Package: src:linux
Version: 5.6.14-2
Severity: normal
Dear Maintainer,
after the kernel upgrade to 5.6.14, my system now freezes some seconds after
each boot,
during Xorg start. Login via Xorg or console is not possible anymore.
The kernel log ends with these messages:
Jun 17 14:38:49 ryu
Package: src:linux
Version: 5.6.14-2
Severity: normal
Dear Maintainer,
after the kernel upgrade to 5.6.14, my system now freezes some seconds after
each boot,
during Xorg start. Login via Xorg or console is not possible anymore.
The kernel log ends with these messages:
Jun 17 14:38:49 ryu
Package: mediathekview
Version: 13.2.1-3
Severity: important
Dear Maintainer,
mediathekview does not work with the updated openjdk packages anymore.
The program hangs with these error messages if started on the console:
~$ mediathekview
___ ___ _ _ _ _ __ _
> > Workaround: add "luks=no" to the kernel command line to disable
> systemd's generator
>
> This worked great... until you try to add another partition to crypttab.
> Since the cryptroot in initrd only does root, but luks=no disables all
> others.
>
> Is there any clean solution that
Package: src:linux
Version: 3.16.7-ckt11-1
Severity: important
Dear Maintainer,
the problem fixed in #784152 affects not only Samsung 850 Pro SSDs but several
other models.
The upstream patch has been extended:
commit 9a9324d3969678d44b330e1230ad2c8ae67acf81
libata: Blacklist queued
Package: src:linux
Version: 3.16.7-ckt11-1
Severity: important
Dear Maintainer,
the problem fixed in #784152 affects not only Samsung 850 Pro SSDs but several
other models.
The upstream patch has been extended:
commit 9a9324d3969678d44b330e1230ad2c8ae67acf81
libata: Blacklist queued
Package: tiger
Version: 1:3.2.3-12.1
Severity: normal
Tags: patch
I get warnings from tiger about mounted sshfs filesystems:
--CONFIG-- [con010c] Filesystem 'fuse.sshfs' used by 'user@server:/mnt' is not
recognised as a valid filesystem
For correct recognition of sshfs just remove the erroneous
.
But for such a tradeoff other things should be considerd first (is your
PIN really your biggest concern if you don't trust your computer/keyboard,
is your reader really more trustworthy than your computer, ...).
--
Michel Messerschmidt li...@michel-messerschmidt.de
) erik.hjalmar.josefs...@gmail.com
--
Michel Messerschmidt li...@michel-messerschmidt.de
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
I had the same problem and your patch (sshfs-disable-hardlink.patch)
fixed it for me.
Thanks,
Michel
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Package: debsecan
Version: 0.4.16+nmu1
Followup-For: Bug #709562
A patch is attached
diff --git a/debsecan b/debsecan.new
index 7b869b7..559d49d 100755
--- a/debsecan
+++ b/debsecan.new
@@ -270,7 +270,7 @@ def parse_cli():
default='/etc/default/debsecan')
On Sat, Feb 23, 2013 at 10:48:04PM +0100, John Paul Adrian Glaubitz wrote:
I just uploaded sane-backends 1.0.23 into experimental. Could you
install it and see whether your scanner works again?
I'm afraid this is not possible anymore.
Due to a hardware failure I had to replace the 640U with
On Thu, Feb 07, 2013 at 10:03:30AM -, refresh...@tormail.org wrote:
I have no reason to believe my system is compromised. Taking security very
serious. Otherwise I wouldn't bother posting here. :)
That sounds like a oxymoron. How can I be REALLY sure my system isn't
compromised? Mail
On Tue, Jan 29, 2013 at 06:36:25PM -0600, John Clizbe wrote:
ved...@nym.hush.com wrote:
if so, would this fall under the open-pgp RFC, or would it have to go
through an
RSA standard first?
RFC 4880 makes no mention of OAEP. RFC 4880 references RFC 3447 for details of
RSA
On Wed, Nov 21, 2012 at 06:46:36PM +0100, Hauke Laging wrote:
The card already has additional storage for private use (if I have understood
the documentation correctly). The idea: Wouldn't it be rather easily possible
to allow the use of the card by
a) either the real password (like today)
Package: mirror
Version: 2.9-61
Severity: normal
Dear Maintainer,
/usr/share/mirror/dateconv.pl uses timelocal.pl that has been moved
to the libperl4-corelibs-perl package.
