On Wed, Oct 06, 2010 at 02:31:22PM -0700, Adam Williamson wrote:
On Wed, 2010-10-06 at 23:32 +0300, Pasi Kärkkäinen wrote:
What's the worst thing that can happen when trusting the ACPI lid state?
Think about this:
- Laptop lid open (so internal lvds enabled), and also external
Try verbose variant to figure out what happened:
$ fedpkg -v scratch-build
06.10.2010 13:19, Farkas Levente wrote:
hi,
while try to make a scratch build i always got:
-
# fedpkg scratch-build
Could not log into koji: Opening a SSL connection failed
On 10/06/2010 08:31 PM, Richard W.M. Jones wrote:
Seems quite complex. What's wrong with a directory:
/etc/iptables.d/
where RPMs like libvirt just drop the required additional rules (in a
separate chain if you like) and restart the iptables service? It's
low-tech but simple and it's
On 10/07/2010 02:20 AM, Genes MailLists wrote:
On 10/06/2010 11:26 AM, Thomas Woerner wrote:
6) Compatibility Mode
The current static firewall model will still be available for
compatibility for users or administrators creating their own firewall.
This deactivates the firewall service and
On Wed, 06 Oct 2010 11:19:21 +0200
Farkas Levente wrote:
hi,
while try to make a scratch build i always got:
-
# fedpkg scratch-build
Could not log into koji: Opening a SSL connection failed
-
even if i try to
On Wed, 2010-10-06 at 17:26 +0200, Thomas Woerner wrote:
It is possible to specify a timeout for a firewall service and also the
other features. The service will be opened immediately and closed again
after the defined period is over. This allows to accept new connections
from unknown
On Wed, 2010-10-06 at 19:31 +0100, Richard W.M. Jones wrote:
Seems quite complex. What's wrong with a directory:
/etc/iptables.d/
where RPMs like libvirt just drop the required additional rules (in a
separate chain if you like) and restart the iptables service? It's
low-tech but
On 10/6/10, Adam Williamson awill...@redhat.com wrote:
On Wed, 2010-10-06 at 16:41 +0200, Ralf Corsepius wrote:
However, this here is Fedora, a project that once was aiming at
Freedom - As trivial as it is, restrictive trademark policies simply
do not fit into this philosophy.
If we don't
I think an exception should be made for Chromium too. Having a more
secure browser would benefit the main repositories.
On 10/7/10, Brandon Lozza bran...@pwnage.ca wrote:
On 10/6/10, Adam Williamson awill...@redhat.com wrote:
On Wed, 2010-10-06 at 16:41 +0200, Ralf Corsepius wrote:
However,
2010 Vitezslav Crhonek vcrho...@redhat.com - 1.3.0-1
- Update to sblim-cmpi-params-1.3.0
- Remove CIMOM dependencies
sepostgresql-9.0.1-20101007.fc15
* Thu Oct 07 2010 KaiGai Kohei kai...@kaigai.gr.jp - 9.0.1-20101007
- upgrade base version to 9.0.1
subversion
Compose started at Thu Oct 7 13:15:30 UTC 2010
Broken deps for x86_64
--
almanah-0.7.3-3.fc14.x86_64 requires libedataserverui-1.2.so.10()(64bit)
antlr3-python-3.1.2-7.fc14.noarch requires python(abi) = 0:2.6
On 10/07/2010 08:36 AM, Brandon Lozza wrote:
On 10/6/10, Adam Williamsonawill...@redhat.com wrote:
If we don't protect the Fedora trademark, anyone can produce anything
and call it 'Fedora'. Including something which doesn't fit into our
philosophy of freedom at all.
What are you guys
commit c7c626e362a1a07ad20af64f9881c6a7dfcd2faf
Author: Iain Arnell iarn...@gmail.com
Date: Thu Oct 7 18:57:20 2010 +0200
update to 0.90
.gitignore|1 +
perl-DateTime-Format-Natural.spec | 19 ---
sources |2 +-
3
The Fedora Infrastructure team is happy to announce support for the
hardware key authentication device, the yubikey. Users will be able to
use their own yubikeys to access some Fedora services, like
fedorapeople.org or some web services.
