Re: kernel security upgrade - "rebase?"

2020-10-19 Thread Bob Bernstein
On Mon, 19 Oct 2020, The Wanderer wrote: Actually, "rebase" isn't a Debian term at all; it's a git term. Ah, thus explaining why I found said term vaguely unpleasant. To install that package and let the upgrade go forward, you have a few options. The simplest, and the one I go with mysel

Re: kernel security upgrade - "rebase?"

2020-10-19 Thread David
On Tue, 20 Oct 2020 at 11:22, The Wanderer wrote: > On 2020-10-19 at 20:01, Bob Bernstein wrote: > > I have noticed for several weeks that when I run "apt-get > > upgrade" my kernel gets held back: > If you run 'apt-cache show linux-image-amd64', I suspect that you will > see that the previous (

Re: kernel security upgrade - "rebase?"

2020-10-19 Thread The Wanderer
On 2020-10-19 at 20:01, Bob Bernstein wrote: > I am trying to meet the challenge of the security upgrade -- > [SECURITY] [DSA 4774-1] linux security update -- that > was issued today. > > This is an AMD Buster system: > > Linux debian.localdomain 4.19.0-8-amd64 #1 SM

kernel security upgrade - "rebase?"

2020-10-19 Thread Bob Bernstein
I am trying to meet the challenge of the security upgrade -- [SECURITY] [DSA 4774-1] linux security update -- that was issued today. This is an AMD Buster system: Linux debian.localdomain 4.19.0-8-amd64 #1 SMP Debian 4.19.98-1+deb10u1 (2020-04-27) x86_64 GNU/Linux I have noticed for

Re: Security Vulnerabilities with Nginx v1.14.2 and GNOME Evolution

2020-09-15 Thread Eduardo M KALINOWSKI
On 15/09/2020 10:44, Greg Wooledge wrote: > Another choice would be to run Debian stable, but don't install Debian's > version of nginx. Use upstream's releases, compile them yourself, and > update them yourself whenever you need to (for security reasons or > otherwise

Re: Security Vulnerabilities with Nginx v1.14.2 and GNOME Evolution

2020-09-15 Thread Eduardo M KALINOWSKI
unknown. > > - install Debian Sid (Unstable) and live with many more changes You can also check if there is a newer version in backports (there doesn't seem to be), and you can request one (but it will depend on some volunteer's effort to create it, so no guarantees). But note that t

Re: Security Vulnerabilities with Nginx v1.14.2 and GNOME Evolution

2020-09-15 Thread Greg Wooledge
but don't install Debian's version of nginx. Use upstream's releases, compile them yourself, and update them yourself whenever you need to (for security reasons or otherwise). Personally I'd prefer to let the Debian security team do all that work for me, but the OP seems to value large numbers for their own sake.

Re: Security Vulnerabilities with Nginx v1.14.2 and GNOME Evolution

2020-09-15 Thread Klaus Singvogel
Hi Revanth, Suryadevara, Revanth wrote: > Hi Klaus, > > Just needed to re-confirm couple of things here > > 1. I understand that the NGINX version shipped by default is secured and will > be updated with patches should there be some security issues. But my question >

Re: Security Vulnerabilities with Nginx v1.14.2 and GNOME Evolution

2020-09-15 Thread Dan Ritter
Suryadevara, Revanth wrote: > Just needed to re-confirm couple of things here > > 1. I understand that the NGINX version shipped by default is secured and will > be updated with patches should there be some security issues. But my question > is, Can we expect the latest versi

Re: Security Vulnerabilities with Nginx v1.14.2 and GNOME Evolution

2020-09-15 Thread tomas
On Tue, Sep 15, 2020 at 12:23:11PM +, Suryadevara, Revanth wrote: > Hi Klaus, > > Just needed to re-confirm couple of things here > > 1. I understand that the NGINX version shipped by default is secured and will > be updated with patches should there be some secur

Re: Security Vulnerabilities with Nginx v1.14.2 and GNOME Evolution

2020-09-15 Thread Greg Wooledge
On Tue, Sep 15, 2020 at 12:23:11PM +, Suryadevara, Revanth wrote: > 1. I understand that the NGINX version shipped by default is secured and will > be updated with patches should there be some security issues. But my question > is, Can we expect the latest version of NGINX(i.e. v1

RE: Security Vulnerabilities with Nginx v1.14.2 and GNOME Evolution

2020-09-15 Thread Suryadevara, Revanth
Hi Klaus, Just needed to re-confirm couple of things here 1. I understand that the NGINX version shipped by default is secured and will be updated with patches should there be some security issues. But my question is, Can we expect the latest version of NGINX(i.e. v1.18.x) to be available in

