Am 13.10.2011 22:26, schrieb Kevin Fenzi:
> I have orphaned all their packages. Please feel free to take the ones
> you wish.
>
> faenza-icon-theme
I've taken this.
Felix
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
I did an update which I thought was going to do everything but grub but this
happened:
# yum update --exclude=grub
Loaded plugins: langpacks, presto, refresh-packagekit
Setting up Update Process
Resolving Dependencies
--> Running transaction check
---> Package grub.x86_64 1:0.97-79.fc16 will be ob
Hi
On a fresh install of F16, I have added "wheel" as a secondary group for a
user using "# usermod -a -G wheel masood".
I have verified that "/etc/group" has the correct entry and
"system-config-users" shows that user "masood" belongs to "wheel" group.
However, "$ groups" only lists user's prima
Ok, sorry. Just took over full-ownership for elementary-icon-theme.
Thought I had it already, sorry... ;-)
On 10/13/2011 10:26 PM, Kevin Fenzi wrote:
> On Wed, 12 Oct 2011 17:27:07 +0200
> Pierre-Yves Chibon wrote:
>
>> On Mon, 2011-10-03 at 22:12 +0200, Pierre-Yves Chibon wrote:
>>> On Thu, 201
On 10/13/2011 10:26 PM, Kevin Fenzi wrote:
> On Wed, 12 Oct 2011 17:27:07 +0200
> Pierre-Yves Chibon wrote:
>
>> On Mon, 2011-10-03 at 22:12 +0200, Pierre-Yves Chibon wrote:
>>> On Thu, 2011-09-15 at 13:24 +0200, Pierre-Yves Chibon wrote:
I just sent an email directly to his archlinux.us
On Thu, 13 Oct 2011, Callum Lerwick wrote:
>> Yeah, who needs backups of private keys anyways!
>
> We're talking about SSH keys here. There's no web of trust to lose.
> Lose your keys? Generate new ones.
And contact my customers and what not to change it? Go past all the
servers i have access to
On Thu, Oct 13, 2011 at 11:25 PM, Paul Wouters wrote:
> On Thu, Oct 13, 2011 at 10:55:59PM -0500, Callum Lerwick wrote:
>
>> Its the only right way to do it. As a general rule, a private ssh key
>> should NEVER be transferred off the machine it was generated on.
>
> Yeah, who needs backups of priv
On Thu, Oct 13, 2011 at 10:55:59PM -0500, Callum Lerwick wrote:
> Its the only right way to do it. As a general rule, a private ssh key
> should NEVER be transferred off the machine it was generated on.
Yeah, who needs backups of private keys anyways!
> you have the same private key on more than
On Thu, Oct 13, 2011 at 11:18 PM, Toshio Kuratomi wrote:
> On Thu, Oct 13, 2011 at 10:55:59PM -0500, Callum Lerwick wrote:
>> On Thu, Oct 13, 2011 at 12:18 PM, Adam Williamson
>> wrote:
>> > On Thu, 2011-10-13 at 10:43 +0200, Gerd Hoffmann wrote:
>> >> One ssh key per machine makes alot more sen
On Thu, Oct 13, 2011 at 10:55:59PM -0500, Callum Lerwick wrote:
> On Thu, Oct 13, 2011 at 12:18 PM, Adam Williamson wrote:
> > On Thu, 2011-10-13 at 10:43 +0200, Gerd Hoffmann wrote:
> >> One ssh key per machine makes alot more sense. For outgoing ssh
> >> connections from -- say -- shell.fedorap
On Thu, Oct 13, 2011 at 12:18 PM, Adam Williamson wrote:
> On Thu, 2011-10-13 at 10:43 +0200, Gerd Hoffmann wrote:
>> One ssh key per machine makes alot more sense. For outgoing ssh
>> connections from -- say -- shell.fedoraproject.org I wouldn't just copy
>> my private key from my laptop but gen
Bojan Smojver wrote:
> Even more interestingly, dmesg and Xorg.0.log contain all the right
> things and yet, mutter won't start. I guess being in Intel graphics camp
> for some time now made me unfamiliar with radeon driver.
