mainGna! Administration - Summary

Show feedback again
Membership Info
Project Admins:
  - Beuc
10 active members

Group identification
Id: #101
System Name: admin
Name: Gna! Administration
Group Type: Organizational

Search in this Group


This project is of Organizational type.

Gna! Administration is a meta-project dedicated to Gna! ( administration.

  • If you need more information about our services, check out our user documentation.
  • If you have a problem to report, a suggestion to make, please use our support tracker.
  • If you want to know what's new at Gna!, take a look at the news section. To stay in the loop, you should even suscribe the news mailing-list.
  • If you are interested in the Gna! project origins and principles, our Constitution is detailed on our web homepage.

Registration Date: Mon 05 Jan 2004 01:59:10 PM UTC


Latest News 
mail subsystem upgraded
     posted by beuc, Sat 23 May 2015 06:17:18 PM UTC - 0 replies was reinstalled with Debian Jessie.
Let us know if there's any issue.
This should be the last major system upgrade before long :)

dl/home/cvs/svn/ upgraded to debian8
     posted by beuc, Thu 21 May 2015 10:12:23 PM UTC - 0 replies

Everything at Gna! but the mail system was upgraded to Debian Jessie. Let us know if you think something is wrong.

Some spam was also cleaned-up.
Cheers! SSL certificate renewed
     posted by zerodeux, Thu 24 Apr 2014 07:13:06 AM UTC - 1 reply

While we were quick to patch the Heartbleed attack, it took a little bit more time and administrative work to renew our and certificates.

It is now a single and freshly issued multi-domain certificate issued by Comodo via Gandi. Although your preferred web browser will automatically trust it, you're welcome to verify by yourself. The SHA fingerprint should read 94:69:D1:5B:B6:B0:64:08:E3:08:97:3B:6A:9F:5F:9E:54:22:D1:D5.

Heartbleed status and measures
     posted by beuc, Wed 09 Apr 2014 09:47:29 AM UTC - 0 replies

Gna! was patched to address the recent openssl "heartbleed" vulnerability.

Gna! has been running a vulnerable version since up to 2 months, and the attacker could silently retreive information from part of the system memory, including credentials and private https keys.

As a safety measure, we removed the current sessions (so you need to reconnect), and are in the process of renewing the https certificate.
Changing your password is also recommended.

[124 news in archive]

Communication Tools
Tech Support Manager Tech Support Manager (231 open items, 1602 total)
  - Browse open items
  - Submit a new item
Mailing Lists Mailing Lists (6 public mailing-lists)

Show feedback again

Back to the top

Powered by Savane 3.1-cleanup