";
+system "mkdir dists/apt-build" unless -e "dists/apt-build";
+system "mkdir dists/apt-build/main" unless -e "dists/apt-build/main";
+system "ln -s ../../.. dists/apt-build/main/binary-$arch" unless -e 
"dists/apt-build/main/binary-$arch";
 make_release_file() unless -e "Release";
 
 system "apt-ftparchive packages . | gzip -9 > Packages.gz";
diff -Naur apt-build-0.12.38.orig/debian/postinst 
apt-build-0.12.38/debian/postinst
--- apt-build-0.12.38.orig/debian/postinst  2011-03-13 16:55:00.0 
+0100
+++ apt-build-0.12.38/debian/postinst   2011-08-31 01:19:41.0 +0200
@@ -79,13 +79,8 @@
 
# Create repository_dir
if [ ! -e "$repository_dir" ]; then
-   mkdir -p "$repository_dir"
-   cd "$repository_dir"
-   ln -s . stable
-   ln -s . dists
-   ln -s . apt-build
-   ln -s . main
-   ln -s . binary-`dpkg --print-architecture`
+   mkdir -p "$repository_dir"/dists/apt-build/main
+   ln -s ../../.. "$repository_dir"/dists/apt-build/main/binary-`dpkg 
--print-architecture`
fi

sed s/__arch__/`dpkg --print-architecture`/ 
/usr/share/apt-build/Release > "$repository_dir/Release"

---

Unfortunately, it doesn't solve the problem.
"apt-get update" keeps saying:
E: The value 'apt-build' is invalid for APT::Default-Release as such a release 
is not available in the sources

Maybe an apt bug rather than an apt-build bug ?

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (800, 'testing'), (750, 'stable'), (500, 'oldstable'), (50, 
'experimental'), (50, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.0.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.utf-8, LC_CTYPE=fr_FR.utf-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages apt-build depends on:
ii  apt   0.8.15.6   Advanced front-end for dpkg
ii  apt-utils 0.8.15.6   APT utility programs
ii  debconf [debconf-2.0] 1.5.40 Debian configuration management sy
ii  devscripts2.11.0 scripts to make the life of a Debi
ii  dpkg-dev  1.16.0.3   Debian package development tools
ii  g++   4:4.6.1-2  GNU C++ compiler
ii  gcc   4:4.6.1-2  GNU C compiler
ii  libappconfig-perl 1.56-2 Perl module for configuration file
ii  libapt-pkg-perl   0.1.24+b2  Perl interface to libapt-pkg
ii  libc6  

Processing of python-scientific_2.8-3_amd64.changes

2011-08-30 Thread Debian FTP Masters
python-scientific_2.8-3_amd64.changes uploaded successfully to localhost
along with the files:
  python-scientific_2.8-3.dsc
  python-scientific_2.8-3.diff.gz
  python-scientific_2.8-3_all.deb
  python-scientific-doc_2.8-3_all.deb
  python-mpi_2.8-3_all.deb
  python-netcdf_2.8-3_amd64.deb
  mpich2python_2.8-3_amd64.deb
  openmpipython_2.8-3_amd64.deb

Greetings,

Your Debian queue daemon (running on host franck.debian.org)


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1qyzjm-y0...@franck.debian.org



python-scientific_2.8-3_amd64.changes is NEW

2011-08-30 Thread Debian FTP Masters
(new) mpich2python_2.8-3_amd64.deb optional python
MPI-enhanced Python interpreter (MPICH2 based version)
 The package provides a python interpreter with MPI (Message Passing Interface,
 message-based parallel programming) support.
(new) openmpipython_2.8-3_amd64.deb extra python
MPI-enhanced Python interpreter (OpenMPI based version)
 The package provides a python interpreter with MPI (Message Passing Interface,
 message-based parallel programming) support.
python-mpi_2.8-3_all.deb
  to main/p/python-scientific/python-mpi_2.8-3_all.deb
python-netcdf_2.8-3_amd64.deb
  to main/p/python-scientific/python-netcdf_2.8-3_amd64.deb
python-scientific-doc_2.8-3_all.deb
  to main/p/python-scientific/python-scientific-doc_2.8-3_all.deb
python-scientific_2.8-3.diff.gz
  to main/p/python-scientific/python-scientific_2.8-3.diff.gz
python-scientific_2.8-3.dsc
  to main/p/python-scientific/python-scientific_2.8-3.dsc
python-scientific_2.8-3_all.deb
  to main/p/python-scientific/python-scientific_2.8-3_all.deb
Changes: python-scientific (2.8-3) unstable; urgency=low
 .
  * QA upload.
  * Replace EOLed MPI implementations (LAM, MPICH1) with actively maintained
implementations (OpenMPI, MPICH2).  (Closes: #571452)
  * Break python-scientific/python-netcdf circular dependency by changing p-s
to Recommend p-n.


