On 11/30/18 6:18 PM, Paul Wise wrote:
I've experienced spammers brute-forcing SMTP submission credentials
and using that to send spam before, so I think that mitigating that
using client-side TLS certs should be required, just as we do for SSH
access to Debian machines. I'm not sure how many MUAs
Greetings,
I've been looking into updating opa-ff to the upstream 10.8.0.0.201
release and have some questions about the patch-queue process
specified in d/README.source, which references DEP-14.
The document states that the upstream tag should be merged to the
patch-queue/debian/master branch. H
On Sat, Dec 1, 2018 at 7:01 AM Jeremy Stanley wrote:
> Compromise of the cryptographic keys or primitives in use,
> compromise of the authorized MTAs, compromise of the sender's
> SMTP submission account, compromise of the sender's MUA/system, and
> biggest of all of course is recipients who don't
On 2018-12-01 06:29:44 +0800 (+0800), Paul Wise wrote:
> On Fri, 2018-11-30 at 17:17 -0500, Alexandre Viau wrote:
>
> > DMARC, SPF and DKIM can be used together prevent almost all
> > scenarios of debian.org email spoofing.
>
> Which spoofing scenarios are not covered by this combination?
Compro
On 2018-11-30 5:29 p.m., Paul Wise wrote:
> On Fri, 2018-11-30 at 17:17 -0500, Alexandre Viau wrote:
>
>> DMARC, SPF and DKIM can be used together prevent almost all scenarios
>> of debian.org email spoofing.
>
> Which spoofing scenarios are not covered by this combination?
Ah, none that I know
On Fri, 2018-11-30 at 17:17 -0500, Alexandre Viau wrote:
> DMARC, SPF and DKIM can be used together prevent almost all scenarios
> of debian.org email spoofing.
Which spoofing scenarios are not covered by this combination?
--
bye,
pabs
https://wiki.debian.org/PaulWise
signature.asc
Descript
On 2018-11-30 4:58 p.m., Paul Wise wrote:
> On Sat, Dec 1, 2018 at 1:49 AM Alexandre Viau wrote:
>
>> Debian can specify which servers it sends emails from and ask mail
>> servers around the world to only accept emails from these servers and
>> discard the others.
>
> Does this break the bounce/r
On Sat, Dec 1, 2018 at 1:49 AM Alexandre Viau wrote:
> Debian can specify which servers it sends emails from and ask mail
> servers around the world to only accept emails from these servers and
> discard the others.
Does this break the bounce/resend/redirect feature of various MUAs?
i.e., arbitra
Hi,
On 30-11-2018 20:45, Helmut Grohne wrote:
> * If archive QA gets painful due to broken packages in unstable:
>Ignore those that have no version in testing. It's an easy filter
>with little misclassification.
That may be true for some QA, but for autopkgtesting of migration
candidates
On Thu, Nov 22, 2018 at 11:20:25AM +, Holger Levsen wrote:
> On Wed, Nov 21, 2018 at 08:37:28PM -0700, Sean Whitton wrote:
> > What harm are the packages doing sitting in unstable? Distributing them
> > does not have much point, but neither does removing them.
>
> the rather few people workin
On Fri, 30 Nov 2018 13:17:51 -0500, Alexandre Viau
wrote:
>Debian could provide MTAs and force DDs to use them if they want to send
>from a @debian email. I would consider this reasonable.
>
>The "flexibility" of sending mails from any MTA isn't really relevant if
>you ask me. I could configure gm
On Nov 30, Alexandre Viau wrote:
> - https://en.wikipedia.org/wiki/DMARC
Among other issues, the BTS is still not compatible with DMARC.
--
ciao,
Marco
signature.asc
Description: PGP signature
On 2018-11-30 12:59 p.m., Jeremy Stanley wrote:
> On 2018-11-30 12:49:02 -0500 (-0500), Alexandre Viau wrote:
> [...]
>> If we wanted, we could largely limit this with more restrictive
>> debian.org DNS records.
> [...]
>
> _And_ restrict those with @debian.org addresses to only sending them
> thr
On 2018-11-30 12:49:02 -0500 (-0500), Alexandre Viau wrote:
[...]
> If we wanted, we could largely limit this with more restrictive
> debian.org DNS records.
[...]
