Regenerated SSL certificates for debian.org (was: debian infrastructure ssh key logins disabled, passwords reset)

2008-05-14 Thread Ben Finney
Peter Palfrader [EMAIL PROTECTED] writes: We also had to replace the SSL certificate on db.debian.org because its CA which is operated by Software in the Public Interest (SPI) is known to have been created with a SSL with the bug. The new SPI CA can be found at the SPI's secretary page[8],

Re: analyzing popcon data for bogus recommends

2008-05-14 Thread Petter Reinholdtsen
[Joey Hess] It would be nice to have a list which Recommends are ignored/overridden the most when installing packages, to identify Recommends that need to be downgraded to Suggests. Could we derive such a list from popcon data? I have no idea if that can be done. :) I think it would need to

Is openssl actually safe now? (was: debian infrastructure ssh key logins disabled, passwords reset)

2008-05-14 Thread BALLABIO GERARDO
Peter Palfrader wrote: Due to the weakness in our openssl's random number generator (see the Debian Security Advisory #1571 from a few minutes ago[1]) that affects among other things ssh keys we have disabled public key auth on all project systems until further notice. Hi all, if I understand

Re: Is openssl actually safe now? (was: debian infrastructure ssh key logins disabled, passwords reset)

2008-05-14 Thread Richard Kettlewell
BALLABIO GERARDO [EMAIL PROTECTED] writes: if I understand correctly, the problem was that openssl used some segment of uninitialized memory as a source of entropy, and the offending patch cleared it. This is not correct. Clearing tmpbuf before reading /dev/urandom is harmless. The broken

Re: Is openssl actually safe now? (was: debian infrastructure ssh key logins disabled, passwords reset)

2008-05-14 Thread Steve Kemp
On Wed May 14, 2008 at 10:21:18 +0200, BALLABIO GERARDO wrote: If so, and if that was the ONLY entropy source used in generating keys, then upstream openssl is (and has always been) just as broken as the patched Debian package. It wasn't. Steve -- Debian GNU/Linux System Administration

Re: analyzing popcon data for bogus recommends

2008-05-14 Thread Enrico Zini
On Tue, May 13, 2008 at 10:51:37PM -0400, Joey Hess wrote: It would be nice to have a list which Recommends are ignored/overridden the most when installing packages, to identify Recommends that need to be downgraded to Suggests. Could we derive such a list from popcon data? I think it would

Re: Is openssl actually safe now? (was: debian infrastructure ssh key logins disabled, passwords reset)

2008-05-14 Thread Miriam Ruiz
2008/5/14 BALLABIO GERARDO [EMAIL PROTECTED]: However I wonder, is the pristine behavior correct? As far as I know, it is NOT justified at all to rely on the assumption that uninitialized memory contains random data. I read that many architectures reset it to some magic number, e.g.,

Re: Is openssl actually safe now? (was: debian infrastructure ssh key logins disabled, passwords reset)

2008-05-14 Thread David Härdeman
On Wed, May 14, 2008 10:21, BALLABIO GERARDO wrote: Peter Palfrader wrote: Due to the weakness in our openssl's random number generator (see the Debian Security Advisory #1571 from a few minutes ago[1]) that affects among other things ssh keys we have disabled public key auth on all project

Re: conglomeration packages (Re: Will nvidia-graphics-drivers ever transition to testing?)

2008-05-14 Thread Lennart Sorensen
On Tue, May 13, 2008 at 10:32:07PM -0400, Filipus Klutiero wrote: I don't follow you. iceweasel, for example, is not independent from, say, libnspr. If they come from one source package, then they all build together. If they do not, then it's a dynamicly linked library and each can be built

db.debian.org/password.html : Why ~/.ssh/id_dsa.pub to setup OpenSSH for RSA

2008-05-14 Thread Osamu Aoki
Hi, Recent openssl issue lead me to http://db.debian.org/password.html and made me wonder why script example uses DSA key while main text only talks about RSA key. | Alternatively, you can do without a password and use PGP to manipulate your | LDAP information through the mail gateway and use

Re: SAGE packages for Debian

2008-05-14 Thread Timothy G Abbott
Yes, I realize there is not much time left. I'm also quite busy for the next week or two, after which point I should have time to work on this again. The precise release timeline is very helpful. I won't be able to reasonably maintain this much software in Debian in the long term, but I

Re: db.debian.org/password.html : Why ~/.ssh/id_dsa.pub to setup OpenSSH for RSA

2008-05-14 Thread Luk Claes
Osamu Aoki wrote: Hi, Recent openssl issue lead me to http://db.debian.org/password.html and made me wonder why script example uses DSA key while main text only talks about RSA key. The text talks about RSA keys as they are preferred over DSA keys. | Alternatively, you can do without a