-- System Information:
Debian Release: wheezy/sid
APT prefers testing
APT policy: (990, 'testing'), (500, 'unstable')
On Sat, Jun 16, 2012 at 05:32:36PM -0400, David Shaw wrote:
Yes, I understand that spreading out keyserver requests can help avoid this
sort of tracking, but remember that the keyserver URL feature allows the
keyholder to bypass the keyserver chosen by the user, and send the requests
On Tue, May 29, 2012 at 10:03:57PM -0400, Robert J. Hansen wrote:
There may be a use case for contextualization in certificates, but if so
I haven't found it yet. :)
You may wnat to lookup up all certificates that signed a certificate.
Or just get all your certificates displayed.
Or all
Package: pcscd
Version: 1.8.2-1
Severity: normal
Dear Maintainer,
my /etc directory is managed in a subversion repository.
pcscd fails to start if .svn is present in /reader.conf.d/ as seen here:
~$ ls -lA /etc/reader.conf.d/
total 8
drwxr-xr-x 6 root root 4096 Feb 1 23:49 .svn
-rw-r--r-- 1
Package: tiger
Version: 1:3.2.3-4
Severity: normal
Tags: patch
Tiger should recognize sshfs as remote and cgroup as local fs.
Patch is attached (against version 1:3.2.3-8 in testing).
-- System Information:
Debian Release: 6.0.3
APT prefers stable-updates
APT policy: (990,
On Tue, Nov 29, 2011 at 10:06:45PM +0100, Olav Seyfarth wrote:
It seems the above files don't solve my problem since they all trigger on USB
events. However, my PCMCIA based reader Omnikey CardMan 4040 (linked as
supported device on http://www.gnupg.org/howtos/card-howto/en/ch02s02.html)
seems
On Sun, Oct 16, 2011 at 02:58:27AM +1100, Ben McGinnes wrote:
On 16/10/11 2:15 AM, MFPA wrote:
The key revocation message saying this key was revoked suggests it
to be referring to the key that was just listed rather than the one
that is about to be listed. Maybe something like the
On Thu, Oct 13, 2011 at 10:03:56AM -0400, Jean-David Beyer wrote:
It seems to me that to do much damage to my machine, you need to get a
shell with root access.
Depends on what you regard as damage.
Do you need root privileges to use your private gpg keys ???
I never run a web browser as
On Thu, Jul 21, 2011 at 05:17:27PM -0600, Aaron Toponce wrote:
On Thu, Jul 21, 2011 at 05:15:25PM -0600, Aaron Toponce wrote:
So, it appears I'm missing some configuration in Mutt then, as it remains
as the PGP message without any attempt to get to the plain text. Also, how
do you get the
On Sat, Jul 02, 2011 at 09:48:55AM +0100, Neil Williams wrote:
This is fixed in newer versions of multistrap, I'm trying to arrange
a backport to squeeze.
For the record, I installed and used multistrap 2.1.15 from wheezy on
a stable system without any issues.
--
To UNSUBSCRIBE, email
Package: multistrap
Version: 2.1.7
Severity: normal
With noauth=false, multistrap aborts foreign builds due to
unauthenticated packages (logfile is attached).
There are two warnings in the logfile:
W: GPG error: http://ftp.de.debian.org stable Release: The following signatures
couldn't be
Sounds very much like Off-the-Record messaging for every kind of
communication. Or is there a difference I have missed?
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
On Mon, Jan 03, 2011 at 01:26:05AM -0800, Paul Richard Ramer wrote:
I'll gladly answer any questions about my setup or tools or run
different stuff to debug this situation. I just want to start using my
pinpad. :-)
Have you tried it with gnupg 2.0.x ?
IIRC you need at least 2.0.12 for the
With 1.0.21-9 my Perfection 640U finally works with epson2.
But only black/wite and gray scans are okay, color scans still don't work.
I'm not sure if this is still the same bug or another one?