It might be blacklisted in mutter/gnome-shell because of known driver
is
Richard Hughes wrote:
> On 12 October 2011 17:44, Kevin Fenzi wrote:
>> All existing users of the Fedora Account System (FAS) at
>> https://admin.fedoraproject.org/accounts are required to change their
>> password and upload a NEW ssh public key before 2011-11-30.
>
> I have to upload a *new* pub
On 10/13/2011 04:07 PM, Josh Boyer wrote:
> If
> nothing else, you can come and wait for the inevitable "why don't you
> ship nvidia kmod" type trolling. Always good for a laugh.
See you there!
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/d
Have some kernel questions you want to ask in a real-time fashion?
Want an overview of where the various Fedora releases are at in terms
of the kernel? Have a really awesome idea for the kernel package you
want to share? Then come join us for the first Fedora Kernel Team
meeting tomorrow!
We're
On Thu, Oct 13, 2011 at 2:45 AM, Callum Lerwick wrote:
> Personally I've been generating passwords with "pwgen -s 12 1", or for
> really important stuff (like online banking), "pwgen -s 12 1".
Erk, that should be "pwgen -s -y 12" for the important stuff.
Cut-and-paste fail. :(
A fully random 12
On Wed, 12 Oct 2011 17:27:07 +0200
Pierre-Yves Chibon wrote:
> On Mon, 2011-10-03 at 22:12 +0200, Pierre-Yves Chibon wrote:
> > On Thu, 2011-09-15 at 13:24 +0200, Pierre-Yves Chibon wrote:
> > >
> > > I just sent an email directly to his archlinux.us email address
> > > asking if he wishes to re
The lightweight tag 'perl-IO-Socket-SSL-1.45-1.fc16' was created pointing to:
90348cd... Update to 1.45
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-dev
Summary of changes:
90348cd... Update to 1.45 (*)
(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mail
The lightweight tag 'perl-IO-Socket-SSL-1.45-1.fc17' was created pointing to:
90348cd... Update to 1.45
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-dev
commit 90348cd7018c9b0f3c644ff8e0bd0a7a87fe3879
Author: Paul Howarth
Date: Thu Oct 13 20:16:19 2011 +0100
Update to 1.45
- New upstream release 1.45:
- Fix readline to continue when getting interrupt waiting for more data
- BR: perl(Carp)
perl-IO-Socket-SSL.spec | 11
On Wed, Oct 12, 2011 at 10:12 AM, Tom Callaway wrote:
> Actually, I revived perl-Text-Aspell, but I haven't built it yet:
> https://bugzilla.redhat.com/show_bug.cgi?id=742759
I see. This isn't exactly an emergency, given how long acheck has
been broken, with 0 bug reports. The right thing to do
A file has been added to the lookaside cache for perl-IO-Socket-SSL:
4c1c1655da9cb5ee8da874893bfb7662 IO-Socket-SSL-1.45.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/m
On Mon, 10 Oct 2011 12:09:51 -0600
Tim Flink wrote:
> Are there any objections to moving forward with this? There seems to
> be no objections from the kernel maintainers who have been
> participating in the discussion on test@ but we wanted a bit more
> devel input before moving forward.
Since t
Ok, looks like gudev is a dead end too.
Problems:
1. No property which give media type. Instead it looks like there are
boolean value given instead, i.e.:
ID_CDROM_MEDIA_DVD_PLUS_R: 1
So I assume if I was using a DVD-R it would be:
ID_CDROM_MEDIA_DVD_MINUS_R: 1
THIS IS CRAZY
This means I wou
I think requiring a minium sized password that is pretty long, like maybe
15-20 or larger. The chance of somebody cracking those sized passwords would
be smaller. Also I know there was a previous issue about the Yubikey as part
of security. In my opinion requiring a 15-20 long password added with a
On Thu, 13 Oct 2011 09:40:59 +0300
Nicu Buculei wrote:
> On 10/12/2011 07:44 PM, Kevin Fenzi wrote:
> >
> > Q&A:
> >
> >
> > Q: I never uploaded a ssh key to the Fedora Account System, nor am I
> > in a group that needs one, do I still have to upload a new one?
