On Mon, 19 Oct 2020, The Wanderer wrote:
Actually, "rebase" isn't a Debian term at all; it's a git
term.
Ah, thus explaining why I found said term vaguely unpleasant.
To install that package and let the upgrade go forward, you
have a few options. The simplest, and the one I go with
mysel
On Tue, 20 Oct 2020 at 11:22, The Wanderer wrote:
> On 2020-10-19 at 20:01, Bob Bernstein wrote:
> > I have noticed for several weeks that when I run "apt-get
> > upgrade" my kernel gets held back:
> If you run 'apt-cache show linux-image-amd64', I suspect that you will
> see that the previous (
On 2020-10-19 at 20:01, Bob Bernstein wrote:
> I am trying to meet the challenge of the security upgrade --
> [SECURITY] [DSA 4774-1] linux security update -- that
> was issued today.
>
> This is an AMD Buster system:
>
> Linux debian.localdomain 4.19.0-8-amd64 #1 SM
I am trying to meet the challenge of the security upgrade --
[SECURITY] [DSA 4774-1] linux security update -- that
was issued today.
This is an AMD Buster system:
Linux debian.localdomain 4.19.0-8-amd64 #1 SMP Debian
4.19.98-1+deb10u1 (2020-04-27) x86_64 GNU/Linux
I have noticed for
On 15/09/2020 10:44, Greg Wooledge wrote:
> Another choice would be to run Debian stable, but don't install Debian's
> version of nginx. Use upstream's releases, compile them yourself, and
> update them yourself whenever you need to (for security reasons or
> otherwise
unknown.
>
> - install Debian Sid (Unstable) and live with many more changes
You can also check if there is a newer version in backports (there
doesn't seem to be), and you can request one (but it will depend on some
volunteer's effort to create it, so no guarantees).
But note that t
but don't install Debian's
version of nginx. Use upstream's releases, compile them yourself, and
update them yourself whenever you need to (for security reasons or
otherwise).
Personally I'd prefer to let the Debian security team do all that work
for me, but the OP seems to value large numbers for their own sake.
Hi Revanth,
Suryadevara, Revanth wrote:
> Hi Klaus,
>
> Just needed to re-confirm couple of things here
>
> 1. I understand that the NGINX version shipped by default is secured and will
> be updated with patches should there be some security issues. But my question
>
Suryadevara, Revanth wrote:
> Just needed to re-confirm couple of things here
>
> 1. I understand that the NGINX version shipped by default is secured and will
> be updated with patches should there be some security issues. But my question
> is, Can we expect the latest versi
On Tue, Sep 15, 2020 at 12:23:11PM +, Suryadevara, Revanth wrote:
> Hi Klaus,
>
> Just needed to re-confirm couple of things here
>
> 1. I understand that the NGINX version shipped by default is secured and will
> be updated with patches should there be some secur
On Tue, Sep 15, 2020 at 12:23:11PM +, Suryadevara, Revanth wrote:
> 1. I understand that the NGINX version shipped by default is secured and will
> be updated with patches should there be some security issues. But my question
> is, Can we expect the latest version of NGINX(i.e. v1
Hi Klaus,
Just needed to re-confirm couple of things here
1. I understand that the NGINX version shipped by default is secured and will
be updated with patches should there be some security issues. But my question
is, Can we expect the latest version of NGINX(i.e. v1.18.x) to be available in
s. So, if
> any security Vulnerabilities arise then system would be at high risk as the
> vendor no longer provide updates.
The Debian security team backports patches to fix security issues
whenever possible.
*If* in the future a vulnerability is discovered which cannot easily be
fixed by a p
Hi Revanth,
as you might have found out now, the Debian Security team is backporting
security patches to older versions of OpenSource software, and Debian 10
isn't insecure.
The advantage of backporting is, that you don't have to adapt config files
to latest syntax on an update, nor
.x is no longer supported and will not be getting regular
> patches. So, if any security Vulnerabilities arise then system would
> be at high risk as the vendor no longer provide updates.
No known CVE = no problem. Unless of course you just happen to know a
private zero-day.
