Re: Please rebuild all ports that depend on PNG

2012-06-03 Thread Matthew Seaman
On 02/06/2012 23:53, Chad Perrin wrote:
 In fact, many of the weaknesses of SSL systems as currently designed
 could be obviated by having used OpenPGP as the basis of the system
 rather than creating this whole PKI system for the sole purpose of making
 corporate CAs seem necessary as imaginary authorities who claim to be
 able to provide special security guarantees.

There's very interesting work going on at the moment about publishing
SSL keys or fingerprints via DNSSEC-secured DNS.  See:

http://www.internetsociety.org/articles/dane-taking-tls-authentication-next-level-using-dnssec

https://tools.ietf.org/html/draft-ietf-dane-protocol-21

So anyone in control of a DNS domain and capable of enabling DNSSEC can
issue themselves authenticable TLS certificates without having to line
the pockets of the CAs.  Server-side, support for the TLSA RR type this
is all based on was added to the last update of BIND, which hit stable
on Friday. Client side, support is available in Chrome and FireFox by
various means.

Other than throwing a big spanner into the works for the whole CA
business model, this moves the responsibility for identifying the site
owner from the CA to the DNS Registrar[*].  While the normal mode will
be to have authenticity assured from the root, this does in principle
permit any number of DLV-style trust anchors.  Whether that can be
parlayed into PGP style web-of-trust is an interesting question.

Cheers,

Matthew

[*]  It's not hard to convince a DNS Registrar that you should have the
rights to a domain name -- you just keep giving them money.

-- 
Dr Matthew J Seaman MA, D.Phil.
PGP: http://www.infracaninophile.co.uk/pgpkey




signature.asc
Description: OpenPGP digital signature


Re: Please rebuild all ports that depend on PNG

2012-06-03 Thread Jason Hellenthal


On Sun, Jun 03, 2012 at 08:14:40AM +0100, Matthew Seaman wrote:
 On 02/06/2012 23:53, Chad Perrin wrote:
  In fact, many of the weaknesses of SSL systems as currently designed
  could be obviated by having used OpenPGP as the basis of the system
  rather than creating this whole PKI system for the sole purpose of making
  corporate CAs seem necessary as imaginary authorities who claim to be
  able to provide special security guarantees.
 
 There's very interesting work going on at the moment about publishing
 SSL keys or fingerprints via DNSSEC-secured DNS.  See:
 
 http://www.internetsociety.org/articles/dane-taking-tls-authentication-next-level-using-dnssec
 
 https://tools.ietf.org/html/draft-ietf-dane-protocol-21
 
 So anyone in control of a DNS domain and capable of enabling DNSSEC can
 issue themselves authenticable TLS certificates without having to line
 the pockets of the CAs.  Server-side, support for the TLSA RR type this
 is all based on was added to the last update of BIND, which hit stable
 on Friday. Client side, support is available in Chrome and FireFox by
 various means.
 
 Other than throwing a big spanner into the works for the whole CA
 business model, this moves the responsibility for identifying the site
 owner from the CA to the DNS Registrar[*].  While the normal mode will
 be to have authenticity assured from the root, this does in principle
 permit any number of DLV-style trust anchors.  Whether that can be
 parlayed into PGP style web-of-trust is an interesting question.
 

Hey! thats pretty cool. Thanks for the information Matt.



-- 

 - (2^(N-1))
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Please rebuild all ports that depend on PNG

2012-06-02 Thread Heino Tiedemann
WOW - is the realy no other posibillity for PNG than rebuild all
depended Ports?

It is al lot! it will cost me three days


Realy no other possibility?!


