On 10/26/2010 04:22 AM, Adam Williamson wrote:
>
> Having said that, I don't think this seems serious enough to be a
> blocker, though obviously we'd like the minimal install to be as minimal
> as possible. Does it cause major problems for any spins? I doubt it, I
> expect most of them will have c
On Mon, Oct 25, 2010 at 12:59:22PM -0600, Kevin Fenzi wrote:
> > The current build needs untagging anyway.
>
> I've untagged it and mailed Jindrich.
>
> Updating a rpm dep is not easy. You will need to rebuild rpm static, or
> make a compat package, or some other trick. ;)
>
The new xz-5.0.0-3
Greetings,
As you can see in the bug list summarized below, Test results of
F-14-Final-RC1 are positive so far, no blocker bugs were found when
executing the tests. Many thanks for the hard working of developers,
rel-engineers, and testers to keep improve the quality of Fedora.
=
On 26/10/10 07:05, Qiang Li wrote:
> On Tue, 2010-10-26 at 00:28 +0200, nodata wrote:
>> Hi,
>>
>> I'm concerned about the default behaviour of mounting encrypted volumes.
>>
>> The default behaviour is that a user must know and supply a passphrase
>> in order to mount an encrypted volume. This is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 10/26/2010 02:36 AM, Tomas Mraz wrote:
> On Tue, 2010-10-26 at 00:28 +0200, nodata wrote:
>> Hi,
>>
>> I'm concerned about the default behaviour of mounting encrypted volumes.
>>
>> The default behaviour is that a user must know and supply a passph
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
Summary: Net::Amazon::S3 is way out of date, please update
https://bugzilla.redhat.com/show_bug.cgi?id=646832
Summary: Net::Amazon::S3 is way out of date, please update
On Tue, Oct 26, 2010 at 12:28:55AM +0200, nodata wrote:
> What I am concerned about is that the volume is mounted for _every_ user
> on the system to see.
Only if the permissions are set that way. chmod 0750 /whatever and it
won't be.
--
Matthew Garrett | mj...@srcf.ucam.org
--
devel mailing
On 10/26/2010 09:44 AM, Matthew Garrett wrote:
> On Tue, Oct 26, 2010 at 12:28:55AM +0200, nodata wrote:
>
>> What I am concerned about is that the volume is mounted for _every_ user
>> on the system to see.
> Only if the permissions are set that way. chmod 0750 /whatever and it
> won't be.
>
I
On Tue, Oct 26, 2010 at 12:07:56 +0200,
nodata wrote:
>
> Now imagine if you could read all of _my_ files and I could read all of
> yours. That makes no sense. You _can_ configure that if you want, but by
> default we go for security.
Once upon a time that was the default for systems.
> Thi
On 10/26/2010 02:44 PM, Matthew Garrett wrote:
> On Tue, Oct 26, 2010 at 12:28:55AM +0200, nodata wrote:
>
>> What I am concerned about is that the volume is mounted for _every_ user
>> on the system to see.
>
> Only if the permissions are set that way. chmod 0750 /whatever and it
> won't be.
Hi,
With the dropping of .NET 1.1 support in mono-2.8, mono-ndoc will now no
longer compile (there is very little support for .NET 2.0 in it anyway).
It's dead in the water. The original author has said he no longer wishes
to maintain the package.
I'm not sure what actually depends on mono-ndoc,
On Tue, Oct 26, 2010 at 11:02:41AM +0200, Jindrich Novy wrote:
> On Mon, Oct 25, 2010 at 12:59:22PM -0600, Kevin Fenzi wrote:
> > > The current build needs untagging anyway.
> >
> > I've untagged it and mailed Jindrich.
> >
> > Updating a rpm dep is not easy. You will need to rebuild rpm static,
On Tue, Oct 26, 2010 at 12:28:55AM +0200, nodata wrote:
> The default behaviour is that a user must know and supply a passphrase
> in order to mount an encrypted volume. This is good: know the
> passphrase, you get to mount the volume.
>
> What I am concerned about is that the volume is mounted
On 26/10/10 16:00, Bruno Wolff III wrote:
> On Tue, Oct 26, 2010 at 12:07:56 +0200,
>nodata wrote:
>>
>> Now imagine if you could read all of _my_ files and I could read all of
>> yours. That makes no sense. You _can_ configure that if you want, but by
>> default we go for security.
