Re: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!

2014-03-04 Thread Alexander Zangerl
On Tue, 04 Mar 2014 04:46:17 +, Luca Filipozzi writes: >I propose 2014-SEP-01. Gives people six months to get this done. Even *I* can >get it done in that amount of time. I've already emailed my fellow Vancouver >Debian Developers in the hopes of coordinating a revolution^Wkeysigning [1]. l

Re: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!

2014-03-04 Thread Luca Filipozzi
On Tue, Mar 04, 2014 at 06:27:38PM +1000, Alexander Zangerl wrote: > On Tue, 04 Mar 2014 04:46:17 +, Luca Filipozzi writes: > >I propose 2014-SEP-01. Gives people six months to get this done. Even *I* > >can > >get it done in that amount of time. I've already emailed my fellow Vancouver > >

Bug#740728: ITP: yorick-ynfft -- nonequispaced fast Fourier transform for Yorick

2014-03-04 Thread Thibaut Paumard
Package: wnpp Severity: wishlist Owner: Thibaut Paumard * Package name: yorick-ynfft Version : 0.0.1 Upstream Author : Éric Thiébaut * URL : http://cral.univ- lyon1.fr/labo/perso/eric.thiebaut/?Software/Yorick/YNFFT * License : CeCILL-C Programming Lang: C,

Re: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!

2014-03-04 Thread Jeremy T. Bouse
I've actually been in the process of working to transition from my existing to 1024D key I created back in 2002 with my new 4096R key I created in 2011 that I use 3072R subkeys on a OpenPGP v2 smartcard. Unfortunately I haven't been able to get together with any other DDs to perform a key signi

Re: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!

2014-03-04 Thread Thomas Goirand
On 03/04/2014 09:24 PM, Jeremy T. Bouse wrote: > If any DDs are in, or will be, the Atlanta area and would like to get > together for a key signing I would be more than welcome to get together Most likely, I will attend the OpenStack summit in Atlanta [1] next May (from 12th to 16th). Even if I'm

Bug#740735: ITP: ruby-docker-api -- Ruby gem to interact with docker.io remote API

2014-03-04 Thread Miguel Landaeta
Package: wnpp Severity: wishlist Owner: Miguel Landaeta * Package name: ruby-docker-api Version : 1.8.2 Upstream Author : Swipely, Inc. * URL : https://github.com/swipely/docker-api * License : MIT/X Programming Lang: Ruby Description : Ruby gem to inte

Bug#740736: ITP: ruby-octokit -- Ruby toolkit for the GitHub API

2014-03-04 Thread Miguel Landaeta
Package: wnpp Severity: wishlist Owner: Miguel Landaeta * Package name: ruby-octokit Version : 2.7.0 Upstream Author : Wynn Netherland , Erik Michaels-Ober , Clint Shryock * URL : http://octokit.github.io/octokit.rb/ * License

Adiscon LogAnalyzer? rsyslog + mongodb?

2014-03-04 Thread Daniel Pocock
I didn't see any existing package of LogAnalyzer from Adiscon, the people who make rsyslog - is there any specific reason for not packaging it or it is just not something anybody needed yet? It is GPL: http://loganalyzer.adiscon.com/ http://download.adiscon.com/loganalyzer/loganalyzer-3.6.5.tar

Re: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!

2014-03-04 Thread Vincent Danjean
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 03/03/2014 19:13, Gunnar Wolf wrote: > If you have a key with not-so-many active DD signatures (with not-so-many ≥ > 2) waiting to get it more signed, stop waiting and request the key > replacement². Is there a way to check this requirement?

Re: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!

2014-03-04 Thread Nicolas Dandrimont
* Vincent Danjean [2014-03-04 17:16:43 +0100]: > On 03/03/2014 19:13, Gunnar Wolf wrote: > > If you have a key with not-so-many active DD signatures (with not-so-many ≥ > > 2) waiting to get it more signed, stop waiting and request the key > > replacement². > > Is there a way to check this r

Re: Adiscon LogAnalyzer? rsyslog + mongodb?

