On 14/09/2022 05:27, Neal Gompa wrote:
Well, we just released the Beta and people have noticed that this is
still broken. Do we have an ETA on a fix? Because this is going to be
a major black eye for*us* if it stays broken through to GA.
Epic Games had more than a month to fix the problem but
On 13/09/2022 23:50, Demi Marie Obenour wrote:
Another option is a TPM-based authenticator. Would this be acceptable?
No. TPM 2.0 chip is a *proprietary* black box. Some of them have known
critical security vulnerabilities[1].
[1]:
https://arstechnica.com/gadgets/2021/08/how-to-go-from-sto
On 14/09/2022 08:46, Demi Marie Obenour wrote:
The only other
non-phishable authentication method is TLS client certificates and
I would be fine with those.
Fedora used to have TLS client certificate authorization (in Koji), but
this has been replaced by Kerberos.
since almost every laptop
On 9/14/22 03:55, Vitaly Zaitsev via devel wrote:
> On 14/09/2022 08:46, Demi Marie Obenour wrote:
>> The only other
>> non-phishable authentication method is TLS client certificates and
>> I would be fine with those.
>
> Fedora used to have TLS client certificate authorization (in Koji), but
> t
On 9/13/22 21:37, Tommy Nguyen wrote:
> On Tue, 2022-09-06 at 16:14 -0500, Jonathan Wright via devel wrote:
>> On Tue, Sep 6, 2022 at 3:52 PM Vitaly Zaitsev via devel <
>> devel@lists.fedoraproject.org> wrote:
>>
>>> On 06/09/2022 19:49, Michael Catanzaro wrote:
Of course, hardware authenticat
* Vitaly Zaitsev via devel:
> On 14/09/2022 05:27, Neal Gompa wrote:
>> Well, we just released the Beta and people have noticed that this is
>> still broken. Do we have an ETA on a fix? Because this is going to be
>> a major black eye for*us* if it stays broken through to GA.
>
> Epic Games had m
On Tue, Sep 13, 2022 at 7:51 PM Chris Adams wrote:
>
> I'd like to piggy-back - is there a Fedora well-supported board that can
> use the Pi-targeted hats? I stayed away from the Pi for a long while,
> because of the support problems, but it just seems like there's so much
> that's just made for
On ke, 14 syys 2022, Demi Marie Obenour wrote:
On 9/14/22 03:55, Vitaly Zaitsev via devel wrote:
On 14/09/2022 08:46, Demi Marie Obenour wrote:
The only other
non-phishable authentication method is TLS client certificates and
I would be fine with those.
Fedora used to have TLS client certific
On Tue, Sep 13, 2022 at 7:35 PM Kevin Fenzi wrote:
>
> How about this:
>
> Drop the term 'jump scare' entirely. IMHO it just sounds bad.
I'm open for proposals on the wording. =)
> Rework the change so it's basically planning on making this change in
> f38.
That makes it closer than currently,
OLD: Fedora-Rawhide-20220913.n.0
NEW: Fedora-Rawhide-20220914.n.0
= SUMMARY =
Added images:0
Dropped images: 0
Added packages: 2
Dropped packages:2
Upgraded packages: 174
Downgraded packages: 0
Size of added packages: 323.29 KiB
Size of dropped packages
I see some new build failures in rawhide related to systemd RPM macros:
Processing files: opencryptoki-3.18.0-4.fc38.s390x
error: File must begin with "/": %{_tmpfilesdir}/opencryptoki.conf
error: File must begin with "/": %{_unitdir}/pkcsslotd.service
[…]
RPM build errors:
File must begin wit
On 14/09/2022 12:11, Florian Weimer wrote:
I see some new build failures in rawhide related to systemd RPM macros:
Processing files: opencryptoki-3.18.0-4.fc38.s390x
error: File must begin with "/": %{_tmpfilesdir}/opencryptoki.conf
error: File must begin with "/": %{_unitdir}/pkcsslotd.service
* Tom Hughes via devel:
> On 14/09/2022 12:11, Florian Weimer wrote:
>> I see some new build failures in rawhide related to systemd RPM macros:
>> Processing files: opencryptoki-3.18.0-4.fc38.s390x
>> error: File must begin with "/": %{_tmpfilesdir}/opencryptoki.conf
>> error: File must begin with
On 14/09/2022 10:01, Demi Marie Obenour wrote:
Still, even a pure software FIDO2 implementation is much better than
TOTP etc.