Information for png-1.4.11:

Required by:
ImageMagick-6.7.7.0
Terminal-0.4.8
Thunar-1.4.0
akonadi-1.7.2
ark-4.8.3
audacious-3.2.2
audacious-plugins-3.2.2_1
cairo-1.10.2_3,2
cairomm-1.10.0
clementine-player-1.0.0_4
cm-super-0.3.4_3
consolekit-0.4.3
cups-base-1.5.2
cups-image-1.5.2
cups-pstoraster-8.15.4_6
dbus-qt3-0.70_5
dconf-0.5.1_3
de-kde-l10n-4.8.3
de-libreoffice-3.5.2
doxygen-1.8.0
dvipsk-tetex-5.95a_5
easytag-2.1.7
emacs-24.0.93.107364,1
ffmpeg-0.7.12_1,1
filelight-4.8.3
firefox-12.0,1
gconf2-2.32.0_2
gd-2.0.35_7,1
gdk-pixbuf-2.23.5_2
geeqie-1.0_4
gegl-0.1.8_3
ghostscript8-8.71_8
gimp-app-2.6.12,1
gnome-icon-theme-2.31.0_1
gnome-keyring-2.32.1_1
gnome-mount-0.8_9
gnome-vfs-2.24.4
gpac-libgpac-0.4.5_5,1
graphviz-2.28.0
grip-3.3.1_4
gstreamer-0.10.35
gstreamer-ffmpeg-0.10.13
gstreamer-plugins-0.10.35_1,3
gstreamer-plugins-a52dec-0.10.18,3
gstreamer-plugins-bad-0.10.22,3
gstreamer-plugins-core-0.10_12
gstreamer-plugins-dts-0.10.22,3
gstreamer-plugins-dvd-0.10.18_1,3
gstreamer-plugins-flac-0.10.30,3
gstreamer-plugins-gio-0.10.35,3
gstreamer-plugins-good-0.10.30,3
gstreamer-plugins-libpng-0.10.30,3
gstreamer-plugins-mad-0.10.18,3
gstreamer-plugins-mp3-0.10.0_1
gstreamer-plugins-ogg-0.10.35,3
gstreamer-plugins-pango-0.10.35,3
gstreamer-plugins-soup-0.10.30,3
gstreamer-plugins-theora-0.10.35,3
gstreamer-plugins-ugly-0.10.18_1,3
gstreamer-plugins-vorbis-0.10.35,3
gstreamer-plugins-xvid-0.10.22,3
gtk-2.24.6_1
gtk-engines2-2.20.2
gtk-update-icon-cache-2.24.6
gtk-xfce-engine-3.0.0
gtkimageview-1.6.4_2
gtkmm-2.24.2
gvfs-1.6.6_2
hal-0.5.14_19
hupnp-1.0.0
icons-tango-0.8.90_1
icons-tango-extras-0.1.0_4
jbig2dec-0.11
kactivities-4.8.3
kate-4.8.3
kaudiocreator-1.2.90_4
kcalc-4.8.3
kcharselect-4.8.3
kde-baseapps-4.8.3
kde-runtime-4.8.3
kde-wallpapers-4.8.3
kde-workspace-4.8.3
kdelibs-4.8.3
kdemultimedia-4.8.3
kdepimlibs-4.8.3
kdetoys-4.8.3
kdf-4.8.3
kfloppy-4.8.3
kgpg-4.8.3
kio-upnp-ms-1.0.0.g20110808_1
konsole-4.8.3
kremotecontrol-4.8.3
ksnapshot-4.8.3
ktimer-4.8.3
kwallet-4.8.3
lensfun-0.2.5_2
libbonoboui-2.24.4
libcanberra-0.28_1
libdbusmenu-qt-0.9.2
