Re: [Tails-dev] [review'n'merge:website advisory]

2015-05-13 Thread intrigeri
emmapeel wrote (13 May 2015 07:58:18 GMT) :
 the link to the tor advisory (the last) should be

 https://www.debian.org/security/2015/dsa-3216 instead of
 https://www.debian.org/security/2015/dsa-3246

 patch attached!

merged, thanks!
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] overlay support in bilibop

2015-05-13 Thread intrigeri
Hi,

quidame wrote (09 May 2015 22:57:33 GMT) :
 On 07/05/2015 13:44, intrigeri wrote:
 
 May you please also provide a patch that applies on top of bilibop
 0.4.23? I need to build a Tails/Jessie ISO with a newer kernel (that
 only supports overlayfs).

 'git diff debian/0.4.23..451b58ad17c4ea4a lib/bilibop/common.sh' builds
 the attached patch.

Thanks! /me feels stupid -- I should have thought of it myself :)
Tested, works for basic usage at least.

 Any news on this front?

 Things work pretty good, and will probably be packaged next week.

Yay! That's good news, given that Linux 4.0 packages (that replace
aufs with overlayfs) are now in Debian unstable.

Cheers,
-- 
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] VeraCrypt

2015-05-13 Thread intrigeri
sajolida wrote (13 May 2015 10:34:39 GMT) :
 intrigeri:
 https://tails.boum.org/blueprint/replace_truecrypt/

 Says Due to various concerns, TrueCrypt is about to be replaced in
 Tails, either by tcplay or cryptsetup.

 Shall we delete that blueprint now that #5373 is solved?

Thanks! I've added a warning on that blueprint. I'd like to keep it
around as it has potentially useful historical information.
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] VeraCrypt

2015-05-13 Thread emmapeel
Marco Polo:
 I see you are looking at tcplay to replace TrueCrypt because it supports
 TC with additional functionality. I think it's a good idea.
 
 How do I add VeraCrypt to the list of candidates?
 
 VC is a direct upgrade of TC, completely backward compatible with
 existing TC volumes/containers, can convert them to VC (except encrypted
 systems), and provides significantly improved encryption algorithms.
 
 Since they're all related (TC, VC, tcplay), I bet it wouldn't be too
 difficult to suport them all - users love choices. And the zuluCrypt gui
 could handle all 3.
 

Have you considered the use of LUKS - cryptsetup, advised by Tails?


https://tails.boum.org/doc/encryption_and_privacy/truecrypt/




signature.asc
Description: OpenPGP digital signature
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] overlay support in bilibop

2015-05-13 Thread intrigeri
Hi,

quidame wrote (09 May 2015 22:57:33 GMT) :
 On 07/05/2015 13:44, intrigeri wrote:
 
 May you please also provide a patch that applies on top of bilibop
 0.4.23? I need to build a Tails/Jessie ISO with a newer kernel (that
 only supports overlayfs).

 'git diff debian/0.4.23..451b58ad17c4ea4a lib/bilibop/common.sh' builds
 the attached patch.

Thanks! /me feels stupid -- I should have thought of it myself :)
Tested, works for basic usage at least.

 Any news on this front?

 Things work pretty good, and will probably be packaged next week.

Yay! That's good news, given that Linux 4.0 packages (that replace
aufs with overlayfs) are now in Debian unstable.

Cheers,
-- 
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] VeraCrypt

2015-05-13 Thread sajolida
intrigeri:
 [please don't Cc me, I read the list.]
 
 Marco Polo wrote (13 May 2015 04:42:35 GMT) :
 I see you are looking at tcplay to replace TrueCrypt because it supports TC 
 with
 additional functionality.
 
 Where did you find this information? It looks pretty much out-of-date
 to me.

intrigeri:

https://tails.boum.org/blueprint/replace_truecrypt/

Says Due to various concerns, TrueCrypt is about to be replaced in
Tails, either by tcplay or cryptsetup.

Shall we delete that blueprint now that #5373 is solved?

Marco:

We are not considering tcplay to replace TrueCrypt now that we have
support to open TrueCrypt volumes in cryptsetup, see

https://tails.boum.org/doc/encryption_and_privacy/truecrypt

The only thing that we are considering changing regarding the current
situation is to provide a graphical way of opening TrueCrypt volumes as
an interoperability feature for encrypted data between Tails and other
operating systems. See the discussion we had on:

https://mailman.boum.org/pipermail/tails-dev/2015-April/008566.html

But our conclusion was that we should work on having support to open
TrueCrypt volume in the usual stack: cryptsetup  udisks  Disk Utility.