I don't think so. Malware can easily steal the private key. Simple TOTP
on a separate device is much better.
--
Sincerely,
Vitaly Zaitsev (vit...@easycoding.org)
__
On Wed, 14 Sept 2022 at 05:28, Alexander Bokovoy
wrote:
>
> Sadly, it cannot be just 'any' certificate, it has to be issued by a
> certificate authority that is trusted by the KDC as well. For example,
> by FreeIPA CA which is already ran by the Fedora project infrastructure
> team. An alternativ
# dnf --releasever=37 --setopt=module_platform_id=platform:f37
--enablerepo=updates-testing $(rpm -q fedora-repos-modular >/dev/null && echo
--enablerepo=updates-testing-modular) --assumeno distro-sync
Last metadata expiration check: 0:06:44 ago on Wed 14 Sep 2022 02:12:53 PM CEST.
Error:
Probl
Hello folks!
We are approaching Fedora 37 Final Freeze, which will start on 2022-10-04.
There are still 33 packages in Fedora 37 that will need to be rebuilt with
Python 3.11 in order to be installable (most of them). I propose to retire the
non-installable packages if they are not rebuilt by
Miro Hrončok a écrit :
> profanity
> @fantom
> ASSIGNED https://bugzilla.redhat.com/2049682
> Bug status changed ~3 weeks ago without comment,
> not updated since.
> Fixed in rawhide recently, f37-candidate build exists.
>
I just made package update 1 hour ago. Cross-fire :)
https://bodhi.fedorap
On ke, 14 syys 2022, Stephen Smoogen wrote:
On Wed, 14 Sept 2022 at 05:28, Alexander Bokovoy
wrote:
Sadly, it cannot be just 'any' certificate, it has to be issued by a
certificate authority that is trusted by the KDC as well. For example,
by FreeIPA CA which is already ran by the Fedora proj
> On Sep 14, 2022, at 4:17 AM, Tom Hughes via devel
> wrote:
>
>> On 14/09/2022 12:11, Florian Weimer wrote:
>> I see some new build failures in rawhide related to systemd RPM macros:
>>
>> Processing files: opencryptoki-3.18.0-4.fc38.s390x
>> error: File must begin with "/": %{_tmpfilesdir}/o
On 14. 09. 22 16:36, Casper wrote:
Miro Hrončok a écrit :
profanity
@fantom
ASSIGNED https://bugzilla.redhat.com/2049682
Bug status changed ~3 weeks ago without comment,
not updated since.
Fixed in rawhide recently, f37-candidate build exists.
I just made package update 1 hour ago. Cross-fire
On Wed, Sep 14, 2022 at 10:53 AM Smith, Stewart via devel
wrote:
>
>
> > On Sep 14, 2022, at 4:17 AM, Tom Hughes via devel
> > wrote:
> >
> >> On 14/09/2022 12:11, Florian Weimer wrote:
> >> I see some new build failures in rawhide related to systemd RPM macros:
> >>
> >> Processing files: openc
On Wed, Sep 14 2022 at 06:58:12 AM +, Tommy Nguyen
wrote:
I'm not entirely convinced. See this paper:
https://eprint.iacr.org/2020/1298.pdf
I only read the abstract of this paper, but looks like the researchers
have found that FIDO is indeed unphishable. Seems their attack relies
on w
TLS client certificates is actually not a terrible idea. They're not
very popular anymore, but they're supported by all major browsers (I
think?) and they work.
On Wed, Sep 14 2022 at 02:08:32 PM +0200, Vitaly Zaitsev via devel
wrote:
On 14/09/2022 10:01, Demi Marie Obenour wrote:
Still,
On Wed, 14 Sep 2022 05:06:29 -
"Richard Myers" wrote:
> This is for F35 -> F37 ...