Why have we done this? The main purpose was to provide
Summary of changes:
c7c626e... update to 0.90 (*)
(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
Summary of changes:
c7c626e... update to 0.90 (*)
(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
On Thu, 2010-10-07 at 10:49 +0300, Pasi Kärkkäinen wrote:
that bug is already inconvenient for some people; if they have laptops
with bad lid switches it'd be much more inconvenient. The only active
display would be the external display they weren't actually using.
I read that bugzilla
On Thu, 2010-10-07 at 08:36 -0400, Brandon Lozza wrote:
What are you guys going to do if someone does it anyway in a country
where Redhat hasn't registered the Fedora trademark, or countries
where another country already owns the Fedora trademark. Do you think
spammers are going to host in
On Thu, 2010-10-07 at 11:07 -0400, James Laska wrote:
All of them. They're mostly modifications of existing pages. I'm not
quite sure how you get that they look the same, they're very different.
General note ... There are a few broken links on this page. I didn't
inspect *all* of them,
On Thu, 2010-10-07 at 13:40 +, Matej Cepl wrote:
Martin Sourada, Wed, 06 Oct 2010 22:39:00 +0200:
But I have my doubts about
mozilla in this regard, after all, proper support on linux does not seem
to be high priority for them
I just fell the urge to mention here
On Thu, Oct 07, 2010 at 10:17:11AM -0700, Adam Williamson wrote:
On Thu, 2010-10-07 at 10:49 +0300, Pasi Kärkkäinen wrote:
that bug is already inconvenient for some people; if they have laptops
with bad lid switches it'd be much more inconvenient. The only active
display would be the
Pasi Kärkkäinen píše v Čt 07. 10. 2010 v 22:29 +0300:
On Thu, Oct 07, 2010 at 10:17:11AM -0700, Adam Williamson wrote:
On Thu, 2010-10-07 at 10:49 +0300, Pasi Kärkkäinen wrote:
that bug is already inconvenient for some people; if they have laptops
with bad lid switches it'd be much
On Sat, Sep 25, 2010 at 01:03:13PM -0600, Kevin Fenzi wrote:
On Wed, 22 Sep 2010 22:21:33 +0200
Till Maas opensou...@till.name wrote:
Also can someone please explain the practical advantages of requiring
the autokarma threshold to approve the ability to push a non critical
path update to
On Tue, Oct 5, 2010 at 9:14 PM, Jesse Keating jkeat...@redhat.com wrote:
There was a change in glibc during the F14 development cycle that
requires running a newer kernel in order to run the f14 binaries.
You could probably cheat a new kernel onto F11 and then do the pungi
compose in a mock
On Thu, Oct 07, 2010 at 12:04:49 -0500,
Mike McGrath mmcgr...@redhat.com wrote:
We also decided to allow yubikeys as an authentication option for the
larger community to some hosts and services like fedorapeople.org or
https://admin.fedoraproject.org/community/. When asked for a password,
Folks,
On current rawhide (perhaps caused by upgrade from F14 beta), I'm
getting a few weirdly broken icons for notification applets. Those
applets then crash when moused over or clicked on with a SEGV that looks
to be caused by it not finding the correct icon (I did file an ABRT bug
last night
On Thu, 7 Oct 2010, Bruno Wolff III wrote:
On Thu, Oct 07, 2010 at 12:04:49 -0500,
Mike McGrath mmcgr...@redhat.com wrote:
We also decided to allow yubikeys as an authentication option for the
larger community to some hosts and services like fedorapeople.org or
On Thu, 7 Oct 2010, Mike McGrath wrote:
We also decided to allow yubikeys as an authentication option for the
larger community to some hosts and services like fedorapeople.org or
https://admin.fedoraproject.org/community/. When asked for a password,
just use your yubikey to generate a otp
On Thu, Oct 07, 2010 at 12:04:49PM -0500, Mike McGrath wrote:
Implementation work continues to be discussed and put in please but please
direct any questions or comments to #fedora-admin on irc.freenode.net or
the Infrastructure mailing list -
Hello, synchronicity! I was just looking at this
I'm not a security expert but I understood that the usual way to use
these keys was to have one server that the key authenticates with, and
further sites would be accessible through openID or similar - so the
authentication is always with one server.
Using the same device with mutliple servers is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 10/6/10 1:44 AM, Tim Waugh wrote:
On Tue, 2010-10-05 at 15:27 -0700, Jesse Keating wrote:
PPS I did not modify my bump script yet to attempt a commit to master
and merge to the f14 branch. In the interest of time, I took the easy
route and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 10/6/10 1:34 AM, Peter Robinson wrote:
What happens in a case where the packager is about to push a new
version, or there has been a rebuild since the 26th?
