Re: xz backdoor

2024-04-06 Thread Michael Shuler

On 4/5/24 10:30, Pierre-Elliott Bécue wrote:

Pierre-Elliott Bécue  wrote on 31/03/2024 at 14:31:37+0200:

Wookey  wrote on 31/03/2024 at 04:34:00+0200:


On 2024-03-30 20:52 +0100, Ansgar  wrote:

Yubikeys, Nitrokeys, GNUK, OpenPGP smartcards and similar devices.
Possibly also TPM modules in computers.

These can usually be used for both OpenPGP and SSH keys.


Slightly off-topic, but a couple of recent posts have given me the
same thought:

Can someone point to good docs on this?  I've had a yubikey for 3/4 of
a year now but have not yet worked out how I put my GPG key in it. (or
if it should be another key, or a subkey, or whatever). So I'm not
actually using it yet.

PEB also described what sounded like a very sensible way to manage
keys (using subkeys) in one of these threads but I don't know how to
do that myself.


I have started (and never finished) a blog article on how I use my
YubiKey and what config I put in it. I'll definitely try to get it out
before the end of next week. I'll probably extend it to mention the
creation of GPG subkeys etc.

I would also be happy if it helps my fellow DDs to try making an article
about some basic crypto concepts regarding PGP, RSA et al. But not in
the same piece I guess.


Hello,

For those interested in: I've published two articles:

  1. One on PGP subkeys https://pe.becue.phd/openpgp-subkeys
  2. One on the OpenPGP module of YubiKeys:
 https://pe.becue.phd/yubikey-workfow-openpgp

I'm happy to receive any kind of constructive feedback.



Thank you so much for working on these. I last-minute cobbled together a 
BOF on GPG Key Best Practices at Columbia in 2010, since the topic came 
up in another talk. I was blown away at how much I did not know, the 
complexity, as well as how many people crammed in that room - definitely 
there are interested people (I think Wookey was there, too?). I include 
myself in each of the things others mentioned, that I should have been 
doing since then, but just never got around to.. At least I now have a 
fist full of Yubikeys to play with, as we use them at work, so thanks 
for your work. I appreciate it, and I'm guessing there's a rather large, 
quiet group of people thinking the same.


Kind regards,
Michael



Re: Pimp your shell - Debian developer tips?

2020-06-04 Thread Michael Shuler

On 6/3/20 7:30 PM, Gunnar Wolf wrote:

Like Paul said in his reply, I also have a "bash monstrosity" as a
Bash prompt.


For many years, I have taken a different approach; use the default and 
add only a few minor changes. Each stable update, I use 
/etc/skel/.bashrc and edit/add in my little bits.


Other than uncommenting a few existing color & alias configs in the 
default file, I configure history to allow .bash_history grep from any 
open shell session, and keep a lot more:


# save every command, as opposed to only at the end of the session
export PROMPT_COMMAND='history -a'

# for setting history length see HISTSIZE and HISTFILESIZE in bash(1)
HISTSIZE=2
HISTFILESIZE=4


# Useful to know where we stand while using different version control systems
parse_git_branch() {
 # Yes, temporary, dirty, yada yada yada. Works for me™.
 # --exclude-standard does not exist on git <= 1.5
 git_opts='--exclude-standard'
 branch=`git branch 2> /dev/null | sed -e '/^[^*]/d' -e 's/* \(.*\)/\1/'`
 if [ ! -z "$branch" ]
 then
clean=`git status --porcelain`
if [ ! -z "$clean" ]
then
branch="${branch}*"
new=`git ls-files -o $git_opts|wc -l`
del=`git ls-files -d $git_opts|wc -l`
mod=$(( `git ls-files -m $git_opts|wc -l` - $del ))
if [ $mod != 0 ]; then branch="${branch}${mod}M"; fi
if [ $new != 0 ]; then branch="${branch}${new}N"; fi
if [ $del != 0 ]; then branch="${branch}${del}D"; fi

fi
 fi
 echo $branch
}


Gunnar's git branch foo is what really lead me to post my default 
.bashrc change strategy. I also depend on knowing branch name and repo 
status state and use this PS1 config:


# adapted from 
http://people.planetpostgresql.org/dfetter/index.php?/archives/53-Git-+-bash-win.html
# 
https://web.archive.org/web/2016101348/http://www.bramschoenmakers.nl/en/node/624

if [ -f /usr/bin/git ]; then
  export GIT_PS1_SHOWDIRTYSTATE=1
  PSGIT='\[\033[01;31m\]$(__git_ps1 "(%s)")\[\033[00m\]'
  PS1="$PSGIT$PS1"
fi

--
Kind regards,
Michael



Accepted ca-certificates 20190110 (source all) into unstable

2019-01-22 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 10 Jan 2019 19:31:31 -0600
Source: ca-certificates
Binary: ca-certificates ca-certificates-udeb
Architecture: source all
Version: 20190110
Distribution: unstable
Urgency: high
Maintainer: Michael Shuler 
Changed-By: Michael Shuler 
Description:
 ca-certificates - Common CA certificates
 ca-certificates-udeb - Common CA certificates - udeb (udeb)
Closes: 895473 895482 911303 916833
Changes:
 ca-certificates (20190110) unstable; urgency=high
 .
   * debian/control:
 Depend on openssl (>= 1.1.1).
 Set Standards-Version: 4.3.0.1.
 Set Build-Depends: debhelper-compat (= 12); drop d/compat
 Remove trailing whitespace from d/changelog.
   * debian/ca-certificates.postinst:
 Fix permissions on /usr/local/share/ca-certificates when using symlinks.
 Closes: #916833
   * sbin/update-ca-certificates:
 Remove orphan symlinks found in /etc/ssl/certs to prevent `openssl
 rehash` from exiting with an error. Closes: #895482, #895473
 This will also fix removal of user CA certificates from /usr/local without
 needing to run --fresh. Closes: #911303
   * mozilla/{certdata.txt,nssckbi.h}:
 Update Mozilla certificate authority bundle to version 2.28.
 The following certificate authorities were added (+):
 + "GlobalSign Root CA - R6"
 + "OISTE WISeKey Global Root GC CA"
 The following certificate authorities were removed (-):
 - "Certplus Root CA G1"
 - "Certplus Root CA G2"
 - "OpenTrust Root CA G1"
 - "OpenTrust Root CA G2"
 - "OpenTrust Root CA G3"
 - "TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5"
 - "Visa eCommerce Root"
Checksums-Sha1:
 9313a30f8c26430fdd1650aa356fa15fa1ba9522 1805 ca-certificates_20190110.dsc
 47d4584eae85fc905e4994766eb3930a8a84e2e1 243472 ca-certificates_20190110.tar.xz
 c1c6b7943359ef689dc1c9b602a4f60d5c536bee 116708 
ca-certificates-udeb_20190110_all.udeb
 282c2431137d6b5696dbea4c1b41ca57dbd1a09d 156920 
ca-certificates_20190110_all.deb
 e152d4fd58742bc255fb20050415212b8e8f136f 6138 
ca-certificates_20190110_amd64.buildinfo
Checksums-Sha256:
 bffbfe63a1ad2a07c6094502f05899c65edba93aefe58682f440e000fc65f6f0 1805 
ca-certificates_20190110.dsc
 ee4bf0f4c6398005f5b5ca4e0b87b82837ac5c3b0280a1cb3a63c47555c3a675 243472 
ca-certificates_20190110.tar.xz
 f83d4d141c8a08d4ac5a3beae67b5ec7d09190aa533a57a59513c1344b4ad2d9 116708 
ca-certificates-udeb_20190110_all.udeb
 f55f88c8cc8fe014fa931fa22eae763fb12771e2b2a04a07bba5e4fdf3a3da6c 156920 
ca-certificates_20190110_all.deb
 927ecb8a4c04b9228234bb603952b86e9502f2362ed2d0ffee9f6b9487d1df0e 6138 
ca-certificates_20190110_amd64.buildinfo
Files:
 e1b3a61d2ae8fd7bc833e9c4bcae5f13 1805 misc optional 
ca-certificates_20190110.dsc
 e91d3d9259127ba2dbb65fda58d73f31 243472 misc optional 
ca-certificates_20190110.tar.xz
 53420cffab0b76b848af0e348698f484 116708 debian-installer optional 
ca-certificates-udeb_20190110_all.udeb
 e19d56b1ec337f0841c8af944b509537 156920 misc optional 
ca-certificates_20190110_all.deb
 d45ce8387a59b51158659067db8115fb 6138 misc optional 
ca-certificates_20190110_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEERoyJeTtCmBnp12Ema+Zjx1o1yXUFAlxHxRMACgkQa+Zjx1o1
yXU/sQ/9GsnfPfSYeGlJDuc0o4UwPTbbKfn/mQkXWWec/OSdW0dpWP44krYax+b7
OuEGEnKsgNB6Cb+aEJbegg3eiGTTlmDs9SQK96tHQz6ETnX5kQQ1YJ0PA+Gk0R60
/YpUlShGDKxuMbRXTzH4fUdKdt+8QFMlsRu0rwBEI8hdVGMR3bJqxCELxd3QkMFh
ys3dMxS71v8UknIkccvpDyLjUWRK0M7LD40G74pPdu6xKm+kFqChzskMjUfWyVg3
dtCHZ/jeUutdqMFJ92BhVy6WBBrvC6W3fDNKNsG8dpxpFSt5LQMT80+bhPyUmOEx
TNVtckopR5u5E1Qu41gq9ZvFihjQ2zKmMAAdgOZIeH71Ugmml4Zkq0uFdlgQhMG1
lXjMt56EqkChRwTnySvTiIRjtbbNXSHKmTS8HFxl2qIw0t7fH1x00rvKDTlY7dw8
Ibl4hWKuYDp6WNLUJ+lrMWzjldoSDggJGc8p0JU/PVq9oR9IWThetGz4HHcOSQsk
rFE4neoIq1DvVo8Hwc+T2puyX5CY7hR8rVYKY0gAaDH7FYQfF6eW4sAFvglJU8Rw
B5wvtgUl8/X7scQ+oefnykgih7VjRne9fG2erbbc24Zja8KdBYHLDIJ/GqObbYif
3Ui+B+DMwX3ERHaRW3xF22l2eEnJbLqjwvkgozTahpzScOdii3k=
=RRTi
-END PGP SIGNATURE-



Accepted ifmetric 0.3-5 (source) into unstable

2019-01-13 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 10 Jan 2019 13:17:26 -0600
Source: ifmetric
Binary: ifmetric
Architecture: source
Version: 0.3-5
Distribution: unstable
Urgency: medium
Maintainer: Michael Shuler 
Changed-By: Michael Shuler 
Description:
 ifmetric   - Set routing metrics for a network interface
Closes: 864889
Changes:
 ifmetric (0.3-5) unstable; urgency=medium
 .
   * debian/{compat,control,copyright}:
 Update to debhelper-compat (= 12) build dependency; drop d/compat
 Update to standards version 4.3.0.1
 Update to salsa Vcs-Browser/Vcs-Git URLs
 Update to priority optional
 Update to https copyright format URL
   * Fix "NETLINK: Error: Invalid argument" for links that are down in kernel
 4.4+. Thanks for the patch, Jim Paris. Closes: #864889
Checksums-Sha1:
 8b8711c376d939a152af6d1fdf60a1e92e2d9b62 1854 ifmetric_0.3-5.dsc
 04a885345251bdb1b52566eb68fbb02d73c1eae9 3832 ifmetric_0.3-5.debian.tar.xz
 f8afe9fabce8d6dfc19f2ceb7e4af43e2c52bb90 5312 ifmetric_0.3-5_source.buildinfo
Checksums-Sha256:
 5b86ba9491e778fa38b6aa5358a5eeaac7241106becfaf66e6e1ea2cc13cafcb 1854 
ifmetric_0.3-5.dsc
 5aa7b4df05e88edfd3704e3255c588da0b74ab984b2abaca4d1a14c0a65aa4e7 3832 
ifmetric_0.3-5.debian.tar.xz
 988ffd5f84cf78fef09f1c6c1a8415cb016cf412031f3990e8901d7983cb543e 5312 
ifmetric_0.3-5_source.buildinfo
Files:
 4362dea084ddf854abbc091316c913d3 1854 net optional ifmetric_0.3-5.dsc
 aac573462ed53a9891229e61364562ec 3832 net optional ifmetric_0.3-5.debian.tar.xz
 c24a1d30fdb18fd6bd93c50bbfafb460 5312 net optional 
ifmetric_0.3-5_source.buildinfo

-BEGIN PGP SIGNATURE-
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=Q+pt
-END PGP SIGNATURE-



