Re: Debian mirrors and MITM

2014-05-31 Thread Peter Palfrader
On Fri, 30 May 2014, Joey Hess wrote: Alfie John wrote: Taking a look at the Debian mirror list, I see none serving over HTTPS: https://www.debian.org/mirror/list https://mirrors.kernel.org/debian is the only one I know of. It would be good to have a few more, because there are

Re: [SECURITY] [DSA 2939-1] chromium-browser security update

2014-05-31 Thread Georgi Naplatanov
On 05/31/2014 10:27 AM, Michael Gilbert wrote: - Debian Security Advisory DSA-2939-1 secur...@debian.org http://www.debian.org/security/ Michael Gilbert May 31, 2014

Re: Debian mirrors and MITM

2014-05-31 Thread Patrick Schleizer
Peter Palfrader: On Fri, 30 May 2014, Joey Hess wrote: Alfie John wrote: Taking a look at the Debian mirror list, I see none serving over HTTPS: https://www.debian.org/mirror/list https://mirrors.kernel.org/debian is the only one I know of. It would be good to have a few more, because

Re: Debian mirrors and MITM

2014-05-31 Thread Patrick Schleizer
Joey Hess: [...] there are situations where debootstrap is used without debian-archive-keyring being available, [...] Please elaborate, which situations are these? -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact

Re: [SECURITY] [DSA 2939-1] chromium-browser security update

2014-05-31 Thread Andrew McGlashan
On 31/05/2014 7:27 PM, Georgi Naplatanov wrote: On 05/31/2014 10:27 AM, Michael Gilbert wrote: - Debian Security Advisory DSA-2939-1 secur...@debian.org http://www.debian.org/security/

Re: Debian mirrors and MITM

2014-05-31 Thread Giuseppe Mazzotta
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 31-05-14 12:55, Patrick Schleizer wrote: Joey Hess: [...] there are situations where debootstrap is used without debian-archive-keyring being available, [...] Please elaborate, which situations are these? Let me answer this: using

Re: [SECURITY] [DSA 2939-1] chromium-browser security update

2014-05-31 Thread Michael Gilbert
On Sat, May 31, 2014 at 5:27 AM, Georgi Naplatanov wrote: When I choose About Chromium menu item it says: Version 35.0.1916.114 Built on Debian 7.1, running on Debian 7.5 (270117) Is that true that package for AMD64 is built on Debian 7.1? If yes, is using of this package secure? Yes, that

Re: [SECURITY] [DSA 2939-1] chromium-browser security update

2014-05-31 Thread Michael Gilbert
On Sat, May 31, 2014 at 7:44 AM, Andrew McGlashan wrote: Does Chromium suffer from the Google decision to make use of OCSP impossible? Therefore, an untrustworthy browser. Basically, the answer is the design of certificate revocation is fundamentally flawed, and Google have their own security

Re: [SECURITY] [DSA 2939-1] chromium-browser security update

2014-05-31 Thread Georgi Naplatanov
On 05/31/2014 05:25 PM, Michael Gilbert wrote: On Sat, May 31, 2014 at 5:27 AM, Georgi Naplatanov wrote: When I choose About Chromium menu item it says: Version 35.0.1916.114 Built on Debian 7.1, running on Debian 7.5 (270117) Is that true that package for AMD64 is built on Debian 7.1? If

Re: [SECURITY] [DSA 2939-1] chromium-browser security update

2014-05-31 Thread Kurt Roeckx
On Sat, May 31, 2014 at 10:25:28AM -0400, Michael Gilbert wrote: On Sat, May 31, 2014 at 5:27 AM, Georgi Naplatanov wrote: When I choose About Chromium menu item it says: Version 35.0.1916.114 Built on Debian 7.1, running on Debian 7.5 (270117) Is that true that package for AMD64 is

Re: [SECURITY] [DSA 2939-1] chromium-browser security update

2014-05-31 Thread Michael Gilbert
On Sat, May 31, 2014 at 11:28 AM, Kurt Roeckx wrote: It could be nice if the stable buildds were kept more up to date. I've CC'd am...@buildd.debian.org to get their opinion on that. I've just updated the chroots. But there is reason to be concerned that it was build against when there were

