Peter Palfrader [EMAIL PROTECTED] writes:
We also had to replace the SSL certificate on db.debian.org because
its CA which is operated by Software in the Public Interest (SPI) is
known to have been created with a SSL with the bug. The new SPI
CA can be found at the SPI's secretary page[8],
[Joey Hess]
It would be nice to have a list which Recommends are
ignored/overridden the most when installing packages, to identify
Recommends that need to be downgraded to Suggests. Could we derive
such a list from popcon data?
I have no idea if that can be done. :)
I think it would need to
Peter Palfrader wrote:
Due to the weakness in our openssl's random number generator (see the
Debian Security Advisory #1571 from a few minutes ago[1]) that affects
among other things ssh keys we have disabled public key auth on all
project systems until further notice.
Hi all,
if I understand
BALLABIO GERARDO [EMAIL PROTECTED] writes:
if I understand correctly, the problem was that openssl used some
segment of uninitialized memory as a source of entropy, and the
offending patch cleared it.
This is not correct. Clearing tmpbuf before reading /dev/urandom is
harmless. The broken
On Wed May 14, 2008 at 10:21:18 +0200, BALLABIO GERARDO wrote:
If so, and if that was the ONLY entropy source used in generating keys,
then upstream openssl is (and has always been) just as broken as the
patched Debian package.
It wasn't.
Steve
--
Debian GNU/Linux System Administration
On Tue, May 13, 2008 at 10:51:37PM -0400, Joey Hess wrote:
It would be nice to have a list which Recommends are ignored/overridden
the most when installing packages, to identify Recommends that need to be
downgraded to Suggests. Could we derive such a list from popcon data? I
think it would
2008/5/14 BALLABIO GERARDO [EMAIL PROTECTED]:
However I wonder, is the pristine behavior correct? As far as I know, it
is NOT justified at all to rely on the assumption that uninitialized
memory contains random data. I read that many architectures reset it to
some magic number, e.g.,
On Wed, May 14, 2008 10:21, BALLABIO GERARDO wrote:
Peter Palfrader wrote:
Due to the weakness in our openssl's random number generator (see the
Debian Security Advisory #1571 from a few minutes ago[1]) that affects
among other things ssh keys we have disabled public key auth on all
project
On Tue, May 13, 2008 at 10:32:07PM -0400, Filipus Klutiero wrote:
I don't follow you. iceweasel, for example, is not independent from, say,
libnspr.
If they come from one source package, then they all build together. If
they do not, then it's a dynamicly linked library and each can be built
Hi,
Recent openssl issue lead me to http://db.debian.org/password.html and
made me wonder why script example uses DSA key while main text only
talks about RSA key.
| Alternatively, you can do without a password and use PGP to manipulate your
| LDAP information through the mail gateway and use
Yes, I realize there is not much time left. I'm also quite busy for the
next week or two, after which point I should have time to work on this
again. The precise release timeline is very helpful.
I won't be able to reasonably maintain this much software in Debian in the
long term, but I
Osamu Aoki wrote:
Hi,
Recent openssl issue lead me to http://db.debian.org/password.html and
made me wonder why script example uses DSA key while main text only
talks about RSA key.
The text talks about RSA keys as they are preferred over DSA keys.
| Alternatively, you can do without a
On Wed, 2008-05-14 at 19:50 +0200, Luk Claes wrote:
Osamu Aoki wrote:
Hi,
Recent openssl issue lead me to http://db.debian.org/password.html and
made me wonder why script example uses DSA key while main text only
talks about RSA key.
The text talks about RSA keys as they are
On Wed, 14 May 2008, David Härdeman wrote:
If the entropy pool is properly coded, there is no negative effect of
adding data which may or may not be truly random to the pool (i.e. you
cannot degrade the quality of the pool no matter what you add). Therefore
step b) might add some entropy or it
On Wed, May 14, 2008 at 03:33:52PM -0400, Ivan Jager wrote:
I think that might depend on how not truly random the data is. For
example, suppose the pool is coded to simply xor the new entropy with the
pool.
It's not -- it's hashed in using a cryptographic hash function.
/* Steinar */
--
Roland Mas [EMAIL PROTECTED] writes:
- Keys submitted through the web interface are now filtered, and only
RSA keys end up in your authorized_keys file. Don't even try
putting DSA keys in your authorized_keys2 file, the use of that file
has been disabled (and it'll be deleted anyway).
