Toi can mua ve may bay di BomBay An Do xin vui long bao gia dum.
Ve khu hoi.
On Thu, Nov 24, 2005 at 07:17:06PM +0100, Goswin von Brederlow wrote:
That's easy: you trust the Packages file to be correct when using apt,
and it's not verified at all by per-package signatures.
In what way trust and how does that change anything?
At best you can prevent a newer version
Quoting Paul LeoNerd Evans [EMAIL PROTECTED]:
I'm not too familiar with creating a source package that can create
multiple binary packages, but I have a local modification of the sudo
source package which creates a sudo-ldap binary package. This is built
using LDAP support.
If you want I
* Bastian Blank [EMAIL PROTECTED] [2005-11-24 23:45]:
On Thu, Nov 24, 2005 at 10:48:39PM +0100, Rafael Laboissiere wrote:
Yes, I have been doing things wrongly in the past, but this is not the
case anymore. The Changed-By fields are correct now. See, for instance,
my last upload:
On Wed, Nov 23, 2005 at 05:34:41PM +0100, Jeroen van Wolffelaar wrote:
In the archive, 525 out of 283283 .deb's are dpkg-sig'd (0.19%). There
are 8 distinct keys used for those 525 .deb's, seven of which correspond
to DD's[1].
Slightly off the topic, but does this mean the archive contains
* Hamish Moffatt [Fri, 25 Nov 2005 20:34:02 +1100]:
On Wed, Nov 23, 2005 at 05:34:41PM +0100, Jeroen van Wolffelaar wrote:
In the archive, 525 out of 283283 .deb's are dpkg-sig'd (0.19%). There
are 8 distinct keys used for those 525 .deb's, seven of which correspond
to DD's[1].
Slightly
On Thu, Nov 24, 2005 at 10:36:41PM +0100, Thiemo Seufer wrote:
I can see arguments against it, but none that make
it an RC bug.
Policy violations are RC by definition.
Actually, no; policy violations are RC by *default*, but the definition of
what's release-critical for a release is set by
Si deseas desinscribirte de esta lista, envia un correo a [EMAIL PROTECTED] solicitandolo. Gracias
Hi,
Anthony Towns wrote:
The problem is that using gzip and ar is complicated, which adds
possibilities for errors. You might find yourself not putting the deb
together again and getting false signature mismatches, or worse, you
might find yourself only verifying part of the .deb, and having
Hello Steve,
Steve Langasek [EMAIL PROTECTED] wrote:
On Sun, Nov 20, 2005 at 11:50:55PM +, Joerg Sommer wrote:
Steve Langasek [EMAIL PROTECTED] wrote:
Does not work with j2re1.3 means you should be depending on what it
*does*
work with, not trying to conflict with (unrelated)
Hello sean,
sean finney [EMAIL PROTECTED] wrote:
hi joerg,
On Sun, Nov 20, 2005 at 10:23:58AM +, Joerg Sommer wrote:
I've got a bug report (#336527) my package bootchart-view do not work
with j2re1.3. But j2re1.3 is not in Debian. Can I set a conflict upon a
packages that is not in
Wouter Verhelst [EMAIL PROTECTED] writes:
On Thu, Nov 24, 2005 at 06:51:24PM +0100, Goswin von Brederlow wrote:
Wouter Verhelst [EMAIL PROTECTED] writes:
I personally see the packages in unstable as something good for
end-users who want to use it, or understand how the system works; but
Michael Banck [EMAIL PROTECTED] writes:
On Thu, Nov 24, 2005 at 06:44:42PM +0100, Goswin von Brederlow wrote:
Michael Banck [EMAIL PROTECTED] writes:
On Wed, Nov 23, 2005 at 03:50:11PM +0100, Goswin von Brederlow wrote:
If you NEED to do a manual binNMU it is probably best to use sbuild
Michael Banck [EMAIL PROTECTED] writes:
On Thu, Nov 24, 2005 at 06:51:24PM +0100, Goswin von Brederlow wrote:
Wouter Verhelst [EMAIL PROTECTED] writes:
They were, originally. Ryan's been very active on it since, and it's
diverged a bit from the code you're maintaining.
Then he should
Adeodato =?utf-8?B?U2ltw7M=?= [EMAIL PROTECTED] writes:
* Goswin von Brederlow [Thu, 24 Nov 2005 18:51:24 +0100]:
Hi,
Wouter Verhelst [EMAIL PROTECTED] writes:
They were, originally. Ryan's been very active on it since, and it's
diverged a bit from the code you're maintaining.
Then he
Anthony Towns aj@azure.humbug.org.au writes:
On Thu, Nov 24, 2005 at 06:28:04PM +0100, Florian Weimer wrote:
If you just want to check hashes, you should just use changes files. If
you _actually_ want to check hashes, and this isn't just a thought
experiment, working out a usable way to
Steve Langasek [EMAIL PROTECTED] writes:
On Thu, Nov 24, 2005 at 07:17:06PM +0100, Goswin von Brederlow wrote:
That's easy: you trust the Packages file to be correct when using apt,
and it's not verified at all by per-package signatures.