2014-03-04 Thread Nicolas Dandrimont
* Daniel Pocock [2014-03-04 15:49:25 +0100]: > > I didn't see any existing package of LogAnalyzer from Adiscon, the > people who make rsyslog - is there any specific reason for not packaging > it or it is just not something anybody needed yet? It is GPL: > > http://loganalyzer.adiscon.com/ >

Re: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!

2014-03-04 Thread Gunnar Wolf
Jonathan McDowell dijo [Tue, Mar 04, 2014 at 05:38:11AM +]: > > Surely this is well within keyring-maint purview and a GR is thus > > unnessecary? Running the plan by debian-project seems a reasonable > > level of consultation. > > We didn't need one for removing PGPv3 keys so I don't see why

Re: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!

2014-03-04 Thread Gunnar Wolf
Vincent Danjean dijo [Tue, Mar 04, 2014 at 05:16:43PM +0100]: > On 03/03/2014 19:13, Gunnar Wolf wrote: > > If you have a key with not-so-many active DD signatures (with > > not-so-many ≥ 2) waiting to get it more signed, stop waiting and > > request the key replacement². > > Is there a way to

Re: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!

2014-03-04 Thread Xavier Roche
Le 03/03/2014 19:13, Gunnar Wolf a écrit : > If you have a key with not-so-many active DD signatures (with > not-so-many ≥ 2) waiting to get it more signed, stop waiting and > request the key replacement². I have a rather silly question: would a mail (signed with this key) request to the DDs who a

RSA vs ECDSA (Was: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!)

2014-03-04 Thread Ondřej Surý
On Mon, Mar 3, 2014, at 19:13, Gunnar Wolf wrote: > As keyring maintainers, we no longer consider 1024D keys to be > trustable. We are not yet mass-removing them, because we don't want to > hamper the project's work, but we definitively will start being more > aggressively deprecating their use. 10

Bug#740761: ITP: ruby-axiom-types -- Ruby module for abstract types for logic programming

2014-03-04 Thread Jonas Genannt
Package: wnpp Severity: wishlist Owner: Jonas Genannt -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 * Package name: ruby-axiom-types Version : 0.1.0 Upstream Author : Dan Kubb * URL : https://github.com/dkubb/axiom-types * License : MIT Programming Lang:

Re: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!

2014-03-04 Thread Gunnar Wolf
Xavier Roche dijo [Tue, Mar 04, 2014 at 06:55:08PM +0100]: > I have a rather silly question: would a mail (signed with this key) > request to the DDs who already signed the initial key (and checked the > identity) to sign the replacement key considered unreasonable ? > > And would it be considered

Bug#740766: ITP: ruby-multimap -- Ruby multimap implementation

2014-03-04 Thread Jonas Genannt
Package: wnpp Severity: wishlist Owner: Jonas Genannt -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 * Package name: ruby-multimap Version : 1.1.2 Upstream Author : Joshua Peek * URL : https://github.com/josh/multimap * License : MIT Programming Lang: Ruby

Re: RSA vs ECDSA (Was: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!)

2014-03-04 Thread Gunnar Wolf
Ondřej Surý dijo [Tue, Mar 04, 2014 at 08:10:47PM +0100]: > On Mon, Mar 3, 2014, at 19:13, Gunnar Wolf wrote: > > As keyring maintainers, we no longer consider 1024D keys to be > > trustable. We are not yet mass-removing them, because we don't want to > > hamper the project's work, but we definitiv

Bug#740768: ITP: ruby-sawyer -- HTTP/REST API client Ruby library

2014-03-04 Thread Miguel Landaeta
Package: wnpp Severity: wishlist Owner: Miguel Landaeta * Package name: ruby-sawyer Version : 0.5.3 Upstream Author : Rick Olson * URL : https://github.com/lostisland/sawyer * License : MIT/X Programming Lang: Ruby Description : HTTP/REST API client li