Below is the debug output of
export SANE_DEBUG_EPSON2=255; scanimage -d epson2:libusb:007:002 --format
On Thu, Sep 23, 2010 at 08:26:19PM +0200, Werner Koch wrote:
On Thu, 23 Sep 2010 14:20, war_is_pe...@privatdemail.net said:
While you're at it, you might want to update zlib to version 1.2.5 -
looking at the source, it seems that the currently used version is 1.1.4.
I see no reason for
On Thu, Sep 23, 2010 at 08:26:19PM +0200, Werner Koch wrote:
On Thu, 23 Sep 2010 14:20, war_is_pe...@privatdemail.net said:
While you're at it, you might want to update zlib to version 1.2.5 -
looking at the source, it seems that the currently used version is 1.1.4.
I see no reason for
cups 1.4.4-3 fixed this bug for me.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Package: logcheck
Version: 1.3.11
Severity: normal
Tags: patch
logcheck does not filter some sudo log messages that I consider false
positives.
One message is caused by executing sudo -l:
Aug 18 16:14:24 rio sudo: mic : TTY=pts/1 ; PWD=/home/mic ; USER=root ;
COMMAND=list
The other
Package: cups
Version: 1.4.4-2
Severity: normal
I have the same connection errors in iceweasel.
The corresponding entry in /var/log/cups/error_log is:
E [08/Aug/2010:20:04:18 +0200] Bad request line ^V^C^A from 192.168.xxx.xxx!
If cupsd is (re)started there are these new error messages:
E
On Tue, Jul 20, 2010 at 04:14:16PM -0400, ved...@nym.hush.com wrote:
Is there a gnupg command to verifiy a hash, not a signature, (e.g.
MD5, SHA1, SHA256), by entering the hash string and the file or
text it corresponds to?
Why would you want to use gnupg for this if md5sum, sha1sum,
I experienced the same problem after upgrading
gstreamer0.10-plugins-good and cheese.
Somehow the videofilter plugin with the videobalance element is not
included in the gstreamer registry cache.
Removing $HOME/.gstreamer-0.10/registry.x86_64.bin and running
gst-inspect-0.10 to rebuild the
On Tue, Jul 06, 2010 at 06:26:10PM -0700, Russ Allbery wrote:
I wonder if the right way of handling this would be to instead install a
logcheck rule as part of the libpam-krb5 package that looks something
like:
^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ [[:alnum:]]+(\[[0-9]+\])?:
On Tue, Jul 06, 2010 at 06:26:10PM -0700, Russ Allbery wrote:
I wonder if the right way of handling this would be to instead install a
logcheck rule as part of the libpam-krb5 package that looks something
like:
^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ [[:alnum:]]+(\[[0-9]+\])?:
On Tue, Jul 06, 2010 at 06:26:10PM -0700, Russ Allbery wrote:
I wonder if the right way of handling this would be to instead install a
logcheck rule as part of the libpam-krb5 package that looks something
This would be the preferred solution for me.
I just haven't found a way to configure
On Tue, Jul 06, 2010 at 06:26:10PM -0700, Russ Allbery wrote:
I wonder if the right way of handling this would be to instead install a
logcheck rule as part of the libpam-krb5 package that looks something
This would be the preferred solution for me.
I just haven't found a way to configure
Package: logcheck
Version: 1.3.10
Severity: normal
Tags: patch
Many of my logcheck reports are triggered by regular user authentication
against kerberos enabled services.
Here are rules to ignore authentication success messages for some common
daemons.
violations.ignore.d/logcheck-sudo:
^\w{3}
Package: logcheck
Version: 1.3.10
Severity: normal
Tags: patch
Many of my logcheck reports are triggered by regular user authentication
against kerberos enabled services.
Here are rules to ignore authentication success messages for some common
daemons.
violations.ignore.d/logcheck-sudo:
^\w{3}
On Wed, May 26, 2010 at 12:57:06PM +0200, Julien BLACHE wrote:
Could you provide a debug log for epson2, by setting
SANE_DEBUG_EPSON2=255 ?
Here is the debug output:
#
$ export SANE_DEBUG_EPSON2=255; scanimage -d epson2:libusb:007:002 -T
[sanei_debug] Setting debug level of epson2 to 255.
Package: libsane
Version: 1.0.21-1
Severity: normal
The scanner works with the old 'epson' backend, but not with 'epson2'
although it should have complete support by both backend.