Re: Security Vulnerabilities with Nginx v1.14.2 and GNOME Evolution

2020-09-15 Thread Greg Wooledge
s. So, if > any security Vulnerabilities arise then system would be at high risk as the > vendor no longer provide updates. The Debian security team backports patches to fix security issues whenever possible. *If* in the future a vulnerability is discovered which cannot easily be fixed by a p

Re: Security Vulnerabilities with Nginx v1.14.2 and GNOME Evolution

2020-09-15 Thread Klaus Singvogel
Hi Revanth, as you might have found out now, the Debian Security team is backporting security patches to older versions of OpenSource software, and Debian 10 isn't insecure. The advantage of backporting is, that you don't have to adapt config files to latest syntax on an update, nor

Re: Security Vulnerabilities with Nginx v1.14.2 and GNOME Evolution

2020-09-15 Thread Reco
.x is no longer supported and will not be getting regular > patches. So, if any security Vulnerabilities arise then system would > be at high risk as the vendor no longer provide updates. No known CVE = no problem. Unless of course you just happen to know a private zero-day. And, as the version of

RE: Security Vulnerabilities with Nginx v1.14.2 and GNOME Evolution

2020-09-15 Thread Suryadevara, Revanth
Hi Klaus, 1.) Pertaining to Nginx there is no CVE-ID, main concern is, According to nginx download page, (http://nginx.org/en/download.html) Nginx 1.14.x is no longer supported and will not be getting regular patches. So, if any security Vulnerabilities arise then system would be at

Re: Security Vulnerabilities with Nginx v1.14.2 and GNOME Evolution

2020-09-15 Thread Klaus Singvogel
Suryadevara, Revanth wrote: > > We have a system running on Debian 10 with Nginx v1.14.2, GNOME Evolution > v3.30.5-1.1 installed along with other packages. > [...] > When can we expect latest versions of Nginx and GNOME Evolution to be > available in Debian 10 ? Which se

Security Vulnerabilities with Nginx v1.14.2 and GNOME Evolution

2020-09-14 Thread Suryadevara, Revanth
Hi, We have a system running on Debian 10 with Nginx v1.14.2, GNOME Evolution v3.30.5-1.1 installed along with other packages. 1. Security Vulnerability with Nginx v1.14.2: THREAT: According to nginx download page, (http://nginx.org/en/download.html) Nginx 1.14.x is no longer supported

Re: sources.list for security

2020-07-06 Thread songbird
Greg Wooledge wrote: ... > If you are running "eternal testing" (you never convert it to a stable > release), then you HAVE NO security support. None. There is no line > you should use for security, because there isn't any security. false. security updates come v

Re: sources.list for security

2020-07-06 Thread songbird
Andrei POPESCU wrote: ... > 'testing' receives security updates via 'unstable', there is no separate=20 > repository. > > https://www.debian.org/security/faq#testing ok, thanks! :) i am fine with that. i had an old line in the sources.list that no long

Re: sources.list for security

2020-07-06 Thread Greg Wooledge
> >> >> https://bugs.debian.org/931785 Which says "security suite renamed to bullseye-security (from buster/updates)". On Sun, Jul 05, 2020 at 05:44:44PM -0400, songbird wrote: > >> wishlist for an alias to testing so nobody who=20 > >> follo

Re: sources.list for security

2020-07-05 Thread Andrei POPESCU
On Du, 05 iul 20, 19:31:54, songbird wrote: > > i want the line that goes into the /etc/apt/sources.list > file for testing security updates. 'testing' receives security updates via 'unstable', there is no separate repository. https://www.debian.org/security/faq#

Re: sources.list for security

2020-07-05 Thread Keith bainbridge
On 6/7/20 9:31 am, songbird wrote: some time ago there was a change made to the sources list names for security and i never saw the one for testing come by (i may have missed it) so i'm asking...:) Good afternoon This is what my sources.list looked like when I first installed te

Re: sources.list for security

2020-07-05 Thread songbird
gt; > What more than the 'testing' alias are you looking for? >> >> the one i should use... > > What problem have you observed that you want to fix? i want the line that goes into the /etc/apt/sources.list file for testing security updates. ... > Does that he

Re: sources.list for security

2020-07-05 Thread Dan Ritter
songbird wrote: > Andrei POPESCU wrote: > > On Du, 05 iul 20, 09:38:05, songbird wrote: > >> Andrei POPESCU wrote: > >> > On Du, 05 iul 20, 09:52:25, Salvatore Bonaccorso wrote: > >> >>=3D20 > >> >> https://bugs.debian.org/931785 > >> > > >> > Oups, completely forgot about that, even though I'm su