Re: db.debian.org/password.html : Why ~/.ssh/id_dsa.pub to setup OpenSSH for RSA

2008-05-14 Thread Adam D. Barratt
On Wed, 2008-05-14 at 19:50 +0200, Luk Claes wrote: Osamu Aoki wrote: Hi, Recent openssl issue lead me to http://db.debian.org/password.html and made me wonder why script example uses DSA key while main text only talks about RSA key. The text talks about RSA keys as they are

Re: Is openssl actually safe now? (was: debian infrastructure ssh key logins disabled, passwords reset)

2008-05-14 Thread Ivan Jager
On Wed, 14 May 2008, David Härdeman wrote: If the entropy pool is properly coded, there is no negative effect of adding data which may or may not be truly random to the pool (i.e. you cannot degrade the quality of the pool no matter what you add). Therefore step b) might add some entropy or it

Re: Is openssl actually safe now? (was: debian infrastructure ssh key logins disabled, passwords reset)

2008-05-14 Thread Steinar H. Gunderson
On Wed, May 14, 2008 at 03:33:52PM -0400, Ivan Jager wrote: I think that might depend on how not truly random the data is. For example, suppose the pool is coded to simply xor the new entropy with the pool. It's not -- it's hashed in using a cryptographic hash function. /* Steinar */ --

SSH keys: DSA vs RSA (was: Alioth and SSH: restored)

2008-05-14 Thread Ben Finney
Roland Mas [EMAIL PROTECTED] writes: - Keys submitted through the web interface are now filtered, and only RSA keys end up in your authorized_keys file. Don't even try putting DSA keys in your authorized_keys2 file, the use of that file has been disabled (and it'll be deleted anyway).

Re: package for configuration - Some suggestions

2008-05-14 Thread Timothy G Abbott
You can make packages to do configuration, but there are tricky issues involved in making sure that the right thing happens when the packages you're configuring are upgraded. At MIT, we wrote a system of CDBS modules that automates a lot of the work involved in making configuration packages.

Re: SSH keys: DSA vs RSA (was: Alioth and SSH: restored)

2008-05-14 Thread The Fungi
On Thu, May 15, 2008 at 08:09:12AM +1000, Ben Finney wrote: Could you explain the rationale for this? My impression was that DSA was recommended over RSA. DSA was recommended over RSA in years gone by for reasons of freedom, until late 2000 when MIT's 17-year US patent (4405829) expired on the

Re: SSH keys: DSA vs RSA (was: Alioth and SSH: restored)

2008-05-14 Thread brian m. carlson
On Thu, May 15, 2008 at 08:09:12AM +1000, Ben Finney wrote: Roland Mas [EMAIL PROTECTED] writes: - Keys submitted through the web interface are now filtered, and only RSA keys end up in your authorized_keys file. Don't even try putting DSA keys in your authorized_keys2 file, the use of

Re: SAGE packages for Debian

2008-05-14 Thread Ondrej Certik
On Wed, May 7, 2008 at 10:16 PM, Timothy G Abbott [EMAIL PROTECTED] wrote: That's probably a good plan, especially since the sandbox is apparently going to be eliminated eventually (and it sounds like arpack and delaunay are on the list of things likely to be merged into mainline scipy)

Re: SSH keys: DSA vs RSA (was: Alioth and SSH: restored)

2008-05-14 Thread brian m. carlson
On Wed, May 14, 2008 at 11:12:26PM +, brian m. carlson wrote: Also, DSA absolutely requires a good random number generator for every signature. If the nonce is not chosen randomly, it will leak bits of the key. This is true for all discrete logarithm algorithms. Therefore, anyone who had

Re: SSH keys: DSA vs RSA (was: Alioth and SSH: restored)

2008-05-14 Thread Steve Greenland
On 14-May-08, 18:12 (CDT), brian m. carlson [EMAIL PROTECTED] wrote: Therefore, anyone who had a DSA key has had it compromised... Shouldn't that be anyone who had a DSA key *created by the flawed version of openssl* has had it compromised...? Or are you asserting something stronger? Steve --

Re: SSH keys: DSA vs RSA (was: Alioth and SSH: restored)

2008-05-14 Thread Steinar H. Gunderson
On Wed, May 14, 2008 at 06:22:37PM -0500, Steve Greenland wrote: Therefore, anyone who had a DSA key has had it compromised... Shouldn't that be anyone who had a DSA key *created by the flawed version of openssl* has had it compromised...? Or are you asserting something stronger? No. Any key