Steps to reproduce (I had to re-enable epson in dll.conf):
$ scanimage - -L
device `epson2:libusb:007:004' is a
On Tue, Apr 27, 2010 at 08:58:24AM -0400, Honer, Lance wrote:
What's your choice:
Company A installs an anti-virus and updates it regularly (BTW
regularly
includes once a year).
Company B has a recovery concept, incident response team,
vulnerability
monitoring, patch management, NIDS,
On Mon, Apr 26, 2010 at 06:02:48AM -0700, Shaqe Wan wrote:
I am not stating that PCI is good in no way, but I am saying that its a MUST
for companies dealing with CC. And in a windows environment, an AV is
important.
Did you consider that an anti-virus may actually be the worst security
On Sun, Mar 14, 2010 at 12:24:14PM -0700, James Moe wrote:
Hello,
opensuse v11.2, linux 2.6.31.12-0.1-desktop x86_64, gpg v2.0.12.
The docs at http://www.gnupg.org/ cover starting gpg-agent pretty
well. What is missing is how to re-start it.
If gpg-agent is terminated for some reason,
I had the same problem with segfaults due to a .svn subdirectory in
/etc/ConsoleKit/seats.d/
This patch fixed it for me:
m...@ryu:~/src/debian/consolekit$ diff -ur consolekit-0.4.1.orig/
consolekit-0.4.1.new/
diff -ur consolekit-0.4.1.orig/src/ck-manager.c
consolekit-0.4.1.new/src/ck-manager.c
Package: linux-2.6
Version: 2.6.31-2
Severity: normal
My iptables script using the conntrack module does not work with this kernel
version anymore. The value of the ctorigsrc parameter is not set correctly:
rei:~$ cat /etc/mm_iptables/mm_iptables_dmz | grep -E 'ctorig|LOCALIP='
Package: linux-2.6
Version: 2.6.31-2
Severity: normal
My iptables script using the conntrack module does not work with this kernel
version anymore. The value of the ctorigsrc parameter is not set correctly:
rei:~$ cat /etc/mm_iptables/mm_iptables_dmz | grep -E 'ctorig|LOCALIP='
On Mon, Nov 02, 2009 at 10:51:46AM -, David Gray wrote:
Could anyone point me in the right direction for a manual/examples
on how to edit the gpg.conf file for GnuPG 2.0.12 (GPG 4 Win)?
http://www.gnupg.org/documentation/manuals/gnupg/Invoking-GPG.html#Invoking-GPG
Within this manual
On Mon, Sep 14, 2009 at 07:05:35PM +0200, Moritz Muehlenhoff wrote:
For the experimental distribution, these problems have been fixed in
version 1.9.1.3-1.
It seems the update is not yet available for i386 because the build failed
(no description available)
-- no debconf information
#! /bin/sh /usr/share/dpatch/dpatch-run
## 01_scd_pw2.dpatch converted by Michel Messerschmidt
w...@michel-messerschmidt.de
##
## All lines beginning with `## DP:' are a description of the patch.
## DP: Fix OpenPGP v2 card support
@DPATCH
On Fri, Aug 21, 2009 at 03:39:34PM +0200, tux.tsn...@free.fr wrote:
So how can I do that (import key, when I've only keys on smartcard, no public
key on keyserver or on file and no file private and secret keys backup.
AFAIK the smartcard contains only your secret keys not the public keys.
On Thu, Jul 16, 2009 at 12:41:32AM +0200, Lukas Faulstich wrote:
W: GPG error: http://security.debian.org etch/updates Release: Die
folgenden Signaturen konnten nicht überprüft werden, weil ihr öffentlicher
Schlüssel nicht verfügbar ist: NO_PUBKEY 9AA38DCD55BE302B
W: Probieren Sie »apt-get
On Mon, Jul 06, 2009 at 10:51:44AM +0200, Sam Lowry wrote:
losetup /dev/loop0 lenny.img
mkdir lenny
mount lenny.img lenny -t ext3 -o loop=/dev/loop0,offset=98703360
losetup offset is in bytes (see 'man losetup')
cryptsetup luksFormat --offset=98703360 /dev/loop0
Command failed:
Package: gnupg2
Version: 2.0.12-0local1
Severity: wishlist
One major new feature in gnupg2 2.0.12 is 2048 bit OpenPGP card support.