And, as the version of
Hi Klaus,
1.) Pertaining to Nginx there is no CVE-ID, main concern is,
According to nginx download page, (http://nginx.org/en/download.html) Nginx
1.14.x is no longer supported and will not be getting regular patches. So, if
any security Vulnerabilities arise then system would be at
Suryadevara, Revanth wrote:
>
> We have a system running on Debian 10 with Nginx v1.14.2, GNOME Evolution
> v3.30.5-1.1 installed along with other packages.
>
[...]
> When can we expect latest versions of Nginx and GNOME Evolution to be
> available in Debian 10 ?
Which se
Hi,
We have a system running on Debian 10 with Nginx v1.14.2, GNOME Evolution
v3.30.5-1.1 installed along with other packages.
1. Security Vulnerability with Nginx v1.14.2:
THREAT:
According to nginx download page, (http://nginx.org/en/download.html) Nginx
1.14.x is no longer supported
Greg Wooledge wrote:
...
> If you are running "eternal testing" (you never convert it to a stable
> release), then you HAVE NO security support. None. There is no line
> you should use for security, because there isn't any security.
false. security updates come v
Andrei POPESCU wrote:
...
> 'testing' receives security updates via 'unstable', there is no separate=20
> repository.
>
> https://www.debian.org/security/faq#testing
ok, thanks! :) i am fine with that.
i had an old line in the sources.list that no long
> >> >> https://bugs.debian.org/931785
Which says "security suite renamed to bullseye-security (from
buster/updates)".
On Sun, Jul 05, 2020 at 05:44:44PM -0400, songbird wrote:
> >> wishlist for an alias to testing so nobody who=20
> >> follo
On Du, 05 iul 20, 19:31:54, songbird wrote:
>
> i want the line that goes into the /etc/apt/sources.list
> file for testing security updates.
'testing' receives security updates via 'unstable', there is no separate
repository.
https://www.debian.org/security/faq#
On 6/7/20 9:31 am, songbird wrote:
some time ago there was a change made to the sources
list names for security and i never saw the one for
testing come by (i may have missed it) so i'm asking...:)
Good afternoon
This is what my sources.list looked like when I first installed te
gt; > What more than the 'testing' alias are you looking for?
>>
>> the one i should use...
>
> What problem have you observed that you want to fix?
i want the line that goes into the /etc/apt/sources.list
file for testing security updates.
...
> Does that he
songbird wrote:
> Andrei POPESCU wrote:
> > On Du, 05 iul 20, 09:38:05, songbird wrote:
> >> Andrei POPESCU wrote:
> >> > On Du, 05 iul 20, 09:52:25, Salvatore Bonaccorso wrote:
> >> >>=3D20
> >> >> https://bugs.debian.org/931785
> >> >
> >> > Oups, completely forgot about that, even though I'm su
Andrei POPESCU wrote:
> On Du, 05 iul 20, 09:38:05, songbird wrote:
>> Andrei POPESCU wrote:
>> > On Du, 05 iul 20, 09:52:25, Salvatore Bonaccorso wrote:
>> >>=3D20
>> >> https://bugs.debian.org/931785
>> >
>> > Oups, completely forgot about that, even though I'm subscribed to -doc.
>>=20
>> wish
On Du, 05 iul 20, 09:38:05, songbird wrote:
> Andrei POPESCU wrote:
> > On Du, 05 iul 20, 09:52:25, Salvatore Bonaccorso wrote:
> >>=20
> >> https://bugs.debian.org/931785
> >
> > Oups, completely forgot about that, even though I'm subscribed to -doc.
>
> wishlist for an alias to testing so nobo
Andrei POPESCU wrote:
> On Du, 05 iul 20, 09:52:25, Salvatore Bonaccorso wrote:
>>=20
>> https://bugs.debian.org/931785
>
> Oups, completely forgot about that, even though I'm subscribed to -doc.
>
> Kind regards,
> Andrei
wishlist for an alias to testing so nobody who
follows testing will need
On Du, 05 iul 20, 09:52:25, Salvatore Bonaccorso wrote:
>
> https://bugs.debian.org/931785
Oups, completely forgot about that, even though I'm subscribed to -doc.
