<html><head/><body><html><head></head><body>If this is going to be system wide we should check against and/or reset roundup and any local passwords and dinsdale and albatross.<br><br><div class="gmail_quote">Jacob Kaplan-Moss <jacob@jacobian.org> wrote:<blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">
<pre style="white-space: pre-wrap; word-wrap:break-word; font-family: sans-serif; margin-top: 0px">On Tue, Feb 12, 2013 at 6:31 AM, Donald Stufft <donald.stufft@gmail.com> wrote:<br /><blockquote class="gmail_quote" style="margin: 0pt 0pt 1ex 0.8ex; border-left: 1px solid #729fcf; padding-left: 1ex;">Since the <a href="http://wiki.python.org">wiki.python.org</a> database was likely compromised and it was using a<br />weak<br />hash we should probably assume that all passwords in there have been leaked.<br />Because<br />of this I want to formally propose that PyPI reset it's passwords.</blockquote><br />I agree -- please do, sooner rather than later.<br /><br />If I was the Benevolent Ops Person for PyPI I would reset them<br />immediately and deal with the fallout. But I'm not the one who'd get<br />angry emails, so any amount of grace period that Richard/MvL/etc won't<br />get any argument from me.<br /><br />Jacob<br /><hr /><br />Catalog-SIG mailing list<br
/>Catalog-SIG@python.org<br /><a href="http://mail.python.org/mailman/listinfo/catalog-sig">http://mail.python.org/mailman/listinfo/catalog-sig</a><br /></pre></blockquote></div></body></html></body></html>