Re: sources.list for security

2020-07-05 Thread songbird
Andrei POPESCU wrote: > On Du, 05 iul 20, 09:38:05, songbird wrote: >> Andrei POPESCU wrote: >> > On Du, 05 iul 20, 09:52:25, Salvatore Bonaccorso wrote: >> >>=3D20 >> >> https://bugs.debian.org/931785 >> > >> > Oups, completely forgot about that, even though I'm subscribed to -doc. >>=20 >> wish

Re: sources.list for security

2020-07-05 Thread Andrei POPESCU
On Du, 05 iul 20, 09:38:05, songbird wrote: > Andrei POPESCU wrote: > > On Du, 05 iul 20, 09:52:25, Salvatore Bonaccorso wrote: > >>=20 > >> https://bugs.debian.org/931785 > > > > Oups, completely forgot about that, even though I'm subscribed to -doc. > > wishlist for an alias to testing so nobo

Re: sources.list for security

2020-07-05 Thread songbird
Andrei POPESCU wrote: > On Du, 05 iul 20, 09:52:25, Salvatore Bonaccorso wrote: >>=20 >> https://bugs.debian.org/931785 > > Oups, completely forgot about that, even though I'm subscribed to -doc. > > Kind regards, > Andrei wishlist for an alias to testing so nobody who follows testing will need

Re: sources.list for security

2020-07-05 Thread Andrei POPESCU
On Du, 05 iul 20, 09:52:25, Salvatore Bonaccorso wrote: > > https://bugs.debian.org/931785 Oups, completely forgot about that, even though I'm subscribed to -doc. Kind regards, Andrei -- http://wiki.debian.org/FAQsFromDebianUser signature.asc Description: PGP signature

Re: sources.list for security

2020-07-05 Thread Salvatore Bonaccorso
hi, On Sun, Jul 05, 2020 at 10:34:30AM +0300, Andrei POPESCU wrote: > On Du, 05 iul 20, 08:14:28, Pierre Frenkiel wrote: > > hi, > > > > I found several proposals for thre security entry > > > > deb http://security.debian.org/ buster/updates m

Re: sources.list for security

2020-07-05 Thread Andrei POPESCU
On Du, 05 iul 20, 08:14:28, Pierre Frenkiel wrote: > hi, > > I found several proposals for thre security entry > > deb http://security.debian.org/ buster/updates main contrib non-free > deb http://security.debian.org/debian-security buster/updates main contrib > non-

Re: sources.list for security

2020-07-04 Thread der.hans
Am 05. Jul, 2020 schwätzte Pierre Frenkiel so: moin moin Pierre, I found several proposals for thre security entry deb http://security.debian.org/ buster/updates main contrib non-free deb http://security.debian.org/debian-security buster/updates main contrib non-free deb http

Re: sources.list for security

2020-07-04 Thread john doe
On 7/5/2020 8:14 AM, Pierre Frenkiel wrote: hi, I found several proposals for thre security entry deb http://security.debian.org/ buster/updates main contrib non-free deb http://security.debian.org/debian-security buster/updates main contrib non-free deb http://deb.debian.org/debian-security

sources.list for security

2020-07-04 Thread Pierre Frenkiel
hi, I found several proposals for thre security entry deb http://security.debian.org/ buster/updates main contrib non-free deb http://security.debian.org/debian-security buster/updates main contrib non-free deb http://deb.debian.org/debian-security/ buster/updates main which one must be

Re: Excess security measures

2020-05-18 Thread Andrei POPESCU
On Du, 17 mai 20, 12:30:03, Andrei POPESCU wrote: > On Du, 17 mai 20, 10:10:38, deloptes wrote: > > Reco wrote: > > > > > Please elaborate that. I haven't found any way to enable that in Debian > > > 10, yet somehow you did it. > > > > perhaps what is meant here is apt-get from source with unknow

Re: Excess security measures

2020-05-17 Thread Andrei POPESCU
On Du, 17 mai 20, 10:10:38, deloptes wrote: > Reco wrote: > > > Please elaborate that. I haven't found any way to enable that in Debian > > 10, yet somehow you did it. > > perhaps what is meant here is apt-get from source with unknown gpg key. I > personally do not see another option. But I also

Re: Excess security measures

2020-05-17 Thread deloptes
Reco wrote: > Please elaborate that. I haven't found any way to enable that in Debian > 10, yet somehow you did it. perhaps what is meant here is apt-get from source with unknown gpg key. I personally do not see another option. But I also do not know how one can workaround this. @Gary L. Roach W