Re: SSH keys: DSA vs RSA (was: Alioth and SSH: restored)

2008-05-14 Thread Steinar H. Gunderson
On Wed, May 14, 2008 at 11:12:26PM +, brian m. carlson wrote: If one can solve the Discrete Logarithm Problem, then one can factor, but the reverse is not true. This is the first time I've ever heard anyone claim this; I've seen people and textbooks claim they're roughly equivalent, but not

Re: SSH keys: DSA vs RSA

2008-05-14 Thread Russ Allbery
Steve Greenland [EMAIL PROTECTED] writes: brian m. carlson [EMAIL PROTECTED] wrote: Therefore, anyone who had a DSA key has had it compromised... Shouldn't that be anyone who had a DSA key *created by the flawed version of openssl* has had it compromised...? Or are you asserting something

Re: conglomeration packages (Re: Will nvidia-graphics-drivers ever transition to testing?)

2008-05-14 Thread Filipus Klutiero
Le May 14, 2008 09:41:02 am Lennart Sorensen, vous avez écrit : On Tue, May 13, 2008 at 10:32:07PM -0400, Filipus Klutiero wrote: I don't follow you. iceweasel, for example, is not independent from, say, libnspr. If they come from one source package, then they all build together. If they

Re: SSH keys: DSA vs RSA (was: Alioth and SSH: restored)

2008-05-14 Thread brian m. carlson
On Thu, May 15, 2008 at 02:00:25AM +0200, Steinar H. Gunderson wrote: On Wed, May 14, 2008 at 11:12:26PM +, brian m. carlson wrote: If one can solve the Discrete Logarithm Problem, then one can factor, but the reverse is not true. This is the first time I've ever heard anyone claim this;

Re: Is openssl actually safe now?

2008-05-14 Thread Goswin von Brederlow
Ivan Jager [EMAIL PROTECTED] writes: On Wed, 14 May 2008, David Härdeman wrote: If the entropy pool is properly coded, there is no negative effect of adding data which may or may not be truly random to the pool (i.e. you cannot degrade the quality of the pool no matter what you add).

Re: SSH keys: DSA vs RSA

2008-05-14 Thread Goswin von Brederlow
Russ Allbery [EMAIL PROTECTED] writes: Steve Greenland [EMAIL PROTECTED] writes: brian m. carlson [EMAIL PROTECTED] wrote: Therefore, anyone who had a DSA key has had it compromised... Shouldn't that be anyone who had a DSA key *created by the flawed version of openssl* has had it

openssh-blacklist for !Debian

2008-05-14 Thread Martin Langhoff
Hi Kees, Jamie, DDs, I am looking at hosts that are runing other linuxen that may have weak keys now, or see those weak keys uploaded inadvertently in the future. Is there a straightforward way to get hosts that are !(Debian|Ubuntu) to use that blacklist? PermitBlacklistedKeys support in

[DSA 1571-1] Heimdal

2008-05-14 Thread Brian May
Apparently, Heimdal in Debian also is affected. I am not aware of any solution other then to manually regenerate all keys. Brian May ---BeginMessage--- I strongly advise all readers of this list that use Debian or might have users in your realm (or any realms for which cross-realm key exchange

Accepted swi-prolog 5.6.55-1 (source i386)

2008-05-14 Thread Chris Lamb
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 02:47:49 +0100 Source: swi-prolog Binary: swi-prolog swi-prolog-clib swi-prolog-http swi-prolog-semweb swi-prolog-sgml swi-prolog-table swi-prolog-odbc swi-prolog-xpce Architecture: source i386 Version: 5.6.55-1

Accepted gupnp 0.10-1 (source i386)

2008-05-14 Thread Ross Burton
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 13 May 2008 17:49:27 +0100 Source: gupnp Binary: libgupnp-1.0-0 libgupnp-1.0-dev libgupnp-1.0-dbg libgupnp-doc Architecture: source i386 Version: 0.10-1 Distribution: unstable Urgency: low Maintainer: Ross Burton [EMAIL

Accepted ca-certificates 20080514 (source all)

2008-05-14 Thread Philipp Kern
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 10:03:42 +0200 Source: ca-certificates Binary: ca-certificates Architecture: source all Version: 20080514 Distribution: unstable Urgency: medium Maintainer: Fumitoshi UKAI [EMAIL PROTECTED] Changed-By: Philipp Kern

Accepted kdepimlibs 4:4.0.73+svn806192-1 (source all amd64)