libdmtx-0.7.4_1
libexo-0.8.0
libglade2-2.6.4_4
libgnome-2.32.0
libgnome-keyring-2.32.0_1
libgnomecanvas-2.30.3
libgnomeui-2.24.4
libgsf-1.14.21
libkate-0.4.1
libkipi-4.8.3
libkonq-4.8.3
liblastfm-0.3.3_2
libmcs-0.7.2_1
libnotify-0.7.3_1
libqrencode-3.3.1
libreoffice-3.5.2_2
librsvg2-2.34.1
libsoup-gnome-2.34.3_1
libspectre-0.2.6
libvisio-0.0.16
libwnck-2.30.6
libwpd-0.9.4
libwpg-0.2.1
libwps-0.2.6
libxfce4gui-4.10.0
libxfce4menu-4.10.0
libxine-1.2.1
libzvbi-0.2.33_3
linux-opera-11.62
m17n-lib-1.6.3
mousepad-0.2.16_9
mplayer-1.0.r20120322_1
netpbm-10.35.84_1
okular-4.8.3
open-motif-2.3.3
orage-4.8.3
pango-1.28.4
pangomm-2.28.2
phonon-4.6.0
phonon-gstreamer-4.6.0
plasma-applet-simpleweatherforecast-1.3_3
policykit-gnome-0.9.2_5
polkit-0.99
polkit-kde-0.99.0_2
polkit-qt-0.103.0
poppler-0.18.4
poppler-glib-0.18.4_1
poppler-qt4-0.18.4
prison-1.0
qimageblitz-0.0.6
qt-3.3.8_13
qt4-assistant-4.8.1
qt4-declarative-4.8.1
qt4-designer-4.8.1
qt4-gui-4.8.1
qt4-help-4.8.1
qt4-help-tools-4.8.1
qt4-iconengines-4.8.1
qt4-imageformats-4.8.1
qt4-inputmethods-4.8.1
qt4-linguist-4.8.1
qt4-opengl-4.8.1
qt4-pixeltool-4.8.1
qt4-qdbusviewer-4.8.1
qt4-qt3support-4.8.1
qt4-qvfb-4.8.1
qt4-scripttools-4.8.1
qt4-svg-4.8.1
qt4-webkit-4.8.1
qtscriptgenerator-0.2.0
qzeitgeist-0.8.0
rawstudio-2.0_1
rawtherapee-4.0.8
sdl_image-1.2.12
seamonkey-2.9.1
squeeze-0.2.3_3
strigi-0.7.7_1
superkaramba-4.8.3
sweeper-4.8.3
teTeX-3.0_5
teTeX-base-3.0_22
thunar-vfs-1.2.0_1
ufraw-0.18_2
upower-0.9.7
vigra-1.7.1_3
vlc-1.1.13_9,3
vorbis-tools-1.4.0_2,3
vte-0.26.2_1
webp-0.1.3
x264-0.123.2189_1
xcursorgen-1.0.4
xdvik-tetex-22.84.16_3
xf86-input-keyboard-1.6.1
xf86-input-mouse-1.7.1
xf86-video-ati-6.14.3_1
xfce-4.10
xfce4-appfinder-4.10.0
xfce4-artwork-0.0.4_11
xfce4-conf-4.10.0
xfce4-desktop-4.10.0
xfce4-mixer-4.8.0_1
xfce4-notifyd-0.2.2_1
xfce4-panel-4.10.0
xfce4-print-4.6.1_7
xfce4-session-4.10.0
xfce4-settings-4.10.0
xfce4-tumbler-0.1.25
xfce4-utils-4.8.3_3
xfce4-weather-plugin-0.7.4_2
xfce4-wm-4.10.0
xfce4-wm-themes-4.10.0
xorg-apps-7.5.2
xorg-server-1.7.7_5,1
xvattr-1.3_7