Kind regards,
Andrei
--
http://wiki.debian.org/FAQsFromDebianUser
signature.asc
Description: PGP signature
hi,
On Sun, Jul 05, 2020 at 10:34:30AM +0300, Andrei POPESCU wrote:
> On Du, 05 iul 20, 08:14:28, Pierre Frenkiel wrote:
> > hi,
> >
> > I found several proposals for thre security entry
> >
> > deb http://security.debian.org/ buster/updates m
On Du, 05 iul 20, 08:14:28, Pierre Frenkiel wrote:
> hi,
>
> I found several proposals for thre security entry
>
> deb http://security.debian.org/ buster/updates main contrib non-free
> deb http://security.debian.org/debian-security buster/updates main contrib
> non-
Am 05. Jul, 2020 schwätzte Pierre Frenkiel so:
moin moin Pierre,
I found several proposals for thre security entry
deb http://security.debian.org/ buster/updates main contrib non-free
deb http://security.debian.org/debian-security buster/updates main contrib
non-free
deb http
On 7/5/2020 8:14 AM, Pierre Frenkiel wrote:
hi,
I found several proposals for thre security entry
deb http://security.debian.org/ buster/updates main contrib non-free
deb http://security.debian.org/debian-security buster/updates main
contrib non-free
deb http://deb.debian.org/debian-security
hi,
I found several proposals for thre security entry
deb http://security.debian.org/ buster/updates main contrib non-free
deb http://security.debian.org/debian-security buster/updates main
contrib non-free
deb http://deb.debian.org/debian-security/ buster/updates main
which one must be
On Du, 17 mai 20, 12:30:03, Andrei POPESCU wrote:
> On Du, 17 mai 20, 10:10:38, deloptes wrote:
> > Reco wrote:
> >
> > > Please elaborate that. I haven't found any way to enable that in Debian
> > > 10, yet somehow you did it.
> >
> > perhaps what is meant here is apt-get from source with unknow
On Du, 17 mai 20, 10:10:38, deloptes wrote:
> Reco wrote:
>
> > Please elaborate that. I haven't found any way to enable that in Debian
> > 10, yet somehow you did it.
>
> perhaps what is meant here is apt-get from source with unknown gpg key. I
> personally do not see another option. But I also
Reco wrote:
> Please elaborate that. I haven't found any way to enable that in Debian
> 10, yet somehow you did it.
perhaps what is meant here is apt-get from source with unknown gpg key. I
personally do not see another option. But I also do not know how one can
workaround this.
@Gary L. Roach
W
Hi.
On Sat, May 16, 2020 at 04:54:30PM -0700, Gary L. Roach wrote:
> 2) The latest annoyance is finding that I can't download and install programs
> because they are not signed.
Please elaborate that. I haven't found any way to enable that in Debian 10, yet
somehow you did it.
Reco
Gary L. Roach wrote:
> 1) Not being able to use Dolphin as root is annoying beyond belief.
> Yes, I know, use sudo. What a pain. I am in and out of root files
> constantly either copying or moving them. I always keep two tabs on my
> bash console, one as root and one as normal user.
Whenever I
if you like risky business:
1) assuming you use sddm:
https://bbs.archlinux.org/viewtopic.php?id=193261 (you probably also
may auto-login as root which would be simpler)
2)
https://askubuntu.com/questions/74345/how-do-i-bypass-ignore-the-gpg-signature-checks-of-apt
On Sun, 17 May 2020 at 09:54, Gary L. Roach
wrote:
>
> Could someone please show me how to bypass some of the recent security
> measures that have been installed in Debian and Ubuntu.
[...]
> I do scientific computer modeling as a hobby (been retired since 1999)
> and use a lot o
Could someone please show me how to bypass some of the recent security
measures that have been installed in Debian and Ubuntu. I have a
fire-walled 3 computer local network that doesn't contain anything that
is not replaceable. I have antivirus software installed and my wife and
I are the
Hi.
On Sun, Apr 05, 2020 at 09:03:00PM +0100, Bhasker C V wrote:
> I kept digging down and saw that anything below 32 bytes is not accepted
> (by cryptsetup --key-file option) but anything above 32 bytes is
> discarded.
cryptsetup(8), "-s" option.
> Does this mean that cryptsetup plain
Hi,
Attached is something I found. I see that cryptsetup --key-file
arguement uses only first 32 bytes of the file and anything beyond is
unused.