2008-05-14 Thread Debian Qt/KDE Maintainers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sat, 10 May 2008 21:48:16 +0300 Source: kdepimlibs Binary: kdepimlibs5 kdepimlibs-data kdepimlibs5-dev kdepimlibs-dbg Architecture: source all amd64 Version: 4:4.0.73+svn806192-1 Distribution: experimental Urgency: low Maintainer:

Accepted widelands 1:12-3 (source all amd64)

2008-05-14 Thread Enrico Tassi
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 10:25:05 +0200 Source: widelands Binary: widelands widelands-data widelands-dbg Architecture: source all amd64 Version: 1:12-3 Distribution: unstable Urgency: low Maintainer: Martin Quinson [EMAIL PROTECTED]

Accepted luarocks 0.5.2-1 (source all)

2008-05-14 Thread Enrico Tassi
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 11:55:11 +0200 Source: luarocks Binary: luarocks Architecture: source all Version: 0.5.2-1 Distribution: unstable Urgency: low Maintainer: Enrico Tassi [EMAIL PROTECTED] Changed-By: Enrico Tassi [EMAIL PROTECTED]

Accepted lyx 1.5.5-1 (source all i386)

2008-05-14 Thread Per Olofsson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 10:48:56 +0200 Source: lyx Binary: lyx lyx-common Architecture: source all i386 Version: 1.5.5-1 Distribution: unstable Urgency: low Maintainer: Debian LyX Maintainers [EMAIL PROTECTED] Changed-By: Per Olofsson

Accepted lua-md5 1.1.2-1 (source amd64)

2008-05-14 Thread Enrico Tassi
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 11:29:50 +0200 Source: lua-md5 Binary: liblua5.1-md5-0 liblua5.1-md5-dev Architecture: source amd64 Version: 1.1.2-1 Distribution: unstable Urgency: low Maintainer: Enrico Tassi [EMAIL PROTECTED] Changed-By: Enrico

Accepted prayer 1.1.0-1 (source i386)

2008-05-14 Thread Magnus Holmgren
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 13 May 2008 22:31:36 +0200 Source: prayer Binary: prayer prayer-accountd Architecture: source i386 Version: 1.1.0-1 Distribution: unstable Urgency: low Maintainer: Magnus Holmgren [EMAIL PROTECTED] Changed-By: Magnus Holmgren

Accepted boinc 5.10.45-3 (source i386)

2008-05-14 Thread Frank S. Thomas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 12:12:06 +0200 Source: boinc Binary: boinc-client boinc-manager boinc-dev boinc-dbg Architecture: source i386 Version: 5.10.45-3 Distribution: unstable Urgency: low Maintainer: Debian BOINC Maintainers [EMAIL

Accepted octave-zenity 0.5.5-1 (source all)

2008-05-14 Thread Thomas Weber
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 13:59:20 +0200 Source: octave-zenity Binary: octave-zenity Architecture: source all Version: 0.5.5-1 Distribution: unstable Urgency: low Maintainer: Debian Octave Group [EMAIL PROTECTED] Changed-By: Thomas Weber

Accepted gstreamermm 0.9.5-1 (source all i386)

2008-05-14 Thread Deng Xiyue
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 12 May 2008 21:59:11 +0800 Source: gstreamermm Binary: libgstreamermm-0.10-2 libgstreamermm-0.10-dev libgstreamermm-0.10-dbg libgstreamermm-0.10-doc Architecture: source all i386 Version: 0.9.5-1 Distribution: experimental

Accepted octave-plot 1.0.5-1 (source i386)

2008-05-14 Thread Thomas Weber
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 14:57:50 +0200 Source: octave-plot Binary: octave-plot Architecture: source i386 Version: 1.0.5-1 Distribution: unstable Urgency: low Maintainer: Debian Octave Group [EMAIL PROTECTED] Changed-By: Thomas Weber [EMAIL

Accepted octave-time 1.0.7-1 (source all)

2008-05-14 Thread Thomas Weber
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 14:28:04 +0200 Source: octave-time Binary: octave-time Architecture: source all Version: 1.0.7-1 Distribution: unstable Urgency: low Maintainer: Debian Octave Group [EMAIL PROTECTED] Changed-By: Thomas Weber [EMAIL

Accepted octave-physicalconstants 0.1.5-1 (source all)

2008-05-14 Thread Thomas Weber
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 15:02:00 +0200 Source: octave-physicalconstants Binary: octave-physicalconstants Architecture: source all Version: 0.1.5-1 Distribution: unstable Urgency: low Maintainer: Debian Octave Group [EMAIL PROTECTED]

Accepted buffer 1.19-10 (source i386)