Override entries for your package:
python-mpi_2.8-3_all.deb - optional python
python-netcdf_2.8-3_amd64.deb - optional python
python-scientific-doc_2.8-3_all.deb - optional doc
python-scientific_2.8-3.dsc - source python
python-scientific_2.8-3_all.deb - optional python

Announcing to debian-devel-chan...@lists.debian.org
Closing bugs: 571452 


Your package contains new components which requires manual editing of
the override file.  It is ok otherwise, so please be patient.  New
packages are usually added to the override file about once a week.

You may have gotten the distribution wrong.  You'll get warnings above
if files already exist in other distributions.


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1qyzqd-0001hw...@franck.debian.org



Processed: reassign 637125 to ca-certificates-java, forcibly merging 635571 637125

2011-08-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 637125 ca-certificates-java
Bug #637125 [ca-certificates] Exception in thread "main" 
java.security.ProviderException: Could not initialize NSS
Bug reassigned from package 'ca-certificates' to 'ca-certificates-java'.
> forcemerge 635571 637125
Bug#635571: ca-certificates-java: Fails in update-ca-certificates hook
Bug#637125: Exception in thread "main" java.security.ProviderException: Could 
not initialize NSS
Forcibly Merged 635571 637125.

> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
637125: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=637125
635571: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635571
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.131475627526735.transcr...@bugs.debian.org



Processing of ca-certificates_20110502+nmu1_i386.changes

2011-08-30 Thread Debian FTP Masters
ca-certificates_20110502+nmu1_i386.changes uploaded successfully to localhost
along with the files:
  ca-certificates_20110502+nmu1.dsc
  ca-certificates_20110502+nmu1.tar.gz
  ca-certificates_20110502+nmu1_all.deb

Greetings,

Your Debian queue daemon (running on host franck.debian.org)


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1qyau5-0004xw...@franck.debian.org



Bug#639744: marked as done (Compromised certificates for *.google.com issued by DigiNotar Root CA)

2011-08-30 Thread Debian Bug Tracking System
Your message dated Wed, 31 Aug 2011 02:47:56 +
with message-id 
and subject line Bug#639744: fixed in ca-certificates 20110502+nmu1
has caused the Debian Bug report #639744,
regarding Compromised certificates for *.google.com issued by DigiNotar Root CA
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
639744: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=639744
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: ca-certificates
Version: 20110502
Severity: critical
Tags: security

Please see the following:
https://bugzilla.mozilla.org/show_bug.cgi?id=682956
http://pastebin.com/ff7Yg663
http://pastebin.com/SwCZqskV
(or just search current news for "DigiNotar", optionally in conjunction
with "gmail" or "google".)

Whatever resolution Mozilla and others end up with (revocation of the
certificate or of the entire CA), ca-certificates will likely need to
do the same.

- Josh Triplett


--- End Message ---
--- Begin Message ---
Source: ca-certificates
Source-Version: 20110502+nmu1

We believe that the bug you reported is fixed in the latest version of
ca-certificates, which is due to be installed in the Debian FTP archive:

ca-certificates_20110502+nmu1.dsc
  to main/c/ca-certificates/ca-certificates_20110502+nmu1.dsc
ca-certificates_20110502+nmu1.tar.gz
  to main/c/ca-certificates/ca-certificates_20110502+nmu1.tar.gz
ca-certificates_20110502+nmu1_all.deb
  to main/c/ca-certificates/ca-certificates_20110502+nmu1_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 639...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Raphael Geissert  (supplier of updated ca-certificates 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 30 Aug 2011 21:00:55 -0500
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20110502+nmu1
Distribution: unstable
Urgency: high
Maintainer: Debian QA Group 
Changed-By: Raphael Geissert 
Description: 
 ca-certificates - Common CA certificates
Closes: 639744
Changes: 
 ca-certificates (20110502+nmu1) unstable; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * Blacklist "DigiNotar Root CA" (Closes: #639744)
Checksums-Sha1: 
 b00627a9ffade9f740d120b5752fe0d407de0138 820 ca-certificates_20110502+nmu1.dsc
 63943f2203893cb8f7ae2f8ec3a29ad121d3593c 276132 
ca-certificates_20110502+nmu1.tar.gz
 141c8bf62f46043c52442d9bb58cc9bf74ed1b4c 174242 
ca-certificates_20110502+nmu1_all.deb
Checksums-Sha256: 
 f89e12fedc5bfe6d160f4380e5c4a6f1a6ea8a27ecb4724d4f072c570de71a3c 820 
ca-certificates_20110502+nmu1.dsc
 32349782ed419d88924f69e3feb1755a045dc15b8d0cfd15cdd9176f0596997d 276132 
ca-certificates_20110502+nmu1.tar.gz
 d44284ee9b733b9890a54516f66b68a382ac5fb2c0bdceafed4cf229aa3b05a1 174242 
ca-certificates_20110502+nmu1_all.deb
Files: 
 e4c5e4bb5bba6508898bcbfe8eda802a 820 misc optional 
ca-certificates_20110502+nmu1.dsc
 13aed718a5cdd05b4086c93dafd4e1e2 276132 misc optional 
ca-certificates_20110502+nmu1.tar.gz
 97e5972d2ef2531667e83df78a8f83a8 174242 misc optional 
ca-certificates_20110502+nmu1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk5dmcAACgkQYy49rUbZzlpZaACdEQpbuSDddjgSXwyZYdg/UPhm
7+kAn1EU6LRHjCRO1e0wbBHfeL0COLC+
=qQMo
-END PGP SIGNATURE-


--- End Message ---


ca-certificates_20110502+nmu1_i386.changes ACCEPTED into unstable

2011-08-30 Thread Debian FTP Masters



Accepted:
ca-certificates_20110502+nmu1.dsc
  to main/c/ca-certificates/ca-certificates_20110502+nmu1.dsc
ca-certificates_20110502+nmu1.tar.gz
  to main/c/ca-certificates/ca-certificates_20110502+nmu1.tar.gz
ca-certificates_20110502+nmu1_all.deb
  to main/c/ca-certificates/ca-certificates_20110502+nmu1_all.deb


Override entries for your package:
ca-certificates_20110502+nmu1.dsc - source misc
ca-certificates_20110502+nmu1_all.deb - optional misc

Announcing to debian-devel-chan...@lists.debian.org
Closing bugs: 639744 


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1qyaqk-00045h...@franck.debian.org



Bug#193061: adopting lgeneral?

2011-08-30 Thread Drew Scott Daniels
Hi,
You mentioned you were planning to adopt lgeneral after squeeze's release
and squeeze has been out for a couple of months now. I was just curious
about the status of this.

Thanks,

 Drew Daniels
http://www.boxheap.net/ddaniels/blog




--
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/08abb60dce976b21f9d87e54835ccd02.squir...@webmail.dreamhost.com



Bug#639744: Compromised certificates for *.google.com issued by DigiNotar Root CA

2011-08-30 Thread Raphael Geissert
On Tuesday 30 August 2011 15:48:11 Mike Hommey wrote:
> On Tue, Aug 30, 2011 at 09:58:18PM +0200, Yves-Alexis Perez wrote:
> > On mar., 2011-08-30 at 12:29 -0500, Raphael Geissert wrote:
> > > What I can't tell for sure from the documentation is whether OpenSSL
> > > and GnuTLS do check the CRL's validity (signature and time.) It
> > > doesn't seem like they do.
> > > This is relevant if we were to ship them in ca-certificates.

Mike, without digging into the documentation I found this reference [2] 
regarding NSS and its CRL support. Do you know if any of what is said on that 
email has changed? namely how 'next update' dates are handled.

[2]http://www.mail-archive.com/mozilla-crypto@mozilla.org/msg00890.html

> > > Yves, do you know how the CRL stuff is handled in nss?
> > 
> > (my first name is Yves-Alexis :)

Oops, sorry. Please accept my apologies.

> That being said, there is a huge problem with mitigation in basically
> all the SSL libraries. There simply is no way to handle the current
> situation[1] without modifying applications.
[...]
> 1. Several fraudulent certificates whose fingerprint is unknown signed
> with several different intermediate certs that are cross-signed by other
> "safe" CAs (aiui).

Oh. Well, first thing first, I've NMUed ca-certs to remove the DigiNotar Root 
CA 
and will probably release a DSA with the change too (I'm afraid it will give a 
false sense of security.)

What is to be done next should probably be discussed in -devel and have input 
from external people.