Re: Excess security measures

2020-05-17 Thread Reco
Hi. On Sat, May 16, 2020 at 04:54:30PM -0700, Gary L. Roach wrote: > 2) The latest annoyance is finding that I can't download and install programs > because they are not signed. Please elaborate that. I haven't found any way to enable that in Debian 10, yet somehow you did it. Reco

Re: Excess security measures

2020-05-17 Thread deloptes
Gary L. Roach wrote: > 1) Not being able to use Dolphin as root is annoying  beyond belief. > Yes, I know, use sudo. What a  pain. I am in and out of root files > constantly either copying or moving them. I always keep two tabs on my > bash console, one as root and one as normal user. Whenever I

Re: Excess security measures

2020-05-17 Thread didier gaumet
if you like risky business: 1) assuming you use sddm: https://bbs.archlinux.org/viewtopic.php?id=193261 (you probably also may auto-login as root which would be simpler) 2) https://askubuntu.com/questions/74345/how-do-i-bypass-ignore-the-gpg-signature-checks-of-apt

Re: Excess security measures

2020-05-16 Thread David
On Sun, 17 May 2020 at 09:54, Gary L. Roach wrote: > > Could someone please show me how to bypass some of the recent security > measures that have been installed in Debian and Ubuntu. [...] > I do scientific computer modeling as a hobby (been retired since 1999) > and use a lot o

Excess security measures

2020-05-16 Thread Gary L. Roach
Could someone please show me how to bypass some of the recent security measures that have been installed in Debian and Ubuntu. I have a fire-walled 3 computer local network that doesn't contain anything that is not replaceable. I have antivirus software installed and my wife and I are the

Re: Security issue ... please could someone help !!!

2020-04-05 Thread Reco
Hi. On Sun, Apr 05, 2020 at 09:03:00PM +0100, Bhasker C V wrote: > I kept digging down and saw that anything below 32 bytes is not accepted > (by cryptsetup --key-file option) but anything above 32 bytes is > discarded. cryptsetup(8), "-s" option. > Does this mean that cryptsetup plain

Security issue ... please could someone help !!!

2020-04-05 Thread Bhasker C V
Hi,  Attached is something I found. I see that cryptsetup --key-file arguement uses only first 32 bytes of the file and anything beyond is unused.  I am on debian bullseye $ cryptsetup --version cryptsetup 2.3.0 $ Following is my test $ cat b #!/bin/bash #create  a file dd if=/dev/zero of=./A

Re: Why does my system download directly from security-cdn.debian.org?

2020-03-08 Thread Roberto C . Sánchez
On Thu, Aug 23, 2018 at 02:20:36PM -0400, Michael Stone wrote: > On Thu, Aug 23, 2018 at 01:16:26PM -0400, Roberto C. Sánchez wrote: > > deb http://apt-cache.localdomain:3142/security/ stretch/updates main > > contrib non-free > > deb http://apt-cache.localdomain:3142/deb

Re: sudo security flaw

2020-02-01 Thread Reco
Hi. On Sun, Feb 02, 2020 at 07:56:48AM +1100, Keith Bainbridge wrote: > Details can be found in the upstream advisory at > https://www.sudo.ws/alerts/pwfeedback.html . It worth noting that to exploit CVE-2019-18634 in Debian one has to configure sudoers a very specific way. > For the st

sudo security flaw

2020-02-01 Thread Keith Bainbridge
Good morning All I guess most people here are on debian security announce. But just in case, it refers to a vulnerability in sudo: Details can be found in the upstream advisory at https://www.sudo.ws/alerts/pwfeedback.html . For the oldstable distribution (stretch), this problem has been

Re: No security support for binutils and libqt5webkit5, what to do?

2019-12-30 Thread Jonas Smedegaard
Quoting Mark Allums (2019-12-30 18:29:07) > > On 12/29/2019 8:44 PM, Andreas wrote: > > I was supposing that Mark's answer implied that (against general > > policies of debian and for reasons unknown to me) in this case > > security changes of upstream would be

Re: No security support for binutils and libqt5webkit5, what to do?

2019-12-30 Thread Mark Allums
On 12/29/2019 8:44 PM, Andreas wrote: I was supposing that Mark's answer implied that (against general policies of debian and for reasons unknown to me) in this case security changes of upstream would be passed on to debian, even if binutils is "not covered by security support&qu

Re: Re: Re: No security support for binutils and libqt5webkit5, what to do?