2008-05-14 Thread Martin Buck
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 9 May 2008 16:09:42 +0200 Source: buffer Binary: buffer Architecture: source i386 Version: 1.19-10 Distribution: unstable Urgency: low Maintainer: Martin Buck [EMAIL PROTECTED] Changed-By: Martin Buck [EMAIL PROTECTED]

Accepted octave-outliers 0.13.7-1 (source all)

2008-05-14 Thread Thomas Weber
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 15:19:30 +0200 Source: octave-outliers Binary: octave-outliers Architecture: source all Version: 0.13.7-1 Distribution: unstable Urgency: low Maintainer: Debian Octave Group [EMAIL PROTECTED] Changed-By: Thomas Weber

Accepted octave-optiminterp 0.2.7-1 (source i386)

2008-05-14 Thread Thomas Weber
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 15:24:01 +0200 Source: octave-optiminterp Binary: octave-optiminterp Architecture: source i386 Version: 0.2.7-1 Distribution: unstable Urgency: low Maintainer: Debian Octave Group [EMAIL PROTECTED] Changed-By: Thomas

Accepted bzr-gtk 0.94.0-1 (source all)

2008-05-14 Thread Chris Lamb
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 12 May 2008 11:38:26 +0100 Source: bzr-gtk Binary: bzr-gtk Architecture: source all Version: 0.94.0-1 Distribution: unstable Urgency: low Maintainer: Debian Bazaar Maintainers [EMAIL PROTECTED] Changed-By: Chris Lamb [EMAIL

Accepted tor 0.1.2.19-3 (source i386)

2008-05-14 Thread Peter Palfrader
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 15:05:47 +0200 Source: tor Binary: tor tor-dbg Architecture: source i386 Version: 0.1.2.19-3 Distribution: unstable Urgency: critical Maintainer: Peter Palfrader [EMAIL PROTECTED] Changed-By: Peter Palfrader [EMAIL

Accepted ghostscript 8.62.dfsg.1-2.1 (source all amd64)

2008-05-14 Thread Pierre Habouzit
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 15:25:03 +0200 Source: ghostscript Binary: ghostscript gs gs-esp gs-gpl gs-aladdin gs-common ghostscript-x ghostscript-doc libgs8 libgs-dev Architecture: source all amd64 Version: 8.62.dfsg.1-2.1 Distribution:

Accepted b2evolution 2.4.2-1 (source all)

2008-05-14 Thread Xavier Luthi
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 05 May 2008 14:17:06 +0200 Source: b2evolution Binary: b2evolution Architecture: source all Version: 2.4.2-1 Distribution: unstable Urgency: low Maintainer: Xavier Luthi [EMAIL PROTECTED] Changed-By: Xavier Luthi [EMAIL

Accepted nitrogen 1.3-1 (source amd64)

2008-05-14 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 16:03:35 +0200 Source: nitrogen Binary: nitrogen Architecture: source amd64 Version: 1.3-1 Distribution: unstable Urgency: low Maintainer: Nico Golde [EMAIL PROTECTED] Changed-By: Nico Golde [EMAIL PROTECTED]

Accepted audacity 1.3.5-1 (source amd64)

2008-05-14 Thread Free Ekanayaka
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 13:54:33 +0100 Source: audacity Binary: audacity Architecture: source amd64 Version: 1.3.5-1 Distribution: unstable Urgency: low Maintainer: Debian Multimedia Team [EMAIL PROTECTED] Changed-By: Free Ekanayaka [EMAIL

Accepted ucspi-proxy 0.97-1 (source powerpc)

2008-05-14 Thread Gerrit Pape
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 13 May 2008 20:44:00 + Source: ucspi-proxy Binary: ucspi-proxy Architecture: source powerpc Version: 0.97-1 Distribution: unstable Urgency: low Maintainer: Gerrit Pape [EMAIL PROTECTED] Changed-By: Gerrit Pape [EMAIL

Accepted bzrtools 1.5.0-1 (source all)

2008-05-14 Thread Jelmer Vernooij
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 12 May 2008 20:25:35 +0200 Source: bzrtools Binary: bzrtools Architecture: source all Version: 1.5.0-1 Distribution: unstable Urgency: low Maintainer: Debian Bazaar Maintainers [EMAIL PROTECTED] Changed-By: Jelmer Vernooij

Accepted linux-2.6 2.6.25-3 (source all amd64)

2008-05-14 Thread maximilian attems
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 11:16:56 +0200 Source: linux-2.6 Binary: linux-source-2.6.25 linux-doc-2.6.25 linux-manual-2.6.25 linux-patch-debian-2.6.25 linux-tree-2.6.25 linux-support-2.6.25-2 linux-libc-dev linux-headers-2.6.25-2-all