> >
> > A: No. If you don't have a
On Thu, 13 Oct 2011 10:39:03 -0700
Toshio Kuratomi wrote:
>...
> So what are our admins to do? 1) We could ignore the issue. We have
> a lot of contributors. Maybe we should just expect that some of
> their accounts are going to be compromised.
Not maybe. Certainly some of the accounts will
Enjoy your two-week vacation :)
On Thu, Oct 13, 2011 at 1:23 PM, seth vidal wrote:
> On Thu, 2011-10-13 at 21:19 +0300, Jussi Lehtola wrote:
> > Hi,
> >
> >
> > just to let you know - I'm taking a two-week holiday starting
> > tomorrow, during which time I probably won't have internet access. So,
On Thu, 2011-10-13 at 21:19 +0300, Jussi Lehtola wrote:
> Hi,
>
>
> just to let you know - I'm taking a two-week holiday starting
> tomorrow, during which time I probably won't have internet access. So,
> don't wonder why I'm not, e.g., attending anything in bugzilla.
Thank you for sending this
Hi,
just to let you know - I'm taking a two-week holiday starting
tomorrow, during which time I probably won't have internet access. So,
don't wonder why I'm not, e.g., attending anything in bugzilla.
--
Jussi Lehtola
Fedora Project Contributor
jussileht...@fedoraproject.org
--
devel mailing li
> On Thu, 13 Oct 2011 10:46:01 -0400 (EDT), Paul Wouters
> said:
PW> Also, trusted the AD bit without trusting the last mile violates the
PW> RFC 3655 Section 3
[snip]
PW> If the ssh client grabs non-localhost resolver entries and trusts the AD
PW> bit, then that is a bug and should
On Thu, Oct 13, 2011 at 11:45:35AM +0200, Thomas Spura wrote:
> On Tue, 11 Oct 2011 23:02:36 -0700
> Toshio Kuratomi wrote:
>
> > On Tue, Oct 11, 2011 at 11:11:39PM -0400, Paul Wouters wrote:
> > > On Tue, 11 Oct 2011, Nathanael D. Noblet wrote:
> > >
> > > > As far as I know if you burn the key
On Thu, Oct 13, 2011 at 09:14:46AM +0100, Richard W.M. Jones wrote:
> On Wed, Oct 12, 2011 at 02:59:31PM -0500, Mike McGrath wrote:
> > 2) We've found PRIVATE keys on our servers
>
> By all means educate these users with a large clue-stick.
>
The problem is this:
Fedora contributors are a group
On Thu, 2011-10-13 at 08:35 -0400, Neal Becker wrote:
> http://news.opensuse.org/2011/10/11/opensuse-announces-first-public-release-of-
> openqa/
saw it!
in fact, we've talked to one of the lead developers before.
it's got some cool design features, a reasonably nice results interface,
and it's
Summary of changes:
a8efed5... Upstream update. (*)
(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/ma
On Thu, 2011-10-13 at 10:43 +0200, Gerd Hoffmann wrote:
> Hi,
>
> > Sure, ssh keys are much harder to compromise than passwords, but
> > _assuming a compromise has happened_ the consequences of using a single
> > key for everything are just as bad as using a single password for
> > everything.
>
On Thu, 2011-10-13 at 09:12 +0100, Richard W.M. Jones wrote:
> On Wed, Oct 12, 2011 at 12:48:57PM -0700, Adam Williamson wrote:
> > Sure. However, if you have multiple keys with multiple passphrases, then
> > it's extra work to compromise each key.
>
> Not true at all. If I keep my key(s) in a si
On Thu, Oct 13, 2011 at 11:17 AM, Stanislav Ochotnicky
wrote:
> Excerpts from Richard Shaw's message of Thu Oct 13 16:13:00 +0200 2011:
>> On Wed, Oct 12, 2011 at 8:16 PM, Dan Williams wrote:
>> > udev replaced HAL, along with some additional helpers. udev has a
>> > database too, much like HAL.
commit a8efed520da65574e2b3e9889bb53039012832e3
Author: Ralf Corsépius
Date: Thu Oct 13 18:58:44 2011 +0200
Upstream update.