I am on debian bullseye
$ cryptsetup --version
cryptsetup 2.3.0
$
Following is my test
$ cat b
#!/bin/bash
#create a file
dd if=/dev/zero of=./A
On Thu, Aug 23, 2018 at 02:20:36PM -0400, Michael Stone wrote:
> On Thu, Aug 23, 2018 at 01:16:26PM -0400, Roberto C. Sánchez wrote:
> > deb http://apt-cache.localdomain:3142/security/ stretch/updates main
> > contrib non-free
> > deb http://apt-cache.localdomain:3142/deb
Hi.
On Sun, Feb 02, 2020 at 07:56:48AM +1100, Keith Bainbridge wrote:
> Details can be found in the upstream advisory at
> https://www.sudo.ws/alerts/pwfeedback.html .
It worth noting that to exploit CVE-2019-18634 in Debian one has to
configure sudoers a very specific way.
> For the st
Good morning All
I guess most people here are on debian security announce.
But just in case, it refers to a vulnerability in sudo:
Details can be found in the upstream advisory at
https://www.sudo.ws/alerts/pwfeedback.html .
For the oldstable distribution (stretch), this problem has been
Quoting Mark Allums (2019-12-30 18:29:07)
>
> On 12/29/2019 8:44 PM, Andreas wrote:
> > I was supposing that Mark's answer implied that (against general
> > policies of debian and for reasons unknown to me) in this case
> > security changes of upstream would be
On 12/29/2019 8:44 PM, Andreas wrote:
I was supposing that Mark's answer implied that (against general
policies of debian and for reasons unknown to me) in this case security
changes of upstream would be passed on to debian, even if binutils is
"not covered by security support&qu
; Question is not if upstream supports their own (continuously changing)
> > code, but if the stable code distributed with Debian is supported.
>
> I was supposing that Mark's answer implied that (against general
> policies of debian and for reasons unknown to me) in this case
code, but if the stable code distributed with Debian is supported.
I was supposing that Mark's answer implied that (against general
policies of debian and for reasons unknown to me) in this case security
changes of upstream would be passed on to debian, even if binutils is
"not covered b
Quoting Andreas (2019-12-30 00:49:10)
> > Binutils is supported upstream
>
> Thanks,
>
> that's reassuring. But were is Debian communicating this important bit
> of information?
I am not so sure that it is reassuring.
Question is not if upstream supports their own (continuously changing)
code,
> Binutils is supported upstream
Thanks,
that's reassuring. But were is Debian communicating this important bit
of information?
Thanks again,
Andreas
And the same for libqt5webkit5:
* Source:qtwebkit-opensource-src
Details: No security support upstream and backports not feasible, only for
use on trusted content
Affected binary package:
- libqt5webkit5:amd64
It's a real problem, IMHO, that essential parts of kde depend on
something
On So, Dez 29, 2019 at 08:48:40 +0100, Pascal Hambourg wrote:
Why do you say that these packages have no or limited security support ?
Because Debian says so.
root@fsing ~ # dpkg -s debian-security-support
Package: debian-security-support
Status: install ok installed
Priority: optional
Le 29/12/2019 à 20:28, Andreas Goesele a écrit :
I just went from jessie to buster and I didn't discover any serious
problem so far.
But I tried to remove all packages where there is no or only limitid
security support and ended up with 5 packages I don't think I should/can
remove:
On 12/29/2019 1:28 PM, Andreas Goesele wrote:
Hi,
I just went from jessie to buster and I didn't discover any serious
problem so far.
But I tried to remove all packages where there is no or only limitid
security support and ended up with 5 packages I don't think I should/
Hi,
I just went from jessie to buster and I didn't discover any serious
problem so far.
But I tried to remove all packages where there is no or only limitid
security support and ended up with 5 packages I don't think I should/can
remove:
binutils (and binutils-common, libbinutils, bi
Hi,
15 déc. 2019 à 18:31 de a...@cityscape.co.uk:
> Using the website name is merely a suggestion. It can be anything you
> like, provided you can remember it. For example, I use "doctor" for one
> site; "surgery" or "prescription" would be equally as good.