>
> Once u
On 26/10/10 16:11, Andrew Haley wrote:
> On 10/26/2010 02:44 PM, Matthew Garrett wrote:
>> On Tue, Oct 26, 2010 at 12:28:55AM +0200, nodata wrote:
>>
>>> What I am concerned about is that the volume is mounted for _every_ user
>>> on the system to see.
>>
>> Only if the permissions are set that way
I have just rebased Net-SNMP to 5.6 in rawhide. The update includes new
soname for all libraries and following packages need to be recompiled:
389-ds-base
amavisd-new
apcupsd
asterisk
cacti
cluster-glue
clustermon
collectd
cpqarrayd
hplip
ifstat
mon
nagios-plugins-snmp-disk-proc
netdisco
ntop
nut
On Sun, 24 Oct 2010 10:45:38 -0400, Mark Bidewell wrote:
> Sorry if this has been discussed, but has there every been discussion
> of a dual 32/64-bit install media?
/usr/bin/mkbiarch is included in livecd-tools-034-2.fc14 upwards:
http://koji.fedoraproject.org/koji/fileinfo?rpmID=2167124
On Tue, Oct 26, 2010 at 07:36:47AM -0700, Toshio Kuratomi wrote:
> On Tue, Oct 26, 2010 at 11:02:41AM +0200, Jindrich Novy wrote:
> > The new xz-5.0.0-3 with a new xz-compat-libs subpackage containing
> > liblzma.so.0* libraries is just built. This should solve the chicken
> > and egg problem with
On Tue, Oct 26, 2010 at 16:56:41 +0200,
nodata wrote:
> On 26/10/10 16:00, Bruno Wolff III wrote:
> > On Tue, Oct 26, 2010 at 12:07:56 +0200,
> >nodata wrote:
> >>
> >> Now imagine if you could read all of _my_ files and I could read all of
> >> yours. That makes no sense. You _can_ configu
On 10/26/2010 03:57 PM, nodata wrote:
> On 26/10/10 16:11, Andrew Haley wrote:
>
>> On 10/26/2010 02:44 PM, Matthew Garrett wrote:
>>
>>> On Tue, Oct 26, 2010 at 12:28:55AM +0200, nodata wrote:
>>>
>>>
What I am concerned about is that the volume is mounted for _every_ user
>
On 10/26/2010 05:14 PM, Vaclav Mocek wrote:
> On 10/26/2010 03:57 PM, nodata wrote:
>> On 26/10/10 16:11, Andrew Haley wrote:
>>
>>> On 10/26/2010 02:44 PM, Matthew Garrett wrote:
>>>
On Tue, Oct 26, 2010 at 12:28:55AM +0200, nodata wrote:
> What I am concerned
On Sunday 24 October 2010 20:24:30 Kalev Lember wrote:
> KDE is pretty much self contained, whereas a Qt upgrade affects a much
> larger number of packages. I don't think updating Qt to a new major
> version in a stable Fedora release is a good idea; it just causes too
> much churn.
Nokia managed
On 10/25/2010 06:40 PM, nodata wrote:
> On 26/10/10 00:31, Nathanael D. Noblet wrote:
>> On 10/25/2010 04:28 PM, nodata wrote:
>>> Hi,
>>>
>>> I'm concerned about the default behaviour of mounting encrypted volumes.
