On Tue, 04 Mar 2014 04:46:17 +, Luca Filipozzi writes:
>I propose 2014-SEP-01. Gives people six months to get this done. Even *I* can
>get it done in that amount of time. I've already emailed my fellow Vancouver
>Debian Developers in the hopes of coordinating a revolution^Wkeysigning [1].
l
On Tue, Mar 04, 2014 at 06:27:38PM +1000, Alexander Zangerl wrote:
> On Tue, 04 Mar 2014 04:46:17 +, Luca Filipozzi writes:
> >I propose 2014-SEP-01. Gives people six months to get this done. Even *I*
> >can
> >get it done in that amount of time. I've already emailed my fellow Vancouver
> >
Package: wnpp
Severity: wishlist
Owner: Thibaut Paumard
* Package name: yorick-ynfft
Version : 0.0.1
Upstream Author : Éric Thiébaut
* URL : http://cral.univ-
lyon1.fr/labo/perso/eric.thiebaut/?Software/Yorick/YNFFT
* License : CeCILL-C
Programming Lang: C,
I've actually been in the process of working to transition from my
existing to 1024D key I created back in 2002 with my new 4096R key I
created in 2011 that I use 3072R subkeys on a OpenPGP v2 smartcard.
Unfortunately I haven't been able to get together with any other DDs to
perform a key signi
On 03/04/2014 09:24 PM, Jeremy T. Bouse wrote:
> If any DDs are in, or will be, the Atlanta area and would like to get
> together for a key signing I would be more than welcome to get together
Most likely, I will attend the OpenStack summit in Atlanta [1] next May
(from 12th to 16th). Even if I'm
Package: wnpp
Severity: wishlist
Owner: Miguel Landaeta
* Package name: ruby-docker-api
Version : 1.8.2
Upstream Author : Swipely, Inc.
* URL : https://github.com/swipely/docker-api
* License : MIT/X
Programming Lang: Ruby
Description : Ruby gem to inte
Package: wnpp
Severity: wishlist
Owner: Miguel Landaeta
* Package name: ruby-octokit
Version : 2.7.0
Upstream Author : Wynn Netherland ,
Erik Michaels-Ober ,
Clint Shryock
* URL : http://octokit.github.io/octokit.rb/
* License
I didn't see any existing package of LogAnalyzer from Adiscon, the
people who make rsyslog - is there any specific reason for not packaging
it or it is just not something anybody needed yet? It is GPL:
http://loganalyzer.adiscon.com/
http://download.adiscon.com/loganalyzer/loganalyzer-3.6.5.tar
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 03/03/2014 19:13, Gunnar Wolf wrote:
> If you have a key with not-so-many active DD signatures (with not-so-many ≥
> 2) waiting to get it more signed, stop waiting and request the key
> replacement².
Is there a way to check this requirement?
* Vincent Danjean [2014-03-04 17:16:43 +0100]:
> On 03/03/2014 19:13, Gunnar Wolf wrote:
> > If you have a key with not-so-many active DD signatures (with not-so-many ≥
> > 2) waiting to get it more signed, stop waiting and request the key
> > replacement².
>
> Is there a way to check this r
* Daniel Pocock [2014-03-04 15:49:25 +0100]:
>
> I didn't see any existing package of LogAnalyzer from Adiscon, the
> people who make rsyslog - is there any specific reason for not packaging
> it or it is just not something anybody needed yet? It is GPL:
>
> http://loganalyzer.adiscon.com/
>
Jonathan McDowell dijo [Tue, Mar 04, 2014 at 05:38:11AM +]:
> > Surely this is well within keyring-maint purview and a GR is thus
> > unnessecary? Running the plan by debian-project seems a reasonable
> > level of consultation.
>
> We didn't need one for removing PGPv3 keys so I don't see why
Vincent Danjean dijo [Tue, Mar 04, 2014 at 05:16:43PM +0100]:
> On 03/03/2014 19:13, Gunnar Wolf wrote:
> > If you have a key with not-so-many active DD signatures (with
> > not-so-many ≥ 2) waiting to get it more signed, stop waiting and
> > request the key replacement².
