Bug#850644: RFP: GNU Guix -- A functional package manager based on Scheme

2017-01-08 Thread bancfc
Package: wnpp X-Debbugs-CC: whonix-de...@whonix.org * Package name: GNU Guix Version : 0.12.0 Upstream Author : Ludovic Courtès * URL : https://www.gnu.org/software/guix/ * License : GPLv3+ Programming Lang: Guile Scheme, C++ Description : A funct

Bug#849321: RFP: AnnealMail -- Icedove pqcrypto add-on

2016-12-25 Thread bancfc
Package: wnpp X-Debbugs-CC: whonix-de...@whonix.org * Package name: AnnealMail Version : 2.0 Upstream Author : Nick Doiron * URL : https://github.com/annealmail/annealmail * License : MPLv2 Programming Lang: JS Description : Icedove plugin based on

Bug#810479: RFP: paxrat -- PaX exception daemon for Debian packages

2016-01-08 Thread bancfc
Package: wnpp X-Debbugs-CC: deskt...@secure-os.org * Package name: paxrat Version : 1 Upstream Author : David McKinney * URL : https://github.com/subgraph/paxrat * License : GPLv3 Programming Lang: Go Description : PaX exception daemon for Debian packag

Bug#605090:

2016-01-07 Thread bancfc
I've been experimenting with the source package in unstable. There is still some security advantages of building the source package such as unique RANDSTRUCT values not known publicly: https://github.com/Whonix/grsecurity-installer/issues/1#issuecomment-169819722 Installing the build dependenc

Bug#605090:

2015-12-20 Thread bancfc
Is there other ways to deal with unwanted network stack modules like Appletalk besides going in and manually disabling them in config before compiling? Is disabling module loading enough? Please give some insight if its okay to discuss.

Bug#605090: Git tag signing

2015-12-20 Thread bancfc
I just wanted to mention Git tag signing. Its a very useful security feature we use for protecting source code builds in our project. https://git-scm.com/book/en/v2/Git-Tools-Signing-Your-Work

Bug#605090: linux-grsec testing

2015-12-20 Thread bancfc
On 2015-12-20 09:51, Yves-Alexis Perez wrote: On dim., 2015-12-20 at 00:32 +, ban...@openmailbox.org wrote: Hi. After testing the kernel X doesn't boot because restrict mprotect is  enabled. Hi, it's most likely because you're using nvidia/nouveau or amd/radeon graphic card, and the us

Bug#605090: linux-grsec testing

2015-12-19 Thread bancfc
Hi. After testing the kernel X doesn't boot because restrict mprotect is enabled. Are there plans to integrate a PaX exception list so mprotect can be enabled system wide while common software can still work?