In what way trust and how does that change
On Fri, Nov 25, 2005 at 02:38:32PM +0100, Goswin von Brederlow wrote:
Michael Banck [EMAIL PROTECTED] writes:
On Thu, Nov 24, 2005 at 06:51:24PM +0100, Goswin von Brederlow wrote:
Wouter Verhelst [EMAIL PROTECTED] writes:
They were, originally. Ryan's been very active on it since, and it's
Anthony Towns aj@azure.humbug.org.au writes:
On Thu, Nov 24, 2005 at 07:47:58PM +0100, Goswin von Brederlow wrote:
Anthony Towns aj@azure.humbug.org.au writes:
On Wed, Nov 23, 2005 at 09:18:40PM +0100, Goswin von Brederlow wrote:
Use 1: I have this deb in my apt-move mirror and I want to
Henrique de Moraes Holschuh [EMAIL PROTECTED] writes:
On Thu, 24 Nov 2005, Anthony Towns wrote:
On Thu, Nov 24, 2005 at 07:39:57AM +0100, Marc Haber wrote:
Uh, packages not uploaded to the official Debian archive can do whatever
they want.
It would, however, be convenient to be able to
On Fri, Nov 25, 2005 at 02:03:12PM +0100, Goswin von Brederlow wrote:
Wouter Verhelst [EMAIL PROTECTED] writes:
It's in Debian, and it's easy to use and understand. If it doesn't
diverge too far from the sbuild actually on svn.cyberhqz.com, it's also
good enough to give you a working setup
Simon Richter [EMAIL PROTECTED] writes:
IF this means we can switch the effort to a detached signature that is more
powerful than a .changes file (or we are allowed to have multiple signatures
in a .changes file),
That is already possible with gnupg, just not well-documented; I'm not
entirely
Daniel Leidert [EMAIL PROTECTED] writes:
Am Donnerstag, den 24.11.2005, 19:53 +0100 schrieb Goswin von Brederlow:
An incoming queue for reprepo is a ~100 lines shell script to check the
changes file signature and include the files in reprepro. Probably less
if you rewrite it in perl.
Yes.
Wouter Verhelst [EMAIL PROTECTED] writes:
On Fri, Nov 25, 2005 at 02:03:12PM +0100, Goswin von Brederlow wrote:
It just pains me that Debian does not include all the software to
build Debian.
Sure it does. It just doesn't include the software that Debian uses to
automatically build
Scripsit Krzysztof Krzyzaniak (eloy) [EMAIL PROTECTED]
This module has only one function, which is also exported by default:
subname NAME, CODEREF
Assigns a new name to referenced sub.
The name is only used for informative routines (caller, Carp, etc).
Is this really useful enough to be
Scripsit Chris Boyle [EMAIL PROTECTED]
On Thu, Nov 24, 2005 at 06:54:12PM +, paddy wrote:
I though a robots.txt thingy on the list web archive is coming to the
rescue ?
Huh? Isn't having the lists searchable generally a good thing?
Yes, a very good thing in general. But excluding
On Fri, Nov 25, 2005 at 03:22:37PM +0100, Goswin von Brederlow wrote:
A signature in the deb by a random developer is as trustworthy as the
changes file and you already trust that. So we are going from snakeoil
to snakoil. No harm done.
It's not the same, actually. A signature in a .deb needs
On 11/25/05, Matthew Palmer [EMAIL PROTECTED] wrote:
Of course, using the signature on the .changes to verify the .debs
independent from the archive at some later date is a nice side-benefit, but
one which suffers from the same key-lifetime issues as in-deb signatures,
What exactly is this key
Michael Banck [EMAIL PROTECTED] writes:
On Fri, Nov 25, 2005 at 02:38:32PM +0100, Goswin von Brederlow wrote:
Michael Banck [EMAIL PROTECTED] writes:
On Thu, Nov 24, 2005 at 06:51:24PM +0100, Goswin von Brederlow wrote:
Wouter Verhelst [EMAIL PROTECTED] writes:
They were, originally.
Matthew Palmer [EMAIL PROTECTED] writes:
On Fri, Nov 25, 2005 at 03:22:37PM +0100, Goswin von Brederlow wrote:
A signature in the deb by a random developer is as trustworthy as the
changes file and you already trust that. So we are going from snakeoil
to snakoil. No harm done.
It's not the
Olaf van der Spek [EMAIL PROTECTED] writes:
On 11/25/05, Matthew Palmer [EMAIL PROTECTED] wrote:
Of course, using the signature on the .changes to verify the .debs
independent from the archive at some later date is a nice side-benefit, but
one which suffers from the same key-lifetime issues
On Fri, 25 Nov 2005, Anthony Towns wrote:
(I'm amazed the security crisis we're having is about deb sigs
*again*, when we're still relying on md5sum which has a public exploit
available now...)