Accepted libdbd-oracle-perl 1.21-2 (source i386 amd64)

2008-05-14 Thread Peter Eisentraut
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 17:15:45 +0200 Source: libdbd-oracle-perl Binary: libdbd-oracle-perl Architecture: amd64 i386 source Version: 1.21-2 Distribution: unstable Urgency: low Maintainer: Peter Eisentraut [EMAIL PROTECTED] Changed-By:

Accepted dir2ogg 0.11.5-1 (source all)

2008-05-14 Thread Julian Andres Klode
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 17:28:31 +0200 Source: dir2ogg Binary: dir2ogg Architecture: source all Version: 0.11.5-1 Distribution: unstable Urgency: low Maintainer: Julian Andres Klode [EMAIL PROTECTED] Changed-By: Julian Andres Klode [EMAIL

Accepted libfreemarker-java 2.3.13-1 (source all)

2008-05-14 Thread Varun Hiremath
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 21:57:58 +0530 Source: libfreemarker-java Binary: libfreemarker-java Architecture: source all Version: 2.3.13-1 Distribution: unstable Urgency: low Maintainer: Debian Java Maintainers [EMAIL PROTECTED] Changed-By:

Accepted charva 1.1.4-4 (source all i386)

2008-05-14 Thread Varun Hiremath
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 21:32:23 +0530 Source: charva Binary: libcharva1-java libcharva1-jni Architecture: source all i386 Version: 1.1.4-4 Distribution: unstable Urgency: low Maintainer: Debian Java Maintainers [EMAIL PROTECTED]

Accepted slrn 0.9.9~pre102-3 (source i386)

2008-05-14 Thread Jörg Sommer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 13 May 2008 16:18:47 +0200 Source: slrn Binary: slrn slrnpull Architecture: source i386 Version: 0.9.9~pre102-3 Distribution: unstable Urgency: low Maintainer: Jörg Sommer [EMAIL PROTECTED] Changed-By: Jörg Sommer [EMAIL

Accepted isoqlog 2.2.1-1 (source i386)

2008-05-14 Thread Murat Demirten
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Wed, 14 May 2008 16:40:20 +0300 Source: isoqlog Binary: isoqlog Architecture: source i386 Version: 2.2.1-1 Distribution: unstable Urgency: low Maintainer: Murat Demirten [EMAIL PROTECTED] Changed-By: Murat Demirten [EMAIL PROTECTED]

Accepted gforge 4.6.99+svn6496-1 (source all)

2008-05-14 Thread Roland Mas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 18:27:34 +0200 Source: gforge Binary: gforge gforge-common gforge-plugins-extra gforge-web-apache2 gforge-web-apache gforge-db-postgresql gforge-mta-exim4 gforge-mta-postfix gforge-mta-courier

Accepted powder 105-1 (source i386)

2008-05-14 Thread Gürkan Sengün
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 07:37:51 +0200 Source: powder Binary: powder Architecture: source i386 Version: 105-1 Distribution: unstable Urgency: low Maintainer: Gürkan Sengün [EMAIL PROTECTED] Changed-By: Gürkan Sengün [EMAIL PROTECTED]

Accepted sane-backends 1.0.19-8 (source amd64)

2008-05-14 Thread Julien BLACHE
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 19:13:29 +0200 Source: sane-backends Binary: sane-utils libsane libsane-dev libsane-dbg Architecture: source amd64 Version: 1.0.19-8 Distribution: unstable Urgency: low Maintainer: Julien BLACHE [EMAIL PROTECTED]

Accepted gnome-common 2.20.0-2 (source all)

2008-05-14 Thread Loic Minier
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 19:25:04 +0200 Source: gnome-common Binary: gnome-common Architecture: source all Version: 2.20.0-2 Distribution: unstable Urgency: low Maintainer: Jordi Mallach [EMAIL PROTECTED] Changed-By: Loic Minier [EMAIL

Accepted gifsicle 1.51-1 (source i386)

2008-05-14 Thread Gürkan Sengün
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 13 May 2008 14:24:41 +0200 Source: gifsicle Binary: gifsicle Architecture: source i386 Version: 1.51-1 Distribution: unstable Urgency: low Maintainer: Gürkan Sengün [EMAIL PROTECTED] Changed-By: Gürkan Sengün [EMAIL PROTECTED]

Accepted aufs 0+20080514-1 (source all amd64)

2008-05-14 Thread Julian Andres Klode
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 19:02:50 +0200 Source: aufs Binary: aufs-tools aufs-source linux-patch-aufs Architecture: source all amd64 Version: 0+20080514-1 Distribution: unstable Urgency: low Maintainer: Julian Andres Klode [EMAIL PROTECTED