___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: Please rebuild all ports that depend on PNG

2012-06-02 Thread Matthew Seaman
On 02/06/2012 07:59, Heino Tiedemann wrote:
 WOW - is the realy no other posibillity for PNG than rebuild all
 depended Ports?
 
 It is al lot! it will cost me three days
 
 
 Realy no other possibility?!

You need to rebuild all the ports that install binaries that link
against libpngNN.so.NN.  That is actually a subset of the ports that
depend on graphics/png -- unfortunately it takes some effort to identify
precisely what does need rebuilding.  There is the pkg_libchk script
(which is part of sysutils/bsdadminscripts) that can help.

However all ports that are known to depend on graphics/png have had
portrevision bumps even when this makes no difference what so ever --
such as for ports that install pure perl code -- so the normal process
of maintaining your ports will eventually result in your rebuilding
everything in your list.

Use pkg_libchk to prioritise the ports that really need to be rebuilt.
Also, when upgrading graphics/png remember to use 'portmaster -w' or
equivalent to preserve a copy of the old shlib, otherwise a lot of your
apps will stop working for the duration of the upgrade session.

Cheers,

Matthew

-- 
Dr Matthew J Seaman MA, D.Phil.
PGP: http://www.infracaninophile.co.uk/pgpkey




signature.asc
Description: OpenPGP digital signature


Re: Please rebuild all ports that depend on PNG

2012-06-02 Thread Miroslav Lachman

Matthew Seaman wrote:

On 02/06/2012 07:59, Heino Tiedemann wrote:

WOW - is the realy no other posibillity for PNG than rebuild all
depended Ports?

It is al lot! it will cost me three days


Realy no other possibility?!


You need to rebuild all the ports that install binaries that link
against libpngNN.so.NN.  That is actually a subset of the ports that
depend on graphics/png -- unfortunately it takes some effort to identify
precisely what does need rebuilding.  There is the pkg_libchk script
(which is part of sysutils/bsdadminscripts) that can help.

However all ports that are known to depend on graphics/png have had
portrevision bumps even when this makes no difference what so ever --
such as for ports that install pure perl code -- so the normal process
of maintaining your ports will eventually result in your rebuilding
everything in your list.

Use pkg_libchk to prioritise the ports that really need to be rebuilt.
Also, when upgrading graphics/png remember to use 'portmaster -w' or
equivalent to preserve a copy of the old shlib, otherwise a lot of your
apps will stop working for the duration of the upgrade session.


And maybe you can try to use EXPLICIT_PACKAGE_DEPENDS=true in make.conf 
to record only direct dependencies, so next time you can easily list 
those ports by


   pkg_info -R png-1.4.11

Miroslav Lachman
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: Please rebuild all ports that depend on PNG

2012-06-02 Thread b. f.
  Realy no other possibility?!

 You need to rebuild all the ports that install binaries that link
 against libpngNN.so.NN.  That is actually a subset of the ports that
 depend on graphics/png -- unfortunately it takes some effort to identify
 precisely what does need rebuilding.  There is the pkg_libchk script
 (which is part of sysutils/bsdadminscripts) that can help.
...
 Use pkg_libchk to prioritise the ports that really need to be rebuilt.

Lawrence Stewart's convenient script can be used with portmaster to
perform this kind of update:

https://lauren.room52.net/hg/scripts/raw-file/tip/libdepend/libdepend.sh

b.
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: Please rebuild all ports that depend on PNG

2012-06-02 Thread Jerry
On Sat, 2 Jun 2012 11:07:28 -0400
b. f. articulated:

  Realy no other possibility?!

 You need to rebuild all the ports that install binaries that link
 against libpngNN.so.NN.  That is actually a subset of the ports that
 depend on graphics/png -- unfortunately it takes some effort to
 identify precisely what does need rebuilding.  There is the
 pkg_libchk script (which is part of sysutils/bsdadminscripts) that
 can help.
...
 Use pkg_libchk to prioritise the ports that really need to be
 rebuilt.

Lawrence Stewart's convenient script can be used with portmaster to
perform this kind of update:

https://lauren.room52.net/hg/scripts/raw-file/tip/libdepend/libdepend.sh

I am receiving a: This Connection is Untrusted warning from Firefox
when I attempt to connect to that URL. It is probably harmless;
however, it certainly doesn't instill confidence is someone viewing the
site for the first time.

-- 
Jerry ♔

Disclaimer: off-list followups get on-list replies or get ignored.
Please do not ignore the Reply-To header.
__

___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: Please rebuild all ports that depend on PNG

2012-06-02 Thread Chris Rees
On Jun 2, 2012 5:27 PM, Jerry je...@seibercom.net wrote:

 On Sat, 2 Jun 2012 11:07:28 -0400
 b. f. articulated:

   Realy no other possibility?!
 
