Bug#683313: libvirtd8) does not generate valid RFC 4122 UUIDs

2012-07-30 Thread Aaron Toponce
Package: libvirt-bin Version: 0.9.12-3 When viewing the contents of the /etc/libvirt/qemu/*.xml files, the UUID strings should be conformant to RFC 4122, which states that the version bit should be one of 1, 2, 3, 4, or 5 and the variant bit should be one of 8, 9, a, or b. However, I have the foll

Bug#643789: ITP: salt -- Remote server administration suite

2012-05-20 Thread Aaron Toponce
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Devon Stewart wrote: >Hey! Are you still working on this? I was just about to try my hand at >packaging >it, but if you've got it covered that's fine too. My goal was to have >Salt >packaged by the time 1.0 ships, (having salt packaged also happens

Bug#674068: xtightvncviewer(1) describes [OPTION] that does not seem to exist

2012-05-22 Thread Aaron Toponce
Package: xtightvncviewer Version 1.3.9-6.3 According to the vncviewer(1) manpage, "-user username" is a valid option for logging in as another user than your current local login. However, when trying to pass "-user username", an error is given, due to the non-zero exit code. No useful information

Bug#858488: dieharder segfaults when testing the XOR generator

2017-03-22 Thread Aaron Toponce
Package: dieharder Version: 3.31.1-7 When testing the XOR generator with dieharder(1), the program segfaults: % dieharder -g 207 -a zsh: segmentation fault dieharder -g 207 -a This generator is a listed generator, according to `-g -1': % dieharder -g -1 #==

Bug#828779: argon2 always produces an `Illegal instruction' with exit code 132

2016-06-27 Thread Aaron Toponce
Package: argon2 Version: 0~20160406-2 When argon2(1) is executed, it always produces an unsuccessful exit with exit code 132, and the error message `Illegal instruction', regardless of options passed. The expected password hash is never printed to STDOUT. For example: $ echo password | argon

Bug#755519: haveged(8) 1.9.1-1 is not honoring /etc/default/haveged when using systemd(8)

2014-07-21 Thread Aaron Toponce
Package: haveged Version: 1.9.1-1 Severity: Important haveged(8) is not honoring the DAEMON_ARGS variable in /etc/default/haveged when the init system is systmed(8). This is due to the following configuration file: $ cat /etc/systemd/system/default.target.wants/haveged.service [Unit]

Bug#864253: Please remove bcrypt- it has not been updated in 15 years, manpage is incorrect, and package is incorrectly named

2017-06-05 Thread Aaron Toponce
Package: bcrypt Version: 1.1-8.1+b1 The bcrypt package is 15 years outdated, with no updates. The last update was 2002-09-13: https://sourceforge.net/projects/bcrypt/files/. In addition, bug #700758 mentions that bcrypt does not use a secure form of encryption, in that it uses the Blowfish algori

Bug#872889: python-pil ImageDraw text() regression drawing blank lines of text

2017-08-22 Thread Aaron Toponce
Package: python-pil Version: 4.2.1-1 When using the text() function with the PIL ImageDraw module, if the text contains a blankline (IE: "\n\n"), PIL crashes. However, if horizontal whitespace exists in the blank line, the module will not error out. But if the blank line is excactly "\n\n", witho

Bug#872957: Python Tkinter Label() funcion is expecting an integer, getting "Sans"

2017-08-22 Thread Aaron Toponce
Package: python-tk Version: 2.7.13-1 When trying to create a Tk Label object, Python Tkinter crashes. Here is the a traceback of the error: >>> import Tkinter >>> tk = Tkinter.Tk() >>> label = Tkinter.Label(tk, text="Testing") Traceback (most recent call last): File "", line