Cheers,
-- 
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net



-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/201108302249.12183.geiss...@debian.org



Bug#639744: Compromised certificates for *.google.com issued by DigiNotar Root CA

2011-08-30 Thread Mike Hommey
On Tue, Aug 30, 2011 at 10:48:11PM +0200, Mike Hommey wrote:
> On Tue, Aug 30, 2011 at 09:58:18PM +0200, Yves-Alexis Perez wrote:
> > On mar., 2011-08-30 at 12:29 -0500, Raphael Geissert wrote:
> > > On Tuesday 30 August 2011 01:08:29 Yves-Alexis Perez wrote:
> > > > On lun., 2011-08-29 at 20:24 -0700, Josh Triplett wrote:
> > > > > I understand that they'd have to manually load the lists, but perhaps 
> > > > > it
> > > > > would make sense to standardize a location from which they should load
> > > > > them?  Does OpenSSL or GnuTLS have any concept of a "revocation store"
> > > > > format, similar to a "certificate store", or would this need some
> > > > > special-purpose custom format?
> > > 
> > > AFAIR they only know about CRL (Certificate Revocation List,) which only 
> > > allows 
> > > for one issuer per-file.
> > > 
> > > What I can't tell for sure from the documentation is whether OpenSSL and 
> > > GnuTLS do check the CRL's validity (signature and time.) It doesn't seem 
> > > like 
> > > they do.
> > > This is relevant if we were to ship them in ca-certificates.
> > > 
> > > 
> > > > And it'd be nice if nss could share that store...
> > > [...]
> > > > 
> > > > By the way, shouldn't this bug be clone to libnss3-1d (and maybe
> > > > iceweasel and icedove if they ship the certificates themselves)?
> > > 
> > > Perhaps it's time to start a discussion as to how we can properly deal 
> > > with 
> > > all this mess:
> > > * Multiple packages shipping their own certificates list
> > > * Probably no app except web browsers support CRLs and/or OCSP
> > > * configuration
> > > 
> > > Yves, do you know how the CRL stuff is handled in nss?
> > > 
> > 
> > (my first name is Yves-Alexis :)
> > 
> > I have no idea.
> > 
> > There's a crlutil
> > (http://www.mozilla.org/projects/security/pki/nss/tools/crlutil.html)
> > but it works on previous database version (bdb, cert8.db and key3.db)
> > while at least evolution now uses the shared sqlite db (cert9.db and
> > key4.db, see https://wiki.mozilla.org/NSS_Shared_DB).
> 
> The NSS tools are supposed to work with whatever database version you
> use, since they use NSS ;)
> 
> That being said, there is a huge problem with mitigation in basically
> all the SSL libraries. There simply is no way to handle the current
> situation[1] without modifying applications.
> 
> Mike
> 
> 1. Several fraudulent certificates whose fingerprint is unknown signed
> with several different intermediate certs that are cross-signed by other
> "safe" CAs (aiui).

So, I'll put that on tiredness. That'd be several fraudulent
certificates which fingerprint is unknown (thus even CRL, OCSP and
blacklists can't do anything), and the mitigation involves several
different intermediate certs that are cross-signed, which makes it kind
of hard. Plus, there is the problem that untrusting the DigiNotar root
untrusts a separate PKI used by the Dutch government.

Add to the above that untrusting a root still allows users to override
in applications, and we have no central way to not allow that. Aiui, the
mozilla update is going to block overrides as well, but that involves
the application side. NSS won't deal with that.

Mike



-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110831042626.ga3...@glandium.org



Bug#639744: Compromised certificates for *.google.com issued by DigiNotar Root CA

