Re: HTTPS everywhere!

2014-06-17 Thread Russell Stuart
On Wed, 2014-06-18 at 04:54 +0200, Christoph Anton Mitterer wrote: > Well https with X.509 has inherent problems which we won't be able to > solve... Precisely. It has a horrible design bug. Given the nature of the net, where we want to deal securely with some entity never dealt with or of heard

Re: HTTPS everywhere!

2014-06-17 Thread Christoph Anton Mitterer
On Tue, 2014-06-17 at 21:00 +0200, Kurt Roeckx wrote: > This should be supported by all libraries, and is being used. > More and more intermediate CAs are in the process of becomming > constrained. Which doesn't really help, if you have still >150 "root" CA certs in Mozilla... which can just do wh

Re: HTTPS everywhere!

2014-06-17 Thread Christoph Anton Mitterer
On Tue, 2014-06-17 at 13:20 +0100, Simon McVittie wrote: > * my browser vendor doesn't trust this CA at all, and indeed my browser > will not let me access https sites secured with it, even though it > will let me access an equally MITM-prone http version of the same > content > > * my bro

Re: sofftware outside Debian (Re: holes in secure apt)

2014-06-17 Thread Christoph Anton Mitterer
On Tue, 2014-06-17 at 13:39 +0200, Holger Levsen wrote: > > Well I guess the reason for flash is rather the license, isn't it? > no, it's in contrib, because it's a downloader package. Well sure... but flash itself is not in main for it's license... > both torbrowser-launcher as well as flashplu

Re: HTTPS everywhere!

2014-06-17 Thread Christoph Anton Mitterer
On Mon, 2014-06-16 at 18:25 +, Luca Filipozzi wrote: > But I don't expect that to be anywhere close to sufficient for other distros > to > include the Debian CA (by which you probably mean the SPI CA) into their > certificate stores. I didn't mean their Mozilla/NSS cert stores, if you were ta

Re: improving downloader packages (was: Re: holes in secure apt)

2014-06-17 Thread Christoph Anton Mitterer
On Mon, 2014-06-16 at 20:14 +0200, Jakub Wilk wrote: > debian-keyring is not useful for automatic authentication of source > packages. Well to be honest I never fully understood the idea behind debian-keyring... IMHO this should be actually debian-developers-keyring and it should be intended just

Re: HTTPS everywhere!

2014-06-17 Thread Kurt Roeckx
On Tue, Jun 17, 2014 at 02:34:27PM +0200, Jakub Wilk wrote: > * Simon McVittie , 2014-06-17, 13:20: > >It should be possible to make a CA certificate that is only considered to > >be valid for the spi-inc.org and debian.org subtrees, and then trust the > >assertion that SPI control that certificate

Bug#751909: ITP: libasr -- asynchronous DNS resolver

2014-06-17 Thread Ryan Kavanagh
Package: wnpp Severity: wishlist Owner: Ryan Kavanagh * Package name: libasr Version : Git Upstream Author : Eric Faurot and others * URL : https://github.com/OpenSMTPD/libasr * License : ISC Programming Lang: C Description : asynchronous DNS resolver

Bug#751895: ITP: node-response-time -- X-Response-Time header manager for HTTP response - Node.js module

2014-06-17 Thread Leo Iannacone
Package: wnpp Severity: wishlist Owner: Leo Iannacone X-Debbugs-CC: debian-devel@lists.debian.org * Package name: node-response-time Version : 2.0.0 Upstream Author : Jonathan Ong (http://jongleberry.com) * URL : https://github.com/expressjs/response-time * License

Please test libnet-dns-perl 0.77 in Debian experimental

2014-06-17 Thread Ondřej Surý
Hi, I have updated Net::DNS in experimental to version 0.77. There were some significant changes in the upstream version 0.69/0.70, so I would appreciate if you can test your perl packages if they still work with libnet-dns-perl 0.77. I know that at least fpdns[1] is broken, but I would expect t

Bug#751885: ITP: node-express-session -- simple HTTP session middleware - Node.js module

2014-06-17 Thread Leo Iannacone
Package: wnpp Severity: wishlist Owner: Leo Iannacone X-Debbugs-CC: debian-devel@lists.debian.org * Package name: node-express-session Version : 1.3.1 Upstream Author : TJ Holowaychuk (http://tjholowaychuk.com) * URL : https://github.com/expressjs/session * License

Re: HTTPS everywhere!

2014-06-17 Thread Jakub Wilk
* Simon McVittie , 2014-06-17, 13:20: It should be possible to make a CA certificate that is only considered to be valid for the spi-inc.org and debian.org subtrees, and then trust the assertion that SPI control that certificate - but in widely-used applications, that isn't possible. In theor

Re: HTTPS everywhere!

2014-06-17 Thread Paul Wise
On Tue, Jun 17, 2014 at 8:20 PM, Simon McVittie wrote: > Expanding on that a little... That is a great non-technical summary of how bad the situation with SSL and browser implementations is, thank you! -- bye, pabs http://wiki.debian.org/PaulWise -- To UNSUBSCRIBE, email to debian-devel-req

Re: HTTPS everywhere!

2014-06-17 Thread Simon McVittie
On 12/06/14 19:16, Tollef Fog Heen wrote: > ]] Christoph Anton Mitterer > >> Supplying the Debian Root CA to people not using Debian could have been >> easily done by a *single* site that uses a cert available in all >> browsers... which offers the Debian Root CA for secure and "trusted" >> downl

Re: sofftware outside Debian (Re: holes in secure apt)

2014-06-17 Thread Holger Levsen
Hi Christoph, On Montag, 16. Juni 2014, Christoph Anton Mitterer wrote: > Well I guess the reason for flash is rather the license, isn't it? no, it's in contrib, because it's a downloader package. > Anyway... just because something it in contrib/non-free for legal > reasons... I see no necessit

Re: Password Protecting GPG Keys

2014-06-17 Thread Christian Kastner
On 2014-06-17 05:45, Matthias Urlichs wrote: > Christian Kastner: >> While that is sadly true, AFAIK all those legislations still require at >> least good cause, but more usually a court order, to do so. >> > You have no legal protection whatsoever on the "international" side of many > countries' a

Re: holes in secure apt

2014-06-17 Thread David Kalnischkies
On Mon, Jun 16, 2014 at 12:04:51PM +0200, Thorsten Glaser wrote: > On Thu, 12 Jun 2014, David Kalnischkies wrote: > > For your attack to be (always) successful, you need a full-sources > > mirror on which you modify all tarballs, so that you can build a valid > > Sources file. You can't just build

Bug#751846: ITP: pyscanfcs -- data analysis software for perpendicular line scanning FCS

2014-06-17 Thread Alex Mestiashvili
Package: wnpp Severity: wishlist Owner: Alexandre Mestiashvili * Package name: pyscanfcs Version : 0.2.2 Upstream Author : Paul Mueller * URL : http://paulmueller.github.io/PyScanFCS * License : GPL-2+ Programming Lang: Python Description : data analys

Re: Password Protecting GPG Keys

2014-06-17 Thread Russ Allbery
Norbert Preining writes: > So while I consider it great that the judges in the case you mentioned > have decided in this way, I don't think this is the *norm* and we - > those travelling to the US - have to be aware of that. Well, the norm is that your electronics aren't searched at all. Becaus