Accepted ca-certificates 20180409 (source all) into unstable

2018-04-10 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 09 Apr 2018 18:43:49 -0500
Source: ca-certificates
Binary: ca-certificates ca-certificates-udeb
Architecture: source all
Version: 20180409
Distribution: unstable
Urgency: medium
Maintainer: Michael Shuler <mich...@pbandjelly.org>
Changed-By: Michael Shuler <mich...@pbandjelly.org>
Description:
 ca-certificates - Common CA certificates
 ca-certificates-udeb - Common CA certificates - udeb (udeb)
Closes: 894070 895075
Changes:
 ca-certificates (20180409) unstable; urgency=medium
 .
   [ Michael Shuler ]
   * mozilla/{certdata.txt,nssckbi.h}:
 Update Mozilla certificate authority bundle to version 2.22.
 The following certificate authorities were added (+):
 + "GDCA TrustAUTH R5 ROOT"
 + "SSL.com EV Root Certification Authority ECC"
 + "SSL.com EV Root Certification Authority RSA R2"
 + "SSL.com Root Certification Authority ECC"
 + "SSL.com Root Certification Authority RSA"
 + "TrustCor ECA-1"
 + "TrustCor RootCert CA-1"
 + "TrustCor RootCert CA-2"
 The following certificate authorities were removed (-):
 - "ACEDICOM Root"
 - "AddTrust Low-Value Services Root"
 - "AddTrust Public Services Root"
 - "AddTrust Qualified Certificates Root"
 - "CA Disig Root R1"
 - "CNNIC ROOT"
 - "Camerfirma Chambers of Commerce Root"
 - "Camerfirma Global Chambersign Root"
 - "Certinomis - Autorité Racine"
 - "Certum Root CA"
 - "China Internet Network Information Center EV Certificates Root"
 - "Comodo Secure Services root"
 - "Comodo Trusted Services root"
 - "DST ACES CA X6"
 - "GeoTrust Global CA 2"
 - "PSCProcert"
 - "Security Communication EV RootCA1"
 - "Swisscom Root CA 1"
 - "Swisscom Root CA 2"
 - "Swisscom Root EV CA 2"
 - "TURKTRUST Certificate Services Provider Root 2007"
 - "TUBITAK UEKAE Kok Sertifika Hizmet Saglayicisi - Surum 3"
 - "UTN USERFirst Hardware Root CA"
   * mozilla/blacklist.txt
 Update blacklist to remove certificates no longer in certdata.txt and
 explicitly ignore distrusted certificates.
   * debian/copyright:
 Fix lintian insecure-copyright-format-uri with https URL.
   * debian/changelog:
 Fix lintian file-contains-trailing-whitespace.
   * debian/{compat,control}:
 Set to debhelper compat 11.
   * Update openssl dependency to >= 1.1.0 to support `openssl rehash` and drop
 usage of `c_rehash` script. Closes: #895075
 .
   [ Thijs Kinkhorst ]
   * Remove Christian Perrier from uploaders at his request (closes: #894070).
   * Checked for policy 4.1.4, no changes.
Checksums-Sha1:
 bfd2cbe5a401853d78bab82483a31499e7a26769 1420 ca-certificates_20180409.dsc
 edf0ec04b02fcbc90cc65906ff83fb042894a3b7 246908 ca-certificates_20180409.tar.xz
 4198a35fc6c0562a8b69011ec0f8972eedf63203 121132 
ca-certificates-udeb_20180409_all.udeb
 0e421ca28489d0e9bdd7dbb84eaed2777ba24d40 161152 
ca-certificates_20180409_all.deb
 ac18044bc5351b6b13f87164a33745e5d930b74d 5682 
ca-certificates_20180409_amd64.buildinfo
Checksums-Sha256:
 cd1f6540d0dab28f897e0e0cb2191130cdbf897f8ce3f52c8e483b2ed1555d30 1420 
ca-certificates_20180409.dsc
 7af6f5bfc619fd29cbf0258c1d95107c38ce840ad6274e343e1e0d971fc72b51 246908 
ca-certificates_20180409.tar.xz
 786bb8fcc980d05e0e64f8b162ef5a1c4ec5c24ad7d640eba9001b048df2aad3 121132 
ca-certificates-udeb_20180409_all.udeb
 5ed9c73e8c6057c0a8e8e7b7e955c68276a309c31f800239bf9ba0f7a3b5f80b 161152 
ca-certificates_20180409_all.deb
 69d98ba93e7f0412e010143d220334186b782642fbd883e65f8dc104c0340242 5682 
ca-certificates_20180409_amd64.buildinfo
Files:
 2129bcf6e3594d346cc20266c54436af 1420 misc optional 
ca-certificates_20180409.dsc
 8425f4b1219e4e528db2de764e4c6586 246908 misc optional 
ca-certificates_20180409.tar.xz
 8dfeb1d0e214e406fb8fd1f46f6e145b 121132 debian-installer optional 
ca-certificates-udeb_20180409_all.udeb
 1658e8d73dbc97ec83ee2cac18acbc45 161152 misc optional 
ca-certificates_20180409_all.deb
 4a4185ac3bb20f19e4483dd044942c23 5682 misc optional 
ca-certificates_20180409_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iQEcBAEBCAAGBQJazE0XAAoJEFb2GnlAHawE9NEH/jBc/pToWPasudVJy5F9LZOg
LfRSZJ/9CeNiqQi8G2gmxIBF/aKdGqC11vPsfcVKmxHVtUNv/CEkA5Mqu0NnYKWD
nhc/hUGLt7+siEMmZZ/DAwfnuoeYFn8sluXOftc0xVqRLYrKFoZPsNzl1OgGIObM
1ou6UR0WBBDj5obRlqXixaPqlGtwH7urQELdTdhEzGk1LrnwWPfWaD2u9xLwle18
TAfwoOgd9tKOu6RtBQO+oh7y/bcupw5quM3HWoP4XPjF/DJ4PVKg0/oGdS/6JuUY
Sf3zFUtd0Glfg1H1GKjsOkeKh6oH6CZRLfYai42Q+oHaiu64lyd/42pKZ+BX9uk=
=RUIW
-END PGP SIGNATURE-



Re: Planning the removal of c_rehash | mass bug filling

2018-04-09 Thread Michael Shuler
On 04/09/2018 05:34 PM, Sebastian Andrzej Siewior wrote:
> On 2018-04-09 15:55:14 [-0500], Michael Shuler wrote:
>> It was purely a conservative duplication of existing symlinks. I can
>> drop the old md5 symlinks, if there's a consensus that they are no
>> longer needed in unstable. 
> 
> Based on my research I think you can drop the old links since they were
> only required until everything was rebuilt and the symlinks were
> re-created during the 0.9.8 -> 1.0.0 transition. We are past that point
> now.
> 
>> I could also include -compat for both
>> symlinks, if this needs to go in a stable update, just to be sure we're
>> not making a breaking change for users in Stretch.
> 
> There is no need to push this stable. There is nothing wrong with it as
> far as I can tell.
> Upstream considers that script as legacy (and it not part of the
> testsuite) and I just wanted to make sure that we are ready to drop that
> script once upstream decides to remove it. Also not to be part of any
> further fallout.

Thanks for the help, Sebastian. I've dropped the -compat flag for the
next upload to unstable and won't worry about this for stable.

-- 
Kind regards,
Michael



Re: Planning the removal of c_rehash | mass bug filling

2018-04-09 Thread Michael Shuler
On 04/09/2018 03:21 PM, Sebastian Andrzej Siewior wrote:
> On 2018-04-06 10:05:35 [-0500], Michael Shuler wrote:
>> If you could go ahead and file this bug for ca-certificates, I'd like to
>> include the bug number in the changelog for this commit on the next
>> upload, which should be soon.
>>
>> https://salsa.debian.org/debian/ca-certificates/commit/1bc87e0b41a04551a93d4e784e158b044c18792a
> 
> out of sheer curiosity: do you intend to keep this -compat mode (old &
> new symlinks) or is it just a carefull first step to ensure that nothing
> breaks while the tool for the job is changed?

It was purely a conservative duplication of existing symlinks. I can
drop the old md5 symlinks, if there's a consensus that they are no
longer needed in unstable. I could also include -compat for both
symlinks, if this needs to go in a stable update, just to be sure we're
not making a breaking change for users in Stretch.

-- 
Kind regards,
Michael



Re: Planning the removal of c_rehash | mass bug filling

2018-04-06 Thread Michael Shuler
On 04/05/2018 05:22 PM, Sebastian Andrzej Siewior wrote:
> Hi,
> 
> the openssl package provides the c_rehash script which creates the links
> from .Y to the actual certificate in /etc/ssl/certs/. During the
> transition from 0.9.8 to 1.0.0 the hash (for the X part) changed from
> md5 to sha1. Since that transition in Debian the c_rehash script
> provides both symlinks: the old hash (md5) and the new (sha1) one. 
> 
> The c_rehash script is considered by upstream as a fallback script and
> will disappear at some point. The recommended way is to use the "openssl
> rehash" command instead which appeared in 1.1.0.  This command creates
> half that many symlinks (one per certificate instead of two) because it
> uses only the sha1 hash. There is also the -compat option which creates
> both symlinks (and behaves like c_rehash currently does) but as
> explained above it should not be required to use it.
> 
> I am planning to fill bugs against 23 packages which use "c_rehash" to
> use "openssl rehash" instead. Here is the dd-list of packages I
> identified:
<...>
> Michael Shuler <mich...@pbandjelly.org>
>ca-certificates

Thanks for the heads up!

If you could go ahead and file this bug for ca-certificates, I'd like to
include the bug number in the changelog for this commit on the next
upload, which should be soon.

https://salsa.debian.org/debian/ca-certificates/commit/1bc87e0b41a04551a93d4e784e158b044c18792a

-- 
Kind regards,
Michael



Accepted ca-certificates 20170717 (source all) into unstable

2017-08-14 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Thu, 20 Jul 2017 00:18:08 -0500
Source: ca-certificates
Binary: ca-certificates ca-certificates-udeb
Architecture: source all
Version: 20170717
Distribution: unstable
Urgency: medium
Maintainer: Michael Shuler <mich...@pbandjelly.org>
Changed-By: Michael Shuler <mich...@pbandjelly.org>
Description:
 ca-certificates - Common CA certificates
 ca-certificates-udeb - Common CA certificates - udeb (udeb)
Closes: 721976 843722 858064
Changes:
 ca-certificates (20170717) unstable; urgency=medium
 .
   * Update to Standards-Version: 4.0.1
   * debian/ca-certificates.postinst:
 Prevent postinst failure on read-only /usr/local. Closes: #843722
   * mozilla/certdata2pem.py:
 Remove email-only roots from mozilla trust store. Closes: #721976
   * mozilla/{certdata.txt,nssckbi.h}:
 Update Mozilla certificate authority bundle to version 2.14.
 Closes: #858064
 The following certificate authorities were added (+):
 + "AC RAIZ FNMT-RCM"
 + "Amazon Root CA 1"
 + "Amazon Root CA 2"
 + "Amazon Root CA 3"
 + "Amazon Root CA 4"
 + "D-TRUST Root CA 3 2013"
 + "LuxTrust Global Root 2"
 + "TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1"
 The following certificate authorities were removed (-):
 - "AC Raiz Certicamara S.A."
 - "ApplicationCA - Japanese Government"
 - "Buypass Class 2 CA 1"
 - "ComSign CA"
 - "EBG Elektronik Sertifika Hizmet Saglayicisi"
 - "Equifax Secure CA"
 - "Equifax Secure eBusiness CA 1"
 - "Equifax Secure Global eBusiness CA"
 - "IGC/A"
 - "Juur-SK"
 - "Microsec e-Szigno Root CA"
 - "Root CA Generalitat Valenciana"
 - "RSA Security 2048 v3"
 - "S-TRUST Authentication and Encryption Root CA 2005 PN"
 - "S-TRUST Universal Root CA"
 - "SwissSign Platinum CA - G2"
 - "TC TrustCenter Class 3 CA II"
 - "TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6"
 - "UTN USERFirst Email Root CA"
 - "Verisign Class 1 Public Primary Certification Authority"
 - "Verisign Class 1 Public Primary Certification Authority - G3"
 - "Verisign Class 2 Public Primary Certification Authority - G2"
 - "Verisign Class 2 Public Primary Certification Authority - G3"
 - "Verisign Class 3 Public Primary Certification Authority"
 - "WellsSecure Public Root Certificate Authority"
Checksums-Sha1:
 4762ba4221be4bd7f26db5fb7b0cf39c09f26072 1506 ca-certificates_20170717.dsc
 4c093ceee1f1428d5aa7e9a5324b92961c0c0f06 293028 ca-certificates_20170717.tar.xz
 4b11fbd1e7bbfbe141c2bb2ffaa4749cb0cda784 136820 
ca-certificates-udeb_20170717_all.udeb
 5b5b702688f44b85ac1dbc2c027723e9e591 177520 
ca-certificates_20170717_all.deb
 f1b20c74a0eac3d41572b06b25c9e02274967189 5479 
ca-certificates_20170717_amd64.buildinfo
Checksums-Sha256:
 da6268ff88e05c85c23c62add13d3d127087467d0c7e83974ca28db5543a252a 1506 
ca-certificates_20170717.dsc
 e487639b641fa75445174734dd6e9d600373e3248b3d86a7e3c6d0f6977decd2 293028 
ca-certificates_20170717.tar.xz
 c89bd92b2ee2b9b857b8122b2472acfc7799d2f33b2033d19c2f6234f89950f5 136820 
ca-certificates-udeb_20170717_all.udeb
 ec7fae9258e341f839daf31dececa01650cb69889f36f87804825aa19ce4d291 177520 
ca-certificates_20170717_all.deb
 315efbe3ae7645a83866d19e647205c0636a2037a7468eb69387c2f35094484f 5479 
ca-certificates_20170717_amd64.buildinfo
Files:
 505735d2a22fda7c44d0d1fba3a4f0b9 1506 misc optional 
ca-certificates_20170717.dsc
 55a6bb6b98afb16b3cde8e3ad1e262eb 293028 misc optional 
ca-certificates_20170717.tar.xz
 b8f8b88d829e5ce75d9b6cfc0f3ac19d 136820 debian-installer optional 
ca-certificates-udeb_20170717_all.udeb
 072bc2525247789bb62a78ee40a9d878 177520 misc optional 
ca-certificates_20170717_all.deb
 9073b884dd76050e3e45682ef8b0dd1a 5479 misc optional 
ca-certificates_20170717_amd64.buildinfo

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEbBAEBCAAGBQJZkcpnAAoJEFb2GnlAHawE9asH+OY8IWqgIcdgjetz3eZeNi2w
O6dLsHMrQ7fH3FHsD3GfkyTckxqFCrnqQ4U2wFdLTZbvSOjY4GVaUUC/lU3SqXIE
eYYVWF2wuTWb7QV/NzanwRDOh/SoaE9GFrsZK2jDIZ8ZwvsC4vV5Xa7oWmXSeQ2L
vy6PlQMXM7oJ7ccAPIom6MnfFuBt2Zrad9WFiPaE1diJFwzm+HTxLBHw0aAsPY/H
yFPcNUhzqwtWjs3i/GKN77yQ0/0C+KQjNE0MwYhYA2TmbvY0Oqj9iwqAL/neaJht
mlz1GXKbaKwimaudXkajAT6DZ9rHZEC8CSu2I3y/fbg6FHenlb9XGqGuJmnO2g==
=HsL2
-END PGP SIGNATURE-



Accepted ca-certificates 20161130 (source all) into unstable, unstable

2016-12-05 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Wed, 30 Nov 2016 21:20:53 -0600
Source: ca-certificates
Binary: ca-certificates ca-certificates-udeb
Architecture: source all
Version: 20161130
Distribution: unstable
Urgency: medium
Maintainer: Michael Shuler <mich...@pbandjelly.org>
Changed-By: Michael Shuler <mich...@pbandjelly.org>
Description:
 ca-certificates - Common CA certificates
 ca-certificates-udeb - Common CA certificates - udeb (udeb)
Closes: 845456
Changes:
 ca-certificates (20161130) unstable; urgency=medium
 .
   [ Philipp Kern ]
   * Add ca-certificates udeb package. Closes: #845456
 .
   [ Michael Shuler ]
   * debian/{compat,control}:
 Update to compat level 10 and debhelper (>= 10)
 Shorten package description.
   * debian/po/id.po
 Update Indonesian debconf translation file for build time line reorder
Checksums-Sha1:
 08fad7e79be13be6fd14b797665200c2a9df6b6a 1506 ca-certificates_20161130.dsc
 b190ca8849697e842e69401b28d4ee27130d8c4d 298656 ca-certificates_20161130.tar.xz
 7c8d3cacd83b489d4bdf313b693e30ff39c89bb2 158134 
ca-certificates-udeb_20161130_all.udeb
 e1aa21b4af603e73f36399a4e094a3901d7eb08b 202884 
ca-certificates_20161130_all.deb
 6f31f7756d26ffce7b5eaa98dd66e0f4e70d0116 5422 
ca-certificates_20161130_amd64.buildinfo
Checksums-Sha256:
 bbba50a4391b33d8f5c8db97e4f077d861ff9f95cc6a3f45ca43fc5be6536617 1506 
ca-certificates_20161130.dsc
 04bca9e142a90a834aca0311f7ced237368d71fee7bd5c9f68ef7f4611aee471 298656 
ca-certificates_20161130.tar.xz
 32eddac565668ade434cb2bdb5983944d30c5e6305bc392df1bd165a13c9f149 158134 
ca-certificates-udeb_20161130_all.udeb
 86334cbea59c84ccf91c296a412787cfc0374edb9e83ee69318c3647845ecdf9 202884 
ca-certificates_20161130_all.deb
 86c19ca6d40a929bb043906aa5de39337dacc2ba66085dec242432dfa910fbf3 5422 
ca-certificates_20161130_amd64.buildinfo
Files:
 d08ee3dc99a7c5cb0c6caafbae909b89 1506 misc optional 
ca-certificates_20161130.dsc
 1a0a3a1b3390dc83affed4b0c2ae1c05 298656 misc optional 
ca-certificates_20161130.tar.xz
 8fcc704fae7b212cd8adb6f6d602619a 158134 debian-installer optional 
ca-certificates-udeb_20161130_all.udeb
 903fd61bf44370efe92f463783e59a9a 202884 misc optional 
ca-certificates_20161130_all.deb
 b56e4da18e4fb8f2b4cf485b52e40fd3 5422 misc optional 
ca-certificates_20161130_amd64.buildinfo

