On Mon, Feb 25, 2019 at 11:22 PM Roberto C. Sánchez wrote:
>
> On Mon, Feb 25, 2019 at 02:44:22PM +, Jonathan Dowland wrote:
> > On Mon, Feb 25, 2019 at 11:19:35AM -0300, Inaki Malerba wrote:
> > > On behalf of the Salsa CI Team I'm pleased to announce some of the
> > > changes we've been worki
On Mon, Feb 25, 2019 at 7:14 PM Philipp Meisberger wrote:
> Poorly libpam-fprintd is not suitable as libfprint0 seems to support
> ZhianTec fingerprint sensors. libpam-fingerprint is especially for those
> sensors. I see it would be more precise to use "Pluggable Authentication
> Module for ZhianT
Hi everybody,
here is a short report from the bug squashing party, which took place at
tarent solutions GmbH[1], Bonn, Germany, the last weekend. It was
poartially sponsored by tarent solutions and partially by Teckids[2], with
tarent sponsoring rooms and drinks, and Teckids sponsoring network and
Julian Andres Klode writes:
> Having symlinks in /bin and so on would be unclean: We'd have to maintain
> one symlink per binary in /usr. This is a lot of symlinks.
Does the quantity of symlinks matter?
> We also cannot ever get rid of them - it would break the property.
Well, on any given sys
On Tue, Feb 19, 2019 at 05:49:24AM +0100, Guillem Jover wrote:
> Hi!
>
> On Tue, 2018-11-20 at 22:16:17 +0100, Adam Borowski wrote:
> > Thus, it seems to me that the plan A for usrmerge has serious downsides for
> > dubious benefits. What about the plan B I described above?
>
> So, people still
> "Ben" == Ben Hutchings writes:
Ben> The output of the RNG may well become public, for example in
Ben> document UUIDs. So when estimating the entropy that the new
Ben> seed file will provide for the next boot, none of the entropy
Ben> in the old seed file should be credited.
On 2019-02-24 19:52:59 [+], Thorsten Glaser wrote:
> tl;dr: it adds entropy during initramfs/as early as possible during
> boot *and* tells the kernel it did so, to make its crng initialised,
> and ensures a subsequent boot has a different seed, also updated
> periodically and on shutdown for a
On Mon, 2019-02-25 at 19:37 +0200, Uoti Urpala wrote:
[...]
> Generally you don't ever
> need to use /dev/random instead of /dev/urandom unless you make
> assumptions about cryptography failing.
[...]
I think I agree with that, but there is no way to add entropy that
unblocks getrandom() without a
On Mon, 2019-02-25 at 16:48 +, Thorsten Glaser wrote:
> Ben Hutchings dixit:
>
> >> ‣ writes between 32 and 256 bytes to /dev/urandom (but does not
> >> accredit them yet, just remembers the amount written)
> >
> >How do you determine the number of bytes here?
>
> 32 + arc4random_un
Ben Hutchings dixit:
>> ‣ writes between 32 and 256 bytes to /dev/urandom (but does not
>> accredit them yet, just remembers the amount written)
>
>How do you determine the number of bytes here?
32 + arc4random_uniform(256 - 32 + 1)
[…]
>The major input into the new seed file contents
On Mon, 2019-02-25 at 18:27 +0200, Uoti Urpala wrote:
> Ben Hutchings wrote:
> > The major input into the new seed file contents is the old seed file
> > contents. You are adding very little entropy on x86, and possibly
> > almost none on other architectures.
> >
> > Please reconsider this, as th
Package: wnpp
Severity: wishlist
Owner: Simon McVittie
* Package name: gnome-shell-extension-bluetooth-quick-connect
Version : (none, git snapshot)
Upstream Author : Bartosz Jaroszewski
* URL :
https://extensions.gnome.org/extension/1401/bluetooth-quick-connect/
* Lic
On Mon, Feb 25, 2019 at 03:53:09PM +, Ben Hutchings wrote:
The major input into the new seed file contents is the old seed file
contents.
Yes, I'd just drop the seed file once used, then have a scheduled job
write a new one at some point in the future if the random quality is
high enough.
On Sun, 2019-02-24 at 19:52 +, Thorsten Glaser wrote:
[...]