>
> Is there a way to
Le 03/03/2014 19:13, Gunnar Wolf a écrit :
> If you have a key with not-so-many active DD signatures (with
> not-so-many ≥ 2) waiting to get it more signed, stop waiting and
> request the key replacement².
I have a rather silly question: would a mail (signed with this key)
request to the DDs who a
On Mon, Mar 3, 2014, at 19:13, Gunnar Wolf wrote:
> As keyring maintainers, we no longer consider 1024D keys to be
> trustable. We are not yet mass-removing them, because we don't want to
> hamper the project's work, but we definitively will start being more
> aggressively deprecating their use. 10
Package: wnpp
Severity: wishlist
Owner: Jonas Genannt
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
* Package name: ruby-axiom-types
Version : 0.1.0
Upstream Author : Dan Kubb
* URL : https://github.com/dkubb/axiom-types
* License : MIT
Programming Lang:
Xavier Roche dijo [Tue, Mar 04, 2014 at 06:55:08PM +0100]:
> I have a rather silly question: would a mail (signed with this key)
> request to the DDs who already signed the initial key (and checked the
> identity) to sign the replacement key considered unreasonable ?
>
> And would it be considered
Package: wnpp
Severity: wishlist
Owner: Jonas Genannt
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
* Package name: ruby-multimap
Version : 1.1.2
Upstream Author : Joshua Peek
* URL : https://github.com/josh/multimap
* License : MIT
Programming Lang: Ruby
Ondřej Surý dijo [Tue, Mar 04, 2014 at 08:10:47PM +0100]:
> On Mon, Mar 3, 2014, at 19:13, Gunnar Wolf wrote:
> > As keyring maintainers, we no longer consider 1024D keys to be
> > trustable. We are not yet mass-removing them, because we don't want to
> > hamper the project's work, but we definitiv
Package: wnpp
Severity: wishlist
Owner: Miguel Landaeta
* Package name: ruby-sawyer
Version : 0.5.3
Upstream Author : Rick Olson
* URL : https://github.com/lostisland/sawyer
* License : MIT/X
Programming Lang: Ruby
Description : HTTP/REST API client li
Moin!
Gunnar Wolf writes:
> Ondřej Surý dijo [Tue, Mar 04, 2014 at 08:10:47PM +0100]:
>> On Mon, Mar 3, 2014, at 19:13, Gunnar Wolf wrote:
>> > As keyring maintainers, we no longer consider 1024D keys to be
>> > trustable. We are not yet mass-removing them, because we don't want to
>> > hamper th
Package: wnpp
Severity: wishlist
Owner: Miguel Landaeta
* Package name: ruby-coveralls
Version : 0.7.0
Upstream Author : Nick Merwin ,
Wil Gieseler
* URL : https://github.com/lemurheavy/coveralls-ruby
* License : MIT/X
Programming Lang: R
Package: wnpp
Severity: wishlist
Owner: Paul Brossier
* Package name: timeside
Version : 0.5.4
Upstream Author : Guillaume Pellerin
* URL : https://github.com/yomguy/TimeSide
* License : GPL-2+
Programming Lang: Python
Description : open web audio proc
Package: wnpp
Severity: wishlist
Owner: Victor Seva
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
* Package name: sems
Version : 1.5.0
Upstream Author : Raphael Coeffic , Stefan Sayer
,
Juha Heinanen, Maxim Sobolev, Andreas Granig
* URL : http://i
On Tue, Mar 04, 2014 at 08:10:47PM +0100, Ondrej Surý wrote:
> On Mon, Mar 3, 2014, at 19:13, Gunnar Wolf wrote:
> > As keyring maintainers, we no longer consider 1024D keys to be
> > trustable. We are not yet mass-removing them, because we don't want to
> > hamper the project's work, but we defini
Package: wnpp
Severity: wishlist
Owner: Tonnerre LOMBARD
* Package name: golang-go.crypto-dev
Version : 0.0~hg190
Upstream Author : The Go Authors
* URL : http://code.google.com/p/go.crypto/
* License : BSD-3-Clause
Programming Lang: Go
Description : Su
Package: wnpp
Severity: normal
I don't use x-tile currently, and neither have the time nor
the motivation to maintain it, so I'd prefer some other to do
it properly.
