[CODE4LIB] Fedora 4 Call to Action–Test Your Favorite Feature!

2014-04-08 Thread Carol Minton Morris
FOR IMMEDIATE RELEASE April 8, 2014 Read it online: http://bit.ly/1hUQw2G Fedora 4 Call to Action–Test Your Favorite Feature! Winchester, MA  A Fedora 4.0 beta will be released in time for Open Repositories 2014. The full list of features to be included in the 4.0 beta and the release is 

Re: [CODE4LIB] viaf

2014-04-08 Thread Eric Lease Morgan
On Apr 7, 2014, at 11:25 PM, Richard Wallis richard.wal...@dataliberate.com wrote: You are correct that in the xmlns namespace definitions in the xml http://viaf.org/viaf/231063554/rdf.xml references a namespace that is no longer used in the output. There is a single commented out reference

Re: [CODE4LIB] ILLiad and LDAP SSL connection issue

2014-04-08 Thread muzzye
These are exactly the same issues we are experiencing. We had some support from individuals at Atlas Systems, and no specific recommendations. One library found a solution on their own; I don't have all the details. It involved installing stunnel (https://www.stunnel.org/index.html) as an

Re: [CODE4LIB] viaf

2014-04-08 Thread Roland Cornelissen
Hi, I have VIAF loaded in my triplestore and did these queries for you: 1) select distinct ?s where {[] a ?Concept} http://xmlns.com/foaf/0.1/Organization http://xmlns.com/foaf/0.1/Person http://dbpedia.org/ontology/Place http://xmlns.com/foaf/0.1/Document

Re: [CODE4LIB] viaf

2014-04-08 Thread LeVan,Ralph
Sorry, Eric! We've known about this problem for a couple of weeks now and had the fix in place, but touching a production system requires motivation. I'll push to get the fix installed this week. In the meantime, here's a pointer to the file you're supposed to get when you ask for

[CODE4LIB] Serious vulnerability in OpenSSL

2014-04-08 Thread Cary Gordon
Please read this page and its supporting documents about the Heartbleed Bug. http://heartbleed.com/ If you use OpenSSL, and most service providers do, you should patch your servers ASAP. OpenSSL versions 1.0.1 through 1.0.1f (inclusive) are vulnerable. Only version 1.0.1g or newer should be

Re: [CODE4LIB] Serious vulnerability in OpenSSL

2014-04-08 Thread Francis Kayiwa
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 4/8/2014 10:06 AM, Cary Gordon wrote: Please read this page and its supporting documents about the Heartbleed Bug. http://heartbleed.com/ If you use OpenSSL, and most service providers do, you should patch your servers ASAP. OpenSSL

Re: [CODE4LIB] Serious vulnerability in OpenSSL

2014-04-08 Thread Becky Yoose
Thanks for forwarding this along, Cary. I've been patching this morning, and am now in the process of determine needs for new certs. (sigh...) If you need some guidance in patching your server, here are a couple of links to start y'all out: Ubuntu-related patch info -

Re: [CODE4LIB] Serious vulnerability in OpenSSL

2014-04-08 Thread Chad Nelson
Francis, Are you asking us to register our servers into a great big list of vulnerable machines? Chad On Tue, Apr 8, 2014 at 10:11 AM, Francis Kayiwa fkay...@colgate.edu wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 4/8/2014 10:06 AM, Cary Gordon wrote: Please read this page

Re: [CODE4LIB] viaf

2014-04-08 Thread Young,Jeff (OR)
The ontology document shouldn't 404s, but either way I'm pretty sure that all the vocabulary terms defined there are obsolete (e.g. viaf:NameAuthorityCluster). The diagram referenced in the 2011-04 Outgoing blog post is still current:

Re: [CODE4LIB] Serious vulnerability in OpenSSL

2014-04-08 Thread Francis Kayiwa
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 4/8/2014 10:27 AM, Chad Nelson wrote: Francis, Are you asking us to register our servers into a great big list of vulnerable machines? Assumption here was. Machine == vulnerable Patch on confirmation but your point is well received. ./fxk

Re: [CODE4LIB] Serious vulnerability in OpenSSL

2014-04-08 Thread Tod Olson
There’s a nice “fork me on github” banner on the test site, so someone motivated could at least check the (purported) code and set up their own checker. So at least they have an implicit “you don’t need to trust us” sign. -Tod On Apr 8, 2014, at 10:00 AM, Francis Kayiwa fkay...@colgate.edu

Re: [CODE4LIB] Serious vulnerability in OpenSSL

2014-04-08 Thread Adam Constabaris
There are other options for testing you can run locally, e.g. http://pastebin.com/WmxzjkXJ I'm pretty sure it doesn't send anything it finds anywhere else, but more folks on this list (a) understand python to verify that for themselves and (b) can run it right now than with Go =) AC On Tue,

[CODE4LIB] Overflow Hotel for 2014 NASIG Conference - Book Now

2014-04-08 Thread publicist
We are pleased to announce that 20 rooms have been secured at an overflow hotel for this year’s NASIG conference. The hotel is: The Courtyard Fort Worth Downtown/Blackstone Hotel 601 Main Street Fort Worth Texas, 76102-5407 Website:

Re: [CODE4LIB] Serious vulnerability in OpenSSL

2014-04-08 Thread Thomas Bennett
There is this one for CentOS 6 http://people.centos.org/z00dax/disable_heartbeat/x86_64/Packages/ They are disabled_heartbeat versions, download your version and use rpm -ivh --force your_version_here to overwrite your current openssl executable. The following were sent out from our campus

Re: [CODE4LIB] Serious vulnerability in OpenSSL

2014-04-08 Thread Riley Childs
Thanks for this, wouldn't have known otherwise, but there goes my Wednesday! Riley Childs Student Asst. Head of IT Services Charlotte United Christian Academy (704) 497-2086 RileyChilds.net Sent from my Windows Phone, please excuse mistakes From: Thomas