.gitignore|4 +---
perl-Test-SharedFork.spec |7 +--
sources |2 +-
3 files changed, 7 insertions(+), 6 deletions(
A file has been added to the lookaside cache for perl-Test-SharedFork:
edd6b8d2fcd9a5449d193f23a9b9a29c Test-SharedFork-0.18.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.o
On 10/12/2011 06:37 PM, Aaron Gray wrote:
> sudo /usr/sbin/in.tftpd -L -v -v -v -s /var/lib/tftpboot
>
>
> Wow, TFTP works like this !
>
> Thanks for that, now why does it not work under xinetd ?
I have no idea. xinetd should be spawning off the equivalent of:
/usr/sbin/in.tftpd -s /var/li
commit 71aeb41dd2fcfe14bf323da4aaca35a003782182
Author: Ralf Corsépius
Date: Thu Oct 13 18:38:34 2011 +0200
Upstream update.
.gitignore |2 +-
perl-Plack.spec |5 -
sources |2 +-
3 files changed, 6 insertions(+), 3 deletions(-)
---
diff --git a/.gitignore b/.
A file has been added to the lookaside cache for perl-Plack:
3d30c1b99124b9dfc78a2b0139d38a14 Plack-0.9984.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinf
# F16 Final Blocker Review meeting #3
# Date: 2011-10-14
# Time: 17:00 UTC [1] (13:00 EDT, 10:00 PDT)
# Location: #fedora-bugzappers on irc.freenode.net
The third Fedora 16 final blocker bug review meeting will be this
Friday at 17:00 UTC in #fedora-bugzappers. We'll be running through the
final b
Summary of changes:
1c4c4df... Upstream update. (*)
(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/ma
Summary of changes:
1c4c4df... Upstream update. (*)
(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/ma
Summary of changes:
1c4c4df... Upstream update. (*)
(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/ma
Excerpts from Richard Shaw's message of Thu Oct 13 16:13:00 +0200 2011:
> On Wed, Oct 12, 2011 at 8:16 PM, Dan Williams wrote:
> > udev replaced HAL, along with some additional helpers. udev has a
> > database too, much like HAL. You can use libudev or libgudev (if you
> > use glib) to talk to u
Greetings, FUDCon friends, near and far:
As you are probably aware, the 2012 North American FUDCon will be held
in Blacksburg, Virginia, on the campus of Virginia Tech. If you are
planning on attending, it's never too early to pre-register, and to
start thinking about your travel plans. FUDCon
commit 1c4c4df5c59efd6db8ed9c039def6e7cf637cf33
Author: Ralf Corsépius
Date: Thu Oct 13 16:50:58 2011 +0200
Upstream update.
.gitignore |3 +--
perl-Number-Compare.spec |5 -
sources |2 +-
3 files changed, 6 insertions(+), 4 deletions(-)
---
A file has been added to the lookaside cache for perl-Number-Compare:
ded4085a8fc96328742785574ca65208 Number-Compare-0.03.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org
On Thu, 13 Oct 2011, Tomas Mraz wrote:
> Nope, you do not understand what the dependency is. Of course you depend
> on the DNS to not be compromised to get the IP address of the host but
> you still can verify the fingerprint on the first connection if you got
> it by other means.
That scales as
commit c5f5aee528450252f6e48df9f8d88a8ca49985a9
Author: Ralf Corsépius
Date: Thu Oct 13 16:38:23 2011 +0200
Post merge cleanup.
perl-File-Find-Rule.spec |6 --
1 files changed, 0 insertions(+), 6 deletions(-)
---
diff --git a/perl-File-Find-Rule.spec b/perl-File-Find-Rule.spec
ind
Summary of changes:
1ef6866... - 661697 rebuild for fixing problems with vendorach/lib (*)
9b2adae... - Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass (*)
f0127e8... Perl mass rebuild (*)
d75db9e... Upstream update. Modernize spec file. (*)
4517902... Post merge cleanup. (*)
commit 4517902b13990719a55a56fc5b9c5deadaba3034
Author: Ralf Corsépius
Date: Thu Oct 13 16:34:24 2011 +0200
Post merge cleanup.
perl-File-Find-Rule.spec |3 ---
1 files changed, 0 insertions(+), 3 deletions(-)
---
diff --git a/perl-File-Find-Rule.spec b/perl-File-Find-Rule.spec
index
Summary of changes:
f0127e8... Perl mass rebuild (*)
d75db9e... Upstream update. Modernize spec file. (*)
4517902... Post merge cleanup.