Said that, it should not be difficult at all to maintain, as
upstream has been inactive for years.
I'm open to sponsorship, so you
On Wed, Mar 5, 2014 at 1:55 AM, Xavier Roche wrote:
> I have a rather silly question: would a mail (signed with this key)
> request to the DDs who already signed the initial key (and checked the
> identity) to sign the replacement key considered unreasonable ?
Considering that the initial keys ar
On Wed, 2014-03-05 at 10:47 +0800, Paul Wise wrote:
> On Wed, Mar 5, 2014 at 1:55 AM, Xavier Roche wrote:
>
> > I have a rather silly question: would a mail (signed with this key)
> > request to the DDs who already signed the initial key (and checked the
> > identity) to sign the replacement key
Package: wnpp
Severity: wishlist
Owner: Peter Roberts
* Package name: libapp-ddflare-perl
Version : 0.05
Upstream Author : Peter Roberts
* URL : http://metacpan.org/release/App-DDFlare
* License : MIT
Programming Lang: Perl
Description : Provides ddfla
Package: wnpp
Severity: wishlist
Owner: Jordan Metzmeier
* Package name: python-crontab
Version : 1.7.2
Upstream Author : Martin Owens
* URL : https://launchpad.net/python-crontab
* License : GPL-3
Programming Lang: Python
Description : Python module f
I am not sure what's the timeframe for GnuPG 2.1.0[1] release, but would
it be possible to skip the RSA and go directly for ECDSA, before we
start deprecating DSA? Or at least have an option to do so? (Well,
unless GnuPG 2.1 release is too much far in the future.)
IMO we need to phase out 1024
Antonio Terceiro wrote:
> On Mon, Mar 03, 2014 at 11:22:23PM +0100, Jakub Wilk wrote:
>> * Martin Pitt , 2014-02-27, 17:38:
>> >Tests can now depend on "@builddeps@" which expands to the source
>> >package's build dependencies. This is useful if you have many
>> >build dependencies which are only
On 5. 3. 2014, at 5:54, peter green wrote:
>>
>> I am not sure what's the timeframe for GnuPG 2.1.0[1] release, but would
>> it be possible to skip the RSA and go directly for ECDSA, before we
>> start deprecating DSA? Or at least have an option to do so? (Well,
>> unless GnuPG 2.1 release is to
On Wed, Mar 05, 2014 at 06:54:53AM +, Ondřej Surý wrote:
> > Also ECDSA shares with DSA the serious disadvantage over RSA that making
> > signatures on a system with a broken RNG can reveal the key.
> Care to share a source? I thought that RSA would be vulnerable to poor RNG as
> well.
The a
On Wed, Mar 5, 2014, at 7:58, Bastian Blank wrote:
> On Wed, Mar 05, 2014 at 06:54:53AM +, Ondřej Surý wrote:
> > > Also ECDSA shares with DSA the serious disadvantage over RSA that making
> > > signatures on a system with a broken RNG can reveal the key.
> > Care to share a source? I thought
On Tue, Mar 4, 2014, at 21:33, Gunnar Wolf wrote:
> Ondřej Surý dijo [Tue, Mar 04, 2014 at 08:10:47PM +0100]:
> > On Mon, Mar 3, 2014, at 19:13, Gunnar Wolf wrote:
> > > As keyring maintainers, we no longer consider 1024D keys to be
> > > trustable. We are not yet mass-removing them, because we don
Package: wnpp
Severity: wishlist
Owner: Thomas Goirand
* Package name: python-croniter
Version : 0.3.4
Upstream Author : Matsumoto Taichi
* URL : https://github.com/kiorky/croniter
* License : Expat
Programming Lang: Python
Description : provides itera
Package: wnpp
Severity: wishlist
Owner: Thomas Goirand
* Package name: python-oslo.vmware
Version : 0.2
Upstream Author : Vipin Balachandran
* URL : https://github.com/openstack/oslo.vmware
* License : Apache-2.0
Programming Lang: Python
Description :
39 matches
Mail list logo