-- 
sajolida
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] Jenkins build is back to normal : build_Tails_ISO_stable #391

2015-05-13 Thread tails-sysadmins
See https://jenkins.tails.boum.org/job/build_Tails_ISO_stable/391/changes

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] Test to see why my emails are held in moderation

2015-05-13 Thread Giorgio Maone
Look at the subject :)

-- 
Giorgio Maone
https://maone.net

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] Build failed in Jenkins: build_Tails_ISO_experimental #2265

2015-05-13 Thread tails-sysadmins
See https://jenkins.tails.boum.org/job/build_Tails_ISO_experimental/2265/

--
[...truncated 3805 lines...]
102 translated messages, 4 fuzzy translations, 5 untranslated messages.
.. done.
110 translated messages, 1 untranslated message.
.. done.
110 translated messages, 1 untranslated message.
.. done.
90 translated messages, 14 fuzzy translations, 7 untranslated messages.
.. done.
110 translated messages, 1 untranslated message.
.. done.
110 translated messages, 1 untranslated message.
.. done.
102 translated messages, 4 fuzzy translations, 5 untranslated messages.
.. done.
110 translated messages, 1 untranslated message.
.. done.
110 translated messages, 1 untranslated message.
.. done.
110 translated messages, 1 untranslated message.
.. done.
110 translated messages, 1 untranslated message.
.. done.
102 translated messages, 4 fuzzy translations, 5 untranslated messages.
.. done.
110 translated messages, 1 untranslated message.
.. done.
110 translated messages, 1 untranslated message.
 done.
110 translated messages, 1 untranslated message.
... done.
102 translated messages, 4 fuzzy translations, 5 untranslated messages.
. done.
110 translated messages, 1 untranslated message.
.. done.
102 translated messages, 4 fuzzy translations, 5 untranslated messages.
.. done.
91 translated messages, 13 fuzzy translations, 7 untranslated messages.
.. done.
108 translated messages, 2 fuzzy translations, 1 untranslated message.
.. done.
110 translated messages, 1 untranslated message.
.. done.
110 translated messages, 1 untranslated message.
.. done.
110 translated messages, 1 untranslated message.
.. done.
110 translated messages, 1 untranslated message.
.. done.
110 translated messages, 1 untranslated message.
.. done.
110 translated messages, 1 untranslated message.
.. done.
110 translated messages, 1 untranslated message.
.. done.
102 translated messages, 4 fuzzy translations, 5 untranslated messages.
.. done.
91 translated messages, 13 fuzzy translations, 7 untranslated messages.
.. done.
102 translated messages, 4 fuzzy translations, 5 untranslated messages.
.. done.
110 translated messages, 1 untranslated message.
.. done.
110 translated messages, 1 untranslated message.
.. done.
110 translated messages, 1 untranslated message.
.. done.
110 translated messages, 1 untranslated message.
.. done.
102 translated messages, 4 fuzzy translations, 5 untranslated messages.
.. done.
0 translated messages, 111 untranslated messages.
.. done.
110 translated messages, 1 untranslated message.
.. done.
110 translated messages, 1 untranslated message.
ar: .. done.
az: .. done.
ca: .. done.
cs: .. done.
cy: .. done.
da: .. done.
de: .. done.
el: .. done.
en_GB: .. done.
es: .. done.
fa: .. done.
fi: .. done.
fr:  done.
fr_CA: .. done.
hr_HR: .. done.
hu: .. done.
id: .. done.
it: .. done.
ja: .. done.
km: .. done.
ko: .. done.
lv: .. done.
nb: .. done.
nl: .. done.
pl: .. done.
pt: .. done.
pt_BR: .. done.
ru: .. done.
sk: .. done.
sk_SK: .. done.
sl_SI: .. done.
sq: .. done.
sr: .. done.
sv: .. done.
tr: .. done.
uk: .. done.
zh: .. done.
zh_CN: .. done.
zh_TW: .. done.