>
Actually, it's way worse like this in
gt;> > On Tue 10 Dec 2019 at 22:34:07 +0100, l0f...@tuta.io wrote:
> >> >
> >> >
> >> I've read the documentation. User needs to remember all of
> >> this:
> >>
> >
> > > user-name
> >
> > Real name actually. If y
I've read the documentation. User needs to remember all of
>> this:
>>
>
> > user-name
>
> Real name actually. If you do not know your name you have problems. :)
> Can be set in ~/.bash_rc. Cross this off the list.
>
You are weakening security if you write do
On Thu 12 Dec 2019 at 22:39:13 -0500, Celejar wrote:
> On Thu, 12 Dec 2019 23:29:28 +
> Brian wrote:
>
> > On Thu 12 Dec 2019 at 21:13:06 +0100, l0f...@tuta.io wrote:
> >
> > > Hi,
> > >
> > > 10 déc. 2019 à 23:11 de a...@cityscape.co.uk:
> > >
> > > > On Tue 10 Dec 2019 at 22:34:07 +0100
On Thu, 12 Dec 2019 23:29:28 +
Brian wrote:
> On Thu 12 Dec 2019 at 21:13:06 +0100, l0f...@tuta.io wrote:
>
> > Hi,
> >
> > 10 déc. 2019 à 23:11 de a...@cityscape.co.uk:
> >
> > > On Tue 10 Dec 2019 at 22:34:07 +0100, l0f...@tuta.io wrote:
> > >
> > >> 9 déc. 2019 à 19:13 de a...@cityscape
On Thu 12 Dec 2019 at 21:13:06 +0100, l0f...@tuta.io wrote:
> Hi,
>
> 10 déc. 2019 à 23:11 de a...@cityscape.co.uk:
>
> > On Tue 10 Dec 2019 at 22:34:07 +0100, l0f...@tuta.io wrote:
> >
> >> 9 déc. 2019 à 19:13 de a...@cityscape.co.uk:
> >>
> >> > How about not having to remember (or write down)
Hi,
10 déc. 2019 à 23:11 de a...@cityscape.co.uk:
> On Tue 10 Dec 2019 at 22:34:07 +0100, l0f...@tuta.io wrote:
>
>> 9 déc. 2019 à 19:13 de a...@cityscape.co.uk:
>>
>> > How about not having to remember (or write down) any passwords for
>> > the places you log in to?
>> >
>> > https://masterpassw
ey may still be unable to decrypt your gpg files if enough time has
> passed and gpg-agent has forgotten your password.
Yes, I acknowledged this point in my original email:
> machine can access the password file anyway. I guess one gets some
> additional security in the case where one w
On Wed, 11 Dec 2019 01:49:14 -0300
riveravaldez wrote:
> On 12/10/19, Celejar wrote:
> > On Sun, 8 Dec 2019 06:48:12 +0100
> > wrote:
> >
> > ...
> >
> >> One example for the other side of the pond is riseup.net -- but they
> >> don't offer nextcloud, afaik; mail, mailing lists, wikis, pastebin
On Wed, 11 Dec 2019 06:41:29 +0100
wrote:
> On Tue, Dec 10, 2019 at 09:57:14PM -0500, Celejar wrote:
> > On Sun, 8 Dec 2019 06:48:12 +0100
> > wrote:
> >
> > ...
> >
> > > One example for the other side of the pond is riseup.net -- but they
> > > don't offer nextcloud, afaik; mail, mailing lis
> I use full disk encryption (cryptsetup / LUKS), so the password file
> is secure at rest, and when I'm actually using the system, if
> gpg-agent is used, then anyone with access to the machine can access
> the password file anyway.
That assumes a single-user situation. But in case someone manag
On Tue, 10 Dec 2019 18:19:05 -0600
John Hasler wrote:
> The Wanderer writes:
> > Hmm. In my lexicon, crimes are defined by statute. How does your
> > definition differ?
>
> Crimes are acts that intentionally harm people (with a few exceptions
> and special cases).
Maybe we need a different wo
On Tue, Dec 10, 2019 at 09:57:14PM -0500, Celejar wrote:
> On Sun, 8 Dec 2019 06:48:12 +0100
> wrote:
>
> ...
>
> > One example for the other side of the pond is riseup.net -- but they
> > don't offer nextcloud, afaik; mail, mailing lists, wikis, pastebin,
> > off the top of my head.