You can make packages to do configuration, but there are tricky issues
involved in making sure that the right thing happens when the packages
you're configuring are upgraded.
At MIT, we wrote a system of CDBS modules that automates a lot of the work
involved in making configuration packages.
On Thu, May 15, 2008 at 08:09:12AM +1000, Ben Finney wrote:
Could you explain the rationale for this? My impression was that DSA
was recommended over RSA.
DSA was recommended over RSA in years gone by for reasons of
freedom, until late 2000 when MIT's 17-year US patent (4405829)
expired on the
On Thu, May 15, 2008 at 08:09:12AM +1000, Ben Finney wrote:
Roland Mas [EMAIL PROTECTED] writes:
- Keys submitted through the web interface are now filtered, and only
RSA keys end up in your authorized_keys file. Don't even try
putting DSA keys in your authorized_keys2 file, the use of
On Wed, May 7, 2008 at 10:16 PM, Timothy G Abbott [EMAIL PROTECTED] wrote:
That's probably a good plan, especially since the sandbox is apparently
going to be eliminated eventually (and it sounds like arpack and delaunay
are on the list of things likely to be merged into mainline scipy)
On Wed, May 14, 2008 at 11:12:26PM +, brian m. carlson wrote:
Also, DSA absolutely requires a good random
number generator for every signature. If the nonce is not chosen
randomly, it will leak bits of the key. This is true for all discrete
logarithm algorithms. Therefore, anyone who had
On 14-May-08, 18:12 (CDT), brian m. carlson [EMAIL PROTECTED] wrote:
Therefore, anyone who had a DSA key has had it compromised...
Shouldn't that be anyone who had a DSA key *created by the flawed
version of openssl* has had it compromised...? Or are you asserting
something stronger?
Steve
--
On Wed, May 14, 2008 at 06:22:37PM -0500, Steve Greenland wrote:
Therefore, anyone who had a DSA key has had it compromised...
Shouldn't that be anyone who had a DSA key *created by the flawed
version of openssl* has had it compromised...? Or are you asserting
something stronger?
No. Any key
On Wed, May 14, 2008 at 11:12:26PM +, brian m. carlson wrote:
If one can solve the Discrete Logarithm Problem, then one can
factor, but the reverse is not true.
This is the first time I've ever heard anyone claim this; I've seen people
and textbooks claim they're roughly equivalent, but not
Steve Greenland [EMAIL PROTECTED] writes:
brian m. carlson [EMAIL PROTECTED] wrote:
Therefore, anyone who had a DSA key has had it compromised...
Shouldn't that be anyone who had a DSA key *created by the flawed
version of openssl* has had it compromised...? Or are you asserting
something
Le May 14, 2008 09:41:02 am Lennart Sorensen, vous avez écrit :
On Tue, May 13, 2008 at 10:32:07PM -0400, Filipus Klutiero wrote:
I don't follow you. iceweasel, for example, is not independent from, say,
libnspr.
If they come from one source package, then they all build together. If
they
On Thu, May 15, 2008 at 02:00:25AM +0200, Steinar H. Gunderson wrote:
On Wed, May 14, 2008 at 11:12:26PM +, brian m. carlson wrote:
If one can solve the Discrete Logarithm Problem, then one can
factor, but the reverse is not true.
This is the first time I've ever heard anyone claim this;
Ivan Jager [EMAIL PROTECTED] writes:
On Wed, 14 May 2008, David Härdeman wrote:
If the entropy pool is properly coded, there is no negative effect of
adding data which may or may not be truly random to the pool (i.e. you
cannot degrade the quality of the pool no matter what you add).
Russ Allbery [EMAIL PROTECTED] writes:
Steve Greenland [EMAIL PROTECTED] writes:
brian m. carlson [EMAIL PROTECTED] wrote:
Therefore, anyone who had a DSA key has had it compromised...
Shouldn't that be anyone who had a DSA key *created by the flawed
version of openssl* has had it
Hi Kees, Jamie, DDs,
I am looking at hosts that are runing other linuxen that may have weak
keys now, or see those weak keys uploaded inadvertently in the future.
Is there a straightforward way to get hosts that are !(Debian|Ubuntu)
to use that blacklist? PermitBlacklistedKeys support in
Apparently, Heimdal in Debian also is affected. I am not aware of any
solution other then to manually regenerate all keys.