Re: [SECURITY] [DSA 2939-1] chromium-browser security update

2014-05-31 Thread Kurt Roeckx
On Sat, May 31, 2014 at 11:53:23AM -0400, Michael Gilbert wrote: On Sat, May 31, 2014 at 11:28 AM, Kurt Roeckx wrote: It could be nice if the stable buildds were kept more up to date. I've CC'd am...@buildd.debian.org to get their opinion on that. I've just updated the chroots. But there

Re: [SECURITY] [DSA 2939-1] chromium-browser security update

2014-05-31 Thread Michael Gilbert
On Sat, May 31, 2014 at 12:19 PM, Kurt Roeckx wrote: This is a manual, I currently see no need to automate it. Does buildd.debian.org provide any information about the up to dateness of its chroots? If this kind of information were available, it would help to determine whether a request for

Re: [SECURITY] [DSA 2939-1] chromium-browser security update

2014-05-31 Thread Kurt Roeckx
On Sat, May 31, 2014 at 12:26:45PM -0400, Michael Gilbert wrote: On Sat, May 31, 2014 at 12:19 PM, Kurt Roeckx wrote: This is a manual, I currently see no need to automate it. Does buildd.debian.org provide any information about the up to dateness of its chroots? If this kind of

Re: [SECURITY] [DSA 2939-1] chromium-browser security update

2014-05-31 Thread Andrew McGlashan
On 1/06/2014 12:31 AM, Michael Gilbert wrote: On Sat, May 31, 2014 at 7:44 AM, Andrew McGlashan wrote: Does Chromium suffer from the Google decision to make use of OCSP impossible? Therefore, an untrustworthy browser. Basically, the answer is the design of certificate revocation is

Re: [SECURITY] [DSA 2939-1] chromium-browser security update

2014-05-31 Thread Kurt Roeckx
On Sun, Jun 01, 2014 at 03:46:35AM +1000, Andrew McGlashan wrote: We may see certificate stapling as an answer, but that won't be enough if it cannot be certified to /require/ stapling in the cert itself. I've mailed the TLS workgroup about this very issue but didn't get any reply. Kurt --

Re: [SECURITY] [DSA 2939-1] chromium-browser security update

2014-05-31 Thread Michael Gilbert
On Sat, May 31, 2014 at 1:46 PM, Andrew McGlashan wrote: We may see certificate stapling as an answer, but that won't be enough if it cannot be certified to /require/ stapling in the cert itself. There may be other solutions in time. You are right in saying that the whole certificate

Re: [SECURITY] [DSA 2939-1] chromium-browser security update

2014-05-31 Thread Andrew McGlashan
On 1/06/2014 4:35 AM, Michael Gilbert wrote: On Sat, May 31, 2014 at 1:46 PM, Andrew McGlashan wrote: We may see certificate stapling as an answer, but that won't be enough if it cannot be certified to /require/ stapling in the cert itself. There may be other solutions in time. You are right

Re: [SECURITY] [DSA 2939-1] chromium-browser security update

2014-05-31 Thread Michael Gilbert
On Sat, May 31, 2014 at 3:13 PM, Andrew McGlashan wrote: Google did have OCSP, but they deliberately removed it recently. FWIW, Steve Gibson has a very good take on all of this. The OCSP server not found issue is rare, in the past the /main/ CA's got together to discuss the OCSP issue and

Re: [SECURITY] [DSA 2939-1] chromium-browser security update

2014-05-31 Thread Kurt Roeckx
On Sat, May 31, 2014 at 05:28:59PM +0200, Kurt Roeckx wrote: I've just updated the chroots. But there is reason to be concerned that it was build against when there were some older packages installed. That should have said no reason. Kurt -- To UNSUBSCRIBE, email to

External check

2014-05-31 Thread Raphael Geissert
CVE-2014-3925: missing from list -- The output might be a bit terse, but the above ids are known elsewhere, check the references in the tracker. The second part indicates the status of that id in the tracker at the moment the script was run. -- To UNSUBSCRIBE, email to