>
> And th
On 12/10/19, Celejar wrote:
> On Sun, 8 Dec 2019 06:48:12 +0100
> wrote:
>
> ...
>
>> One example for the other side of the pond is riseup.net -- but they
>> don't offer nextcloud, afaik; mail, mailing lists, wikis, pastebin,
>> off the top of my head.
>
> And they have a .. very particular ideol
On Sun, 8 Dec 2019 06:48:12 +0100
wrote:
...
> One example for the other side of the pond is riseup.net -- but they
> don't offer nextcloud, afaik; mail, mailing lists, wikis, pastebin,
> off the top of my head.
And they have a .. very particular ideology they're pushing:
"Our purpose is to ai
The Wanderer writes:
> Hmm. In my lexicon, crimes are defined by statute. How does your
> definition differ?
Crimes are acts that intentionally harm people (with a few exceptions
and special cases). Statute violations are acts or states (e.g,
possession of certain substances or objects) that a go
On Tue, 10 Dec 2019 21:43:55 +
Brian wrote:
> On Mon 09 Dec 2019 at 18:35:46 -0500, Celejar wrote:
>
> > On Mon, 9 Dec 2019 19:34:29 +
> > Brian wrote:
> >
> > > On Mon 09 Dec 2019 at 14:10:56 -0500, Celejar wrote:
> >
> > ...
> >
> > > > Although I almost always use it with its --se
On Tue 10 Dec 2019 at 22:11:33 +, Brian wrote:
> On Tue 10 Dec 2019 at 22:34:07 +0100, l0f...@tuta.io wrote:
>
> > 9 déc. 2019 à 19:13 de a...@cityscape.co.uk:
> >
> > > How about not having to remember (or write down) any passwords for
> > > the places you log in to?
> > >
> > > https://mas
On Tue 10 Dec 2019 at 22:34:07 +0100, l0f...@tuta.io wrote:
> 9 déc. 2019 à 19:13 de a...@cityscape.co.uk:
>
> > How about not having to remember (or write down) any passwords for
> > the places you log in to?
> >
> > https://masterpassword.app/
> >
> > Not in Debian, unfortunately.
> >
> Interes
ave to constantly enter a master password to access my
> passwords. pass recommends using gpg-agent, but then how much does one
> really gain by the encryption? I use full disk encryption (cryptsetup /
> LUKS), so the password file is secure at rest, and when I'm actually
> using
Hi,
9 déc. 2019 à 15:56 de charlescur...@charlescurley.com:
> There is a handy password generator available on Debian, called APG
> (Automated Password Generator), which will generate passwords for you.
> The default settings yield a fairly strong password, but you can modify
> those to make the
On 2019-12-10 at 08:07, John Hasler wrote:
> Andrei writes:
>
>> "Criminals" are what the law defines them to be. Laws can be
>> created and / or changed as needed.
>
> In my lexicon criminals are people who commit crimes, not people who
> violate statutes.
Hmm. In my lexicon, crimes are defin
On Tue, Dec 10, 2019 at 06:56:15AM -0600, John Hasler wrote:
> I wrote:
> > Bruce Schneier recommends writing passwords down and then keeping the
> > document containing them secure.
>
> Andrei writes:
> > Not everybody has the luxury of typing password without danger of
> > someone taking a peek
d I write down my passphrase?
This is a very important question. Much advice says never write down
your passphrase under any circumstances. I strongly disagree, as do may
other security experts.
Most people are more afraid of forgetting their own passphrase than
they are of having it stolen. As a res
Andrei writes:
> "Criminals" are what the law defines them to be. Laws can be created
> and / or changed as needed.
In my lexicon criminals are people who commit crimes, not people who
violate statutes.
Not restricting my emailing to sending encrypted messages to people in
my web of trust and doi
I wrote:
> Bruce Schneier recommends writing passwords down and then keeping the
> document containing them secure.
Andrei writes:
> Not everybody has the luxury of typing password without danger of
> someone taking a peek over the shoulder.
True but the admonition isn't "Don't write down passwor
On Lu, 09 dec 19, 14:17:39, John Hasler wrote:
> Jonas Smedegaard writes:
> > I dislike APG because it generates passwords difficult to remember -
> > without aiding in how to deal with that, which has a high risk of
> > passwords getting stored on physical notes in the top drawer...