Brian May
---BeginMessage---
I strongly advise all readers of this list that use Debian or might have
users in your realm (or any realms for which cross-realm key exchange
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 02:47:49 +0100
Source: swi-prolog
Binary: swi-prolog swi-prolog-clib swi-prolog-http swi-prolog-semweb
swi-prolog-sgml swi-prolog-table swi-prolog-odbc swi-prolog-xpce
Architecture: source i386
Version: 5.6.55-1
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Tue, 13 May 2008 17:49:27 +0100
Source: gupnp
Binary: libgupnp-1.0-0 libgupnp-1.0-dev libgupnp-1.0-dbg libgupnp-doc
Architecture: source i386
Version: 0.10-1
Distribution: unstable
Urgency: low
Maintainer: Ross Burton [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 10:03:42 +0200
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20080514
Distribution: unstable
Urgency: medium
Maintainer: Fumitoshi UKAI [EMAIL PROTECTED]
Changed-By: Philipp Kern
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sat, 10 May 2008 21:48:16 +0300
Source: kdepimlibs
Binary: kdepimlibs5 kdepimlibs-data kdepimlibs5-dev kdepimlibs-dbg
Architecture: source all amd64
Version: 4:4.0.73+svn806192-1
Distribution: experimental
Urgency: low
Maintainer:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 10:25:05 +0200
Source: widelands
Binary: widelands widelands-data widelands-dbg
Architecture: source all amd64
Version: 1:12-3
Distribution: unstable
Urgency: low
Maintainer: Martin Quinson [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 11:55:11 +0200
Source: luarocks
Binary: luarocks
Architecture: source all
Version: 0.5.2-1
Distribution: unstable
Urgency: low
Maintainer: Enrico Tassi [EMAIL PROTECTED]
Changed-By: Enrico Tassi [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 10:48:56 +0200
Source: lyx
Binary: lyx lyx-common
Architecture: source all i386
Version: 1.5.5-1
Distribution: unstable
Urgency: low
Maintainer: Debian LyX Maintainers [EMAIL PROTECTED]
Changed-By: Per Olofsson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 11:29:50 +0200
Source: lua-md5
Binary: liblua5.1-md5-0 liblua5.1-md5-dev
Architecture: source amd64
Version: 1.1.2-1
Distribution: unstable
Urgency: low
Maintainer: Enrico Tassi [EMAIL PROTECTED]
Changed-By: Enrico
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Tue, 13 May 2008 22:31:36 +0200
Source: prayer
Binary: prayer prayer-accountd
Architecture: source i386
Version: 1.1.0-1
Distribution: unstable
Urgency: low
Maintainer: Magnus Holmgren [EMAIL PROTECTED]
Changed-By: Magnus Holmgren
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 12:12:06 +0200
Source: boinc
Binary: boinc-client boinc-manager boinc-dev boinc-dbg
Architecture: source i386
Version: 5.10.45-3
Distribution: unstable
Urgency: low
Maintainer: Debian BOINC Maintainers [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 13:59:20 +0200
Source: octave-zenity
Binary: octave-zenity
Architecture: source all
Version: 0.5.5-1
Distribution: unstable
Urgency: low
Maintainer: Debian Octave Group [EMAIL PROTECTED]
Changed-By: Thomas Weber
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 12 May 2008 21:59:11 +0800
Source: gstreamermm
Binary: libgstreamermm-0.10-2 libgstreamermm-0.10-dev libgstreamermm-0.10-dbg
libgstreamermm-0.10-doc
Architecture: source all i386
Version: 0.9.5-1
Distribution: experimental
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 14:57:50 +0200
Source: octave-plot
Binary: octave-plot
Architecture: source i386
Version: 1.0.5-1
Distribution: unstable
Urgency: low
Maintainer: Debian Octave Group [EMAIL PROTECTED]
Changed-By: Thomas Weber [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 14:28:04 +0200
Source: octave-time
Binary: octave-time
Architecture: source all
Version: 1.0.7-1
Distribution: unstable
Urgency: low
Maintainer: Debian Octave Group [EMAIL PROTECTED]
Changed-By: Thomas Weber [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 15:02:00 +0200
Source: octave-physicalconstants
Binary: octave-physicalconstants
Architecture: source all
Version: 0.1.5-1
Distribution: unstable
Urgency: low