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYQCP7AAoJEFb2GnlAHawEGT0H/A/ufiQsRWjy8geM04zHAwAA
kIxf3YvugXglE+mY4JQLc0d2giFVs2ZoAKZBErj/Ae7IjbwxpuKNJbCH73NlgKBC
MUz5jrOgIXchZUIjR1+x8KGlfKhtHM5ZnS6oy5g2z924Dsoc85rBI5Hwe/0hxq86
OtXRYf8Gug2enArscBj7kf4tX/nEGGufijo1pmtikqeNv1wxAPEGqZbL8m6ky1UL
RaeGhLR7e/lYvrhIOHQfYSsuJhYgU2xx0cx5eY0bU534iphX2/ivelOSdqXcDHo5
qN3jRvOmwJk/HcJUYfLh3Mzw7knJyV7/BeRI/Q5GqZMlXuzH6fB0Zq9IYs+5ZPI=
=E2cK
-END PGP SIGNATURE-



Accepted ifmetric 0.3-4 (source) into unstable

2016-11-04 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Thu, 03 Nov 2016 18:09:20 -0500
Source: ifmetric
Binary: ifmetric
Architecture: source
Version: 0.3-4
Distribution: unstable
Urgency: low
Maintainer: Michael Shuler <mich...@pbandjelly.org>
Changed-By: Michael Shuler <mich...@pbandjelly.org>
Description:
 ifmetric   - Set routing metrics for a network interface
Changes:
 ifmetric (0.3-4) unstable; urgency=low
 .
   * debian/control:
 Set Architecture: linux-any to exclude kfreebsd/hurd builds.
 Update to Standards-Version: 3.9.8.
 Update Vcs-Browser/Vcs-Git: https URLs.
   * debian/copyright:
 Drop recurrent license text for lintian.
   * debian/rules:
 Add hardening build flag for all options.
   * debian/patches/ifmetric.8_typo:
 Fix typo in man page.
Checksums-Sha1:
 b06161c6acdf5afc8d94b12ec0186eeb5730a961 1843 ifmetric_0.3-4.dsc
 2792b1cc6bf19662627d3f487e8802c45b864ec6 3560 ifmetric_0.3-4.debian.tar.xz
Checksums-Sha256:
 b5c000714295b9fda24522a7837cd8168461e6c196dd571bae37941ed9acf76d 1843 
ifmetric_0.3-4.dsc
 86910629739f0f89f1325298aee7b610ceed95373c8f63a53979b791ed6fa392 3560 
ifmetric_0.3-4.debian.tar.xz
Files:
 d4ecfb35b2e91aafbc9cde5db33512fe 1843 net extra ifmetric_0.3-4.dsc
 7fcfe580911bdffba1630ce0bd15980d 3560 net extra ifmetric_0.3-4.debian.tar.xz

-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=JO+B
-END PGP SIGNATURE-



Accepted ca-certificates 20161102 (source all) into unstable

2016-11-03 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Wed, 02 Nov 2016 21:15:03 -0500
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20161102
Distribution: unstable
Urgency: medium
Maintainer: Michael Shuler <mich...@pbandjelly.org>
Changed-By: Michael Shuler <mich...@pbandjelly.org>
Description:
 ca-certificates - Common CA certificates
Closes: 825730 828845 835156
Changes:
 ca-certificates (20161102) unstable; urgency=medium
 .
   [ Michael Shuler ]
   * debian/control:
 Update to Standards-Version: 3.9.8
 Update to Vcs-Browser/Vcs-Git: https URLs
   * mozilla/{certdata.txt,nssckbi.h}:
 Update Mozilla certificate authority bundle to version 2.9.
 Thanks for the initial 2.7 patch, Jonathan Wiltshire. Closes: #828845
 The following certificate authorities were added (+):
 + "Certplus Root CA G1"
 + "Certplus Root CA G2"
 + "Certum Trusted Network CA 2"
 + "Hellenic Academic and Research Institutions ECC RootCA 2015"
 + "Hellenic Academic and Research Institutions RootCA 2015"
 + "ISRG Root X1"
 + "OpenTrust Root CA G1"
 + "OpenTrust Root CA G2"
 + "OpenTrust Root CA G3"
 + "SZAFIR ROOT CA2"
 The following certificate authorities were removed (-):
 - "CA Disig"
 - "NetLock Business (Class B) Root"
 - "NetLock Express (Class C) Root"
 - "NetLock Notary (Class A) Root"
 - "NetLock Qualified (Class QA) Root"
 - "Sonera Class 1 Root CA"
 - "Staat der Nederlanden Root CA"
 - "Verisign Class 1 Public Primary Certification Authority - G2"
 - "Verisign Class 3 Public Primary Certification Authority"
 - "Verisign Class 3 Public Primary Certification Authority - G2"
 .
[ Andreas Beckmann ]
* debian/postinst:
  Run update-certificates without hooks to initially populate
  /etc/ssl/certs.  (The hooks are deferred to the noawait trigger.)
  Closes: #825730
 .
 [ Izharul Haq ]
 * debian/po/id.po:
   Add Indonesian debconf translation. Thank you, Izharul! Closes: #835156
Checksums-Sha1:
 321020b8f5bbdab5092f9352fd1e0c04c34f127b 1412 ca-certificates_20161102.dsc
 850e32c5173cee7f46c9ebb239d2300f5e6542de 298544 ca-certificates_20161102.tar.xz
 e52e803a9c15741b6064fba7f735e7e3db184cf6 202788 
ca-certificates_20161102_all.deb
Checksums-Sha256:
 b50d77748b48207876d7dff9ebd6dddeaa334318a8a6e53ce90cc963fa95c457 1412 
ca-certificates_20161102.dsc
 25384a67e2f1e76495ceeb00abfdbe831033780324128cb1587d09132dd173a5 298544 
ca-certificates_20161102.tar.xz
 8d267d22b75589a9bda6b6620205ea5fbe5b5ceaa4c9888c7d98dd6ce3ee72ff 202788 
ca-certificates_20161102_all.deb
Files:
 eb4306b7c2d6abd606903428f0cf898d 1412 misc optional 
ca-certificates_20161102.dsc
 74642bd9b9e0a449fa55e6632070745f 298544 misc optional 
ca-certificates_20161102.tar.xz
 5f26fc332ef3c588814c21bf4766ffa1 202788 misc optional 
ca-certificates_20161102_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJYGuq3AAoJEFb2GnlAHawEtAMH/R1U8UpqYXdvc7vy5/wacYfI
kS0LqIXhxsD8fu1q5uCRFwjlapKOT1UQY4EOvcxuDxZ8dge7irCmMw0ai9c39iX2
svOXwNXZQrECytSbUEp4d6pR/502DJlzKlczQKSUML+zv2juS4ZmFzmeVcqDxGIC
MjM3HV6UdwfqZhycxxfI4A9QpoFZgcq+glFSE9+IwMrKb6LqbKEwl+Gd3H90ppwX
G8x0HC9nEf/N05Or/tC3H7adyTVETZ2uKyW9EdbuDB1M9JPFIy7/SmWFPtv4mNNg
YWkjFaj96SHprdgVTpdUnoHDAeCAl6aDa4SCbKMh+jxrRgrCTU4RkM4i0iwOMTg=
=iFx2
-END PGP SIGNATURE-



Accepted ca-certificates 20160104 (source all) into unstable

2016-01-04 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 04 Jan 2016 11:08:26 -0600
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20160104
Distribution: unstable
Urgency: medium
Maintainer: Michael Shuler <mich...@pbandjelly.org>
Changed-By: Michael Shuler <mich...@pbandjelly.org>
Description:
 ca-certificates - Common CA certificates
Closes: 808711
Changes:
 ca-certificates (20160104) unstable; urgency=medium
 .
   * debian/rules:
 Sort certificate list for reproducible builds.  Closes: #808711
   * mozilla/certdata2pem.py:
 Drop old CK*_NETSCAPE trust flag checks
Checksums-Sha1:
 26e09276d3f42a110286054616560a6f19a3f1bd 1405 ca-certificates_20160104.dsc
 4525a194736c6691dbd59fa87281b722837b4768 293632 ca-certificates_20160104.tar.xz
 a02737cc818f63f7f4c8272ef1ab97abcd241644 199582 
ca-certificates_20160104_all.deb
Checksums-Sha256:
 2225db22cec974a89121390db30cbdd7dc1198f6f17fb508d9ef6d435984ae49 1405 
ca-certificates_20160104.dsc
 09eb770122e23260316120c0cbbddc8a1d33e7147210ce44e146084d5d5abcdd 293632 
ca-certificates_20160104.tar.xz
 ff3524b274038b53e2129c1cbc96b5078511e9214c5b3a2d5f5ea3dc59ca3abd 199582 
ca-certificates_20160104_all.deb
Files:
 4730883e571b3d76929bd4c6494be66a 1405 misc optional 
ca-certificates_20160104.dsc
 d9665a83d0d3ef8176a38e6aa20458e9 293632 misc optional 
ca-certificates_20160104.tar.xz
 742739143fe51b12fd60a9dd3e688dc0 199582 misc optional 
ca-certificates_20160104_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJWiq0YAAoJEFb2GnlAHawEE2AH/3+XdbzS3AkP5QbE2vgUXsyK
/TCVMPsxHq+LlIgml7ap4GWErlR1PVDu+YE4HhJrmC+ZZaJYTnxs4tJalkZJ5UV7
ZWn0XM8BA4bIO3XvES0vJQjSCSkF0HuB3Hd7wRd9qr/+5NRDGqK1TCBW5JhpZlsi
1jDQKevQ8jLOwQFXGm6GlJKb5QZTc1smcQQ1XWySPV13RApDyugt5fUPU+WoLDd4
rfkgt96jHKAKFlFgeglsGdcnE3f+0cp0MNp+m5hnI9GEVg1FDHWcMfSQu6iVf4yH
IECcA6Rt7RxRlh428vZWBZ3fn0lsEdIQFBMOHB3uuoG5qup7AdshAzAFy/p/j+I=
=hFsr
-END PGP SIGNATURE-



Accepted ca-certificates 20151214 (source all) into unstable

2015-12-20 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 14 Dec 2015 18:51:50 -0600
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20151214
Distribution: unstable
Urgency: medium
Maintainer: Michael Shuler <mich...@pbandjelly.org>
Changed-By: Michael Shuler <mich...@pbandjelly.org>
Description:
 ca-certificates - Common CA certificates
Closes: 611501 783615 789753 796208
Changes:
 ca-certificates (20151214) unstable; urgency=medium
 .
   * Removed SPI CA.  Closes: #796208
   * debian/{compat,control}:
 Updated d/compat to version 9 and updated Build-Depends.
   * debian/postinst:
 Handle /usr/local/share/ca-certificates permissions and ownership on
 upgrade.  Closes: #611501
   * mozilla/certdata2pem.py:
 Add Python 3 support to ca-certificates.
 Thanks to Andrew Wilcox and Richard Ipsum for the patch!  Closes: #789753
   * sbin/update-ca-certificates:
 Update local certificates directory when calling --fresh.
 Thanks for the patch, Daniel Lutz!  Closes: #783615
   * mozilla/{certdata.txt,nssckbi.h}:
 Update Mozilla certificate authority bundle to version 2.6.
 The following certificate authorities were added (+):
 + "CA WoSign ECC Root"
 + "Certification Authority of WoSign G2"
 + "Certinomis - Root CA"
 + "OISTE WISeKey Global Root GB CA"
 + "TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5"
 + "TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6"
 The following certificate authorities were removed (-):
 - "A-Trust-nQual-03"
 - "Buypass Class 3 CA 1"
 - "ComSign Secured CA"
 - "Digital Signature Trust Co. Global CA 1"
 - "Digital Signature Trust Co. Global CA 3"
 - "SG TRUST SERVICES RACINE"
 - "TC TrustCenter Class 2 CA II"
 - "TC TrustCenter Universal CA I"
 - "TURKTRUST Certificate Services Provider Root 1"
 - "TURKTRUST Certificate Services Provider Root 2"
 - "UTN DATACorp SGC Root CA"
 - "Verisign Class 4 Public Primary Certification Authority - G3"
Checksums-Sha1:
 12ebddaa1aae04c9309c71671247a8079e5f9bf5 1405 ca-certificates_20151214.dsc
 c993a9a44cf2bf2d7282699fd0415f2b5d52fa00 293672 ca-certificates_20151214.tar.xz
 6c60f8af11fb8a4378092f40d1b1083f3e95adbb 199574 
ca-certificates_20151214_all.deb
Checksums-Sha256:
 07f110fc0d0691ec8c127b052f0ebee65e9f32684868b12735b9d57a7cd9d90f 1405 
ca-certificates_20151214.dsc
 59286e6403f482a24c672e09b810c7d089a73153d4772ff4a66e86053a920525 293672 
ca-certificates_20151214.tar.xz
 6b84bef92f6f76f96502326437ed5987bd6d852ce025513f6d26655e14910b10 199574 
ca-certificates_20151214_all.deb
Files:
 edef46f1bb2d172075ea93b85bf62ded 1405 misc optional 
ca-certificates_20151214.dsc
 2233bfa64af6f58f5eca9735b6742818 293672 misc optional 
ca-certificates_20151214.tar.xz
 3ad959fc9ea29346d10667a83b1a563f 199574 misc optional 
ca-certificates_20151214_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJWdnqjAAoJEFb2GnlAHawEnaEH/jLKQINK+cqeHt8vCFI6p65Y
NsJ8lxRQxU6OtRTAuU1ZfeDzPCB8JX73SpAcoQUpf4RVaFei/trUONSIE948wKfB
gZTHOz+PgOckBLzvnTcri8vcOyt3a9Z2b6Ykxmh40WHihI9ibb1hDo+15+HFuGhV
+qUk1yTmfSF0UXtkLQFbV+niWXfphGLKcMGlVgRNsKbiG+tYu1P2d56SzwWY2yjp
uqyK9B2jfAYSSyd5vpLjFTiVvyjo2R2QjnO5tcNco2VGzPshA/eBH1DurEEb+DcD
qSB3oK3X2nFuALV/Js6yu1ik/SkK+M1Zdn/hDhdDv6KR5m68uOfA2BDjYwwR8Cw=
=iZAZ
-END PGP SIGNATURE-