>
> I sure
> would love it if anybody knows how to fix the below warning(?), which
> shows up every time I run DNF (it has persisted through at least 3 or
> 4 Fedora revisions, maybe more):
>
> Traceback (mos
I just copied and pasted from the OP...
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List
On Wed, Sep 14, 2022 at 11:45:16AM +0200, Alexander Sosedkin wrote:
> On Tue, Sep 13, 2022 at 7:35 PM Kevin Fenzi wrote:
> >
> > How about this:
> >
> > Drop the term 'jump scare' entirely. IMHO it just sounds bad.
>
> I'm open for proposals on the wording. =)
Well, I guess it depends on if you
On 9/14/22 09:40, Scott Beamer wrote:
I just copied and pasted from the OP...
Ok, but you have to be aware that your email client might reformat the
text and mess up the lines.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe s
On 14/09/2022 17:26, Michael Catanzaro wrote:
If you want to protect against *both* threats, use a security key, but
you've already pushed back against requiring a hardware purchase.
I never click on links from emails, instant messengers, etc.
I'm using fkinit and my simple custom systemd user
OK, third time is the charm. I finally got the command right.
Everything went just fine.:
sudo dnf --releasever=37 --setopt=module_platform_id=platform:f37
--enablerepo=updates-testing $(rpm -q fedora-repos-modular >/dev/null && echo
--enablerepo=updates-testing-modular) --assumeno distro-sync
# dnf --releasever=37 --setopt=module_platform_id=platform:f37
--enablerepo=updates-testing $(rpm -q fedora-repos-modular >/dev/null
&& echo --enablerepo=updates-testing-modular) --assumeno distro-sync
Fedora 37 - x86_64
22 MB/s |
81 MB
On Wed, Sep 14, 2022 at 6:40 PM Kevin Fenzi wrote:
>
> On Wed, Sep 14, 2022 at 11:45:16AM +0200, Alexander Sosedkin wrote:
> > On Tue, Sep 13, 2022 at 7:35 PM Kevin Fenzi wrote:
> > >
> > > How about this:
> > >
> > > Drop the term 'jump scare' entirely. IMHO it just sounds bad.
> >
> > I'm open
On Wed, 2022-09-07 at 17:47 +, Maxwell G via devel wrote:
> I think this is a bad idea. It's quite hostile to packagers. It will
> break rawhide for months and make it very difficult to stabilize the
> distro before the beta freeze or do any type of rebuild. It very well
> may
> affect other
I've updated https://fedoraproject.org/wiki/Changes/NodejsRepackaging
with the results of this discussion. I'll go the
`nodejs-$MAJOR-unversioned-command` route.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel
The gap package has a new version available (4.12), which comes with
significant improvements over 4.11. I've been working on updating the
entire gap stack [1] for the new version. The spec files have been
simplified and made more uniform, which should aid future maintenance.
I need one new packa
Hello,
I am planning to update gpgme to 1.18.0 in rawhide and since there is
SONAME bump in libqgpgme, I am asking to be a co-maintainer of these
dependant packages:
- https://src.fedoraproject.org/rpms/isoimagewriter (main admin: lupinix)
- https://src.fedoraproject.org/rpms/kdepim-addons (main a
Minutes:
https://meetbot.fedoraproject.org/fedora-meeting-1/2022-09-14/fedora_coreos_meeting.2022-09-14-16.30.html
Minutes (text):
https://meetbot.fedoraproject.org/fedora-meeting-1/2022-09-14/fedora_coreos_meeting.2022-09-14-16.30.txt
Log:
https://meetbot.fedoraproject.org/fedora-meeting-1/2022
On Wed, Sep 14, 2022 at 05:47:46PM +0300, Alexander Bokovoy wrote:
> On ke, 14 syys 2022, Stephen Smoogen wrote:
> > On Wed, 14 Sept 2022 at 05:28, Alexander Bokovoy
> > wrote:
> >
> > >
> > > Sadly, it cannot be just 'any' certificate, it has to be issued by a
> > > certificate authority that i
Alexander Sosedkin wrote:
> That's a reason why my initial thread [1] has been named
> "Landing a larger-than-release change (distrusting SHA-1 signatures)":
> flipping the switch is the easy part, unfortunately.