Maintainer: Debian Octave Group [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 9 May 2008 16:09:42 +0200
Source: buffer
Binary: buffer
Architecture: source i386
Version: 1.19-10
Distribution: unstable
Urgency: low
Maintainer: Martin Buck [EMAIL PROTECTED]
Changed-By: Martin Buck [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 15:19:30 +0200
Source: octave-outliers
Binary: octave-outliers
Architecture: source all
Version: 0.13.7-1
Distribution: unstable
Urgency: low
Maintainer: Debian Octave Group [EMAIL PROTECTED]
Changed-By: Thomas Weber
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 15:24:01 +0200
Source: octave-optiminterp
Binary: octave-optiminterp
Architecture: source i386
Version: 0.2.7-1
Distribution: unstable
Urgency: low
Maintainer: Debian Octave Group [EMAIL PROTECTED]
Changed-By: Thomas
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 12 May 2008 11:38:26 +0100
Source: bzr-gtk
Binary: bzr-gtk
Architecture: source all
Version: 0.94.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Bazaar Maintainers [EMAIL PROTECTED]
Changed-By: Chris Lamb [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 15:05:47 +0200
Source: tor
Binary: tor tor-dbg
Architecture: source i386
Version: 0.1.2.19-3
Distribution: unstable
Urgency: critical
Maintainer: Peter Palfrader [EMAIL PROTECTED]
Changed-By: Peter Palfrader [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 15:25:03 +0200
Source: ghostscript
Binary: ghostscript gs gs-esp gs-gpl gs-aladdin gs-common ghostscript-x
ghostscript-doc libgs8 libgs-dev
Architecture: source all amd64
Version: 8.62.dfsg.1-2.1
Distribution:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 05 May 2008 14:17:06 +0200
Source: b2evolution
Binary: b2evolution
Architecture: source all
Version: 2.4.2-1
Distribution: unstable
Urgency: low
Maintainer: Xavier Luthi [EMAIL PROTECTED]
Changed-By: Xavier Luthi [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 16:03:35 +0200
Source: nitrogen
Binary: nitrogen
Architecture: source amd64
Version: 1.3-1
Distribution: unstable
Urgency: low
Maintainer: Nico Golde [EMAIL PROTECTED]
Changed-By: Nico Golde [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 13:54:33 +0100
Source: audacity
Binary: audacity
Architecture: source amd64
Version: 1.3.5-1
Distribution: unstable
Urgency: low
Maintainer: Debian Multimedia Team [EMAIL PROTECTED]
Changed-By: Free Ekanayaka [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Tue, 13 May 2008 20:44:00 +
Source: ucspi-proxy
Binary: ucspi-proxy
Architecture: source powerpc
Version: 0.97-1
Distribution: unstable
Urgency: low
Maintainer: Gerrit Pape [EMAIL PROTECTED]
Changed-By: Gerrit Pape [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 12 May 2008 20:25:35 +0200
Source: bzrtools
Binary: bzrtools
Architecture: source all
Version: 1.5.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Bazaar Maintainers [EMAIL PROTECTED]
Changed-By: Jelmer Vernooij
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 11:16:56 +0200
Source: linux-2.6
Binary: linux-source-2.6.25 linux-doc-2.6.25 linux-manual-2.6.25
linux-patch-debian-2.6.25 linux-tree-2.6.25 linux-support-2.6.25-2
linux-libc-dev linux-headers-2.6.25-2-all
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 17:15:45 +0200
Source: libdbd-oracle-perl
Binary: libdbd-oracle-perl
Architecture: amd64 i386 source
Version: 1.21-2
Distribution: unstable
Urgency: low
Maintainer: Peter Eisentraut [EMAIL PROTECTED]
Changed-By:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 17:28:31 +0200
Source: dir2ogg
Binary: dir2ogg
Architecture: source all
Version: 0.11.5-1
Distribution: unstable
Urgency: low
Maintainer: Julian Andres Klode [EMAIL PROTECTED]
Changed-By: Julian Andres Klode [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 21:57:58 +0530
Source: libfreemarker-java
Binary: libfreemarker-java
Architecture: source all
Version: 2.3.13-1
Distribution: unstable
Urgency: low
Maintainer: Debian Java Maintainers [EMAIL PROTECTED]
Changed-By:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 21:32:23 +0530
Source: charva
Binary: libcharva1-java libcharva1-jni
Architecture: source all i386
Version: 1.1.4-4
Distribution: unstable