Accepted ca-certificates 20150426 (source all) into unstable

2015-05-28 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sun, 26 Apr 2015 10:37:48 -0500
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20150426
Distribution: unstable
Urgency: medium
Maintainer: Michael Shuler mich...@pbandjelly.org
Changed-By: Michael Shuler mich...@pbandjelly.org
Description:
 ca-certificates - Common CA certificates
Closes: 611501 762709 774059 774201 782230
Changes:
 ca-certificates (20150426) unstable; urgency=medium
 .
   * debian/postinst:
 Set mode and group of /usr/local/share/ca-certificates based on current
 /usr/local permissions and ownership.  Closes: #611501
   * sbin/update-ca-certificates:
 Allow customisation of the paths used by update-ca-certificates.
 Add an option to set the certs in a directory to the defaults.
 Thanks for the patches, Paul Wise.  Closes: #774059, #774201
 Fix shellcheck warnings and a little indentation.
   * sbin/update-ca-certificates.8:
 Correct concatenated file name in man page from certificates.crt to
 ca-certificates.crt.  Closes: #782230
   * mozilla/{certdata.txt,nssckbi.h}:
 Update Mozilla certificate authority bundle to version 2.4.
 The following certificate authorities were added (+):
 + CFCA EV ROOT
 + COMODO RSA Certification Authority
 + Entrust Root Certification Authority - EC1
 + Entrust Root Certification Authority - G2
 + GlobalSign ECC Root CA - R4
 + GlobalSign ECC Root CA - R5
 + IdenTrust Commercial Root CA 1
 + IdenTrust Public Sector Root CA 1
 + S-TRUST Universal Root CA
 + Staat der Nederlanden EV Root CA
 + Staat der Nederlanden Root CA - G3
 + USERTrust ECC Certification Authority
 + USERTrust RSA Certification Authority  Closes: #762709
 The following certificate authorities were removed (-):
 - America Online Root Certification Authority 1
 - America Online Root Certification Authority 2
 - E-Guven Kok Elektronik Sertifika Hizmet Saglayicisi
 - GTE CyberTrust Global Root
 - Thawte Premium Server CA
 - Thawte Server CA
Checksums-Sha1:
 6a7a53d697bf196679ba04a294b42375d9da3621 1405 ca-certificates_20150426.dsc
 c2d7ae81e28ff1f8a6b9ef7602c4e756ff08503c 303256 ca-certificates_20150426.tar.xz
 6078a86f83bc7b776e0f5b2514b52a0da077e220 207866 
ca-certificates_20150426_all.deb
Checksums-Sha256:
 f0e00056fe1a60136a2c191aa6b4aba729d879bcb7096a610b9e00588962f0ef 1405 
ca-certificates_20150426.dsc
 37dbaa93ed64cc4ae93ac295f9248fbc741bd51376438cfb1257f17efab5494f 303256 
ca-certificates_20150426.tar.xz
 ca06d436c3e1acc64a47a2f394e6963cb9dd8a07a8b75722bfeae5343c4dcdfb 207866 
ca-certificates_20150426_all.deb
Files:
 131d07a7a9ddf2a40819c1942d8416a5 1405 misc optional 
ca-certificates_20150426.dsc
 717455f13fb31fd014a11a468ea3895d 303256 misc optional 
ca-certificates_20150426.tar.xz
 d07b23fd4afdfc869dd7f5944581b197 207866 misc optional 
ca-certificates_20150426_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJVZz4ZAAoJEFb2GnlAHawEVDcIAJ6whHn4qO4IrQ3BGhvYyP8l
G4Yvl2wqZvmBJcKtny4erC7eU8JHnKCVKXniKjV0OghMnWnHenAoeJkJFQzZtouj
hTvckNHdFVJTOI868Wg5MbPbSV5owOoeueUeXnDmXbL0qZzlivREdi5lKuAnXgmN
oq60O3QTss1EvEu48KIMt5bSr2vl6LAixIQch4rNIZ5DhXb7bUtpxiXe415zSMbG
W2LX+hN6cXGpQ0LFvLj7dMnvQT1DsoKT0KGefFxzX+w7mBAzVBBcPvo610P0j48u
IN8KacnNt7CCvS9D8jmKYzkBKpY0x3JyaQWDnzQyEfPySDhswU7koKH7u6/cIgM=
=Pk3U
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1yy0xe-00022x...@franck.debian.org



Re: [Bug-wget] certificate revocation lists (CRLs) #43501

2014-11-05 Thread Michael Shuler

On 11/05/2014 06:51 AM, Noël Köthe wrote:

Hello Debian,;)

wget developers are working on CRL support and raised the following
questions which somebody of you guys have a better answer:

Am Mittwoch, den 05.11.2014, 12:48 +0100 schrieb Tim Ruehsen:


BTW, does Debian meanwhile has a CRL infrastructure (something like
/etc/ssl/certs/) or is planning something like it ?


I'm aware of fetch-crl
https://packages.debian.org/unstable/main/fetch-crl but maybe there is
more anything planed like CRL support for the ca-certificates package?


Patches welcomed!  :)

--
Kind regards
Michael


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/545a5108.1070...@pbandjelly.org



Accepted ca-certificates 20141019 (source all) into unstable

2014-10-20 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sun, 19 Oct 2014 10:36:49 -0500
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20141019
Distribution: unstable
Urgency: medium
Maintainer: Michael Shuler mich...@pbandjelly.org
Changed-By: Michael Shuler mich...@pbandjelly.org
Description:
 ca-certificates - Common CA certificates
Closes: 742663 742957
Changes:
 ca-certificates (20141019) unstable; urgency=medium
 .
   * debian/copyright:
 Add coverage for all files reported by lintian
 file-without-copyright-information warning.
   * debian/source/lintian-overrides:
 Add file-without-copyright-information override for SPI certificate file.
   * sbin/update-ca-certificates:
 Restore SELinux label after generating ca-certificates.crt file.
 Thanks to Laurent Bigonville for the patch.  Closes: #742957
 Tidy indentation whitespace.
 Thanks to Antonio Terceiro for the patch.  Closes: #742663
   * debian/control:
 Update to Standards-Version: 3.9.6 (no other changes needed).
 Update Vcs-Browser link to cgit URL.
Checksums-Sha1:
 520a2dff5f5b6aa358bf20adb2a445cf5ed70406 1403 ca-certificates_20141019.dsc
 6013ce6a3bf13e73a7e1feddcd17f5b2c09e5bd3 289092 ca-certificates_20141019.tar.xz
 1be1d5b484edffab569d0f52727acc9058952bfb 199724 
ca-certificates_20141019_all.deb
Checksums-Sha256:
 14edb4083d9edbae6fdfa11c7cd926202d51dfeb483d19ac7551f09fbbe3b57b 1403 
ca-certificates_20141019.dsc
 684902d3f4e9ad27829f4af0d9d2d588afed03667997579b9c2be86fcd1eb73a 289092 
ca-certificates_20141019.tar.xz
 9c6b7eb8af976bcb3449fd6283a780093e7eae7a1e3396354a2f1a29f30943e8 199724 
ca-certificates_20141019_all.deb
Files:
 22d9a40a805e7909c25311dd3bd978b9 1403 misc optional 
ca-certificates_20141019.dsc
 f619282081c8bfc65ea64c37fa5285ed 289092 misc optional 
ca-certificates_20141019.tar.xz
 cbac2b1e7259c11571ad4393ee84a190 199724 misc optional 
ca-certificates_20141019_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJURLCAAAoJEFb2GnlAHawEK7oH/04qV8nF7/jvpkqCFpUj0xm/
obquBcCoV4B3piLBSojycozjmtfzfimNFfxoVT9aerer+7DyFJQxCLDTTWVH3Cbm
HvqbQtTuSzWecj6SRzqnbVPFyyGnfEMeWuR0b4Vuap62c9VzxASM7CFHYL1RSMjf
OdoSrVqSCoTNx+voJ+G7Cn6edTMhjsEvzAGX8XEW8CkgQ4ydAS976IkGP336FVej
sFsVFjgw9l6VlqL09NAfFKdC/nXs5GnDKMGqXdpCR4E+5AgbbXbqkFB2vnANic2i
JsJnX5j/mcuVYpTje5Uw/zXAkz617/NYynGa8GfSh9HxqJsXM09MnSoT2roMtUQ=
=F/kk
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1xg70l-00022j...@franck.debian.org



Accepted ca-certificates 20140927 (source all) into unstable

2014-10-06 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sat, 27 Sep 2014 15:14:00 -0500
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20140927
Distribution: unstable
Urgency: medium
Maintainer: Michael Shuler mich...@pbandjelly.org
Changed-By: Michael Shuler mich...@pbandjelly.org
Description:
 ca-certificates - Common CA certificates
Closes: 743365
Changes:
 ca-certificates (20140927) unstable; urgency=medium
 .
   * Update Mozilla certificate authority bundle to version 2.1.
 The following certificate authorities were added (+):
 + DigiCert Assured ID Root G2
 + DigiCert Assured ID Root G3
 + DigiCert Global Root G2
 + DigiCert Global Root G3
 + DigiCert Trusted Root G4
 + QuoVadis Root CA 1 G3
 + QuoVadis Root CA 2 G3
 + QuoVadis Root CA 3 G3
 + WoSign
 + WoSign China
 The following certificate authorities were removed (-):
 - Entrust.net Secure Server CA
 - RSA Root Certificate 1
 - TDC Internet Root CA
 - ValiCert Class 1 VA
 - ValiCert Class 2 VA
   * Include clear list of CAs added/removed, as above, and include better note
 in README.Debian for trust reconfiguration.  Closes: #743365
   * Remove debian/config in debian/rules clean target.
   * Include d/{changelog,NEWS} entries in 20140223 for duplicate CKA_LABEL
 rename of StartCom Certification Authority_2.
Checksums-Sha1:
 77ec70a4cfb7b32f8615e536ce9a372dcb4c4b09 1408 ca-certificates_20140927.dsc
 6f7f4360b8298ebd3ba9fbc8ae7805edd7e81941 288824 ca-certificates_20140927.tar.xz
 e9ed917c2312087ee4c99140594306978163b31a 199404 
ca-certificates_20140927_all.deb
Checksums-Sha256:
 6074f27e2209b3bb1af3f42aa214e990c2917dee2af9e567f5a08bcd5ce77f23 1408 
ca-certificates_20140927.dsc
 e582724ebb9d5d6fe02d02db1773c9ca76d3aaab4b15375a0d72e9abf88a65c5 288824 
ca-certificates_20140927.tar.xz
 ee85f4f512b4c97ffde72df539f6cb548f4ca71a8d8275c7706c49df42722ae9 199404 
ca-certificates_20140927_all.deb
Files:
 8880f1073c6a4cb7a78f6ad9cb16c48f 1408 misc optional 
ca-certificates_20140927.dsc
 743b90a08e08f6638d51cc6fdf2f773a 288824 misc optional 
ca-certificates_20140927.tar.xz
 1ed84ced6fae3833e369343f24454be5 199404 misc optional 
ca-certificates_20140927_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJUMrwAAAoJEFb2GnlAHawEdnoH/idrEmyEwA8vhLq8Y1t+2xV3
GoQ9zuzsyrr1QX7uIXrrvwV5hU2vpj9PPfVsUCu2sorI3LPg/5NsjGpL71c+9DTR
sV4Ps6PjCxcUfpeiDV9uiFqCkQ9qoisWiVTqcHGYFbURKsa6zpTkwhjSE52xS4zt
2a17LgFRJyyVvBfrnzJ6Pagjdp0j1Ss9DlSCe/LSrcGRtLgj6M/+Vv+UW8ioYqTw
nFFu+hfY5LWKNMoICgYLGIPWEJisxZawnJ8JpArZjKrq7KtX0ZUrAaixGGDIhsyV
lM9B2nFKXO19f7yHreHksbBaGF4x+HuJY4oFXFj/RjsYTG6ogqYRMzYBItGj9bo=
=4pwO
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1xbb0y-0008ch...@franck.debian.org



Re: ca-certificates: no more cacert.org certificates?!?

2014-04-02 Thread Michael Shuler

On 04/02/2014 04:43 AM, Bas van den Dikkenberg wrote:

The only things states in RDL that user has to be informed about the copyright


I find this, perhaps, the most interesting and on-topic comment in this 
thread.