>>>
>>> The default behaviour is that a user must know and supply a passphrase
>>>
On Tue, Oct 26, 2010 at 6:01 PM, Lars Seipel wrote:
> On Sunday 24 October 2010 20:24:30 Kalev Lember wrote:
>> KDE is pretty much self contained, whereas a Qt upgrade affects a much
>> larger number of packages. I don't think updating Qt to a new major
>> version in a stable Fedora release is a g
Peter Robinson (pbrobin...@gmail.com) said:
> > Nokia managed to upgrade Qt to 4.7 in their Maemo distribution and it got
> > pushed to all devices without causing any problems so far. Their standards
> > for
> > avoiding churn are pretty high and their update scheme is extremely
> > conservative
Compose started at Tue Oct 26 16:34:49 UTC 2010
Broken deps for x86_64
--
qtgpsc-0.2.3-6.fc12.x86_64 requires libgps.so.18()(64bit)
tryton-1.6.1-1.fc14.noarch requires python(abi) = 0:2.6
Broken deps for i386
--
On 10/26/10 11:46 AM, Branched Report wrote:
> Updated Packages:
>
> tryton-1.6.1-1.fc14
> ---
> * Tue Jul 27 2010 Dan Horák 1.6.1-1
> - update to upstream version 1.6.1
>
> * Thu Jul 22 2010 Dan Horák 1.6.0-3.1
> - don't build docs on EL <= 5
This is not necessarily a freeze b
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
Summary: perl-Date-Manip-6.14 is available
https://bugzilla.redhat.com/show_bug.cgi?id=646963
Summary: perl-Date-Manip-6.14 is available
Product: Fedora
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
Summary: perl-CPAN-Checksums-2.06 is available
https://bugzilla.redhat.com/show_bug.cgi?id=646962
Summary: perl-CPAN-Checksums-2.06 is available
Product: Fedo
On Tue, Oct 26, 2010 at 2:18 PM, Przemek Klosowski
wrote:
> The security role and rationale for the filesystem encryption is to
> prevent the access to lost or stolen media, when you can't rely on the
> mechanisms existent within the OS. The underlying device encryption
> technology is not set up
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
https://bugzilla.redhat.com/show_bug.cgi?id=596103
Upstream Release Monitoring
changed:
What|Removed |Added
--
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
Summary: perl-Syntax-Highlight-Perl6-0.88 is available
https://bugzilla.redhat.com/show_bug.cgi?id=646968
Summary: perl-Syntax-Highlight-Perl6-0.88 is available
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
Summary: perl-PPIx-Regexp-0.015 is available
https://bugzilla.redhat.com/show_bug.cgi?id=646966
Summary: perl-PPIx-Regexp-0.015 is available
Product: Fedora
Jesse Keating píše v Út 26. 10. 2010 v 12:01 -0700:
> On 10/26/10 11:46 AM, Branched Report wrote:
> > Updated Packages:
> >
> > tryton-1.6.1-1.fc14
> > ---
> > * Tue Jul 27 2010 Dan Horák 1.6.1-1
> > - update to upstream version 1.6.1
> >
> > * Thu Jul 22 2010 Dan Horák 1.6.0-3
A file has been added to the lookaside cache for perl-CGI-PSGI:
77d944c8eae1d1f021b1e46da43643d5 CGI-PSGI-0.12.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/lis
On 10/26/2010 01:03 PM, Gregory Maxwell wrote:
> I think that a small change in the default mount behavior so that the
> mountpoint encrypted is always owned by the user and mode 700— or if
> it were mounted under the user's home directory, perhaps with a
> checkbox (defaulting to off) on the pass
On 10/26/10 12:15 PM, Dan Horák wrote:
> Jesse Keating píše v Út 26. 10. 2010 v 12:01 -0700:
>> On 10/26/10 11:46 AM, Branched Report wrote:
>>> Updated Packages:
>>>
>>> tryton-1.6.1-1.fc14
>>> ---
>>> * Tue Jul 27 2010 Dan Horák 1.6.1-1
>>> - update to upstream version 1.6.1
>>>
On 10/26/2010 04:07 AM, nodata wrote:
> Imagine that you want to login to the computer, your username is oiang.
> I want to login too. My username is nodata. Now, I can only login to my
> account and look at my files because only I know my password. You can
> only login to your account because only
commit 7023c15d7586833e431cb2c6ab6535832b2c1a5b
Author: Emmanuel Seyman
Date: Tue Oct 26 21:22:29 2010 +0200
Update to 0.12
.gitignore |1 +
perl-CGI-PSGI.spec |5 -
sources|2 +-
3 files changed, 6 insertions(+), 2 deletions(-)
---
diff --git a/.gitign
Following is the list of topics that will be discussed in the FESCo
meeting tomorrow at 18:30UTC (2:30pm EDT) in #fedora-meeting on
irc.freenode.net.