Re: RSA vs ECDSA

2014-03-04 Thread Christoph Egger
Moin! Gunnar Wolf writes: > Ondřej Surý dijo [Tue, Mar 04, 2014 at 08:10:47PM +0100]: >> On Mon, Mar 3, 2014, at 19:13, Gunnar Wolf wrote: >> > As keyring maintainers, we no longer consider 1024D keys to be >> > trustable. We are not yet mass-removing them, because we don't want to >> > hamper th

Bug#740779: ITP: ruby-coveralls -- Ruby implementation of the Coveralls API

2014-03-04 Thread Miguel Landaeta
Package: wnpp Severity: wishlist Owner: Miguel Landaeta * Package name: ruby-coveralls Version : 0.7.0 Upstream Author : Nick Merwin , Wil Gieseler * URL : https://github.com/lemurheavy/coveralls-ruby * License : MIT/X Programming Lang: R

Bug#740783: ITP: timeside -- open web audio processing framework

2014-03-04 Thread Paul Brossier
Package: wnpp Severity: wishlist Owner: Paul Brossier * Package name: timeside Version : 0.5.4 Upstream Author : Guillaume Pellerin * URL : https://github.com/yomguy/TimeSide * License : GPL-2+ Programming Lang: Python Description : open web audio proc

Bug#740788: ITP: sems -- SIP Express Media Server, very fast and flexible SIP media server

2014-03-04 Thread Victor Seva
Package: wnpp Severity: wishlist Owner: Victor Seva -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 * Package name: sems Version : 1.5.0 Upstream Author : Raphael Coeffic , Stefan Sayer , Juha Heinanen, Maxim Sobolev, Andreas Granig * URL : http://i

Re: RSA vs ECDSA (Was: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!)

2014-03-04 Thread Kurt Roeckx
On Tue, Mar 04, 2014 at 08:10:47PM +0100, Ondrej Surý wrote: > On Mon, Mar 3, 2014, at 19:13, Gunnar Wolf wrote: > > As keyring maintainers, we no longer consider 1024D keys to be > > trustable. We are not yet mass-removing them, because we don't want to > > hamper the project's work, but we defini

Bug#740791: ITP: golang-go.crypto-dev -- Supplementary Go cryptography libraries.

2014-03-04 Thread Tonnerre LOMBARD
Package: wnpp Severity: wishlist Owner: Tonnerre LOMBARD * Package name: golang-go.crypto-dev Version : 0.0~hg190 Upstream Author : The Go Authors * URL : http://code.google.com/p/go.crypto/ * License : BSD-3-Clause Programming Lang: Go Description : Su

Bug#740793: RFA: x-tile

2014-03-04 Thread Ricardo Mones
Package: wnpp Severity: normal I don't use x-tile currently, and neither have the time nor the motivation to maintain it, so I'd prefer some other to do it properly. Said that, it should not be difficult at all to maintain, as upstream has been inactive for years. I'm open to sponsorship, so you

Re: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!

2014-03-04 Thread Paul Wise
On Wed, Mar 5, 2014 at 1:55 AM, Xavier Roche wrote: > I have a rather silly question: would a mail (signed with this key) > request to the DDs who already signed the initial key (and checked the > identity) to sign the replacement key considered unreasonable ? Considering that the initial keys ar

Re: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!

2014-03-04 Thread Nick Phillips
On Wed, 2014-03-05 at 10:47 +0800, Paul Wise wrote: > On Wed, Mar 5, 2014 at 1:55 AM, Xavier Roche wrote: > > > I have a rather silly question: would a mail (signed with this key) > > request to the DDs who already signed the initial key (and checked the > > identity) to sign the replacement key

Bug#740799: ITP: libapp-ddflare-perl -- Provides ddflare, a command line Dynamic DNS utility that updates with the latest IP every 5 minutes