--
Kind regards,
Michael


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/533c81d5.3060...@pbandjelly.org



Accepted ca-certificates 20140325 (source all)

2014-03-26 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 25 Mar 2014 13:28:19 -0500
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20140325
Distribution: unstable
Urgency: medium
Maintainer: Michael Shuler mich...@pbandjelly.org
Changed-By: Michael Shuler mich...@pbandjelly.org
Description: 
 ca-certificates - Common CA certificates
Changes: 
 ca-certificates (20140325) unstable; urgency=medium
 .
   * Update mozilla/certdata.txt to version 1.97+revert_of_936304
 Mozilla reverted the removal of 1024-bit root certificates for
 Entrust.net, GTE CyberTrust, and ValiCert (RSA), but did not update the
 version number in nssckbi.h.
 Certificates added (+) (none removed):
 + Entrust.net Secure Server CA
 + GTE CyberTrust Global Root
 + RSA Root Certificate 1
 + ValiCert Class 1 VA
 + ValiCert Class 2 VA
Checksums-Sha1: 
 65f279ffcbf05c5a0b046871980679cc0f3b2cc8 1420 ca-certificates_20140325.dsc
 36818098ba0a43486384853a73a22bd9c8c99cfd 278816 ca-certificates_20140325.tar.xz
 a2ad6f89a44cb95ccca9c3deae12bf19be83a0d4 192798 
ca-certificates_20140325_all.deb
Checksums-Sha256: 
 df77748cf40399ec6039cd76066cf2709cc9f76d95fb3326f22d4f9c73a9be45 1420 
ca-certificates_20140325.dsc
 c0e3d8c517995db2737f7f1a9b69d654b8823fa6d337871c6ce111fcf083454a 278816 
ca-certificates_20140325.tar.xz
 0bdef2a449ecac917c7f94cffa7dc0d985a650c8319d6c6032efc3393cd2dd14 192798 
ca-certificates_20140325_all.deb
Files: 
 9d0f8d1f89a77c8f48c58f2958293b94 1420 misc optional 
ca-certificates_20140325.dsc
 0436aba482091da310bd762e1deca8b4 278816 misc optional 
ca-certificates_20140325.tar.xz
 c83be2f26735431c4bb397b393e04e33 192798 misc optional 
ca-certificates_20140325_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJTMtU+AAoJEFb2GnlAHawEpogH/jt27okEmKSbXt+Lnl3LaKiA
cSV81eIcgmkuEC4gR6UL3ecrjnEwAOTuBhCAzFkIAsHgx5UZJg2uzpQUklcCn4Xp
Xg399/DuTRSwJveoEQyr7nW6JGgsx58encNGNfD66sUUgiot523I/Ms3fyssPxy6
5LORVFkYVf0fTt875hOBp75qB4oXe2CwJ2ZC6MWYjecZJClDWunYFyFrzyj39jyu
qJVa8Aj7Xo7Nmzpyf7efMzGqJAt/ApMGNJ7nGBV+1oH6c4gF7JzKiBXPZQwOcLVT
hAYYXfEMXacZWDId823yS9Hb9kA9bAwaFtoPqb0P6JDJiuxvZx41W7AExWPqGVg=
=cHc1
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1wsnxr-ec...@franck.debian.org



Accepted ca-certificates 20140223 (source all)

2014-03-13 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sun, 23 Feb 2014 23:22:29 -0600
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20140223
Distribution: unstable
Urgency: medium
Maintainer: Michael Shuler mich...@pbandjelly.org
Changed-By: Michael Shuler mich...@pbandjelly.org
Description: 
 ca-certificates - Common CA certificates
Closes: 635570 683403 718434 727136
Changes: 
 ca-certificates (20140223) unstable; urgency=medium
 .
   * No longer ship cacert.org certificates.  Closes: #718434, LP: #1258286
   * Fix certdata2pem.py for multiple CAs using the same CKA_LABEL.  Thanks
 to Marc Deslauriers for the patch.  Closes: #683403, LP: #1031333
   * Sort local CA certificates on update-ca-certificates runs.  Thanks to
 Vaclav Ovsik for the suggestion and patch.  Closes: #727136
   * Add trailing newline to certificate, if it is missing.  Closes: #635570
   * Update mozilla/certdata.txt to version 1.97.
 Certificates added (+), removed (-), and renamed (~):
 + ACCVRAIZ1
 + Atos TrustedRoot 2011
 + E-Tugra Certification Authority
 + SG TRUST SERVICES RACINE
 + T-TeleSec GlobalRoot Class 2
 + TWCA Global Root CA
 + TeliaSonera Root CA v1
 + Verisign Class 3 Public Primary Certification Authority
 ~ Verisign Class 3 Public Primary Certification Authority_2
   (both Verisign Class 3 CAs now included with duplicate CKA_LABEL fix)
 - Entrust.net Secure Server CA
 - Firmaprofesional Root CA
 - GTE CyberTrust Global Root
 - RSA Root Certificate 1
 - TDC OCES Root CA
 - ValiCert Class 1 VA
 - ValiCert Class 2 VA
 - Wells Fargo Root CA
Checksums-Sha1: 
 5c16595be2d53faae390f91d8e46b292f100b2b8 1420 ca-certificates_20140223.dsc
 ad57a45f0422fafd78a2e8191e5204f2306cc91b 274768 ca-certificates_20140223.tar.xz
 be6a0d32c76ae4adaafc04aefb56bb00b5cc72ed 190226 
ca-certificates_20140223_all.deb
Checksums-Sha256: 
 d3be3f9ecba77f7feb176cbc1fb1df2ad320b29368b53a3d9d9f70a0713d5ce3 1420 
ca-certificates_20140223.dsc
 815b7cd97200b0d76450bb3e7d9b65997ac494ab6467b17369f65b2ef94bcb0c 274768 
ca-certificates_20140223.tar.xz
 13cb11144a97d95a8be130e4bcdd6c9ffc3df269bb194699bcd21ca377e01df2 190226 
ca-certificates_20140223_all.deb
Files: 
 fcf461554a554420e0359d7810269cc0 1420 misc optional 
ca-certificates_20140223.dsc
 ff4049c32342ea450cda82bb14026ffd 274768 misc optional 
ca-certificates_20140223.tar.xz
 555a2965e08517f0ef84a8810016f75b 190226 misc optional 
ca-certificates_20140223_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJTIap0AAoJEFb2GnlAHawE+kAH/1QGWMJV89sAmclrYeeyDKvl
9PnaATmhoVow3yL+Qg/CBKUZeahlXrBdQt7QsItn6whH2NOQUiWbsprzImZdT3xo
GOHSWRBbjosmz1Uco1Iw2abdUIfPDnWvQEEo5oHnHg38s/3wcI/ADDTXkuf69PNT
joGdyBYsJyAH/ltw6WiwiKO0nYwAQv006d/Q9jn8rqOB0MIwx4EUR+Z/qtZRk++n
Xob/g6EsoqbKgB0MH4kqnhn1ZSKBQviTZOlhfkoe2KWfJZCpOmTmDYXdZb7Kh3TC
2nw+FC9ees/ccdwDrnGnif+Mp3CPGrXjbvDvH1kX04nFrP0fI86ClnNlE1VAnoQ=
=VLPi
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1wo5ib-0005jo...@franck.debian.org



Re: Unreleased libraries

2014-02-08 Thread Michael Shuler

On 02/08/2014 05:55 AM, Andreas Beckmann wrote:

On 2014-02-08 10:01, Tzafrir Cohen wrote:

On Fri, Feb 07, 2014 at 10:41:56AM -0600, Michael Shuler wrote:

On 02/07/2014 10:25 AM, Pau Garcia i Quiles wrote:

Is there a policy on how to package software that does not make releases?


A version similar to skia_0.0-1~svnr1234 would allow an upstream
version of i.e. 0.1 (if they ever release) to supersede your
packaged version. It should also allow you to upgrade via new svn
version (0.0-1~svnr1235), as well as new packaging of same svn
version (0.0-2~svnr1234).  Please, correct me, if there is a better

 method, here!


Please do not abuse the Debian revision for including upstream version
information!


Indeed, I was incorrect - thanks for the clarification.


One other thing to keep in mind: what if they switch to git?


If you expect this, start with

   0~~svn12345-1

and switch to

   0~git$whatever-1

later on.


I think your detailed reply [0] was most helpful.  Using a dated version 
would probably be the best method, in my opinion - anything after that 
is easily overridden.  Epochs should be an avenue of last resort.


[0] http://lists.debian.org/52f50f53.3090...@debian.org

--
Michael


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/52f648f2.6030...@pbandjelly.org



Re: Unreleased libraries

2014-02-07 Thread Michael Shuler

On 02/07/2014 10:25 AM, Pau Garcia i Quiles wrote:

Is there a policy on how to package software that does not make releases?


A version similar to skia_0.0-1~svnr1234 would allow an upstream version 
of i.e. 0.1 (if they ever release) to supersede your packaged version. 
It should also allow you to upgrade via new svn version 
(0.0-1~svnr1235), as well as new packaging of same svn version 
(0.0-2~svnr1234).  Please, correct me, if there is a better method, here!


--
Kind regards,
Michael


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/52f50cd4.90...@pbandjelly.org



Accepted ifmetric 0.3-3 (source amd64)

2013-09-22 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Thu, 05 Sep 2013 14:53:17 -0500
Source: ifmetric
Binary: ifmetric
Architecture: source amd64
Version: 0.3-3
Distribution: unstable
Urgency: low
Maintainer: Michael Shuler mich...@pbandjelly.org
Changed-By: Michael Shuler mich...@pbandjelly.org
Description: 
 ifmetric   - Set routing metrics for a network interface
Closes: 514197 721769
Changes: 
 ifmetric (0.3-3) unstable; urgency=low
 .
   * New maintainer.  Closes: #721769
   * Update to standards-version 3.9.4.
   * Update to compat 9 for hardening build flags.
   * Remove empty debian/{pre,post}{inst,rm} files.
   * Add debian/source/format - 3.0 (quilt).
   * Add Vcs-* and Homepage fields to debian/control.
   * Update debian/copyright to machine readable format.
   * Switch debian/copyright license reference from GPL symlink to GPL-2.
   * Move debian/ifmetric.ifup to debian/ifmetric.if-up.
   * Add debian/watch file.
   * Switch from cdbs to dh.
   * Add debian/source/local-options to keep build source clean.
   * Patch src/ifmetric.c for s/Recieved/Received/ typo.
   * Add debian/upstream_changelog from homepage News section.
   * Add patch to fix NETLINK: Packet too small or truncated! error.
 Thanks to Benedek László for the patch.  Closes: #514197, LP: #896584
Checksums-Sha1: 
 83904665f390991b767434a839f42f5718b47316 1833 ifmetric_0.3-3.dsc
 7fb8a811a5119b316828398648deea843483053b 3290 ifmetric_0.3-3.debian.tar.gz
 92a7ed332ef02b8c986754496cac7e86f081a236 10306 ifmetric_0.3-3_amd64.deb
Checksums-Sha256: 
 c8f3b3827c71012bdcf5f11eac7d6a7af426420549742063637378a5c0845662 1833 
ifmetric_0.3-3.dsc
 c5776ec52cb4ddd9834955e46fbb54302b1dc5a157e7c0704a6835962f60b121 3290 
ifmetric_0.3-3.debian.tar.gz
 1fd28b73f5274d22947aa365ed88a5e974ff2a4b5bb6a46a231e86adcba875dd 10306 
ifmetric_0.3-3_amd64.deb
Files: 
 43721f0615733ceb7478a4288f133e11 1833 net extra ifmetric_0.3-3.dsc
 e17ae63b1a07268a7febfbe8daa4e81c 3290 net extra ifmetric_0.3-3.debian.tar.gz
 339e5b63f834096483496cc0283c581b 10306 net extra ifmetric_0.3-3_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.14 (GNU/Linux)
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=YhKE
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1vntr5-0007yg...@franck.debian.org



Accepted ca-certificates 20130906 (source all)

2013-09-07 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Fri, 06 Sep 2013 11:31:06 -0500
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20130906
Distribution: unstable
Urgency: low
Maintainer: Michael Shuler mich...@pbandjelly.org
Changed-By: Michael Shuler mich...@pbandjelly.org
Description: 
 ca-certificates - Common CA certificates
Closes: 647848 664769 718173
Changes: 
 ca-certificates (20130906) unstable; urgency=low
 .
   * Add ca-certificates-local source package example to documentation
   * Update local certificate handling in README.Debian.
 Closes: #718173, LP: #487845
   * Update CA inclusion policy for ca-certificates in README.Debian. With
 the exception of SPI and CAcert, only those CAs included in Mozilla's
 trust store will be included in ca-certificates in Debian.
 Closes: #647848, LP: #103074
   * Clarify that not all software that uses SSL uses ca-certificates in
 README.Debian.  Closes: #664769
   * Add mozilla/nssckbi.h to source, since certdata.txt no longer contains
 a version number.
   * Update debian/copyright to Copyright: Mozilla Contributors for
 mozilla/{certdata.txt,nssckbi.h}.
   * Update mozilla/certdata.txt to version 1.94
 Certificates added (+) and removed (-):
 + CA Disig Root R1
 + CA Disig Root R2
 + China Internet Network Information Center EV Certificates Root
 + D-TRUST Root Class 3 CA 2 2009
 + D-TRUST Root Class 3 CA 2 EV 2009
 + PSCProcert
 + Swisscom Root CA 2
 + Swisscom Root EV CA 2
 + TURKTRUST Certificate Services Provider Root 2007
 - Equifax Secure eBusiness CA 2
 - TC TrustCenter Universal CA III
Checksums-Sha1: 
 004bd1f1e5503638f88ca38fa7f3ea4eae8c2483 1420 ca-certificates_20130906.dsc
 7f197c1bf7c7fc82e9f8f2fec6d8cc65f6a6187b 319624 ca-certificates_20130906.tar.gz
 b7cfd7a3802fcade4f6e138e1f08b7d114850be2 185064 
ca-certificates_20130906_all.deb
Checksums-Sha256: 
 1b3a2a3ce1cfe8356eae6bf19f54afc56be0d9d14a729133bbfb12e5ded1 1420 
ca-certificates_20130906.dsc
 dd10520091d469e95e11e5fafb7422d3be0a66071984d09009ed3e0232cb277d 319624 
ca-certificates_20130906.tar.gz
 b2326834479192de2298c607bc020715c949cbd4dc5dd6be28a1b3f348eb9b76 185064 
ca-certificates_20130906_all.deb
Files: 
 093c08b1a6ce9195eadd0a5720759114 1420 misc optional 
ca-certificates_20130906.dsc
 67d42b6be21c616a8b7d3d85d95ae912 319624 misc optional 
ca-certificates_20130906.tar.gz
 aeedad004000d8002536c06c553023af 185064 misc optional 
ca-certificates_20130906_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.14 (GNU/Linux)

iQEcBAEBAgAGBQJSKt0eAAoJEFb2GnlAHawEJ3sH/RtIE6gIQzudppUe2ZuF0HCp
KzwZMzU+dwgTgmokGZxHg9Z4QZLlU/iwzbzmZTH7tKE1BTT7kLuFDk4C0ozqv6zE
Ln7iO/MjXIvvd32qaVUVjQsQdtkzn5ho/Ng0II42B5NkvRYRdiGD5MrDXQTBl5zZ
eiEcNebEkG0ZCzm7l/0AauWi4EyIL+Sh8h74DPJueJJJnkoTjhsZhIxBJ7Lvs01H
EE29Ozx535kdDaL4qHhRrWoBMefNBcNbRKW5srAOqMAL8Xu3SPKkrWpA009Nmkj+
xsFsaHPPbPqkl8085glY8TGbFMNazKCyJ4liBVYVso4eE20tAKPqiJas1vHG4KA=
=gPFb
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1vieer-0008nj...@franck.debian.org



Accepted ca-certificates 20130119 (source all)