I can confirm that a local build works fine so far. If it helps, my
packages are available at http://www.michel-messerschmidt.de/debian/
-- System Information:
Package: hpijs
Version: 3.9.4b-1
Severity: important
Whenever a print job is processed by cups and the hpijs backend fails
to open the connection to the printer, it writes error messages to
syslog every 30 seconds.
In environments where printers are not always online (e.g. to save
energy) this
On Sun, Jun 21, 2009 at 02:42:45AM -0500, John Clizbe wrote:
Joel C. Salomon wrote:
gpg command line and output:
C:\\Program Files\\GNU\\GnuPG\\gpg.exe --charset utf8 --batch --no-tty
--status-fd 2 --keyserver-options auto-key-retrieve --keyserver
pool.sks-keyservers.net --verify
gpg:
On Sun, Jun 21, 2009 at 12:15:48PM +0400, gpg2.20.mani...@dfgh.net wrote:
4. Sorry if this is OT or if this is a long post I felt that this
experience sharing is essential on this list , because there may be other
users who may be blisfully un aware of this problem of temp files and my
On Sun, Jun 21, 2009 at 06:33:11PM +0200, Thomas Bohn wrote:
On Jun 21, 2009, at 6:17 PM, Joel C. Salomon wrote:
Interesting, now it comes up as good. Did you change some setting?
I didn't change anything.
At least the version in the signature header changed from 2.0.11 to
2.0.12.
On Fri, Jun 05, 2009 at 05:33:07PM +0200, Werner Koch wrote:
On Fri, 5 Jun 2009 14:41, li...@michel-messerschmidt.de said:
I don't think gpg has problem identifying and finding the secret key,
but it refuses to decrypt a message with a key that had no encryption
capability set during
...
[...]
:encrypted data packet:
length: unknown
gpg: encrypted with 1024-bit RSA key, ID 96C5988D, created 2006-12-03
Michel Messerschmidt m...@michel-messerschmidt.de
gpg: encrypted with RSA key, ID
gpg: decryption failed: No secret key
I don't think gpg has problem
: encrypted with 1024-bit RSA key, ID 96C5988D, created 2006-12-03
Michel Messerschmidt m...@michel-messerschmidt.de
gpg: public key decryption failed: Wrong secret key used
gpg: encrypted with RSA key, ID
gpg: decryption failed: No secret key
$ gpg2 --edit-key 96C5988D
Secret key
Package: debsecan
Version: 0.4.11
Severity: important
It seems the suite name is misspelled:
$ debsecan --format=summary --suite=squeeze
Usage: debsecan OPTIONS...
debsecan: error: option --suite: invalid choice: 'squeeze' (choose from
'woody', 'sarge', 'etch', 'lenny', 'squueze', 'sid')
$
On Mon, Feb 23, 2009 at 01:42:32PM -0500, Robert J. Hansen wrote:
Open up my wallet, fish out the list, and there it is.
Although I think this one of the most secure but usable places, what if
a real life phisher gets your wallet?
No problem to cancel credit cards. But are you able to reset all
One last test: Rather than having BPEL run gpg directly, perhaps you
could have it run a shell script that in turn runs gpg. You should then
be able to set whatever variables you need prior to the call of gpg from
within the shell script. You can also enable tracing (set -o xtrace) to
help
On Mon, Jan 26, 2009 at 12:14:10AM -0300, Ricardo Rolim wrote:
Am I missing something? This is the third mailing list that I'm
trying. Thanks a lot :)
Have you tried adding
vdso=1
as kernel boot parameter ?
See Documentation/kernel-parameters.txt in the kernel source for details.
On Thu, Jan 22, 2009 at 08:51:23AM -0500, Robert J. Hansen wrote:
Faramir wrote:
And the second question is: Does somebody know about this virus? Is is
as fast spreading as it looks like?
Yes. No. Moo. Ten pounds of flax. Getting accurate intelligence
about the spread of malware is a
Package: flashplugin-nonfree
Version: 1:2.2
Severity: normal
Adobe released a new 64bit version on Dec 16 (see
http://labs.adobe.com/downloads/flashplayer10.html).