In this case my script will detect a new build in either
dist-f14-updates-candidate or
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 10/5/10 2:30 PM, Mamoru Tasaka wrote:
Well, how about creating dist-f14-for-chainbuild build target and allow
people to tag or untag build as/from that tag freely?
For example currently
On Thu, Oct 7, 2010 at 5:51 PM, Paul Wouters p...@xelerance.com wrote:
I have one and I've played with it in fedora. There is however an important
catch. The server and the yubikey share the same AES symmetric key. This means
that if the yubikey is used for multiple sites by one user, that user
On 10/7/2010 12:04, Mike McGrath wrote:
http://fedoraproject.org/wiki/Infrastruture/Yubikey
^^
Typo alert! ;)
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
On Thu, 7 Oct 2010, Mike McLean wrote:
I guess in a way it is like using the same password, but people might not be
thinking of that when they have a device on them that they use.
Wow, that's a serious weakness. Are we sure about this?
On Thu, 7 Oct 2010, Paul Wouters wrote:
On Thu, 7 Oct 2010, Mike McGrath wrote:
We also decided to allow yubikeys as an authentication option for the
larger community to some hosts and services like fedorapeople.org or
https://admin.fedoraproject.org/community/. When asked for a
On 2010-10-07 07:25:47 PM, Mike McLean wrote:
On Thu, Oct 7, 2010 at 5:51 PM, Paul Wouters p...@xelerance.com wrote:
I have one and I've played with it in fedora. There is however an important
catch. The server and the yubikey share the same AES symmetric key. This
means
that if the
On Thu, 7 Oct 2010, Ricky Zhou wrote:
On 2010-10-07 07:25:47 PM, Mike McLean wrote:
On Thu, Oct 7, 2010 at 5:51 PM, Paul Wouters p...@xelerance.com wrote:
I have one and I've played with it in fedora. There is however an
important
catch. The server and the yubikey share the same AES
On Thu, Oct 07, 2010 at 08:54:12PM -0400, Paul Wouters wrote:
I have one and I've played with it in fedora. There is however an important
catch. The server and the yubikey share the same AES symmetric key. This means
that if the yubikey is used for multiple sites by one user, that user is
On Thu, Oct 07, 2010 at 11:30:43PM -0400, Toshio Kuratomi wrote:
The newer yubikey hardware has provision for two AES keys but I'm not sure
how that works and whether it actually allows you to use separate keys with
separate servers. Someone will need to look into this.
Yes, separate keys --
Folks,
It would seem that systemd employs some kind of arbitrary timeout (30
seconds?) by default and will log operation timed out. Terminating if
things take longer than this time to start up. I would like to know how
to increase this timeout, or to (preferably) disable it entirely.
Certain
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
https://bugzilla.redhat.com/show_bug.cgi?id=640752
Petr Pisar ppi...@redhat.com changed:
What|Removed |Added
A file has been added to the lookaside cache for perl-Catalyst-Engine-Apache:
7a7241dadd7c0eb28ce10aeb90c9944e Catalyst-Engine-Apache-1.16.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
commit 8142ca35f9b8dec6c9971241ed0a427b16620888
Author: Iain Arnell iarn...@gmail.com
Date: Thu Oct 7 18:38:56 2010 +0200
update to 1.16
.gitignore |1 +
perl-Catalyst-Engine-Apache.spec | 37 -
sources
A file has been added to the lookaside cache for perl-Clipboard:
817e33acc9005b5f0da22bcca2827e7d Clipboard-0.11.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
commit 9facc87310f1ab7522c4f8788306b6a5296cce08
Author: Iain Arnell iarn...@gmail.com
Date: Thu Oct 7 18:45:52 2010 +0200
update to 0.11
.gitignore |1 +
perl-Clipboard.spec | 14 +-
sources |2 +-
3 files changed, 11 insertions(+), 6
The Fedora Infrastructure team is happy to announce support for the
hardware key authentication device, the yubikey. Users will be able to
use their own yubikeys to access some Fedora services, like
fedorapeople.org or some web services.
Why have we done this? The main purpose was to provide
48 matches
Mail list logo