Re: Draft ballot for the GFDL vote

2006-02-25 Thread Arthur de Jong

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1



[   ] Choice 1: GFDL licensed works are unsuitable for main in all cases


I would personally like to see this without the "in all cases" as an 
author could add extra statements clarifying their intention or 
interpretation of the license that could make the work DFSG-free. This 
also seems to be what the proposal is about.



[   ] Choice 2: GFDL licensed works are free unless unmodifiable
sections present


Is this correct (I have trouble parsing this)? Maybe "GFDL licend works 
withour unmidifiable sections are free."?


- -- 
- -- arthur - [EMAIL PROTECTED] - http://people.debian.org/~adejong --

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFEAEWAVYan35+NCKcRApWvAJ9+EWUJ24w1gYdZIe1ybyGiiCc1lQCeMazh
b9Jf7VL28j40J/Bg3Lk1XNY=
=zRPt
-END PGP SIGNATURE-


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



use of md5sum for tally sheet

2006-04-07 Thread Arthur de Jong

I'm not a cryptographer so I could be way off here. Could there be a
problem with using the MD5 hash in the tally sheet? My concern is purely
theoretic and I have absolutely no reason to doubt the secretary!

When I submit my vote (for DPL elections) I receive a confirmation email
with a moniker of FOO (as far as I can determine I don't have any
influence of the chosen moniker). After the vote I check that the hash:
  echo "adejong FOO" | md5sum
is in the tally sheet and has the correct vote (everybody does this
right?). So far so good.

The problem arises with the recent discoveries in hash-collisions for
MD5. Is it possible to construct a moniker BAR that for another
developer would result in the same MD5 hash as mine? If so, this could
be exploited so that two developers look at the same row in the tally
sheet and see their vote there (provided they voted the same). This
would leave a row in the tally sheet that could be stuffed with a random
MD5 hash and a vote of the secretary's choosing.

This problem would of course be detected in a recount of the votes
(signed emails) but it will not be detected from checking the tally
sheet. Also, this problem obviously applies only to DPL elections as
other votes are not anonymous.

Again, I'm not doubting the integrity of the secretary and the ongoing
vote. I'm just asking if this is purely theoretical or becoming
practical?

This issue was raised before:
  http://lists.debian.org/debian-vote/2003/03/msg00114.html
and dismissed as impractical. A method for constructing MD5 collisions
has been developed since then and I think the hashing landscape has
changed somewhat so I think the question should be asked again.

Some references on the MD5 collisions:
  http://www.cryptography.com/cnews/hash.html
  http://www.cits.rub.de/MD5Collisions/
  http://en.wikipedia.org/wiki/Md5
These mainly describe inserting binary data in messages of around 1K.
The data we're hashing is all ASCII and much shorter. Also it seems that
most attacks insert a magic prefix rather than a suffix (and our moniker
is at the back). This would suggest that there is not yet a ready-made
attack available that would work in our case.

A quick fix for this problem would be to also use a SHA1 (or other) hash
with the SAME moniker (assuming finding a moniker that would result in a
MD5 and SHA1 collision is still impractical). Another solution would be
to let the voter choose the moniker. This could however have an
influence on the anonymity of the vote. Better solutions can probably be
found though.

On a slightly (but not really) related note, would it be possible to get
the tally sheet signed and sent to debian-vote after the vote? This
would make tampering with the tally sheet after the vote harder.

-- 
-- arthur - [EMAIL PROTECTED] - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: Analysis of the ballot options

2004-06-21 Thread Arthur de Jong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


> Well, most of those supporters probably did not believe the proposal
> would or should have any effect on sarge's release.
>
> At least that was the case for me...

And to not make the same mistake twice, is there some statement from the
release manager somewhere regarding this vote? I would like to know
exactly what effect the different choices would have on the release of
sarge, accoring to the release manager.

I have searched some lists a little but did not really find an answer to
my question. Some of the questions that come to mind are:

Can sarge realisticly be released before september 1st? (related to
proposal A)

Does the temporal change of the SC and rollback after the release of sarge
cause problems for point releases of sarge? (related to several proposals)

Does the list of "exempt" items from proposal C (documentation and
firmware) cover enough items to be in line with the earlier release plan
[1]?

Is the next release really numbered 3.1? (relating to proposals C and E)

[1] http://lists.debian.org/debian-devel-announce/2003/12/msg0.html

- -- arthur - [EMAIL PROTECTED] - http://people.debian.org/~adejong --
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFA1vx+VYan35+NCKcRAtqCAKCBttN93dDfMmbYimfx6GvB3FItwQCgorsI
cuD2Q7nNong5G4tBO8l16lM=
=lqsX
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Analysis of the ballot options

2004-06-22 Thread Arthur de Jong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


> The technical committee is waiting to see the outcome of this GR, but
> informally
>http://lists.debian.org/debian-ctte/2004/06/msg2.html

If the RM has delegated the descision of the requirements for distributing
sarge, could the TC take a stance on the proposals presented?

Well looking at that post some of the points were:

| ... It would be a bad idea to write a long document `under the gun'. ...

This pretty much pleads agains proposal E.

| ... Any such grandfather resolution should probably delegate reasonably
| wide discretion about scope and interpretation to the Release Manager,
| the Project Leader, the Committee or some other similar person or body,
| to ensure that the resolution is sufficient and we don't need another
| GR. ...

Well none of the proposals really seem to do this, except for maybe
proposals C and E. All the others fall back to the previous (ambiguous)
SC.

Would it be correct to assume that only the passing of proposal C will
allow for a speedy release of sarge if it were up to the TC?

- -- arthur - [EMAIL PROTECTED] - http://people.debian.org/~adejong --
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFA2MOmVYan35+NCKcRArucAKCVSmfDlGmSbIUodR70NU2ajkkdUgCgyu9b
XlmXyfD8bGJtE6X28lZNDzg=
=dSqs
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]