= Followups =
#topic Updates policy
#351 Create a policy for updates - status report on implementation
https://fedorahosted.org/fesco/ticket/351
#
Jesse Keating píše v Út 26. 10. 2010 v 12:18 -0700:
> On 10/26/10 12:15 PM, Dan Horák wrote:
> > Jesse Keating píše v Út 26. 10. 2010 v 12:01 -0700:
> >> On 10/26/10 11:46 AM, Branched Report wrote:
> >>> Updated Packages:
> >>>
> >>> tryton-1.6.1-1.fc14
> >>> ---
> >>> * Tue Jul 27
On Tue, Oct 26, 2010 at 14:18:55 -0400,
Przemek Klosowski wrote:
>
> Such user-differentiated authorization is provided by the filesystem
> access rights, ACLs and SELinux attributes. Note that unlike the first
> two mechanisms, SELinux can protect the data even for systems with
> compromise
On Tue, Oct 26, 2010 at 13:16:41 -0600,
"Nathanael D. Noblet" wrote:
>
> Just out of curiosity... when are these being mounted? If we are talking
> about mounting a partition from a user session that's one thing and can
> easily make it user only accessible with a checkbox I guess. I'm
> won
On Tue, 26 Oct 2010 21:15:03 +0200
Dan Horák wrote:
> Jesse Keating píše v Út 26. 10. 2010 v 12:01 -0700:
> > On 10/26/10 11:46 AM, Branched Report wrote:
> > > Updated Packages:
> > >
> > > tryton-1.6.1-1.fc14
> > > ---
> > > * Tue Jul 27 2010 Dan Horák 1.6.1-1
> > > - update to
On Tue, Oct 26, 2010 at 4:10 PM, Bruno Wolff III wrote:
> This is where we should be going. Encryption is really irrelavent. The issue
> should be if a removable device is inserted, who should have access to it
> if it gets automounted. I would expect encrypted and unencrypted devices
> to get the
Thomas Spura píše v Út 26. 10. 2010 v 22:23 +0200:
> On Tue, 26 Oct 2010 21:15:03 +0200
> Dan Horák wrote:
>
> > Jesse Keating píše v Út 26. 10. 2010 v 12:01 -0700:
> > > On 10/26/10 11:46 AM, Branched Report wrote:
> > > > Updated Packages:
> > > >
> > > > tryton-1.6.1-1.fc14
> > > > ---
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 10/26/2010 01:05 PM, Bruno Wolff III wrote:
> On Tue, Oct 26, 2010 at 14:18:55 -0400,
> Przemek Klosowski wrote:
>>
>> Such user-differentiated authorization is provided by the filesystem
>> access rights, ACLs and SELinux attributes. Note that
On 10/26/2010 04:05 PM, Bruno Wolff III wrote:
> On Tue, Oct 26, 2010 at 14:18:55 -0400,
>Przemek Klosowski wrote:
>>
>> Such user-differentiated authorization is provided by the filesystem
>> access rights, ACLs and SELinux attributes. Note that unlike the first
>> two mechanisms, SELinux can
On 26/10/10 22:24, Gregory Maxwell wrote:
> On Tue, Oct 26, 2010 at 4:10 PM, Bruno Wolff III wrote:
>> This is where we should be going. Encryption is really irrelavent. The issue
>> should be if a removable device is inserted, who should have access to it
>> if it gets automounted. I would expect
On Tue, Oct 26, 2010 at 14:07:53 -0700,
Jesse Keating wrote:
> -BEGIN PGP SIGNED MESSAGE-
>
> That's only if you give root the right to disable or load new selinux
> policy.
And the policy is tight enough. You need to not allow root shells or most
processes the ability to read the keys
At the Fedora 14 Final Go/No-Go meeting today, the Fedora 14 Final
Release was declared GOLD and ready for release on November 2, 2010.
Thank you to everyone who made this on-time release possible!
A reminder that the Fedora 14 Release Wide Readiness Meeting will take
place on Thursday at 19:00
Kevin Fenzi said the following on 10/26/2010 12:36 PM Pacific Time:
> Following is the list of topics that will be discussed in the FESCo
> meeting tomorrow at 18:30UTC (2:30pm EDT) in #fedora-meeting on
> irc.freenode.net.
>
> = Followups =
>
> #topic Updates policy
>
> #351 Create a policy for up
On Tue, 2010-10-26 at 13:01 +0530, Rahul Sundaram wrote:
> On 10/26/2010 04:22 AM, Adam Williamson wrote:
> >
> > Having said that, I don't think this seems serious enough to be a
> > blocker, though obviously we'd like the minimal install to be as minimal
> > as possible. Does it cause major probl
On Tue, 2010-10-26 at 15:10 -0500, Bruno Wolff III wrote:
> On Tue, Oct 26, 2010 at 13:16:41 -0600,
> "Nathanael D. Noblet" wrote:
> >
> > Just out of curiosity... when are these being mounted? If we are talking
> > about mounting a partition from a user session that's one thing and can
> > e
54 matches
Mail list logo