Although no release information is given, there is some public speculation that
it may fix the security vulnerability reported in
On Tue, Nov 04, 2008 at 12:04:19PM -0500, David Shaw wrote:
Indeed. The alteration also may or may not be malicious. The most
common alteration I've ever seen are mail programs that break the
signature via word-wrap or the like. (Hence the frequent Does my
signature verify now? message
On Wed, Aug 20, 2008 at 04:21:04PM -0400, John W. Moore III wrote:
I believe that We are all agreed that physical destruction of the HD is
the only truly effective means of ensuring Data cannot be recovered.
There is also the possibility to use encryption for *all* data on a
harddisk. If the
Sorry, I posted to the wrong bug number :(
___
Logcheck-devel mailing list
Logcheck-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/logcheck-devel
Sorry, I posted to the wrong bug number :(
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Sorry for the late reply, but somehow I haven't received any mail yet
(just saw the answers on the web interface).
IMHO what the bug reporter means is nfsd loads fine with non-openvz
kernels (both 2.6.25 and 2.6.26), but fails to load with openvz 2.6.26
kernel.
Exactly.
I tried it again
Sorry for the late reply, but somehow I haven't received any mail yet
(just saw the answers on the web interface).
IMHO what the bug reporter means is nfsd loads fine with non-openvz
kernels (both 2.6.25 and 2.6.26), but fails to load with openvz 2.6.26
kernel.
Exactly.
I tried it again
Sorry for the late reply, but somehow I haven't received any mail yet
(just saw the answers on the web interface).
IMHO what the bug reporter means is nfsd loads fine with non-openvz
kernels (both 2.6.25 and 2.6.26), but fails to load with openvz 2.6.26
kernel.
Exactly.
I tried it again
Sorry for the late reply, but somehow I haven't received any mail yet
(just saw the answers on the web interface).
IMHO what the bug reporter means is nfsd loads fine with non-openvz
kernels (both 2.6.25 and 2.6.26), but fails to load with openvz 2.6.26
kernel.
Exactly.
I tried it again
Package: logcheck
Version: 1.2.67
Severity: normal
Hi,
newer kernels output messages with various whitespace before the
timestamp, but logcheck rules match only messages without whitespace
inside the timestamp.
Examples output from kernel 2.6.26-1:
[0.00] Linux version 2.6.26-1-686
Package: logcheck
Version: 1.2.67
Severity: normal
Hi,
newer kernels output messages with various whitespace before the
timestamp, but logcheck rules match only messages without whitespace
inside the timestamp.
Examples output from kernel 2.6.26-1:
[0.00] Linux version 2.6.26-1-686
Package: linux-image-2.6.26-1-openvz-686
Version: 2.6.26-1
Severity: normal
Hello,
I upgraded from 2.6.25-2 to 2.6.26-1-openvz-686.
After reboot, the nfsd module fails to load with this error message:
FATAL: Error inserting nfsd
(/lib/modules/2.6.26-1-openvz-686/kernel/fs/nfsd/nfsd.ko): Cannot
Package: linux-image-2.6.26-1-openvz-686
Version: 2.6.26-1
Severity: normal
Hello,
I upgraded from 2.6.25-2 to 2.6.26-1-openvz-686.
After reboot, the nfsd module fails to load with this error message:
FATAL: Error inserting nfsd
(/lib/modules/2.6.26-1-openvz-686/kernel/fs/nfsd/nfsd.ko): Cannot
On Wed, Jul 23, 2008 at 03:54:35PM -0700, kurt c wrote:
no, i typed in my windows vista command prompt: gpg -a --export
0x8e758d5f mykey.asc and i only get access is denied. i guess no one
knows why.