2013-01-20 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sat, 19 Jan 2013 14:02:09 -0600
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20130119
Distribution: unstable
Urgency: low
Maintainer: Michael Shuler mich...@pbandjelly.org
Changed-By: Michael Shuler mich...@pbandjelly.org
Description: 
 ca-certificates - Common CA certificates
Closes: 537051 697366
Changes: 
 ca-certificates (20130119) unstable; urgency=low
 .
   * Update mozilla/certdata.txt to version 1.87  Closes: #697366
 Certificates removed (-) (none added):
 - TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı
   * Remove unneeded and confusing usage of interest-noawait; remove unneeded
 Pre-Depends on dpkg. Thanks to Guillem Jover for the help and patch.
 Closes: #537051
Checksums-Sha1: 
 5131c1639cd9c0ae51f097301f4ea4134fcaca3a 1409 ca-certificates_20130119.dsc
 e96ba8005000bde7886a78efa0e8ae148a0d6b08 301542 ca-certificates_20130119.tar.gz
 1877a2f04ab2f84965c15a6ead12cedbf70ec444 185428 
ca-certificates_20130119_all.deb
Checksums-Sha256: 
 854e5dc3bb46c9a9f5ba742c118291ade3060aa1697dfe7c093a2e48da24da79 1409 
ca-certificates_20130119.dsc
 fb51ec9a2c551838cc1646a0b3c9e6bea5c1bb20ff5d71c542451fac4b191c22 301542 
ca-certificates_20130119.tar.gz
 08f8e5a1fab74a365c284ed4e353b4f14596f5ef533fced6395ead81fb3a76f7 185428 
ca-certificates_20130119_all.deb
Files: 
 eb478ecf0f87e437511424a48c4d6ad2 1409 misc optional 
ca-certificates_20130119.dsc
 1fbbec2028a33cf865b79c204aa2e626 301542 misc optional 
ca-certificates_20130119.tar.gz
 c8262d0bd2639706375cabb34f1b0458 185428 misc optional 
ca-certificates_20130119_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJQ/AFlAAoJEFb2GnlAHawECM4H/iX3MKdGZ2uOiJGoddQ9l48k
uei8BYNv02OXZJxEzGuP36iEGccdAYYoXi+2YiTeyUjwgVhNje9ukrXss3vXUlUB
R07IdF80upt6CctBbDmocUHdupTV4DuaYMkKsYkHqDTb7EANnVCaBz/1RI3pBxJ2
miLq2llVIzaFTlouTQyvlFjFC9v7hOdOwATNM97U58fMi56d2Yf9VcOMdHOQMNHB
KnF+6t3sYz9UNj508bI8jt300vNXEhgP9V8QT3TkTjbVt7RRS2WHomwA9/y7ybcf
gwtGfNF/2qejm0PdQlmPwnLYpAI8/ruXHD+KuSDXpAPDpgDR7hkEyqBAaA29NSw=
=yhQw
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1twwpv-0007sq...@franck.debian.org



Accepted ca-certificates 20121114 (source all)

2012-11-28 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Wed, 14 Nov 2012 23:58:59 -0600
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20121114
Distribution: unstable
Urgency: low
Maintainer: Michael Shuler mich...@pbandjelly.org
Changed-By: Michael Shuler mich...@pbandjelly.org
Description: 
 ca-certificates - Common CA certificates
Closes: 537051
Changes: 
 ca-certificates (20121114) unstable; urgency=low
 .
   [ Don Armstrong ]
   * Breaks ca-certificates-java (20121112+nmu1); partially fixing #537051.
   * Provide update-ca-certificates and update-ca-certificates-fresh
 triggers.
   * Call the triggers using no-await so that the configuration files from
 the newer version of ca-certificates-java are in places before the
 upgrade. Closes: #537051.
 .
   [ Michael Shuler ]
   * Add note to previous mozilla/certdata.txt changelog entry to document
 CKT_NSS_MUST_VERIFY_TRUST changes.
Checksums-Sha1: 
 79dbf5c34c1ec4747a3c2335e4dd647846f888d9 1747 ca-certificates_20121114.dsc
 abc3b25006fea83ae8ea141b21d22a7069e2863b 305166 ca-certificates_20121114.tar.gz
 76b90337124ba069d20ea6df5da1d101c24c6730 192630 
ca-certificates_20121114_all.deb
Checksums-Sha256: 
 675a6c13b72a846ffe915d38a81286c4ae872b8facd46372df19b82b24935160 1747 
ca-certificates_20121114.dsc
 a0cd6007da337b9772b4c1f426c106fb1b8e6afd72a5f7566f3ea55eb3f7ee59 305166 
ca-certificates_20121114.tar.gz
 f6991820d1c6431a7db42e92efa51f4058e921bdcc491a906dc1309e9ba35286 192630 
ca-certificates_20121114_all.deb
Files: 
 e60d45d75dbdc7d64e7c619e0027b4a0 1747 misc optional 
ca-certificates_20121114.dsc
 3000802ea54fbe3a9b6aaa58428241c3 305166 misc optional 
ca-certificates_20121114.tar.gz
 aec4dda82afd8d8f2e14ce0ab1d3ac48 192630 misc optional 
ca-certificates_20121114_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=XONG
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1tdpf5-0002io...@franck.debian.org



Accepted ca-certificates 20121105 (source all)

2012-11-07 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Mon, 05 Nov 2012 10:56:05 -0600
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20121105
Distribution: unstable
Urgency: low
Maintainer: Michael Shuler mich...@pbandjelly.org
Changed-By: Michael Shuler mich...@pbandjelly.org
Description: 
 ca-certificates - Common CA certificates
Closes: 682125 683728
Changes: 
 ca-certificates (20121105) unstable; urgency=low
 .
   * Update mozilla/certdata.txt to version 1.86  Closes: #683728
 Certificates added (+) (none removed):
 + Actalis Authentication Root CA
 + Trustis FPS Root CA
 + StartCom Certification Authority (renewal/rehash)
 + StartCom Certification Authority G2
 + Buypass Class 2 Root CA
 + Buypass Class 3 Root CA
 + TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı
 + T-TeleSec GlobalRoot Class 3
 + EE Certification Centre Root CA
   * Correct piuparts package remove/purge behavior  Closes: #682125
 - Remove deletes of /etc/ssl{,/certs} from debian/postrm
Checksums-Sha1: 
 69992fc35df7f4f48a52f4404b0e1a841770ab41 1409 ca-certificates_20121105.dsc
 ffebbdfc8f634df99d0795d909a6a073f6c8e9ce 301829 ca-certificates_20121105.tar.gz
 8622eb36d3cfc1ac93543b7c4f099bdace400c1e 185340 
ca-certificates_20121105_all.deb
Checksums-Sha256: 
 309db4fdb32154e5e72cbe14b9bcf00583614e6bf5d6a50a1e53c0cd5d47885b 1409 
ca-certificates_20121105.dsc
 77551086b074b8c8a6c0fbb595b7efdd5a274cfc8505f015332ff06f4c76a012 301829 
ca-certificates_20121105.tar.gz
 0765b6335033021d4c476915ad2a7e67f8c7c181bd5395aaa1018c6a68b3d840 185340 
ca-certificates_20121105_all.deb
Files: 
 36eae0af662f710682d68b6b9cee77d0 1409 misc optional 
ca-certificates_20121105.dsc
 9f5eed928cab9b71242d77dda9bed25b 301829 misc optional 
ca-certificates_20121105.tar.gz
 4c93ba2a5e7bac5a823156125b2f5fd4 185340 misc optional 
ca-certificates_20121105_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJQmo87AAoJEFb2GnlAHawEPUQH/jLs5OdNRC73RLA5oEp50/eu
HGghu8mJMlt97uAEbW7Ie9wk3o0rDIwIu+nXMZ2pbrnNH2w2CT6qezVq3OjBK3Og
PFG9TH38mASmxuzx6YWqrtx3U3/xKBo8WYDGL2nybz4oa945d/lGW1fHP2H18DSo
DJeQ6GnpXLA0I9VLbijWzG+ksBRfn2e/6yU2n51NCNjKyma1AuH5oH3VhRKlV4Ub
QtmKV1eZi7VlGHTomaOv7g3HbyN5cGqCAMG+CQH/pYy8pTd/RspO5HJpJwIrdAYq
OtCn+Rr1OgD4ko9g/B7LzNJOM6RcngPB4ALS3MHubHUZCOyOqIgKC+zwUdQD/kI=
=VVvi
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1tw8mx-000631...@franck.debian.org



Re: Bug#685038: ITP: mailscanner -- email gateway for virus scanning, spam and phishing detection

2012-08-16 Thread Michael Shuler
On 08/15/2012 07:35 PM, Aaron Schrab wrote:
 Package: wnpp
 Severity: wishlist
 Owner: Aaron Schrab aa...@schrab.com
 
 * Package name: mailscanner

You may wish to contact the previous mailscanner maintainer [0][1] and
dig through all the existing/archived bugs [2] to find out why it was
removed from the archive post-squeeze, and if it may be suitable for
debian in the future.

[0] http://packages.debian.org/search?keywords=mailscanner
[1] http://packages.qa.debian.org/m/mailscanner.html
[2]
http://bugs.debian.org/cgi-bin/pkgreport.cgi?archive=both;src=mailscanner

-- 
Kind regards,
Michael Shuler


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/502cfdd0.8040...@pbandjelly.org



Re: Modified http://wiki.debian.org/DebianDeveloper to mention non-packagers (Re: [CTTE #614907] Resolution of node/nodejs conflict)

2012-07-26 Thread Michael Shuler
On 07/26/2012 08:37 AM, The Fungi wrote:
 On 2012-07-26 14:29:14 +0100 (+0100), Ian Jackson wrote:
 [...]
 We also need a general word for someone involved with Debian in a
 positive way. Participant is clumsy; member of the community
 even more so. Person might do but word with a more positive spin
 would be nice.
 
 As a long-time participant and non-DD, I've always liked the term
 contributor in that context.

Although it is likely to not stay this way forever, this is exactly how
I describe my participation - Debian Contributor

-- 
Kind regards,
Michael


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/501149b5.3020...@pbandjelly.org



Accepted ca-certificates 20120623 (source all)

2012-06-23 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sat, 23 Jun 2012 09:16:54 -0500
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20120623
Distribution: unstable
Urgency: low
Maintainer: Michael Shuler mich...@pbandjelly.org
Changed-By: Michael Shuler mich...@pbandjelly.org
Description: 
 ca-certificates - Common CA certificates
Closes: 595279 660002 661785 666932
Changes: 
 ca-certificates (20120623) unstable; urgency=low
 .
   * Add Polish translation, thanks to Michał Kułach.  Closes: #660002
   * Add Turkish translation, thanks to Atila KOÇ.  Closes: #661785
   * Correct update-ca-certificates(8) alignment  Closes: #666932
   * Add note to update-ca-certificates(8) about .crt extension needed for
 CA certificates in /usr/local/share/ca-certificates  Closes: #595279
   * Update mozilla/certdata.txt to version 1.83
 Mozilla Public License updated to v2.0
 (no added/removed CAs)
   * Update debian/copyright to:
 - reflect MPL v2.0 update for mozilla/certdata.txt
 - specify GPL-2 instead of GPL symlink
   * Update debian/NEWS with added/removed certs from 20111211 and 20120212
   * Update to Standards-Version: 3.9.3 (no changes needed)
Checksums-Sha1: 
 d7e8924d98653afab3216d8a9595ea4a997903ab 1747 ca-certificates_20120623.dsc
 11999225d87cdfe751a645652d1d40b0406a71b0 287315 ca-certificates_20120623.tar.gz
 487e48210aedca793874019298fdc8ea971e5abd 183022 
ca-certificates_20120623_all.deb
Checksums-Sha256: 
 75ad1bcce3c517df5d554e96f236bacd933ab5fd04b89089ed19478437eb3c5c 1747 
ca-certificates_20120623.dsc
 878cd1130ba056fe5f96decde7e5fc1b71d35eb8565a1515744912e100731ee9 287315 
ca-certificates_20120623.tar.gz
 41f719a63b8cace12a6cd69dce3fea9720c2702511205c2bab20c5d05528ede7 183022 
ca-certificates_20120623_all.deb
Files: 
 9a146e86fc80dd69f8f1f68e0f983680 1747 misc optional 
ca-certificates_20120623.dsc
 5105d4cc086f0d4ecf7bf2e4c4667289 287315 misc optional 
ca-certificates_20120623.tar.gz
 7862fdd21bf8a505ee02eb379b428fdd 183022 misc optional 
ca-certificates_20120623_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=/iPp
-END PGP SIGNATURE-


Accepted:
ca-certificates_20120623.dsc
  to main/c/ca-certificates/ca-certificates_20120623.dsc
ca-certificates_20120623.tar.gz
  to main/c/ca-certificates/ca-certificates_20120623.tar.gz
ca-certificates_20120623_all.deb
  to main/c/ca-certificates/ca-certificates_20120623_all.deb


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1siuew-0003a0...@franck.debian.org



Accepted ca-certificates 20120212 (source all)

2012-02-13 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sun, 12 Feb 2012 15:12:59 -0600
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20120212
Distribution: unstable
Urgency: low
Maintainer: Michael Shuler mich...@pbandjelly.org
Changed-By: Michael Shuler mich...@pbandjelly.org
Description: 
 ca-certificates - Common CA certificates
Changes: 
 ca-certificates (20120212) unstable; urgency=low
 .
   * Update mozilla/certdata.txt to version 1.81
 Certificates added (+) and removed (-):
 + Security Communication RootCA2
 + EC-ACC
 + Hellenic Academic and Research Institutions RootCA 2011
 - Verisign Class 2 Public Primary Certification Authority
 - Verisign Class 4 Public Primary Certification Authority - G2
 - TC TrustCenter, Germany, Class 2 CA
 - TC TrustCenter, Germany, Class 3 CA
   * Add notice to README.Debian deprecating CA inclusions and refer to
 #647848 for Debian CA Certificate Policy discussion.
Checksums-Sha1: 
 d208e56f084880b3e9217647bf458d84f1b0d727 1747 ca-certificates_20120212.dsc
 aa8836617c7ee27975efd9cc0727fc4bed85e7a2 279619 ca-certificates_20120212.tar.gz
 530c67633a2e973a6bea3a76a13a7afce469e2f2 176812 
ca-certificates_20120212_all.deb
Checksums-Sha256: 
 71f742913d10a3ffa95a0545d17a442445d6951e287fdfbbde2a0b3948f3c028 1747 
ca-certificates_20120212.dsc
 95f3eac93dad4433b5731bc9e106a26e2ccf210acace1927e597477b24187dce 279619 
ca-certificates_20120212.tar.gz
 7e4277a0a5a0ac42c370a93f986839b4e3ff82646581caa8c5135ad0a41d01d7 176812 
ca-certificates_20120212_all.deb
Files: 
 adaaf79dfacb1f79bd5ccbbc5dce3c2e 1747 misc optional 
ca-certificates_20120212.dsc
 391dea8d827db935ca0d0d1e6641bf23 279619 misc optional 
ca-certificates_20120212.tar.gz
 23513b9f042560075da3cead2b8b5bc2 176812 misc optional 
ca-certificates_20120212_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
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=MZN5
-END PGP SIGNATURE-


Accepted:
ca-certificates_20120212.dsc
  to main/c/ca-certificates/ca-certificates_20120212.dsc
ca-certificates_20120212.tar.gz
  to main/c/ca-certificates/ca-certificates_20120212.tar.gz
ca-certificates_20120212_all.deb
  to main/c/ca-certificates/ca-certificates_20120212_all.deb


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1rx1oh-0006qo...@franck.debian.org



Accepted ca-certificates 20111211 (source all)