Bug#872957: 32-bit is not affected

2017-08-23 Thread Aaron Toponce
It appears that this only affects the 64-bit packages. The 32-bit packages of the same versions are not affected: >>> import Tkinter >>> tk = Tkinter.Tk() >>> Tkinter._test() (pops up a Tcl/Tk window with buttons to click) -- . o . o . o . . o o . . . o . . . o . o o

Bug#875741: Debian mirror mirrors.xmission.com: sync-frequency

2017-09-14 Thread Aaron Toponce
re files that have been added to the archive in > recent years in the correct stage. It also should produce trace files that > contain more information that is useful for us. > > http://ftp.debian.org/debian/project/ftpsync/ftpsync-current.tar.gz I'll look at getting this setup,

Bug#832935: kpcli: Perl's rand() is not cryptographically secure. Patch included

2016-07-29 Thread Aaron Toponce
Package: kpcli Version: 2.7-1 Severity: normal kpcli uses rand() for its RNG, which is not cryptographically secure [0]. A drop in replacement would be to use Math::Random::ISAAC [1] which provides a rand() subroutine via the `libmath-random-isaac-perl' package, which should be provided as a depen

Bug#619183: Hashcash token does not represent bits calculated [Bug]

2011-03-21 Thread Aaron Toponce
Package: hashcash Version: 1.21-1 According to the documentation, the hashcash binary supports the '-b bits' switch and argument for calculating a hashcash token of the size specified. The default size is 20 bits. The '-b' switch argument supports an exact size, say '-b 40' for minting a 40 bit to

Bug#581413: The default umask in Debian should be changed to '0002' to be fully compliant with user private groups

2010-05-12 Thread Aaron Toponce
Package: login Version: 1:4.1.4.2-1 First, a discussion about this bug on the debian-devel mailing list [1]. This affects unstable, testing and stable. To summarize: Debian uses user private groups (UPG) by default. This places each user on the system in their own default, private group, that no

Bug#581434: closed by Santiago Vila (Bug#581434: fixed in base-files 5.4)

2010-05-14 Thread Aaron Toponce
On 05/13/2010 11:21 AM, Debian Bug Tracking System wrote: > This is an automatic notification regarding your Bug report > which was filed against the base-files package: > > #581434: The default umask in Debian should be changed to '0002' to be fully > compliant with user private groups > > It h

Bug#581729: [SQUEEZE] Document the umask change for new installs

2010-05-15 Thread Aaron Toponce
On 05/15/2010 05:26 AM, Christoph Anton Mitterer wrote: > On Sat, 2010-05-15 at 14:16 +0300, Andrei Popescu wrote: >> for regular users > Would have to double check it,... but doesn't the current change also > affect root? This does, but root is also in his own UPG. If you add any user to the root

Bug#581729: [SQUEEZE] Document the umask change for new installs

2010-05-15 Thread Aaron Toponce
On 05/15/2010 05:50 AM, Christoph Anton Mitterer wrote: > On Sat, 2010-05-15 at 13:45 +0200, Holger Levsen wrote: >> This paragraph should be accompanied by something like: >> >> Instead of adding users to other users private groups (which has issues as >> explained above) it is recommend to creat

Bug#581899: Default login shell for $UID 1-99 should be /usr/sbin/nologin

2010-05-16 Thread Aaron Toponce
Package: base-passwd Version: 3.5.22 System users with UID 1 through 99 should not have a default login shell in /etc/passwd, as they are not interactive accounts. Even though the password is disabled by default in /etc/shadow, it makes no sense to have the login shell as /bin/sh. The default log

Bug#899254: mkpasswd(1) truncates passwords to 127 characters

2018-05-21 Thread Aaron Toponce
Package: whois Version: 5.3.0 The mkpasswd(1) binary is truncating passwords longer than 127-characters: Unique password string for 126 characters: $ printf 'a%.0s' {1..126} | mkpasswd -m SHA-512 -S '' -s $6$$W.thEL8diDVRFeHWlFLX3uJQViSwuCRjGgQNzFHsGNmaRKC2op