2019-12-29 Thread Jonas Smedegaard
; Question is not if upstream supports their own (continuously changing) > > code, but if the stable code distributed with Debian is supported. > > I was supposing that Mark's answer implied that (against general > policies of debian and for reasons unknown to me) in this case

Re: Re: Re: No security support for binutils and libqt5webkit5, what to do?

2019-12-29 Thread Andreas
code, but if the stable code distributed with Debian is supported. I was supposing that Mark's answer implied that (against general policies of debian and for reasons unknown to me) in this case security changes of upstream would be passed on to debian, even if binutils is "not covered b

Re: Re: No security support for binutils and libqt5webkit5, what to do?

2019-12-29 Thread Jonas Smedegaard
Quoting Andreas (2019-12-30 00:49:10) > > Binutils is supported upstream > > Thanks, > > that's reassuring. But were is Debian communicating this important bit > of information? I am not so sure that it is reassuring. Question is not if upstream supports their own (continuously changing) code,

Re: Re: No security support for binutils and libqt5webkit5, what to do?

2019-12-29 Thread Andreas
> Binutils is supported upstream Thanks, that's reassuring. But were is Debian communicating this important bit of information? Thanks again, Andreas

Re: Re: No security support for binutils and libqt5webkit5, what to do?

2019-12-29 Thread Andreas
And the same for libqt5webkit5: * Source:qtwebkit-opensource-src Details: No security support upstream and backports not feasible, only for use on trusted content Affected binary package: - libqt5webkit5:amd64 It's a real problem, IMHO, that essential parts of kde depend on something

Re: No security support for binutils and libqt5webkit5, what to do?

2019-12-29 Thread Stephan Seitz
On So, Dez 29, 2019 at 08:48:40 +0100, Pascal Hambourg wrote: Why do you say that these packages have no or limited security support ? Because Debian says so. root@fsing ~ # dpkg -s debian-security-support Package: debian-security-support Status: install ok installed Priority: optional

Re: No security support for binutils and libqt5webkit5, what to do?

2019-12-29 Thread Pascal Hambourg
Le 29/12/2019 à 20:28, Andreas Goesele a écrit : I just went from jessie to buster and I didn't discover any serious problem so far. But I tried to remove all packages where there is no or only limitid security support and ended up with 5 packages I don't think I should/can remove:

Re: No security support for binutils and libqt5webkit5, what to do?

2019-12-29 Thread Mark Allums
On 12/29/2019 1:28 PM, Andreas Goesele wrote: Hi, I just went from jessie to buster and I didn't discover any serious problem so far. But I tried to remove all packages where there is no or only limitid security support and ended up with 5 packages I don't think I should/

No security support for binutils and libqt5webkit5, what to do?

2019-12-29 Thread Andreas Goesele
Hi, I just went from jessie to buster and I didn't discover any serious problem so far. But I tried to remove all packages where there is no or only limitid security support and ended up with 5 packages I don't think I should/can remove: binutils (and binutils-common, libbinutils, bi

Re: [OT] Master Password (was: dropbox security situation)

2019-12-16 Thread l0f4r0
Hi, 15 déc. 2019 à 18:31 de a...@cityscape.co.uk: > Using the website name is merely a suggestion. It can be anything you > like, provided you can remember it. For example, I use "doctor" for one > site; "surgery" or "prescription" would be equally as good. > Actually, it's way worse like this in

Re: [OT] Master Password (was: dropbox security situation)

2019-12-15 Thread Brian
gt;> > On Tue 10 Dec 2019 at 22:34:07 +0100, l0f...@tuta.io wrote: > >> > > >> > > >> I've read the documentation. User needs to remember all of > >> this: > >> > > > > > user-name > > > > Real name actually. If y

[OT] Master Password (was: dropbox security situation)

2019-12-14 Thread l0f4r0
I've read the documentation. User needs to remember all of >> this: >> > > > user-name > > Real name actually. If you do not know your name you have problems. :) > Can be set in ~/.bash_rc. Cross this off the list. > You are weakening security if you write do

Re: dropbox security situation

2019-12-13 Thread Brian
On Thu 12 Dec 2019 at 22:39:13 -0500, Celejar wrote: > On Thu, 12 Dec 2019 23:29:28 + > Brian wrote: > > > On Thu 12 Dec 2019 at 21:13:06 +0100, l0f...@tuta.io wrote: > > > > > Hi, > > > > > > 10 déc. 2019 à 23:11 de a...@cityscape.co.uk: > > > > > > > On Tue 10 Dec 2019 at 22:34:07 +0100