2011-12-14 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sun, 11 Dec 2011 19:05:32 -0600
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20111211
Distribution: unstable
Urgency: low
Maintainer: Michael Shuler mich...@pbandjelly.org
Changed-By: Michael Shuler mich...@pbandjelly.org
Description: 
 ca-certificates - Common CA certificates
Closes: 594383 646767 647849
Changes: 
 ca-certificates (20111211) unstable; urgency=low
 .
   * Clarify CA audit note in package description and README.debian. Thanks
 to C.J. Adams-Collier for the patch.  Closes: #594383
   * Remove French Government IGC/A CA certificates. The RSA certificate is
 included in the Mozilla bundle and the DSA certificate is not in use.
 Closes: #646767
   * Remove expired signet.pl CAs.  Closes: #647849
   * Remove expired brasil.gov.br CA.
   * Edit 20111025 changelog/NEWS entries to correctly list installed CAs
   * Use 'set -e' in body of debian/postinst
   * Update mozilla/certdata.txt to version 1.80
 (no added/removed CAs)
   * Update mozilla/certdata2pem.py to parse NETSCAPE or NSS data
Checksums-Sha1: 
 68df1e97e9dc923e47bc6604b7dc0bf707f0d68b 1747 ca-certificates_20111211.dsc
 7c13d7e1e6ea119ee6ab3b03e45ef7e48e5e9b63 277937 ca-certificates_20111211.tar.gz
 25998fd32380ded0b658034e53eedebf514bb8c9 175372 
ca-certificates_20111211_all.deb
Checksums-Sha256: 
 71b709cc33ac317e9a8d5f28051e122bd5aebbd28247fbc47f85e95f584ef05f 1747 
ca-certificates_20111211.dsc
 6f0633136d17ffef3ed0adfb171a00136a320f0fd79c9c75733ac02662a754a7 277937 
ca-certificates_20111211.tar.gz
 0ec173492418b32b07e400d4822ec9812e04207af7e6ea1f5064505ca9b80f3f 175372 
ca-certificates_20111211_all.deb
Files: 
 8ee60f575635f25563d1712e2bc02eaa 1747 misc optional 
ca-certificates_20111211.dsc
 f99a90a91b23338b4df765c0d18eba73 277937 misc optional 
ca-certificates_20111211.tar.gz
 02a3105a228f1e053926ed3dc397d8cd 175372 misc optional 
ca-certificates_20111211_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iQIVAwUBTuj6s4cvcCxNbiWoAQLnKA//dQv6eEwDpADMyz/EoizYsK4agifE3KiA
auIj/9gOsDcAYcCI8V85dV72j7URxG3uLzRT0x9g2pLyeiM6SCt8eOqphegUGD+Z
SVk+GdU6Qf/1OsAiyVm5eY8w+awvMXpiAdUDaz5HPmoDzOyagJCgamRXqe6Tdejy
VofPbPZWCb8yVph4onSOYCJ1jtllVlPOFiPYxewGEdqiW+sgw4jW7fdj+vKvkB1M
kMugyc0/GazJevIqIniQa9rj5ssfZ027CVFWu34Hhsm1GnRgqiiEVMGqtzrhD6Bw
FPj34+lrIyS5j+6mP5kOynd8D4r5OqYTvFeI4iE/p5uWCejBUYxxpNm3s4lryzCM
dyFXq56jPZJrnFeVxLisY0MUFbypzvmL1Fj1Gd9sppARmosvOQ6LWM3PrRiQrJLt
D4Fo/1ZYFHh8CSML1HqeTQ395LjIH+kRJMUheI99TA5GGJJNvqZjygo/qZuYslHE
V/qvAg06CdR7iPNUrpM404uCRAph7T61Bi/+y4nT3DkXhR6+obLmcnUdxFlrRSja
8C+rQeCh/CGwJdkpj8UOlsK+wMt8q8+vEMRe8qXGwSZjsyyuk8hk+OJ5xSBp3UdK
uAEb11IfDZUditDXuEzYxhq3gJqYu8E88uOXYfCQQ5nVUt4xbuw7+kswWwHtqb4D
xqqMVOPBwOg=
=xnOb
-END PGP SIGNATURE-


Accepted:
ca-certificates_20111211.dsc
  to main/c/ca-certificates/ca-certificates_20111211.dsc
ca-certificates_20111211.tar.gz
  to main/c/ca-certificates/ca-certificates_20111211.tar.gz
ca-certificates_20111211_all.deb
  to main/c/ca-certificates/ca-certificates_20111211_all.deb


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1rauns-00016b...@franck.debian.org



Re: debian/copyright, DEP5 and SPDX

2011-12-13 Thread Michael Shuler
On 12/13/2011 09:17 AM, Simon Josefsson wrote:
 Possibly DEP5-compliant files could be generated from SPDX files.

This has come up in several DEP5 discussions over the past ~year, as
well as several recent mentions:

https://www.google.com/search?q=spdx+site%3Alists.debian.org

-- 
Kind regards,
Michael


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4ee77f75.9090...@pbandjelly.org



Accepted ca-certificates 20111025 (source all)

2011-10-26 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 25 Oct 2011 09:12:10 -0500
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20111025
Distribution: unstable
Urgency: low
Maintainer: Michael Shuler mich...@pbandjelly.org
Changed-By: Michael Shuler mich...@pbandjelly.org
Description: 
 ca-certificates - Common CA certificates
Closes: 537382 588219 619587 630232 643667
Changes: 
 ca-certificates (20111025) unstable; urgency=low
 .
   [ Michael Shuler ]
   * Add 3.0 (native) source format
   * Add Vcs-Git/Browser fields
   * Add myself as new Maintainer with Uploaders  Closes: #588219
   * Update mozilla/certdata.txt to latest (NSS branch version 1.64.2.13)
 Certificates added (+) and removed (-):
 + AffirmTrust Commercial
 + AffirmTrust Networking
 + AffirmTrust Premium
 + AffirmTrust Premium ECC
 + A-Trust-nQual-03
 + Bogus Global Trustee
 + Bogus GMail
 + Bogus Google
 + Bogus kuix.de
 + Bogus live.com
 + Bogus Mozilla Addons
 + Bogus Skype
 + Bogus Yahoo 1
 + Bogus Yahoo 2
 + Bogus Yahoo 3
 + Certinomis - Autorité Racine
 + Certum Trusted Network CA
 + Explicitly Distrust DigiNotar Cyber CA
 + Explicitly Distrust DigiNotar Cyber CA 2nd
 + Explicitly Distrust DigiNotar Root CA
 + Explicitly Distrust DigiNotar Services 1024 CA
 + Explicitly Distrusted DigiNotar PKIoverheid
 + Explicitly Distrusted DigiNotar PKIoverheid G2
 + Go Daddy Root Certificate Authority - G2
 + Root CA Generalitat Valenciana
 + Starfield Root Certificate Authority - G2
 + Starfield Services Root Certificate Authority - G2
 + TWCA Root Certification Authority
 - AOL Time Warner Root Certification Authority 1
 - AOL Time Warner Root Certification Authority 2
 - DigiNotar Root CA
 - Entrust.net Global Secure Personal CA
 - Entrust.net Global Secure Server CA
 - Entrust.net Secure Personal CA
 - IPS Chained CAs root
 - IPS CLASE1 root
 - IPS CLASE3 root
 - IPS CLASEA1 root
 - IPS CLASEA3 root
 - IPS Timestamping root
 - Thawte Personal Freemail CA
 - Thawte Time Stamping CA
   * Bogus * CAs above address Comodo MITM 03/11  Closes: #619587
   * Update CAcert-Class 3-Subroot-certificate  Closes: #630232
 .
   [ Steve Langasek ]
   * sbin/update-ca-certificates: move the ca-certificates.crt bundle out of
 the way before calling c_rehash, so that symlinks don't accidentally get
 pointed here, breaking openssl certificate verification  LP: #854927
 .
   [ Loïc Minier ]
   * Drop bogus c_rehash on upgrades, which caused issue when
 ca-certificates.crt was still in place; instead, call
 update-ca-certificates --fresh on upgrades to this version, and
 the usual update-ca-certificates otherwise  Closes: #643667, #537382
Checksums-Sha1: 
 fd73ea4f9e085106bdf7979a29121fbf72b47dea 1747 ca-certificates_20111025.dsc
 3c9817265915a43e1a2cd8d88325df3904fbf5ee 298904 ca-certificates_20111025.tar.gz
 949ca2535b927753aa9edeb7afbedac9b793f630 185800 
ca-certificates_20111025_all.deb
Checksums-Sha256: 
 3322f8df3c8edfba2a11b03b995f52b953810ddede324433c0ba285b0e3a0c13 1747 
ca-certificates_20111025.dsc
 318bbf0f7c0a32adc10105f843148fd0e9e3b013de75645c02ea858652240924 298904 
ca-certificates_20111025.tar.gz
 7d743b307ab31138176d6da4fff1f4c7f6bd246b42698662894bfb1b74e55647 185800 
ca-certificates_20111025_all.deb
Files: 
 0e3c65cb361b2710ce8626ec53cfeb1c 1747 misc optional 
ca-certificates_20111025.dsc
 dfd593c9f89e64351aae78b9be588696 298904 misc optional 
ca-certificates_20111025.tar.gz
 245d8b5bba947b8ae786e0f14459dd18 185800 misc optional 
ca-certificates_20111025_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iQIVAwUBTqhQpocvcCxNbiWoAQKEhw//aOuTI95KwsJCv2eTmjMOalK16QgBYApZ
/5Evz0XGl9UD/Ec9H37AEBfwXRdOyOaAJIrV46xzk5J6R+nRWyCViL4czyabuSLh
llLJXAVOx4zyL3BdBN1eDqETrOVD+Y8j5odQfo9Cgmt9ucY4wWVLNNbYLqYlFwpd
rEPHxyYYXGC5riWwEK9+JNKkS4J+AAcy/5oCzqdQFBlyTsLM8cBfscDJQSEvg8Xm
vPm5k7tgzyYn6lUKOPwBg6+/LembJ5D32fRyTWzZk7kZNcs4I6ldwtQG43eUSEPe
E7Wapb+rZLK0IGzBGSCufCGmq7/w7V0URpC9h30m2OVYtijoJkJthE7mhQONjPU3
4K02L2FszF2QMSLU8AGYrLhWCeFfefGhKS0/dIWkDZRc4r2uqIegaBLkH6sUDv4X
2WlzyVN+e/LS7f3Cmx7EUbqol8jOyxF3l49DAaaWap1z25mZqxoi6MaqNDk46VOn
+9iHXxV1ZVSxKuDaOAYD5HCUA0gL4ggvZk5+ZsvJV2iwmmXJ24tFNa9+Lvz3ZyIX
CElWS1qxCCDTE0M9U93dnxbaC39yAO6dPyScsl8UOOfCOK90hEy+UooLUdD4YUpF
7RTizkIxBSwUXzxMtV7RuN4DIZSJzekQqpKOioPzglDn/xPMli+bsLnmGMhuDNAA
PIJAlpTV5OE=
=tF07
-END PGP SIGNATURE-


Accepted:
ca-certificates_20111025.dsc
  to main/c/ca-certificates/ca-certificates_20111025.dsc
ca-certificates_20111025.tar.gz
  to main/c/ca-certificates/ca-certificates_20111025.tar.gz
ca-certificates_20111025_all.deb
  to main/c/ca-certificates/ca-certificates_20111025_all.deb


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Re: Looking for seconds to add the Amazon EC2 public certificate in ca-certificates.

2011-08-23 Thread Michael Shuler
On 08/22/2011 10:56 PM, Russ Allbery wrote:
 Charles Plessy ple...@debian.org writes:
 
 as per /usr/share/doc/ca-certificates/README.Debian, I am looking for
 additional signed recommendations for the addition of the Amazon Elastic
 Computer Cloud (EC2) public certificate to the ca-certificates packages.
 
 As someone not particularly familiar with the details of how certs work
 inside EC2, my main question would be: what's the signing policy used by
 the holder of the private key for this certificate?

This is also my question - is this a CA that will be verifying and
signing other certs? (I'll try to dig on the same info, as well)

For the record, I intend to adopt ca-certificates relatively soon, as I
have not heard back from the previous ITA poster in a few weeks.  The
package needs some TLC and I have some updates already queued up, but
not pushed to my git repo, yet  :-)

-- 
Kind regards,
Michael



signature.asc
Description: OpenPGP digital signature


Re: How is the stable version of Chrome tracked for chromium-browser?

2011-07-06 Thread Michael Shuler
On 07/06/2011 08:52 PM, Aaron Toponce wrote:
 I would like to mimic the build process of the chromium-browser as closely
 as possible on a development system, but I am unaware of the process that
 the Debian Chromium Package Maintainers use. I'm not as interested as
 building the .deb, as I am grabbing the right upstream source that matches
 the latest stable release of Chrome.
 
 Any help?

You might wish to ask the package team:

Debian Chromium Maintainers pkg-chromium-ma...@lists.alioth.debian.org

and dig around the Alioth project's bzr repo:

https://alioth.debian.org/projects/pkg-chromium/

-- 
Kind regards,
Michael


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4e151868.6040...@pbandjelly.org



Accepted libauthen-tacacsplus-perl 0.20-2 (source i386)

2011-05-23 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 23 May 2011 15:44:52 -0500
Source: libauthen-tacacsplus-perl
Binary: libauthen-tacacsplus-perl
Architecture: source i386
Version: 0.20-2
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group pkg-perl-maintain...@lists.alioth.debian.org
Changed-By: Michael Shuler mich...@pbandjelly.org
Description: 
 libauthen-tacacsplus-perl - Perl module for authentication using TACACS+ server
Changes: 
 libauthen-tacacsplus-perl (0.20-2) unstable; urgency=low
 .
   [ Ryan Niebur ]
   * Update jawnsy's email address
 .
   [ Michael Shuler ]
   * Switch to dpkg-source 3.0 (quilt) format
   * Update to Standards-Version: 3.9.2
   * Update to debhelper 8
   * Reformat debian/copyright (mainly whitespace)
Checksums-Sha1: 
 4b06d87be0c6e87ccd11f1e9a08d77339325dffa 2075 
libauthen-tacacsplus-perl_0.20-2.dsc
 70eea95728f19f398aa90196ef2cbf9d5d9d1961 2946 
libauthen-tacacsplus-perl_0.20-2.debian.tar.gz
 90ac311f4a359fb0376f180b3972204005124e6b 23182 
libauthen-tacacsplus-perl_0.20-2_i386.deb
Checksums-Sha256: 
 85e01d7ecdc23c67b6aad93c00b01dca93938128ba77c46e618343ec3640085c 2075 
libauthen-tacacsplus-perl_0.20-2.dsc
 f84eb71ae23f69118b2579cbbf22661c07e421ed8f61682143e6a257b9fac03c 2946 
libauthen-tacacsplus-perl_0.20-2.debian.tar.gz
 c5cfdd1d1d956e56439981b2fc1bf58c63d790521081a94f47fc73ef48708119 23182 
libauthen-tacacsplus-perl_0.20-2_i386.deb
Files: 
 53802d6e62320562904108f6bbea9d4e 2075 perl optional 
libauthen-tacacsplus-perl_0.20-2.dsc
 2c31f0df9d851995550ba5eb0ecb4ce0 2946 perl optional 
libauthen-tacacsplus-perl_0.20-2.debian.tar.gz
 8aa53ed0700dd7b0eee7b15281210070 23182 perl optional 
libauthen-tacacsplus-perl_0.20-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iQIcBAEBCAAGBQJN2tgbAAoJELs6aAGGSaoGqcIP/1hrdpkIJR7Qln6D6bF6IhFj
HKBLo7TTS+PqwiJExjBnvDwE+urMlr3qUE6aYHA8JUaiomBdAQB0WlD3MmogdvoL
nl4MIMqMyQVAV9oSfDjvOIdwLeWhzjnvg1saBiGz+xJXWgHHiBdxsxGu3cGJY9Jo
50foyDxkhbkezSQ6aA6SI3j1oY5O8XHez8TMGxI/cZ1RuEe4RsYgoBcWn5MWIwQl
z/XpKODYFTHJapG2nsZs7j6hIP0wLGEuaU5QBnd0RIuN1FYP+XkI3mrPZVrLncnb
pbOetWkhbx0J4wpAIGNMNUWwRGJw3Xb2sYfrbo4Y9cDZY0vGJuLdBlBuBNhg+qgs
YseF1pRQpjOacW8jLmUI90Fw6Ao4T6uX6OvCXRZ+KBqQWvod8mS4nGuFjWB8nFNw
15ppPEl9gietMhZEjnaW2SpJQzQ35XYngSYmB3kXFupQaEA4ifDrT66KSoqFXy4k
zbxwTK96pa+D4q6xPYAF9G/4CYimMHAJHFTk3Q72uPHNHI+t7EIfsi2ou/wxovtB
I6QzxID4UdPJUkdPAozpapYGY7ZO5wAq81yvpnI32joUtW3uOfJwzz4+4ySuvfOH
RLB1mgjhOca4zvzzrql5Z4Yzvs7RuErkuhu1umzTFvsha2yHjAiBXnQ7/G4u9SXT
RnocFcI8rKVIa7SIVOnA
=cYxM
-END PGP SIGNATURE-