 * Current translation support in tails 

ar: 102 translated messages, 4 fuzzy translations, 5 untranslated messages.
az: 102 translated messages, 4 fuzzy translations, 5 untranslated messages.
ca: 110 translated messages, 1 untranslated message.
cs: 110 translated messages, 1 untranslated message.
cy: 90 translated messages, 14 fuzzy translations, 7 untranslated messages.
da: 110 translated messages, 1 untranslated message.
de: 110 translated messages, 1 untranslated message.
el: 102 translated messages, 4 fuzzy translations, 5 untranslated messages.
en_GB: 110 translated messages, 1 untranslated 

[Tails-dev] [review'n'merge:website advisory]

2015-05-13 Thread emmapeel
Small typo on the security notes, spotted by user, confirmed by me. At

https://tails.boum.org/security/Numerous_security_holes_in_1.3.2/index.en.html


the link to the tor advisory (the last) should be

https://www.debian.org/security/2015/dsa-3216 instead of
https://www.debian.org/security/2015/dsa-3246

patch attached!

From 49004e80e820eed463433a27cdb64e43742a6ee7 Mon Sep 17 00:00:00 2001
From: Tails developers amne...@boum.org
Date: Wed, 13 May 2015 07:51:14 +
Subject: [PATCH] tor debian advisory typo

---
 wiki/src/security/Numerous_security_holes_in_1.3.2.mdwn |2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/wiki/src/security/Numerous_security_holes_in_1.3.2.mdwn b/wiki/src/security/Numerous_security_holes_in_1.3.2.mdwn
index 59fc0f3..a7cb6be 100644
--- a/wiki/src/security/Numerous_security_holes_in_1.3.2.mdwn
+++ b/wiki/src/security/Numerous_security_holes_in_1.3.2.mdwn
@@ -28,4 +28,4 @@ Details
  - libxml2: Fixup on [[!cve CVE-2014-3660]] for [[!debsa2014 3057]]
  - OpenJDK 7: [[!debsa2015 3235]]
  - ppp: [[!debsa2015 3228]]
- - tor: [[!debsa2015 3246]]
+ - tor: [[!debsa2015 3216]]
-- 
1.7.10.4



signature.asc
Description: OpenPGP digital signature
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] extension specification

2015-05-13 Thread Giorgio Maone
On 12/05/2015 18:54, sajolida wrote:

 B. It's not the latest version of the extension. This version is
 incompatible with the version of the page. We can't go forward or
 otherwise stuff won't work:

   - How can we detect that? Through a version number in the URL as you
 are proposing? Wouldn't a version number in the code of the page be more
 simple?
I vote for a version string at a fixed location (div
id=ui-version1.0/div) of the HTML.
Of course, we can keep it user-invisible via CSS (#ui-version { display:
none }).

   - Then what do we do once we detected that incompatibility? Redirect
 to a compatible version of the page that we're keeping on the website
 for backward compatibility?
The extension can detect the incompatibility and ask the user that if
she wants to proceed by upgrading the downloader first ([Upgrade
Downloader] / [Abort]).
On [Upgrade Downloader], the extension forces its own upgrade to be
performed quietly (with no further prompts / warning unless something
goes wrong, e.g. if AMO's SSL certificate is bogus) and goes on with the
download+verify process.

 C. It's not the latest version of the extension. This version is
 compatible with the version of the page but we did a security upgrade of
 the extension and we want to force people to update. In that case, we
 need something on the page that says which version of the extension is
 expected and asks for an upgrade if it doesn't match. That would be a
 different version of slide 3 but to update instead of install.
Same as B above.

Of course all of this is particularly relevant for those who have
automatic add-ons updates disabled, such as Tor Browser users AFAIK.
Regular Firefox users would usually receive the most recent version of
the extension silently and timely through AMO.

-- 
Giorgio Maone
https://maone.net


___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] VeraCrypt

2015-05-13 Thread intrigeri
Hi,

[please don't Cc me, I read the list.]

Marco Polo wrote (13 May 2015 04:42:35 GMT) :
 I see you are looking at tcplay to replace TrueCrypt because it supports TC 
 with
 additional functionality.

Where did you find this information? It looks pretty much out-of-date
to me.

 How do I add VeraCrypt to the list of candidates?

https://tails.boum.org/support/faq/#new_software

Cheers,
-- 
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.