>
> Bruce Sc
word file is secure at rest, and when I'm actually
> using the system, if gpg-agent is used, then anyone with access to the
> machine can access the password file anyway. I guess one gets some
> additional security in the case where one walks away from
> the machine and leaves it runni
, if gpg-agent is used, then anyone with access to the
machine can access the password file anyway. I guess one gets some
additional security in the case where one walks away from
the machine and leaves it running (and an attacker doesn't get there
before gpg-agent evicts the password from the cache)
On Mon, Dec 9, 2019 at 2:29 PM John Hasler wrote:
> Nicholas Geovanis writes:
> > You are safe (now) so others' freedoms need not be respected. Your
> > first jump down the slippery slope :-) Jefferson the slave-master
> > would have said that you have taken one hand off the wolf's ears.
> > Goo
Charles Curley (12019-12-09):
> Archaeological record.
Are not history.
Can we close this useless subthread now?
Quoting John Hasler (2019-12-09 21:17:39)
> Jonas Smedegaard writes:
> > I dislike APG because it generates passwords difficult to remember -
> > without aiding in how to deal with that, which has a high risk of
> > passwords getting stored on physical notes in the top drawer...
>
> Bruce Schne
On Lu, 09 dec 19, 14:28:39, John Hasler wrote:
> Nicholas Geovanis writes:
> > You are safe (now) so others' freedoms need not be respected. Your
> > first jump down the slippery slope :-) Jefferson the slave-master
> > would have said that you have taken one hand off the wolf's ears.
> > Good luc
On Mon, 9 Dec 2019 20:01:04 +0100
Nicolas George wrote:
> Maybe you have studied a lot of it, but apparently not in depth enough
> to know that we have less than 5500 years of it.
Archaeological record.
--
Does anybody read signatures any more?
https://charlescurley.com
https://charlescurley.
Quoting John Hasler (2019-12-09 20:40:06)
> Charles Curley writes:
> > There is a handy password generator available on Debian, called APG
> > (Automated Password Generator), which will generate passwords for you.
> > The default settings yield a fairly strong password, but you can
> > modify thos
Charles Curley writes:
> How do you know that? Mr. Snowden, among others, has made it
> abundantly clear that the US government is perfectly willing to do
> mass surveillance and other intrusions without the slightest notice to
> the Congress, never mind the public.
Read what I actually wrote. I
Nicholas Geovanis writes:
> You are safe (now) so others' freedoms need not be respected. Your
> first jump down the slippery slope :-) Jefferson the slave-master
> would have said that you have taken one hand off the wolf's ears.
> Good luck :-) don't let go the other ear or you become the slave
On Lu, 09 dec 19, 11:16:32, John Hasler wrote:
> Charlie writes:
> > Over many years, although, I may not ever be in possession of anything
> > of interest to anyone?
>
> There are two distinct "security" condsiderations here that are often
> munged together:
&
t note and sticking it on the corner of her
terminal (or, if she was security minded, hiding it under her blotter).
The sysadmins, who kept a copy of the root passsword in the safe, saw no
reason why she couldn't just memorize the damn thing. It was only six
letters, after all, and if she forgo
On Mon 09 Dec 2019 at 19:50:21 +, Brian wrote:
> On Mon 09 Dec 2019 at 11:58:57 -0600, Nicholas Geovanis wrote:
>
> > On Mon, Dec 9, 2019 at 11:17 AM John Hasler wrote:
> >
> > > The data trawling activities of my
> > > government[2] angers me but when I think about it objectively I realiz
On Mon 09 Dec 2019 at 11:58:57 -0600, Nicholas Geovanis wrote:
> On Mon, Dec 9, 2019 at 11:17 AM John Hasler wrote:
>
> > The data trawling activities of my
> > government[2] angers me but when I think about it objectively I realize
> > that it does me no actual harm: I'm simply not someone the
Charles Curley writes:
> There is a handy password generator available on Debian, called APG
> (Automated Password Generator), which will generate passwords for you.
> The default settings yield a fairly strong password, but you can
> modify those to make the results even stronger.
Considering th
401 - 500 of 4497 matches
Mail list logo