(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl
Summary of changes:
d75db9e... Upstream update. Modernize spec file. (*)
(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin
commit d75db9e1dbc7229504ad7536f741aebbd568a216
Author: Ralf Corsépius
Date: Thu Oct 13 16:27:37 2011 +0200
Upstream update.
Modernize spec file.
.gitignore |2 +-
perl-File-Find-Rule.spec | 15 +++
sources |2 +-
3 files changed, 9
A file has been added to the lookaside cache for perl-File-Find-Rule:
92c6cb88549c30f5665e39bf80f3d704 File-Find-Rule-0.33.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org
On Thu, 13 Oct 2011, Tomas Mraz wrote:
>>
>>> And if this malicious DNS administrator controls the caching
>>> nameserver you're using for DNS queries, he can present you ANY data
>>> even 'valid' fake DNSSEC data.
>>
>> This is not generally true. Resolver libraries can (and should, IMHO)
>> veri
On Wed, Oct 12, 2011 at 8:16 PM, Dan Williams wrote:
> udev replaced HAL, along with some additional helpers. udev has a
> database too, much like HAL. You can use libudev or libgudev (if you
> use glib) to talk to udev and get information.
Ok, I found python-gudev which lets me talk to udev!
http://news.opensuse.org/2011/10/11/opensuse-announces-first-public-release-of-
openqa/
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
On Wed, 2011-10-12 at 14:37 -0400, Przemek Klosowski wrote:
> On 10/12/2011 01:41 PM, Richard Hughes wrote:
> > On 12 October 2011 17:44, Kevin Fenzi wrote:
> >> * Nine or more characters with lower and upper case letters, digits and
> >> punctuation marks.
> >> * Ten or more characters with low
commit a0471213623126dd4eee132a22a70ce01cdd5e89
Author: Petr Sabata
Date: Thu Oct 13 13:03:31 2011 +0200
1.5000 bump
.gitignore |1 +
perl-App-cpanminus.spec |7 +--
sources |2 +-
3 files changed, 7 insertions(+), 3 deletions(-)
---
diff --git
A file has been added to the lookaside cache for perl-App-cpanminus:
f0d120dde9ae82c4a718a951741ca136 App-cpanminus-1.5000.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org
I don't think it is actually used somewhere, but I wrote an article about
using Yubikeys with Fedora a long time ago when the Infra team was busy
implementing Yubikey support. Iirc I wrote about using the second slot
somewhere in there. It might help you:
https://fedoraproject.org/wiki/Using_Yubike
On 10/13/2011 09:45 AM, Callum Lerwick wrote:
> On Wed, Oct 12, 2011 at 1:37 PM, Przemek Klosowski
> wrote:
>> Length beats out larger character set, which is nicely illustrated by
>> the XKCD cartoon
>>
>> http://imgs.xkcd.com/comics/password_strength.png
>
> Be careful, that xkcd strip glosses
On Tue, 11 Oct 2011 23:02:36 -0700
Toshio Kuratomi wrote:
> On Tue, Oct 11, 2011 at 11:11:39PM -0400, Paul Wouters wrote:
> > On Tue, 11 Oct 2011, Nathanael D. Noblet wrote:
> >
> > > As far as I know if you burn the key you will lose the ability to
> > > use the yubikey's servers and I'm guessin
On 10/13/2011 11:13 AM, Tomas Mraz wrote:
> On Thu, 2011-10-13 at 10:59 +0200, Ralf Corsepius wrote:
>> On 10/12/2011 09:59 PM, Mike McGrath wrote:
>>> On Wed, 12 Oct 2011, Henrik Nordström wrote:
>>>
ons 2011-10-12 klockan 13:04 -0500 skrev Mike McGrath:
> Lots of people use and shar
On Thu, 2011-10-13 at 10:59 +0200, Ralf Corsepius wrote:
> On 10/12/2011 09:59 PM, Mike McGrath wrote:
> > On Wed, 12 Oct 2011, Henrik Nordström wrote:
> >
> >> ons 2011-10-12 klockan 13:04 -0500 skrev Mike McGrath:
> >>
> >>> Lots of people use and share keys across different projects.