Urgency: low
Maintainer: Debian Java Maintainers [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Tue, 13 May 2008 16:18:47 +0200
Source: slrn
Binary: slrn slrnpull
Architecture: source i386
Version: 0.9.9~pre102-3
Distribution: unstable
Urgency: low
Maintainer: Jörg Sommer [EMAIL PROTECTED]
Changed-By: Jörg Sommer [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Wed, 14 May 2008 16:40:20 +0300
Source: isoqlog
Binary: isoqlog
Architecture: source i386
Version: 2.2.1-1
Distribution: unstable
Urgency: low
Maintainer: Murat Demirten [EMAIL PROTECTED]
Changed-By: Murat Demirten [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 18:27:34 +0200
Source: gforge
Binary: gforge gforge-common gforge-plugins-extra gforge-web-apache2
gforge-web-apache gforge-db-postgresql gforge-mta-exim4 gforge-mta-postfix
gforge-mta-courier
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 07:37:51 +0200
Source: powder
Binary: powder
Architecture: source i386
Version: 105-1
Distribution: unstable
Urgency: low
Maintainer: Gürkan Sengün [EMAIL PROTECTED]
Changed-By: Gürkan Sengün [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 19:13:29 +0200
Source: sane-backends
Binary: sane-utils libsane libsane-dev libsane-dbg
Architecture: source amd64
Version: 1.0.19-8
Distribution: unstable
Urgency: low
Maintainer: Julien BLACHE [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 19:25:04 +0200
Source: gnome-common
Binary: gnome-common
Architecture: source all
Version: 2.20.0-2
Distribution: unstable
Urgency: low
Maintainer: Jordi Mallach [EMAIL PROTECTED]
Changed-By: Loic Minier [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Tue, 13 May 2008 14:24:41 +0200
Source: gifsicle
Binary: gifsicle
Architecture: source i386
Version: 1.51-1
Distribution: unstable
Urgency: low
Maintainer: Gürkan Sengün [EMAIL PROTECTED]
Changed-By: Gürkan Sengün [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 19:02:50 +0200
Source: aufs
Binary: aufs-tools aufs-source linux-patch-aufs
Architecture: source all amd64
Version: 0+20080514-1
Distribution: unstable
Urgency: low
Maintainer: Julian Andres Klode [EMAIL PROTECTED
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 20:49:18 +0200
Source: libcoat-perl
Binary: libcoat-perl
Architecture: source all
Version: 0.300-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group [EMAIL PROTECTED]
Changed-By: gregor herrmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 12 May 2008 22:28:43 +0200
Source: lynis
Binary: lynis
Architecture: source all
Version: 1.1.2-1
Distribution: unstable
Urgency: low
Maintainer: Francisco Garcia [EMAIL PROTECTED]
Changed-By: Francisco Garcia [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 10:59:33 -0700
Source: libnet-scp-perl
Binary: libnet-scp-perl
Architecture: source all
Version: 0.08-1
Distribution: unstable
Urgency: low
Maintainer: Ivan Kohler [EMAIL PROTECTED]
Changed-By: Ivan Kohler [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 01 May 2008 19:35:43 +0200
Source: gcc-4.2
Binary: gcc-4.2-base gcc-4.2 gcc-4.2-multilib gcc-4.2-hppa64 cpp-4.2
gcc-4.2-locales g++-4.2 g++-4.2-multilib gobjc++-4.2 gobjc++-4.2-multilib
gobjc-4.2 gobjc-4.2-multilib
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 19:54:45 +0200
Source: gambas2
Binary: gambas2 gambas2-dev gambas2-doc gambas2-gb-chart gambas2-gb-compress
gambas2-gb-compress-bzlib2 gambas2-gb-compress-zlib gambas2-gb-crypt
gambas2-gb-db gambas2-gb-db-firebird
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 21:01:42 +0200
Source: cmake
Binary: cmake
Architecture: source amd64
Version: 2.6.0-4
Distribution: unstable
Urgency: low
Maintainer: A. Maitland Bottoms [EMAIL PROTECTED]
Changed-By: Pierre Habouzit [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 09 May 2008 17:30:17 +0200
Source: glademm
Binary: glademm
Architecture: source amd64
Version: 2.6.0-2
Distribution: unstable
Urgency: low
Maintainer: Christoph Egger [EMAIL PROTECTED]
Changed-By: Christoph Egger [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 23 Apr 2008 00:01:16 +0200
Source: python-biopython
Binary: python-biopython python-biopython-doc python-biopython-sql