Accepted:
libauthen-tacacsplus-perl_0.20-2.debian.tar.gz
  to 
main/liba/libauthen-tacacsplus-perl/libauthen-tacacsplus-perl_0.20-2.debian.tar.gz
libauthen-tacacsplus-perl_0.20-2.dsc
  to main/liba/libauthen-tacacsplus-perl/libauthen-tacacsplus-perl_0.20-2.dsc
libauthen-tacacsplus-perl_0.20-2_i386.deb
  to 
main/liba/libauthen-tacacsplus-perl/libauthen-tacacsplus-perl_0.20-2_i386.deb


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1qodcs-0004lb...@franck.debian.org



Accepted libdata-password-perl 1.07-3 (source all)

2011-05-23 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 23 May 2011 14:50:19 -0500
Source: libdata-password-perl
Binary: libdata-password-perl
Architecture: source all
Version: 1.07-3
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group pkg-perl-maintain...@lists.alioth.debian.org
Changed-By: Michael Shuler mich...@pbandjelly.org
Description: 
 libdata-password-perl - Perl extension for assessing password quality
Changes: 
 libdata-password-perl (1.07-3) unstable; urgency=low
 .
   [ gregor herrmann ]
   * debian/control: Changed: Switched Vcs-Browser field to ViewSVN
 (source stanza).
 .
   [ Nathan Handler ]
   * debian/watch: Update to ignore development releases.
 .
   [ Michael Shuler ]
   * Switch to dpkg-source 3.0 (quilt) format
   * Update to Standards-Version: 3.9.2
   * Update to debhelper 8
   * Update debian/copyright to DEP5 format
   * Add DEP3 header to usr-dict.patch
Checksums-Sha1: 
 01e788c9ab1a438b01e2a36f5b6b9f206e80cb69 1997 libdata-password-perl_1.07-3.dsc
 86c4fa7b320dd7e3f9538a090449090fef012d52 2587 
libdata-password-perl_1.07-3.debian.tar.gz
 59d74d6a0429a4a0ae604229ba88fab2dabcebee 9100 
libdata-password-perl_1.07-3_all.deb
Checksums-Sha256: 
 f9e7a7d0aedc9ee39b7a130b1e463801634e16a9b9b7d7a6f3c5f424a3deb1c2 1997 
libdata-password-perl_1.07-3.dsc
 fe56e1ffd8dec0c683696afd1ef0baa6139ada3a3f8255418126c61242009232 2587 
libdata-password-perl_1.07-3.debian.tar.gz
 92a14eddf48fb1cc82583a24bc0aa9d1894da33aabf02ecc396867864b203e17 9100 
libdata-password-perl_1.07-3_all.deb
Files: 
 e33a96389b4aec9bdf17b81c10f50223 1997 perl optional 
libdata-password-perl_1.07-3.dsc
 4c615744a7db540b564ac23cc6033702 2587 perl optional 
libdata-password-perl_1.07-3.debian.tar.gz
 117f483abbccaff4c13f3b540db6ed8d 9100 perl optional 
libdata-password-perl_1.07-3_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
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=7x8U
-END PGP SIGNATURE-


Accepted:
libdata-password-perl_1.07-3.debian.tar.gz
  to main/libd/libdata-password-perl/libdata-password-perl_1.07-3.debian.tar.gz
libdata-password-perl_1.07-3.dsc
  to main/libd/libdata-password-perl/libdata-password-perl_1.07-3.dsc
libdata-password-perl_1.07-3_all.deb
  to main/libd/libdata-password-perl/libdata-password-perl_1.07-3_all.deb


-- 
To UNSUBSCRIBE, email to debian-devel-changes-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1qodd0-0004nh...@franck.debian.org



Bug#543118: ITP: python-cloudfiles -- Python interface to Rackspace CloudFiles service

2009-08-22 Thread Michael Shuler
Package: wnpp
Severity: wishlist
Owner: Michael Shuler mich...@pbandjelly.org

  Package name: python-cloudfiles
  Version : 1.4.0
  Upstream Author : Cloud Files cloudfi...@rackspacecloud.com
  URL : http://github.com/rackspace/python-cloudfiles/
  License : MIT
  Programming Lang: Python
  Description : Python interface to Rackspace Cloud Files service

python-cloudfiles provides a simple interface to the Rackspace Cloud Files
service. Cloud Files is reliable, scalable and affordable web-based
storage for backing up and archiving all your static content. Find out
more at http://www.rackspacecloud.com/cloud_hosting_products/files.

To use this module you will need to sign up to Rackspace Cloud Files and
provide a user and key. If you use this module, you will incurr costs
as specified by Rackspace. Please check the costs. If you use this module
with your user and key you will be responsible for these costs.

(This module will be maintained under the Debian Python Modules Team)



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#538761: ITP: libnet-mosso-cloudfiles-perl -- Perl interface to Mosso CloudFiles service

2009-07-26 Thread Michael Shuler
Package: wnpp
Severity: wishlist
Owner: Michael Shuler mich...@pbandjelly.org

* Package name: libnet-mosso-cloudfiles-perl
  Version : 0.43
  Upstream Author : Léon Brocard l...@astray.com
* URL : http://search.cpan.org/dist/Net-Mosso-CloudFiles/
* License : Perl (Artistic and GPL)
  Programming Lang: Perl
  Description : Perl interface to Mosso CloudFiles service

Net::Mosso::CloudFiles provides a simple interface to the Mosso Cloud Files
service. Cloud Files is reliable, scalable and affordable web-based
storage for backing up and archiving all your static content. Find out
more at http://www.mosso.com/cloudfiles.jsp.

To use this module you will need to sign up to Mosso Cloud Files and
provide a user and key. If you use this module, you will incurr
costs as specified by Mosso. Please check the costs. If you use this
module with your user and key you will be responsible for these costs.

(This module will be maintained under the Debian Perl Group)



--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Xen - Source?

2009-06-09 Thread Michael Shuler
On 06/09/2009 11:49 AM, Andreas wrote:
 Installing it (make), it downloads the binary of the hypervisor!
 Cloning http://xenbits.xensource.com/linux-2.6.18-xen.hg  # 
 (downloading)

This is an incorrect understanding of that download step - it is a
*source* download from the upstream mercurial repository:

mshu...@aineko:~/src/repos/hg$ hg clone
http://xenbits.xensource.com/linux-2.6.18-xen.hg
destination directory: linux-2.6.18-xen.hg
requesting all changes
adding changesets
adding manifests
adding file changes
added 899 changesets with 23501 changes to 20928 files
updating working directory
20905 files updated, 0 files merged, 0 files removed, 0 files unresolved
mshu...@aineko:~/src/repos/hg$

 So where do I find the source of the xen-Hypervisor?

Right where you found it  ;)

You can also download tarballs from the parent web site, if you wish.

-- 
Kind Regards,
Michael


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Xen - Source?

2009-06-09 Thread Michael Shuler
On 06/09/2009 02:59 PM, David Claughton wrote:
 Michael Shuler wrote:
 On 06/09/2009 11:49 AM, Andreas wrote:
 Installing it (make), it downloads the binary of the hypervisor!
 Cloning http://xenbits.xensource.com/linux-2.6.18-xen.hg  # 
 (downloading)
 This is an incorrect understanding of that download step - it is a
 *source* download from the upstream mercurial repository:
 
 Are you saying the source package does not actually contain the source
 code, but is just a framework for downloading the actual source?
 
 If so, this seems unusual to me.  AIUI it's normal practice for a source
 package to contain a local copy of the source tree because Debian cannot
 make the assumption that xenbits.xensource.com will always be there.

You're right.  Ben pointed to the xen patch directory in the linux-2.6
source package in his reply - the package build should not fetch the
repo.  I just spoke up (probably incorrectly, without asking for more
info) to help with what I thought he was seeing.

Kind Regards,
Michael


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Accepted libauthen-tacacsplus-perl 0.17-2 (source i386)

2008-02-26 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 25 Feb 2008 18:07:23 -0600
Source: libauthen-tacacsplus-perl
Binary: libauthen-tacacsplus-perl
Architecture: source i386
Version: 0.17-2
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group [EMAIL PROTECTED]
Changed-By: Michael Shuler [EMAIL PROTECTED]
Description: 
 libauthen-tacacsplus-perl - Perl extension for authentication using tacacs+ 
server
Changes: 
 libauthen-tacacsplus-perl (0.17-2) unstable; urgency=low
 .
   * debian/rules:
 removed unnecessary commented dh_* lines
   * debian/control:
 added myself to Uploaders
Files: 
 417fda0542a719e3fdc30cff80ec18b7 933 perl optional 
libauthen-tacacsplus-perl_0.17-2.dsc
 24c479af866c428c3b06e6f69f4ebc35 3066 perl optional 
libauthen-tacacsplus-perl_0.17-2.diff.gz
 e9ff799504a2ac4042cefc387659da52 19928 perl optional 
libauthen-tacacsplus-perl_0.17-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHxG6S5SXWIKfIlGQRAl0DAJ4kU6mugyxOnCjRCTOQzrsdTU0FfgCgtSaI
4Bs9l6ELFupJwEhXV8KQDUY=
=zlSp
-END PGP SIGNATURE-


Accepted:
libauthen-tacacsplus-perl_0.17-2.diff.gz
  to 
pool/main/liba/libauthen-tacacsplus-perl/libauthen-tacacsplus-perl_0.17-2.diff.gz
libauthen-tacacsplus-perl_0.17-2.dsc
  to 
pool/main/liba/libauthen-tacacsplus-perl/libauthen-tacacsplus-perl_0.17-2.dsc
libauthen-tacacsplus-perl_0.17-2_i386.deb
  to 
pool/main/liba/libauthen-tacacsplus-perl/libauthen-tacacsplus-perl_0.17-2_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted libdata-password-perl 1.07-2 (source all)

2008-02-20 Thread Michael Shuler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Feb 2008 11:09:18 -0600
Source: libdata-password-perl
Binary: libdata-password-perl
Architecture: source all
Version: 1.07-2
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group [EMAIL PROTECTED]
Changed-By: Michael Shuler [EMAIL PROTECTED]
Description: 
 libdata-password-perl - Perl extension for assessing password quality
Changes: 
 libdata-password-perl (1.07-2) unstable; urgency=low
 .
   * Password.pm, README:
 patch /usr/dict/* to /usr/share/dict/* for FHS
   * debian/rules:
 include quilt patch for Password.pm, README
 remove commented dh_installexamples
 delete /usr/lib/perl5 only if it exists
   * debian/control:
 include quilt in Build-Depends
   * debian/copyright:
 convert to new format
Files: 
 b7d5588d06bfbbf8cbcc94f66a3f9c5a 931 perl optional 
libdata-password-perl_1.07-2.dsc
 80e4e2ba1de70f4c833c5a706311b626 2688 perl optional 
libdata-password-perl_1.07-2.diff.gz
 6f6a82d88528fc145efd871975102109 9272 perl optional 
libdata-password-perl_1.07-2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHvI852A7zWou1J68RAjO9AJ9dXKip3XzTFa7mCLtA6ryk2GmDVQCeJtPC
ke56MKkyLQIoW5I/k/RwEzo=
=bUOl
-END PGP SIGNATURE-


Accepted:
libdata-password-perl_1.07-2.diff.gz
  to pool/main/libd/libdata-password-perl/libdata-password-perl_1.07-2.diff.gz
libdata-password-perl_1.07-2.dsc
  to pool/main/libd/libdata-password-perl/libdata-password-perl_1.07-2.dsc
libdata-password-perl_1.07-2_all.deb
  to pool/main/libd/libdata-password-perl/libdata-password-perl_1.07-2_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: RFH: How to debug FTBFS of erlang on sparc (UltraSPARC III)?

2008-01-08 Thread Michael Shuler

On 01/08/2008 09:51 AM, Sergei Golovan wrote:

Which kernel version do you have installed? But anyway, if the build
is successful then this machine is useless for me :)


It is an Etch scratch box running 2.6.18-5-sparc64.  You could certainly 
upgrade/install anything on the box you would like to try to recreate 
the problem - it's all just 1's and 0's  ;)


--
Kind Regards,
Michael Shuler



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: RFH: How to debug FTBFS of erlang on sparc (UltraSPARC III)?

2008-01-08 Thread Michael Shuler

On 01/07/2008 04:29 PM, Sergei Golovan wrote:

I can't build it on UltraSPARC III because I don't have an access to
it.


Have you gotten access to a machine, Sergei?  If not, let me know, I 
would be happy to give you a login.  I successfully (slowly) built 
erlang_11.b.5dfsg-12 last night with pbuilder on my SunFire V120.


--
Kind Regards,
Michael Shuler


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Bug#453680: ITP: djbdns -- Replacement for BIND, written by Dan Bernstein

2007-11-30 Thread Michael Shuler
On 11/30/2007 11:51 AM, Milan P. Stanic wrote:
 Are you sure that the complete package is in the public domain?
 Some files are, but not all of them, AFAIK.

There has been some additional discussion on this topic in BTS, as well
as some other places.

http://bugs.debian.org/453680
http://linux.slashdot.org/article.pl?sid=07/11/30/0430201
http://video.google.com/videoplay?docid=-3147768955127254412

-- 
Michael


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]