> >>
> >>
On 10/12/2011 09:59 PM, Mike McGrath wrote:
> On Wed, 12 Oct 2011, Henrik Nordström wrote:
>
>> ons 2011-10-12 klockan 13:04 -0500 skrev Mike McGrath:
>>
>>> Lots of people use and share keys across different projects.
>>
>> There is no security issue in sharing kes across different projects,
>> ot
commit bd880bbc484622e21bbf81eb0f92ce638b917e6b
Author: Ralf Corsépius
Date: Thu Oct 13 10:52:50 2011 +0200
Merge cleanup.
perl-Tk-TableMatrix.spec |3 ---
1 files changed, 0 insertions(+), 3 deletions(-)
---
diff --git a/perl-Tk-TableMatrix.spec b/perl-Tk-TableMatrix.spec
index febb0
Summary of changes:
4a3e2e1... Perl mass rebuild (*)
88a23db... Add BR: perl(Tk::MMutil). (*)
bd880bb... Merge cleanup.
(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing li
Hi,
> What can we do there? We can't separate out those with good practices
> and those without.
For starters block ssh keys found @ fedorapeople.org ?
cheers,
Gerd
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
On Thu, 2011-10-13 at 10:29 +0200, Benny Amorsen wrote:
> Tomas Mraz writes:
>
> > And if this malicious DNS administrator controls the caching
> > nameserver you're using for DNS queries, he can present you ANY data
> > even 'valid' fake DNSSEC data.
>
> This is not generally true. Resolver li
Hi,
> Sure, ssh keys are much harder to compromise than passwords, but
> _assuming a compromise has happened_ the consequences of using a single
> key for everything are just as bad as using a single password for
> everything.
One ssh key per project doesn't make sense at all to me. They all
On Wed, Oct 12, 2011 at 02:18:20PM -0600, Kevin Fenzi wrote:
> On Wed, 12 Oct 2011 22:13:11 +0200
> Tomas Mraz wrote:
>
> >
> > OK, but then you should not penalize also the people who keep their
> > SSH private keys only on safe private computers.
>
> We're sorry if it's causing you inconvenie
Tomas Mraz writes:
> And if this malicious DNS administrator controls the caching
> nameserver you're using for DNS queries, he can present you ANY data
> even 'valid' fake DNSSEC data.
This is not generally true. Resolver libraries can (and should, IMHO)
verify DNSSEC themselves. Otherwise DNSS
On 10/12/11 19:53, Adam Williamson wrote:
> On Wed, 2011-10-12 at 13:45 -0400, Simo Sorce wrote:
>
>> I have no problem with changing the password, but leave my ssh keys
>> alone, unless there is a real reason to ask people to change them.
>
> Reading between the lines of recent attacks, it seems l
On Wed, Oct 12, 2011 at 02:59:31PM -0500, Mike McGrath wrote:
> 2) We've found PRIVATE keys on our servers
By all means educate these users with a large clue-stick.
Rich.
--
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming blog: http://rwmj.wordp
On Wed, Oct 12, 2011 at 12:48:57PM -0700, Adam Williamson wrote:
> Sure. However, if you have multiple keys with multiple passphrases, then
> it's extra work to compromise each key.
Not true at all. If I keep my key(s) in a single location (a secure
machine at my home), then either all keys in th
On Wed, Oct 12, 2011 at 1:37 PM, Przemek Klosowski
wrote:
> Length beats out larger character set, which is nicely illustrated by
> the XKCD cartoon
>
> http://imgs.xkcd.com/comics/password_strength.png
Be careful, that xkcd strip glosses over how that phrase was actually
generated. If you just p
83 matches
Mail list logo