Accepted libcoat-perl 0.300-1 (source all)

2008-05-14 Thread gregor herrmann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 20:49:18 +0200 Source: libcoat-perl Binary: libcoat-perl Architecture: source all Version: 0.300-1 Distribution: unstable Urgency: low Maintainer: Debian Perl Group [EMAIL PROTECTED] Changed-By: gregor herrmann

Accepted lynis 1.1.2-1 (source all)

2008-05-14 Thread Francisco Garcia
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 12 May 2008 22:28:43 +0200 Source: lynis Binary: lynis Architecture: source all Version: 1.1.2-1 Distribution: unstable Urgency: low Maintainer: Francisco Garcia [EMAIL PROTECTED] Changed-By: Francisco Garcia [EMAIL PROTECTED]

Accepted libnet-scp-perl 0.08-1 (source all)

2008-05-14 Thread Ivan Kohler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 10:59:33 -0700 Source: libnet-scp-perl Binary: libnet-scp-perl Architecture: source all Version: 0.08-1 Distribution: unstable Urgency: low Maintainer: Ivan Kohler [EMAIL PROTECTED] Changed-By: Ivan Kohler [EMAIL

Accepted gcc-4.2 4.2.3-6 (source all i386)

2008-05-14 Thread Matthias Klose
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 01 May 2008 19:35:43 +0200 Source: gcc-4.2 Binary: gcc-4.2-base gcc-4.2 gcc-4.2-multilib gcc-4.2-hppa64 cpp-4.2 gcc-4.2-locales g++-4.2 g++-4.2-multilib gobjc++-4.2 gobjc++-4.2-multilib gobjc-4.2 gobjc-4.2-multilib

Accepted gambas2 2.6-1 (source all amd64)

2008-05-14 Thread José L. Redrejo Rodríguez
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 19:54:45 +0200 Source: gambas2 Binary: gambas2 gambas2-dev gambas2-doc gambas2-gb-chart gambas2-gb-compress gambas2-gb-compress-bzlib2 gambas2-gb-compress-zlib gambas2-gb-crypt gambas2-gb-db gambas2-gb-db-firebird

Accepted cmake 2.6.0-4 (source amd64)

2008-05-14 Thread Pierre Habouzit
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 21:01:42 +0200 Source: cmake Binary: cmake Architecture: source amd64 Version: 2.6.0-4 Distribution: unstable Urgency: low Maintainer: A. Maitland Bottoms [EMAIL PROTECTED] Changed-By: Pierre Habouzit [EMAIL

Accepted glademm 2.6.0-2 (source amd64)

2008-05-14 Thread Christoph Egger
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 09 May 2008 17:30:17 +0200 Source: glademm Binary: glademm Architecture: source amd64 Version: 2.6.0-2 Distribution: unstable Urgency: low Maintainer: Christoph Egger [EMAIL PROTECTED] Changed-By: Christoph Egger [EMAIL

Accepted python-biopython 1.45-2 (source all powerpc)

2008-05-14 Thread Philipp Benner
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 23 Apr 2008 00:01:16 +0200 Source: python-biopython Binary: python-biopython python-biopython-doc python-biopython-sql python-biopython-martel Architecture: source all powerpc Version: 1.45-2 Distribution: unstable Urgency: low

Accepted libnet-ssh-perl 0.09-1 (source all)

2008-05-14 Thread Ivan Kohler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 11:45:30 -0700 Source: libnet-ssh-perl Binary: libnet-ssh-perl Architecture: source all Version: 0.09-1 Distribution: unstable Urgency: low Maintainer: Ivan Kohler [EMAIL PROTECTED] Changed-By: Ivan Kohler [EMAIL

Accepted atari-bootstrap 3.3-6 (source m68k)

2008-05-14 Thread Stephen R. Marenka
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 29 Apr 2008 07:45:43 -0500 Source: atari-bootstrap Binary: atari-bootstrap Architecture: source m68k Version: 3.3-6 Distribution: unstable Urgency: low Maintainer: Roman Hodek [EMAIL PROTECTED] Changed-By: Stephen R. Marenka

Accepted wise 2.4.1-5 (source all powerpc)

2008-05-14 Thread Philipp Benner
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 04 May 2008 15:19:01 +0900 Source: wise Binary: wise wise-doc Architecture: source all powerpc Version: 2.4.1-5 Distribution: unstable Urgency: low Maintainer: Debian-Med Packaging Team [EMAIL PROTECTED] Changed-By: Philipp

Accepted tasksel 2.74 (source all)