2014-03-04 Thread Peter Roberts
Package: wnpp Severity: wishlist Owner: Peter Roberts * Package name: libapp-ddflare-perl Version : 0.05 Upstream Author : Peter Roberts * URL : http://metacpan.org/release/App-DDFlare * License : MIT Programming Lang: Perl Description : Provides ddfla

Bug#740800: ITP: python-crontab -- Python module for reading and writing crontab files

2014-03-04 Thread Jordan Metzmeier
Package: wnpp Severity: wishlist Owner: Jordan Metzmeier * Package name: python-crontab Version : 1.7.2 Upstream Author : Martin Owens * URL : https://launchpad.net/python-crontab * License : GPL-3 Programming Lang: Python Description : Python module f

RSA vs ECDSA (Was: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!)

2014-03-04 Thread peter green
I am not sure what's the timeframe for GnuPG 2.1.0[1] release, but would it be possible to skip the RSA and go directly for ECDSA, before we start deprecating DSA? Or at least have an option to do so? (Well, unless GnuPG 2.1 release is too much far in the future.) IMO we need to phase out 1024

Re: Bits from the autopkgtest maintainer

2014-03-04 Thread Stuart Prescott
Antonio Terceiro wrote: > On Mon, Mar 03, 2014 at 11:22:23PM +0100, Jakub Wilk wrote: >> * Martin Pitt , 2014-02-27, 17:38: >> >Tests can now depend on "@builddeps@" which expands to the source >> >package's build dependencies. This is useful if you have many >> >build dependencies which are only

Re: RSA vs ECDSA (Was: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!)

2014-03-04 Thread Ondřej Surý
On 5. 3. 2014, at 5:54, peter green wrote: >> >> I am not sure what's the timeframe for GnuPG 2.1.0[1] release, but would >> it be possible to skip the RSA and go directly for ECDSA, before we >> start deprecating DSA? Or at least have an option to do so? (Well, >> unless GnuPG 2.1 release is to

Re: RSA vs ECDSA (Was: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!)

2014-03-04 Thread Bastian Blank
On Wed, Mar 05, 2014 at 06:54:53AM +, Ondřej Surý wrote: > > Also ECDSA shares with DSA the serious disadvantage over RSA that making > > signatures on a system with a broken RNG can reveal the key. > Care to share a source? I thought that RSA would be vulnerable to poor RNG as > well. The a

Re: RSA vs ECDSA (Was: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!)

2014-03-04 Thread Ondřej Surý
On Wed, Mar 5, 2014, at 7:58, Bastian Blank wrote: > On Wed, Mar 05, 2014 at 06:54:53AM +, Ondřej Surý wrote: > > > Also ECDSA shares with DSA the serious disadvantage over RSA that making > > > signatures on a system with a broken RNG can reveal the key. > > Care to share a source? I thought

Re: RSA vs ECDSA (Was: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!)

2014-03-04 Thread Ondřej Surý
On Tue, Mar 4, 2014, at 21:33, Gunnar Wolf wrote: > Ondřej Surý dijo [Tue, Mar 04, 2014 at 08:10:47PM +0100]: > > On Mon, Mar 3, 2014, at 19:13, Gunnar Wolf wrote: > > > As keyring maintainers, we no longer consider 1024D keys to be > > > trustable. We are not yet mass-removing them, because we don

Bug#740805: ITP: python-croniter -- provides iteration for datetime object with cron like format

2014-03-04 Thread Thomas Goirand
Package: wnpp Severity: wishlist Owner: Thomas Goirand * Package name: python-croniter Version : 0.3.4 Upstream Author : Matsumoto Taichi * URL : https://github.com/kiorky/croniter * License : Expat Programming Lang: Python Description : provides itera

Bug#740806: ITP: python-oslo.vmware -- VMware library for OpenStack projects

2014-03-04 Thread Thomas Goirand
Package: wnpp Severity: wishlist Owner: Thomas Goirand * Package name: python-oslo.vmware Version : 0.2 Upstream Author : Vipin Balachandran * URL : https://github.com/openstack/oslo.vmware * License : Apache-2.0 Programming Lang: Python Description :