Are you sure that your user has write permissions in the current directory?
signature.asc
On Tue, May 20, 2008 at 08:45:20PM +0100, Alexandros Papadopoulos wrote:
a) How/why were my active connections to the server killed right after
upgrading and
Don't know, I've never seen this behaviour on a debian system.
b) Why I am not allowed access now that I try to utilise the simplest
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Alexandros Papadopoulos said:
+ I enabled password authentication in sshd_config
(PasswordAuthentication yes)
+ aptitude update aptitude dist-upgrade, which updated the packages
and restarted the openssh daemon
+ shortly thereafter my SSH
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Florian Weimer said:
The first vulnerable version, 0.9.8c-1, was uploaded to the unstable
distribution on 2006-09-17, and has since propagated to the testing and
current stable (etch) distributions. The old stable distribution
(sarge) is not
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello, I want to move my keyring files from %appdata%/gnupg to R:/
You can either set
GNUPGHOME=R:/
or add/change the entry HomeDir in the registry under the key
HKEY_CURRENT_USER\Software\GNU\GnuPG
Michel
-BEGIN PGP SIGNATURE-
Version:
Hello,
is there a possibility to force gnupg 2 to use the internal CCID
smartcard driver even if pcscd is running (something like the
--disable-ccid option but for pcsc) ?
I have a SCM SPR532 reader and like to use the pinpad. But it's
deactivated if pcscd is running.
Thanks,
Michel
On Tue, Feb 12, 2008 at 09:18:30PM +0100, Jens Schüßler wrote:
* Florian Weimer [EMAIL PROTECTED] wrote:
Not in our tests. Are you sure you're running the new kernel? What
does uname -a say?
$uname -a
Linux algol 2.6.18+2008-02-12 #1 Tue Feb 12 16:49:10 CET 2008 i686 GNU/Linux
As I
On Tue, Feb 12, 2008 at 09:18:30PM +0100, Jens Schüßler wrote:
* Florian Weimer [EMAIL PROTECTED] wrote:
Not in our tests. Are you sure you're running the new kernel? What
does uname -a say?
$uname -a
Linux algol 2.6.18+2008-02-12 #1 Tue Feb 12 16:49:10 CET 2008 i686 GNU/Linux
As I
On Thu, Oct 18, 2007 at 09:51:45PM +0200, Michael Heide wrote:
I was concerned about the fact, that there is one simple way to circumvent
the hole encryption system if someone has physical access to the pc: to
simply replace the kernel or initrd at the boot partition to include some
trojan
Package: libpam-modules
Version: 0.99.7.1-4
Severity: minor
After updating the pam packages to the new version in testing
(0.79-4 = 0.99.7.1-4), I get error messages in /var/log/auth.log
about a missing file /etc/environment.
I don't know which package creates this file or if it's intended to
that they put their system at a
risk.
It's certainly a bad idea to force something onto users they may not
understand.
But if a user installs a debian package that lowers his systems security
there should be a big warning in the installer.
--
Michel Messerschmidt [EMAIL PROTECTED
found 346146 1:1.1.0-3
thanks
signature.asc
Description: Digital signature
Package: nfs-common
Version: 1:1.1.0-2
Followup-For: Bug #346146
nfs-common ignores the -o or --outgoing-port option after upgrading
my system from testing (1.0.12-4+b1) to unstable (1:1.1.0-2).
The viersion in testing worked fine but in unstable I get this:
hex:~$ netstat --inet -a -n -l -p |
Package: mysql-server-5.0
Version: 5.0.32-7
Severity: normal
Version 5.0.32-4 added the !includedir option to the end of my.cnf,
but included files are interpreted in the context of the surrounding
option group (see http://dev.mysql.com/doc/refman/5.0/en/option-files.html).
Therefore options for
On Tue, Jan 16, 2007 at 09:23:31AM +0100, Maik Holtkamp wrote:
Public keys can be stolen too. If you consider this a risk, you should
[Typ|Brain]o?
s/Public/Private/
Okay, I had a long day, but this really sounds stupid ;)
Please read it as
The *private* key used for ssh public key
On Sun, Jan 14, 2007 at 02:36:10PM +0100, Adrian von Bidder wrote:
I have users a, b, c, d, e. All users except e can have shell access, but
beecause shell access is powerful, must not be able to log in with
password, but only with public key.
If you don't trust your users to keep their
On Thu, Jan 11, 2007 at 06:55:33PM +0100, Adrian von Bidder wrote:
Anybody has an idea if and how this is possible? The obvious but ugly
solution would be to run a second sshd on a different port, but I'd rather
avoid that.
If I understand this correctly, it's not a matter of public key or
reopen 384734
retitle Sun java packages still not fixed (CVE-2006-2426)
reassign sun-java5
thanks
signature.asc
Description: Digital signature
1 - 100 of 123 matches
Mail list logo