Re: dropbox security situation

2019-12-12 Thread Celejar
On Thu, 12 Dec 2019 23:29:28 + Brian wrote: > On Thu 12 Dec 2019 at 21:13:06 +0100, l0f...@tuta.io wrote: > > > Hi, > > > > 10 déc. 2019 à 23:11 de a...@cityscape.co.uk: > > > > > On Tue 10 Dec 2019 at 22:34:07 +0100, l0f...@tuta.io wrote: > > > > > >> 9 déc. 2019 à 19:13 de a...@cityscape

Re: dropbox security situation

2019-12-12 Thread Brian
On Thu 12 Dec 2019 at 21:13:06 +0100, l0f...@tuta.io wrote: > Hi, > > 10 déc. 2019 à 23:11 de a...@cityscape.co.uk: > > > On Tue 10 Dec 2019 at 22:34:07 +0100, l0f...@tuta.io wrote: > > > >> 9 déc. 2019 à 19:13 de a...@cityscape.co.uk: > >> > >> > How about not having to remember (or write down)

Re: dropbox security situation

2019-12-12 Thread l0f4r0
Hi, 10 déc. 2019 à 23:11 de a...@cityscape.co.uk: > On Tue 10 Dec 2019 at 22:34:07 +0100, l0f...@tuta.io wrote: > >> 9 déc. 2019 à 19:13 de a...@cityscape.co.uk: >> >> > How about not having to remember (or write down) any passwords for >> > the places you log in to? >> > >> > https://masterpassw

Re: dropbox security situation

2019-12-11 Thread Celejar
ey may still be unable to decrypt your gpg files if enough time has > passed and gpg-agent has forgotten your password. Yes, I acknowledged this point in my original email: > machine can access the password file anyway. I guess one gets some > additional security in the case where one w

Re: dropbox security situation

2019-12-11 Thread Celejar
On Wed, 11 Dec 2019 01:49:14 -0300 riveravaldez wrote: > On 12/10/19, Celejar wrote: > > On Sun, 8 Dec 2019 06:48:12 +0100 > > wrote: > > > > ... > > > >> One example for the other side of the pond is riseup.net -- but they > >> don't offer nextcloud, afaik; mail, mailing lists, wikis, pastebin

Re: dropbox security situation

2019-12-11 Thread Celejar
On Wed, 11 Dec 2019 06:41:29 +0100 wrote: > On Tue, Dec 10, 2019 at 09:57:14PM -0500, Celejar wrote: > > On Sun, 8 Dec 2019 06:48:12 +0100 > > wrote: > > > > ... > > > > > One example for the other side of the pond is riseup.net -- but they > > > don't offer nextcloud, afaik; mail, mailing lis

Re: dropbox security situation

2019-12-11 Thread Stefan Monnier
> I use full disk encryption (cryptsetup / LUKS), so the password file > is secure at rest, and when I'm actually using the system, if > gpg-agent is used, then anyone with access to the machine can access > the password file anyway. That assumes a single-user situation. But in case someone manag

Re: [OT] Google security

2019-12-11 Thread Joe
On Tue, 10 Dec 2019 18:19:05 -0600 John Hasler wrote: > The Wanderer writes: > > Hmm. In my lexicon, crimes are defined by statute. How does your > > definition differ? > > Crimes are acts that intentionally harm people (with a few exceptions > and special cases). Maybe we need a different wo

Re: dropbox security situation

2019-12-10 Thread tomas
On Tue, Dec 10, 2019 at 09:57:14PM -0500, Celejar wrote: > On Sun, 8 Dec 2019 06:48:12 +0100 > wrote: > > ... > > > One example for the other side of the pond is riseup.net -- but they > > don't offer nextcloud, afaik; mail, mailing lists, wikis, pastebin, > > off the top of my head. > > And th

Re: dropbox security situation

2019-12-10 Thread riveravaldez
On 12/10/19, Celejar wrote: > On Sun, 8 Dec 2019 06:48:12 +0100 > wrote: > > ... > >> One example for the other side of the pond is riseup.net -- but they >> don't offer nextcloud, afaik; mail, mailing lists, wikis, pastebin, >> off the top of my head. > > And they have a .. very particular ideol

Re: dropbox security situation

2019-12-10 Thread Celejar
On Sun, 8 Dec 2019 06:48:12 +0100 wrote: ... > One example for the other side of the pond is riseup.net -- but they > don't offer nextcloud, afaik; mail, mailing lists, wikis, pastebin, > off the top of my head. And they have a .. very particular ideology they're pushing: "Our purpose is to ai