_And_ restrict those with @debian.org addresses to only sending them
through specific MTAs. Received headers indicate your message to
On Fri, Nov 30, 2018 at 12:49:02PM -0500, Alexandre Viau wrote:
It is true that others are vulnerable, but this is a choice that Debian
makes and it can be fixed. If we wanted, we could largely limit this
with more restrictive debian.org DNS records.
Yes and no. :) There would need to be a conc
On 2018-11-30 9:29 a.m., Roberto C. Sánchez wrote:
> That is just how email works. With the help of a cooperating mail
> server (which is trivial to setup) anybody in the world can send mail
> with any from address that they wish. This problem is not unique to
> Debian.
Yes and no.
It is true t
>
>
> > However this worries me. During the setup there is no Debian
> involvement, and that means anyone can do the same trick to pretend to own
> my Debian address.
> >
>
That's also a reason why it's better to gpg-sign important email (aside
from the fact that anybody can have a setup that send
Hi Bastian,
I've uploaded julia_1.0.2-1 to unstable (NEW) yesterday. There are
already six uploads being piled up in NEW. These uploads already have
been tested by Ubuntu devel extensively, and are suitable for the
Buster release.
I totally understand that for traditional C/C++ shared object, str
Dzień dobry,jestem reprezentantem firmy, która zajmuje się tworzeniem
nowoczesnych Stron i Sklepów WWW .Z przyjemnością prześlę Państwu naszą
aktualną propozycję w tym zakresie.Jeżeli mogę, proszę o odpowiedź na tego
maila o treści "TAK"._ _ _ _ _ _ _ _Pozdrawiam!
Dzień dobry,jestem reprezentantem firmy, która zajmuje się tworzeniem
nowoczesnych Stron i Sklepów WWW .Z przyjemnością prześlę Państwu naszą
aktualną propozycję w tym zakresie.Jeżeli mogę, proszę o odpowiedź na tego
maila o treści "TAK"._ _ _ _ _ _ _ _Pozdrawiam!
On Fri, Nov 30, 2018 at 10:17:47PM +0800, 殷啟聰 | Kai-Chung Yan wrote:
> > There is a Gmail trick where you can add one send-as email and provide
> > smtp.gmail.com credentials.
>
> > You might have to create an app password.
>
> > I think that this guide does something similar to what I did:
>
>
On Fri, Nov 30, 2018 at 9:18 AM 殷啟聰 | Kai-Chung Yan wrote:
> However this worries me. During the setup there is no Debian involvement, and
> that means anyone can do the same trick to pretend to own my Debian address.
There is a confirmation email so a Bad Guy would have to be able to
read your
> There is a Gmail trick where you can add one send-as email and provide
> smtp.gmail.com credentials.
> You might have to create an app password.
> I think that this guide does something similar to what I did:
> https://blog.alexlenail.me/i-want-to-send-emails-from-my-google-domains-email-thro
Le 22/08/2017 à 18:51, Xavier a écrit :
> Le 22/08/2017 à 16:29, gregor herrmann a écrit :
>> On Tue, 22 Aug 2017 09:45:10 +0200, Alexander Wirt wrote:
>>
There is lemonldap-ng already packaged which provides saml, oauth,
openid-connect, CAS, and more (both identity provider and service
>
Package: wnpp
Severity: wishlist
Owner: Andreas Tille
* Package name: python-msgpack-numpy
Version : 0.4.4
Upstream Author : , Lev E. Givon.
* URL : https://github.com/lebedov/msgpack-numpy
* License : BSD-3-clause
Programming Lang: Python
Description :
Josh Triplett writes:
> Ian Jackson wrote:
>> Stepping back a bit I think the ideal situation is this:
>>
>> * All packages have sysvinit scripts for compatibility.
>
> Preferably in a package maintained by someone who actually uses that
> daemon with sysvinit, rather than one maintained by some
Hi,
Just FYI, as RHEL8beta release note says(*) "Python 2.7 is available in
the python2 package. However, Python 2 will have a shorter life cycle and
its aim is to facilitate smoother transition to Python 3 for customers".
I'm not sure but if we would ship python2.7 in buster, it may be bett
> > Many of those chipsets you list, as I understand, have a mesa driver
> > for them that support opengl and gles.
> > Such as freedreno which supports A4XX series. https://mesamatrix.net/
> >
> > Keep in mind, only the proprietary drivers seem to not support opengl
> > while the hardware is perfe
28 matches
Mail list logo