python-biopython-martel
Architecture: source all powerpc
Version: 1.45-2
Distribution: unstable
Urgency: low
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 11:45:30 -0700
Source: libnet-ssh-perl
Binary: libnet-ssh-perl
Architecture: source all
Version: 0.09-1
Distribution: unstable
Urgency: low
Maintainer: Ivan Kohler [EMAIL PROTECTED]
Changed-By: Ivan Kohler [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Tue, 29 Apr 2008 07:45:43 -0500
Source: atari-bootstrap
Binary: atari-bootstrap
Architecture: source m68k
Version: 3.3-6
Distribution: unstable
Urgency: low
Maintainer: Roman Hodek [EMAIL PROTECTED]
Changed-By: Stephen R. Marenka
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 04 May 2008 15:19:01 +0900
Source: wise
Binary: wise wise-doc
Architecture: source all powerpc
Version: 2.4.1-5
Distribution: unstable
Urgency: low
Maintainer: Debian-Med Packaging Team [EMAIL PROTECTED]
Changed-By: Philipp
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 17:07:03 -0400
Source: tasksel
Binary: tasksel tasksel-data
Architecture: source all
Version: 2.74
Distribution: unstable
Urgency: low
Maintainer: Debian Install System Team [EMAIL PROTECTED]
Changed-By: Joey Hess
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 01 May 2008 13:59:52 +0100
Source: gwget2
Binary: gwget epiphany-extension-gwget
Architecture: source i386
Version: 0.99-3
Distribution: unstable
Urgency: low
Maintainer: Arnaud Fontaine [EMAIL PROTECTED]
Changed-By: Arnaud
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 23:40:56 +0200
Source: adabrowse
Binary: adabrowse
Architecture: source amd64
Version: 4.0.2-6
Distribution: unstable
Urgency: low
Maintainer: Ludovic Brenta [EMAIL PROTECTED]
Changed-By: Ludovic Brenta [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 15 May 2008 00:15:59 +0200
Source: farpd
Binary: farpd
Architecture: source i386
Version: 0.2-9
Distribution: unstable
Urgency: low
Maintainer: Javier Fernandez-Sanguino Pen~a [EMAIL PROTECTED]
Changed-By: Javier
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 19:36:48 -0400
Source: debconf
Binary: debconf debconf-i18n debconf-english debconf-doc debconf-utils
Architecture: source all
Version: 1.5.22
Distribution: unstable
Urgency: low
Maintainer: Debconf Developers [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sat, 26 Apr 2008 22:08:51 -0400
Source: powstatd
Binary: powstatd
Architecture: source i386
Version: 1.5.1-6
Distribution: unstable
Urgency: low
Maintainer: Peter S Galbraith [EMAIL PROTECTED]
Changed-By: Peter S Galbraith [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 19:46:03 -0400
Source: splitvt
Binary: splitvt
Architecture: source i386
Version: 1.6.6-5
Distribution: unstable
Urgency: low
Maintainer: Joey Hess [EMAIL PROTECTED]
Changed-By: Joey Hess [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 19:38:18 -0400
Source: mr
Binary: mr
Architecture: source all
Version: 0.29
Distribution: unstable
Urgency: low
Maintainer: Joey Hess [EMAIL PROTECTED]
Changed-By: Joey Hess [EMAIL PROTECTED]
Description:
mr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 19:37:42 -0400
Source: moreutils
Binary: moreutils
Architecture: source i386
Version: 0.30
Distribution: unstable
Urgency: low
Maintainer: Joey Hess [EMAIL PROTECTED]
Changed-By: Joey Hess [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 21:12:54 -0400
Source: fltk1.1
Binary: fluid libfltk1.1-dev libfltk1.1 libfltk1.1-dbg fltk1.1-doc fltk1.1-games
Architecture: source amd64 all
Version: 1.1.9-2
Distribution: unstable
Urgency: low
Maintainer: Aaron M.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Wed, 14 May 2008 21:30:25 -0600
Source: postfix
Binary: postfix postfix-ldap postfix-cdb postfix-pcre postfix-mysql
postfix-pgsql postfix-dev postfix-doc
Architecture: all i386 source
Version: 2.5.2-0
Distribution: unstable
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 14 May 2008 22:40:35 +
Source: gnu-smalltalk
Binary: gnu-smalltalk libgst7 libgst-dev gnu-smalltalk-doc gnu-smalltalk-common
gnu-smalltalk-el libpostgresql-gst libsqlite3-gst libncurses-gst libgdbm-gst
libtk-gst
93 matches
Mail list logo