Re: [OT] Google security

2019-12-10 Thread John Hasler
The Wanderer writes: > Hmm. In my lexicon, crimes are defined by statute. How does your > definition differ? Crimes are acts that intentionally harm people (with a few exceptions and special cases). Statute violations are acts or states (e.g, possession of certain substances or objects) that a go

Re: dropbox security situation

2019-12-10 Thread Celejar
On Tue, 10 Dec 2019 21:43:55 + Brian wrote: > On Mon 09 Dec 2019 at 18:35:46 -0500, Celejar wrote: > > > On Mon, 9 Dec 2019 19:34:29 + > > Brian wrote: > > > > > On Mon 09 Dec 2019 at 14:10:56 -0500, Celejar wrote: > > > > ... > > > > > > Although I almost always use it with its --se

Re: dropbox security situation

2019-12-10 Thread Brian
On Tue 10 Dec 2019 at 22:11:33 +, Brian wrote: > On Tue 10 Dec 2019 at 22:34:07 +0100, l0f...@tuta.io wrote: > > > 9 déc. 2019 à 19:13 de a...@cityscape.co.uk: > > > > > How about not having to remember (or write down) any passwords for > > > the places you log in to? > > > > > > https://mas

Re: dropbox security situation

2019-12-10 Thread Brian
On Tue 10 Dec 2019 at 22:34:07 +0100, l0f...@tuta.io wrote: > 9 déc. 2019 à 19:13 de a...@cityscape.co.uk: > > > How about not having to remember (or write down) any passwords for > > the places you log in to? > > > > https://masterpassword.app/ > > > > Not in Debian, unfortunately. > > > Interes

Re: dropbox security situation

2019-12-10 Thread Brian
ave to constantly enter a master password to access my > passwords. pass recommends using gpg-agent, but then how much does one > really gain by the encryption? I use full disk encryption (cryptsetup / > LUKS), so the password file is secure at rest, and when I'm actually > using

Re: dropbox security situation

2019-12-10 Thread l0f4r0
Hi, 9 déc. 2019 à 15:56 de charlescur...@charlescurley.com: > There is a handy password generator available on Debian, called APG > (Automated Password Generator), which will generate passwords for you. > The default settings yield a fairly strong password, but you can modify > those to make the

Re: [OT] Google security

2019-12-10 Thread The Wanderer
On 2019-12-10 at 08:07, John Hasler wrote: > Andrei writes: > >> "Criminals" are what the law defines them to be. Laws can be >> created and / or changed as needed. > > In my lexicon criminals are people who commit crimes, not people who > violate statutes. Hmm. In my lexicon, crimes are defin

Re: dropbox security situation

2019-12-10 Thread tomas
On Tue, Dec 10, 2019 at 06:56:15AM -0600, John Hasler wrote: > I wrote: > > Bruce Schneier recommends writing passwords down and then keeping the > > document containing them secure. > > Andrei writes: > > Not everybody has the luxury of typing password without danger of > > someone taking a peek

Re: dropbox security situation

2019-12-10 Thread Celejar
d I write down my passphrase? This is a very important question. Much advice says never write down your passphrase under any circumstances. I strongly disagree, as do may other security experts. Most people are more afraid of forgetting their own passphrase than they are of having it stolen. As a res

Re: [OT] Google security

2019-12-10 Thread John Hasler
Andrei writes: > "Criminals" are what the law defines them to be. Laws can be created > and / or changed as needed. In my lexicon criminals are people who commit crimes, not people who violate statutes. Not restricting my emailing to sending encrypted messages to people in my web of trust and doi

Re: dropbox security situation

2019-12-10 Thread John Hasler
I wrote: > Bruce Schneier recommends writing passwords down and then keeping the > document containing them secure. Andrei writes: > Not everybody has the luxury of typing password without danger of > someone taking a peek over the shoulder. True but the admonition isn't "Don't write down passwor

Re: dropbox security situation

2019-12-09 Thread Andrei POPESCU
On Lu, 09 dec 19, 14:17:39, John Hasler wrote: > Jonas Smedegaard writes: > > I dislike APG because it generates passwords difficult to remember - > > without aiding in how to deal with that, which has a high risk of > > passwords getting stored on physical notes in the top drawer... > > Bruce Sc

Re: dropbox security situation

2019-12-09 Thread Andrei POPESCU
word file is secure at rest, and when I'm actually > using the system, if gpg-agent is used, then anyone with access to the > machine can access the password file anyway. I guess one gets some > additional security in the case where one walks away from > the machine and leaves it runni