> I’ve written something, a linux-any package, that…
>
> • during postinst, creates a 128-byte random seed file in /
> • updates that in a daily cronjob (using same tool as during
> boot except with more bits taken from the kernel)
On Sun, 2019-02-24 at 20:10 +, Thorsten Glaser wrote:
> Hi Philipp,
>
> >FTR this is supposedly fixed on the main architectures featuring an
> RNG
> >in the CPU by linux 4.19.20-1, which enabled RANDOM_TRUST_CPU. Which
> Ben
>
> that’s what I referred to by…
>
> >>• it does not use/add CPU R
On Mon, Feb 25, 2019 at 02:44:22PM +, Jonathan Dowland wrote:
> On Mon, Feb 25, 2019 at 11:19:35AM -0300, Inaki Malerba wrote:
> > On behalf of the Salsa CI Team I'm pleased to announce some of the
> > changes we've been working on this weekend. We don't have an official
> > mailing list, so pl
On Mon, Feb 25, 2019 at 11:19:35AM -0300, Inaki Malerba wrote:
On behalf of the Salsa CI Team I'm pleased to announce some of the
changes we've been working on this weekend. We don't have an official
mailing list, so please excuse us if this is not the place for this
kind of announcements.
Than
Hi everyone !
On behalf of the Salsa CI Team I'm pleased to announce some of the
changes we've been working on this weekend. We don't have an official
mailing list, so please excuse us if this is not the place for this kind
of announcements.
Making the most of the fact that some of us are on the
Dzień dobry,
chcielibyśmy przesłać niezobowiązującą
propozycję dotyczącą wykonania przez nas nowej *Strony* lub *Sklepu*
internetowego dla Państwa firmy.
Zwracamy się z prośbą o
odpowiedź: *TAK *na ten adres e-mail.
_
Pozdrawiamy
Poorly libpam-fprintd is not suitable as libfprint0 seems to support
ZhianTec fingerprint sensors. libpam-fingerprint is especially for those
sensors. I see it would be more precise to use "Pluggable Authentication
Module for ZhianTec fingerprint sensors" as description and name the
package "libpam
On 2019-02-25 08:20, Philipp Meisberger wrote:
Package: wnpp
Severity: wishlist
Owner: Philipp Meisberger
* Package name: libpam-fingerprint
Version : 1.5
Upstream Author : Philipp Meisberger
* URL :
https://github.com/philippmeisberger/pam-fingerprint
* License
Package: wnpp
Severity: wishlist
Owner: Philipp Meisberger
* Package name: libpam-rfid
Version : 1.4
Upstream Author : Philipp Meisberger
* URL : https://github.com/philippmeisberger/pam-rfid
* License : D-FSL
Programming Lang: Python
Description : Plu
On 24/02/2019 20:00, Philipp Kern wrote:
On 2/24/2019 8:52 PM, Thorsten Glaser wrote:
In buster/sid, I noticed a massive delay booting up my laptop
and some virtual machines, which was reduced by hitting the
Shift and Ctrl keys multiple times randomly during boot; a
message “random: crng init
Package: wnpp
Severity: wishlist
Owner: Philipp Meisberger
* Package name: libpam-fingerprint
Version : 1.5
Upstream Author : Philipp Meisberger
* URL : https://github.com/philippmeisberger/pam-fingerprint
* License : D-FSL
Programming Lang: Python
Descrip
Package: wnpp
Severity: wishlist
Owner: Philipp Meisberger
* Package name: eclipse-package
Version : 1.0
Upstream Author : Philipp Meisberger
* URL : https://github.com/philippmeisberger/eclipse-package
* License : D-FSL
Programming Lang: Shell
Description
Package: wnpp
Severity: wishlist
Owner: Philipp Meisberger
* Package name: arduino-package
Version : 1.0
Upstream Author : Philipp Meisberger
* URL : https://github.com/philippmeisberger/arduino-package
* License : D-FSL
Programming Lang: Shell
Description
Package: wnpp
Severity: wishlist
Owner: Philipp Meisberger
* Package name: python-rfid
Version : 1.4
Upstream Author : Philipp Meisberger
* URL : https://github.com/philippmeisberger/pyrfid
* License : D-FSL
Programming Lang: Python
Description : Pytho
Package: wnpp
Severity: wishlist
Owner: Philipp Meisberger
* Package name: gamewake
Version : 3.5.1
Upstream Author : Philipp Meisberger
* URL : https://github.com/philippmeisberger/gamewake
* License : D-FSL
Programming Lang: Object Pascal
Description
Package: wnpp
Severity: wishlist
Owner: Philipp Meisberger
* Package name: python-fingerprint
Version : 1.5
Upstream Author : Philipp Meisberger
* URL : https://github.com/bastianraschke/pyfingerprint
* License : D-FSL
Programming Lang: Python
Description
29 matches
Mail list logo