  You need to rebuild all the ports that install binaries that link
  against libpngNN.so.NN.  That is actually a subset of the ports that
  depend on graphics/png -- unfortunately it takes some effort to
  identify precisely what does need rebuilding.  There is the
  pkg_libchk script (which is part of sysutils/bsdadminscripts) that
  can help.
 ...
  Use pkg_libchk to prioritise the ports that really need to be
  rebuilt.
 
 Lawrence Stewart's convenient script can be used with portmaster to
 perform this kind of update:
 
 https://lauren.room52.net/hg/scripts/raw-file/tip/libdepend/libdepend.sh

 I am receiving a: This Connection is Untrusted warning from Firefox
 when I attempt to connect to that URL. It is probably harmless;
 however, it certainly doesn't instill confidence is someone viewing the
 site for the first time.


It just means he hasn't bought a certificate- no less trustworthy than
vanilla (non-SSL) http.

Chris
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: Please rebuild all ports that depend on PNG

2012-06-02 Thread Jerry
On Sat, 2 Jun 2012 17:34:59 +0100
Chris Rees articulated:

On Jun 2, 2012 5:27 PM, Jerry je...@seibercom.net wrote:

 On Sat, 2 Jun 2012 11:07:28 -0400
 b. f. articulated:

   Realy no other possibility?!
 
  You need to rebuild all the ports that install binaries that link
  against libpngNN.so.NN.  That is actually a subset of the ports
  that depend on graphics/png -- unfortunately it takes some effort
  to identify precisely what does need rebuilding.  There is the
  pkg_libchk script (which is part of sysutils/bsdadminscripts) that
  can help.
 ...
  Use pkg_libchk to prioritise the ports that really need to be
  rebuilt.
 
 Lawrence Stewart's convenient script can be used with portmaster to
 perform this kind of update:
 
 https://lauren.room52.net/hg/scripts/raw-file/tip/libdepend/libdepend.sh

 I am receiving a: This Connection is Untrusted warning from Firefox
 when I attempt to connect to that URL. It is probably harmless;
 however, it certainly doesn't instill confidence is someone viewing
 the site for the first time.


It just means he hasn't bought a certificate- no less trustworthy than
vanilla (non-SSL) http.

IMHO, if you are going to use https then you should have a proper SSL
certificate. A self-signed one means virtually nothing. If the web site
operator is not going to purchase an authentic certificate they why
use SSL at all? Just my 2¢ on the matter.

-- 
Jerry ♔

Disclaimer: off-list followups get on-list replies or get ignored.
Please do not ignore the Reply-To header.
__
Graduate students and most professors are
no smarter than undergrads.  They're just older.
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: Please rebuild all ports that depend on PNG

2012-06-02 Thread Kevin Oberman
On Sat, Jun 2, 2012 at 6:07 PM, Jerry je...@seibercom.net wrote:
 On Sat, 2 Jun 2012 17:34:59 +0100
 Chris Rees articulated:

On Jun 2, 2012 5:27 PM, Jerry je...@seibercom.net wrote:

 On Sat, 2 Jun 2012 11:07:28 -0400
 b. f. articulated:

   Realy no other possibility?!
 
  You need to rebuild all the ports that install binaries that link
  against libpngNN.so.NN.  That is actually a subset of the ports
  that depend on graphics/png -- unfortunately it takes some effort
  to identify precisely what does need rebuilding.  There is the
  pkg_libchk script (which is part of sysutils/bsdadminscripts) that
  can help.
 ...
  Use pkg_libchk to prioritise the ports that really need to be
  rebuilt.
 
 Lawrence Stewart's convenient script can be used with portmaster to
 perform this kind of update:
 
 https://lauren.room52.net/hg/scripts/raw-file/tip/libdepend/libdepend.sh

 I am receiving a: This Connection is Untrusted warning from Firefox
 when I attempt to connect to that URL. It is probably harmless;
 however, it certainly doesn't instill confidence is someone viewing
 the site for the first time.