2008-05-14 Thread Joey Hess
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 17:07:03 -0400 Source: tasksel Binary: tasksel tasksel-data Architecture: source all Version: 2.74 Distribution: unstable Urgency: low Maintainer: Debian Install System Team [EMAIL PROTECTED] Changed-By: Joey Hess

Accepted gwget2 0.99-3 (source i386)

2008-05-14 Thread Arnaud Fontaine
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 01 May 2008 13:59:52 +0100 Source: gwget2 Binary: gwget epiphany-extension-gwget Architecture: source i386 Version: 0.99-3 Distribution: unstable Urgency: low Maintainer: Arnaud Fontaine [EMAIL PROTECTED] Changed-By: Arnaud

Accepted adabrowse 4.0.2-6 (source amd64)

2008-05-14 Thread Ludovic Brenta
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 23:40:56 +0200 Source: adabrowse Binary: adabrowse Architecture: source amd64 Version: 4.0.2-6 Distribution: unstable Urgency: low Maintainer: Ludovic Brenta [EMAIL PROTECTED] Changed-By: Ludovic Brenta [EMAIL

Accepted farpd 0.2-9 (source i386)

2008-05-14 Thread Javier Fernandez-Sanguino Pen~a
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 15 May 2008 00:15:59 +0200 Source: farpd Binary: farpd Architecture: source i386 Version: 0.2-9 Distribution: unstable Urgency: low Maintainer: Javier Fernandez-Sanguino Pen~a [EMAIL PROTECTED] Changed-By: Javier

Accepted debconf 1.5.22 (source all)

2008-05-14 Thread Joey Hess
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 19:36:48 -0400 Source: debconf Binary: debconf debconf-i18n debconf-english debconf-doc debconf-utils Architecture: source all Version: 1.5.22 Distribution: unstable Urgency: low Maintainer: Debconf Developers [EMAIL

Accepted powstatd 1.5.1-6 (source i386)

2008-05-14 Thread Peter S Galbraith
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sat, 26 Apr 2008 22:08:51 -0400 Source: powstatd Binary: powstatd Architecture: source i386 Version: 1.5.1-6 Distribution: unstable Urgency: low Maintainer: Peter S Galbraith [EMAIL PROTECTED] Changed-By: Peter S Galbraith [EMAIL

Accepted splitvt 1.6.6-5 (source i386)

2008-05-14 Thread Joey Hess
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 19:46:03 -0400 Source: splitvt Binary: splitvt Architecture: source i386 Version: 1.6.6-5 Distribution: unstable Urgency: low Maintainer: Joey Hess [EMAIL PROTECTED] Changed-By: Joey Hess [EMAIL PROTECTED]

Accepted mr 0.29 (source all)

2008-05-14 Thread Joey Hess
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 19:38:18 -0400 Source: mr Binary: mr Architecture: source all Version: 0.29 Distribution: unstable Urgency: low Maintainer: Joey Hess [EMAIL PROTECTED] Changed-By: Joey Hess [EMAIL PROTECTED] Description: mr

Accepted moreutils 0.30 (source i386)

2008-05-14 Thread Joey Hess
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 19:37:42 -0400 Source: moreutils Binary: moreutils Architecture: source i386 Version: 0.30 Distribution: unstable Urgency: low Maintainer: Joey Hess [EMAIL PROTECTED] Changed-By: Joey Hess [EMAIL PROTECTED]

Accepted fltk1.1 1.1.9-2 (source all amd64)

2008-05-14 Thread Aaron M. Ucko
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 21:12:54 -0400 Source: fltk1.1 Binary: fluid libfltk1.1-dev libfltk1.1 libfltk1.1-dbg fltk1.1-doc fltk1.1-games Architecture: source amd64 all Version: 1.1.9-2 Distribution: unstable Urgency: low Maintainer: Aaron M.

Accepted postfix 2.5.2-0 (source all i386)

2008-05-14 Thread LaMont Jones
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Wed, 14 May 2008 21:30:25 -0600 Source: postfix Binary: postfix postfix-ldap postfix-cdb postfix-pcre postfix-mysql postfix-pgsql postfix-dev postfix-doc Architecture: all i386 source Version: 2.5.2-0 Distribution: unstable

Accepted gnu-smalltalk 3.0.3-1 (source all i386)

2008-05-14 Thread Thomas Girard
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 14 May 2008 22:40:35 + Source: gnu-smalltalk Binary: gnu-smalltalk libgst7 libgst-dev gnu-smalltalk-doc gnu-smalltalk-common gnu-smalltalk-el libpostgresql-gst libsqlite3-gst libncurses-gst libgdbm-gst libtk-gst