2011-08-30 Thread Mike Hommey
On Wed, Aug 31, 2011 at 06:26:26AM +0200, Mike Hommey wrote:
> On Tue, Aug 30, 2011 at 10:48:11PM +0200, Mike Hommey wrote:
> > On Tue, Aug 30, 2011 at 09:58:18PM +0200, Yves-Alexis Perez wrote:
> > > On mar., 2011-08-30 at 12:29 -0500, Raphael Geissert wrote:
> > > > On Tuesday 30 August 2011 01:08:29 Yves-Alexis Perez wrote:
> > > > > On lun., 2011-08-29 at 20:24 -0700, Josh Triplett wrote:
> > > > > > I understand that they'd have to manually load the lists, but 
> > > > > > perhaps it
> > > > > > would make sense to standardize a location from which they should 
> > > > > > load
> > > > > > them?  Does OpenSSL or GnuTLS have any concept of a "revocation 
> > > > > > store"
> > > > > > format, similar to a "certificate store", or would this need some
> > > > > > special-purpose custom format?
> > > > 
> > > > AFAIR they only know about CRL (Certificate Revocation List,) which 
> > > > only allows 
> > > > for one issuer per-file.
> > > > 
> > > > What I can't tell for sure from the documentation is whether OpenSSL 
> > > > and 
> > > > GnuTLS do check the CRL's validity (signature and time.) It doesn't 
> > > > seem like 
> > > > they do.
> > > > This is relevant if we were to ship them in ca-certificates.
> > > > 
> > > > 
> > > > > And it'd be nice if nss could share that store...
> > > > [...]
> > > > > 
> > > > > By the way, shouldn't this bug be clone to libnss3-1d (and maybe
> > > > > iceweasel and icedove if they ship the certificates themselves)?
> > > > 
> > > > Perhaps it's time to start a discussion as to how we can properly deal 
> > > > with 
> > > > all this mess:
> > > > * Multiple packages shipping their own certificates list
> > > > * Probably no app except web browsers support CRLs and/or OCSP
> > > > * configuration
> > > > 
> > > > Yves, do you know how the CRL stuff is handled in nss?
> > > > 
> > > 
> > > (my first name is Yves-Alexis :)
> > > 
> > > I have no idea.
> > > 
> > > There's a crlutil
> > > (http://www.mozilla.org/projects/security/pki/nss/tools/crlutil.html)
> > > but it works on previous database version (bdb, cert8.db and key3.db)
> > > while at least evolution now uses the shared sqlite db (cert9.db and
> > > key4.db, see https://wiki.mozilla.org/NSS_Shared_DB).
> > 
> > The NSS tools are supposed to work with whatever database version you
> > use, since they use NSS ;)
> > 
> > That being said, there is a huge problem with mitigation in basically
> > all the SSL libraries. There simply is no way to handle the current
> > situation[1] without modifying applications.
> > 
> > Mike
> > 
> > 1. Several fraudulent certificates whose fingerprint is unknown signed
> > with several different intermediate certs that are cross-signed by other
> > "safe" CAs (aiui).
> 
> So, I'll put that on tiredness. That'd be several fraudulent
> certificates which fingerprint is unknown (thus even CRL, OCSP and
> blacklists can't do anything), and the mitigation involves several
> different intermediate certs that are cross-signed, which makes it kind
> of hard. Plus, there is the problem that untrusting the DigiNotar root
> untrusts a separate PKI used by the Dutch government.
> 
> Add to the above that untrusting a root still allows users to override
> in applications, and we have no central way to not allow that. Aiui, the
> mozilla update is going to block overrides as well, but that involves
> the application side. NSS won't deal with that.

See https://bugzilla.mozilla.org/show_bug.cgi?id=682927 which is now
open.

Mike



-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110831043019.gb3...@glandium.org



Bug#639744: Compromised certificates for *.google.com issued by DigiNotar Root CA

2011-08-30 Thread Mike Hommey
On Tue, Aug 30, 2011 at 10:49:04PM -0500, Raphael Geissert wrote:
> On Tuesday 30 August 2011 15:48:11 Mike Hommey wrote:
> > On Tue, Aug 30, 2011 at 09:58:18PM +0200, Yves-Alexis Perez wrote:
> > > On mar., 2011-08-30 at 12:29 -0500, Raphael Geissert wrote:
> > > > What I can't tell for sure from the documentation is whether OpenSSL
> > > > and GnuTLS do check the CRL's validity (signature and time.) It
> > > > doesn't seem like they do.
> > > > This is relevant if we were to ship them in ca-certificates.
> 
> Mike, without digging into the documentation I found this reference [2] 
> regarding NSS and its CRL support. Do you know if any of what is said on that 
> email has changed? namely how 'next update' dates are handled.
> 
> [2]http://www.mail-archive.com/mozilla-crypto@mozilla.org/msg00890.html

I think CRL handling is still mostly manual work. I don't know much more
though.

Mike



-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110831050635.ga5...@glandium.org



Bug#639744: Accepted ca-certificates 20110502+nmu1 (source all)

2011-08-30 Thread Peter Palfrader
On Wed, 31 Aug 2011, Raphael Geissert wrote:

> Changes: 
>  ca-certificates (20110502+nmu1) unstable; urgency=high
>  .
>* Non-maintainer upload by the Security Team.
>* Blacklist "DigiNotar Root CA" (Closes: #639744)

Are we updating stable too?

Cheers,
weasel
-- 
   |  .''`.   ** Debian **
  Peter Palfrader  | : :' :  The  universal
 http://www.palfrader.org/ | `. `'  Operating System
   |   `-http://www.debian.org/



-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110831065538.gi11...@anguilla.noreply.org