Re: dropbox security situation

2019-12-09 Thread Celejar
, if gpg-agent is used, then anyone with access to the machine can access the password file anyway. I guess one gets some additional security in the case where one walks away from the machine and leaves it running (and an attacker doesn't get there before gpg-agent evicts the password from the cache)

Re: [OT] Google security

2019-12-09 Thread Nicholas Geovanis
On Mon, Dec 9, 2019 at 2:29 PM John Hasler wrote: > Nicholas Geovanis writes: > > You are safe (now) so others' freedoms need not be respected. Your > > first jump down the slippery slope :-) Jefferson the slave-master > > would have said that you have taken one hand off the wolf's ears. > > Goo

Re: [OT] Google security

2019-12-09 Thread Nicolas George
Charles Curley (12019-12-09): > Archaeological record. Are not history. Can we close this useless subthread now?

Re: dropbox security situation

2019-12-09 Thread Jonas Smedegaard
Quoting John Hasler (2019-12-09 21:17:39) > Jonas Smedegaard writes: > > I dislike APG because it generates passwords difficult to remember - > > without aiding in how to deal with that, which has a high risk of > > passwords getting stored on physical notes in the top drawer... > > Bruce Schne

Re: [OT] Google security

2019-12-09 Thread Andrei POPESCU
On Lu, 09 dec 19, 14:28:39, John Hasler wrote: > Nicholas Geovanis writes: > > You are safe (now) so others' freedoms need not be respected. Your > > first jump down the slippery slope :-) Jefferson the slave-master > > would have said that you have taken one hand off the wolf's ears. > > Good luc

Re: [OT] Google security

2019-12-09 Thread Charles Curley
On Mon, 9 Dec 2019 20:01:04 +0100 Nicolas George wrote: > Maybe you have studied a lot of it, but apparently not in depth enough > to know that we have less than 5500 years of it. Archaeological record. -- Does anybody read signatures any more? https://charlescurley.com https://charlescurley.

Re: dropbox security situation

2019-12-09 Thread Jonas Smedegaard
Quoting John Hasler (2019-12-09 20:40:06) > Charles Curley writes: > > There is a handy password generator available on Debian, called APG > > (Automated Password Generator), which will generate passwords for you. > > The default settings yield a fairly strong password, but you can > > modify thos

Re: [OT] Google security

2019-12-09 Thread John Hasler
Charles Curley writes: > How do you know that? Mr. Snowden, among others, has made it > abundantly clear that the US government is perfectly willing to do > mass surveillance and other intrusions without the slightest notice to > the Congress, never mind the public. Read what I actually wrote. I

Re: [OT] Google security

2019-12-09 Thread John Hasler
Nicholas Geovanis writes: > You are safe (now) so others' freedoms need not be respected. Your > first jump down the slippery slope :-) Jefferson the slave-master > would have said that you have taken one hand off the wolf's ears. > Good luck :-) don't let go the other ear or you become the slave

Re: [OT] Google security

2019-12-09 Thread Andrei POPESCU
On Lu, 09 dec 19, 11:16:32, John Hasler wrote: > Charlie writes: > > Over many years, although, I may not ever be in possession of anything > > of interest to anyone? > > There are two distinct "security" condsiderations here that are often > munged together: &

Re: dropbox security situation

2019-12-09 Thread John Hasler
t note and sticking it on the corner of her terminal (or, if she was security minded, hiding it under her blotter). The sysadmins, who kept a copy of the root passsword in the safe, saw no reason why she couldn't just memorize the damn thing. It was only six letters, after all, and if she forgo

Re: [OT] Google security

2019-12-09 Thread Brian
On Mon 09 Dec 2019 at 19:50:21 +, Brian wrote: > On Mon 09 Dec 2019 at 11:58:57 -0600, Nicholas Geovanis wrote: > > > On Mon, Dec 9, 2019 at 11:17 AM John Hasler wrote: > > > > > The data trawling activities of my > > > government[2] angers me but when I think about it objectively I realiz

Re: [OT] Google security

2019-12-09 Thread Brian
On Mon 09 Dec 2019 at 11:58:57 -0600, Nicholas Geovanis wrote: > On Mon, Dec 9, 2019 at 11:17 AM John Hasler wrote: > > > The data trawling activities of my > > government[2] angers me but when I think about it objectively I realize > > that it does me no actual harm: I'm simply not someone the

Re: dropbox security situation

2019-12-09 Thread John Hasler
Charles Curley writes: > There is a handy password generator available on Debian, called APG > (Automated Password Generator), which will generate passwords for you. > The default settings yield a fairly strong password, but you can > modify those to make the results even stronger. Considering th

<    1   2   3   4   5   6   7   8   9   10   >