IMHO, a change that breaks so many things that you expect it to take more
than 6 mon
On Tue, 2022-09-13 at 16:46 +, Timo S via devel wrote:
> $ sudo dnf --releasever=37 --setopt=module_platform_id=platform:f37 -
> -enablerepo=updates-testing $(rpm -q fedora-repos-modular >/dev/null
> && echo --enablerepo=updates-testing-modular) --assumeno distro-sync
> Last metadata expiration
On Wed, 2022-09-14 at 10:25 -0500, Michael Catanzaro wrote:
>
> On Wed, Sep 14 2022 at 06:58:12 AM +, Tommy Nguyen
> wrote:
> > I'm not entirely convinced. See this paper:
> > https://eprint.iacr.org/2020/1298.pdf
>
> I only read the abstract of this paper, but looks like the researchers
>
On Wed, 2022-09-14 at 15:11 -0700, Adam Williamson wrote:
> On Wed, 2022-09-14 at 10:25 -0500, Michael Catanzaro wrote:
> >
> > On Wed, Sep 14 2022 at 06:58:12 AM +, Tommy Nguyen
> > wrote:
> > > I'm not entirely convinced. See this paper:
> > > https://eprint.iacr.org/2020/1298.pdf
> >
> >
On Wed, 2022-09-14 at 18:35 -0400, Simo Sorce wrote:
> On Wed, 2022-09-14 at 15:11 -0700, Adam Williamson wrote:
> > On Wed, 2022-09-14 at 10:25 -0500, Michael Catanzaro wrote:
> > >
> > > On Wed, Sep 14 2022 at 06:58:12 AM +, Tommy Nguyen
> > > wrote:
> > > > I'm not entirely convinced. See
On Wed, 2022-09-14 at 15:49 -0700, Adam Williamson wrote:
> The hardcore way is to say "welp, too bad, your account's gone,
> create
> a new one and start over, including going through the maintainer
> process again", but that might be a bit *too* hardcore.
>
> This is a perennial issue, though, a
Hi Miroslav,
On Mon, Sep 12, 2022 at 04:36:47PM +0200, Miroslav Lichvar wrote:
> flac-1.4.0 changes the libFLAC and libFLAC++ sonames. There are also
> some incompatible changes in the API, but I didn't see any packages
> failing to built due to these changes.
>
> The following packages need to b
On 14. 09. 22 16:01, Miro Hrončok wrote:
Hello folks!
...
Will be retired one week before the freeze anyway barbecue it's an old NEW.
I don't always spell "because" as "barbecue". But when I do I copy-paste it to
the email 8 times 🤦
--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
On 2022-09-14 07:01, Miro Hrončok wrote:
Hello folks!
luya dlib
dlib
@bizdelnick @luya
ASSIGNED https://bugzilla.redhat.com/2098694
Bundles old pybind11 which is not Python 3.11 compatible,
needs to be unbundled or at least updated.
Upstream is waiting for the stable release of Python
On ke, 14 syys 2022, Kevin Fenzi wrote:
On Wed, Sep 14, 2022 at 05:47:46PM +0300, Alexander Bokovoy wrote:
On ke, 14 syys 2022, Stephen Smoogen wrote:
> On Wed, 14 Sept 2022 at 05:28, Alexander Bokovoy
> wrote:
>
> >
> > Sadly, it cannot be just 'any' certificate, it has to be issued by a
> > c
On 9/15/22 00:59, Kevin Kofler via devel wrote:
Alexander Sosedkin wrote:
That's a reason why my initial thread [1] has been named
"Landing a larger-than-release change (distrusting SHA-1 signatures)":
flipping the switch is the easy part, unfortunately.
IMHO, a change that breaks so many thin
49 matches
Mail list logo