It just means he hasn't bought a certificate- no less trustworthy than
vanilla (non-SSL) http.

 IMHO, if you are going to use https then you should have a proper SSL
 certificate. A self-signed one means virtually nothing. If the web site
 operator is not going to purchase an authentic certificate they why
 use SSL at all? Just my 2¢ on the matter.

No, it means that the transfer is encrypted. There is no guarantee
that the site you are downloading from is the site you thought you
were, but many people like to do https as a matter of principle. For
this, self-signed certs  are fine.

And, if you think think a valid cert really guarantees anything other
than encryption, you have not been paying attention to the news. There
are lots of bogus, but properly signed certs out there.
-- 
R. Kevin Oberman, Network Engineer
E-mail: kob6...@gmail.com
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: Please rebuild all ports that depend on PNG

2012-06-02 Thread Chad Perrin
On Sat, Jun 02, 2012 at 02:07:03PM -0400, Jerry wrote:
 On Sat, 2 Jun 2012 17:34:59 +0100 Chris Rees articulated:
 
 It just means he hasn't bought a certificate- no less trustworthy than
 vanilla (non-SSL) http.
 
 IMHO, if you are going to use https then you should have a proper SSL
 certificate. A self-signed one means virtually nothing. If the web site
 operator is not going to purchase an authentic certificate they why
 use SSL at all? Just my 2¢ on the matter.

1. SSL means encrypted, regardless of who signs the certificate.

2. Using a known CA for certificate signing means a third party with
enough clout to get added to a list of known CAs vouches for the
certificate (or that someone else has somehow compromised that third
party's cert signing resources).

3. Many trusted widely-known CAs have questionable policies with regard
to certificate signing, and often use very weak ciphers for cert signing.
On several occasions, government agencies and malicious security crackers
have been found using bogus certs that verify as signed by legitimate
CAs.

4. Regardless of who signs a cert, you still have to trust the site
operators to some extent, because the encryption certainly doesn't stop
*them* from getting the information you're sending, so in principle a
self-signed cert is not in any way an indication of any lesser
trustworthiness.

5. As long as you can get trustworthy confirmation of the provenance of a
given cert's signature, you can verify the cert as authentic for the site
in question, subject to the limitations of the technology used.

The not-quite-obvious (to many, at least) consequence of the above is
that the entire PKI system used by CAs for SSL is what amounts to a
vacant lot scam.  This is where a vacant parking lot -- owned by someone
who is not making (much) use of it on a given occasion -- is claimed by
someone wearing something like a valet uniform, who takes money in
exchange for parking someone's car in the lot but actually has no
relationship with the lot owner at all.  The result is that people
parking in the lot are being charged money for the promise of something
(official, property-owner permission to park there, plus responsible care
for the vehicles in question) that to some extent the person charging the
money is not in a position to offer.

The analogous condition in this case is that the well-known CAs are
promising security and privacy that can be gotten by other, cheaper
means, but to some extent do not even provide as high quality a guarantee
as they would like you to think.  Alternate verification infrastructures
such as Monkeysphere and (my favorite, in terms of design principles)
Perspectives provide roughly equivalent security value, and if they reach
a threshhold of user density would exceed the security value of CA-signed
certificates as a basis for verification.  In addition to this, simply
posting cert signature data publicly for out-of-band comparison could
greatly enhance the verifiability of SSL site certificates, as with an
OpenPGP public key.

In fact, many of the weaknesses of SSL systems as currently designed
could be obviated by having used OpenPGP as the basis of the system
rather than creating this whole PKI system for the sole purpose of making
corporate CAs seem necessary as imaginary authorities who claim to be
able to provide special security guarantees.

So . . . your opinion may be that a self-signed sertificate means
virtually nothing, but security in the real world does not operate on
unfounded opinions.

-- 
Chad Perrin [ original content licensed OWL: http://owl.apotheon.org ]
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org