Do you really want a thread about how we should switch everything to SHA-512
or something like that?
* Anthony Towns:
(I'm amazed the security crisis we're having is about deb sigs
*again*, when we're still relying on md5sum which has a public exploit
available now...)
These exploits are irrelevant as far as the Debian archive is
concerned. (And that's not because hardly any sarge user
Henning Makholm wrote:
Scripsit Chris Boyle [EMAIL PROTECTED]
On Thu, Nov 24, 2005 at 06:54:12PM +, paddy wrote:
I though a robots.txt thingy on the list web archive is coming to the
rescue ?
Huh? Isn't having the lists searchable generally a good thing?
Yes, a very good thing
Blrgh!
OK. So I was working on the problem of fixing dpkg-dev so that
foo Depends: foo-data {SourceVersion}, foo-libs {BinaryVersion}
or something similar actually works. By parsing the version numbers.
Now it's apparently been changed under our noses, in such a way that my
proposed
Anthony Towns aj@azure.humbug.org.au writes:
.deb signatures are aimed at giving users some sort of assurance the
package is valid; but when you actually look into it -- at least in
Debian's circumstances -- those signatures can't actually give any
meaningful assurance for any specific
Goswin von Brederlow [EMAIL PROTECTED] writes:
The archive signing key gives absolutely no integrity ensurance on the
deb package. The only thing it insures is that the file was not
altered _after_ leaving ftp.de.debian.org for the mirrors and/or
user. In no way does it prevent altering the
Package: wnpp
Severity: wishlist
Owner: Patrick Das Gupta [EMAIL PROTECTED]
* Package name: me-jasspa
Version : 20050505
Upstream Author : Jon Green
* URL : http://www.jasspa.com/
* License : GPL
Description : A lightweight but fully featured editor
On Fri, Nov 25, 2005 at 03:13:58PM +0100, Goswin von Brederlow wrote:
You're correct.
And he is also wrong.
That would result in debs with the same name and version but different
md5sums. Something that easily confuses apt-get and people.
And yet, somehow people manage partial cross-grades
On Fri, Nov 25, 2005 at 12:49:11PM -0800, Thomas Bushnell BSG wrote:
Anthony Towns aj@azure.humbug.org.au writes:
.deb signatures are aimed at giving users some sort of assurance the
package is valid; but when you actually look into it -- at least in
Debian's circumstances -- those
On Fri, Nov 25, 2005 at 02:27:23PM -0200, Henrique de Moraes Holschuh wrote:
Well, the email about the new bin-NMU structure implied that it was fixed
for *NMUs done through that structure*.
Then the email was wrong. *shrug*
My objection is that it's *useless* for *Debian*. Debian has
On Fri, Nov 25, 2005 at 07:59:40PM +0100, Florian Weimer wrote:
* Anthony Towns:
(I'm amazed the security crisis we're having is about deb sigs
*again*, when we're still relying on md5sum which has a public exploit
available now...)
These exploits are irrelevant as far as the Debian
Ken Bloom wrote:
Henning Makholm wrote:
Scripsit Chris Boyle [EMAIL PROTECTED]
On Thu, Nov 24, 2005 at 06:54:12PM +, paddy wrote:
I though a robots.txt thingy on the list web archive is coming to the
rescue ?
Huh? Isn't having the lists searchable
On Fri, Nov 25, 2005 at 09:01:24AM +0100, Rafael Laboissiere wrote:
* Bastian Blank [EMAIL PROTECTED] [2005-11-24 23:45]:
| Maintainer: Debian/IA64 Build Daemon [EMAIL PROTECTED]
| Changed-By: Debian Octave Group [EMAIL PROTECTED]
Could you please explain to me why having Changed-By as a
On Sat, Nov 26, 2005 at 08:48:45AM +1000, Anthony Towns wrote:
On Fri, Nov 25, 2005 at 03:13:58PM +0100, Goswin von Brederlow wrote:
You're correct.
And he is also wrong.
That would result in debs with the same name and version but different
md5sums. Something that easily confuses
On Sat, Nov 26, 2005 at 09:13:02AM +1000, Anthony Towns wrote:
Moving away from MD5 is certainly not a bad idea, but it's not clear
whether the alternatives are any better. Sure, everyone recommends
SHA-256 at this stage, but nobody can give a rationale.
MD5 is broken; SHA-1 is where MD5 was
Thiemo == Thiemo Seufer [EMAIL PROTECTED] writes:
Well, even if I know naught about it, it looks to me that having
something signed is better than having the same something not signed.
Thiemo Sorry, but that's a snake oil rationale.
A: Why do you lock your car up[1]?
B: Because
On Sat, Nov 26, 2005 at 10:47:57AM +1100, Brian May wrote:
Well, even if I know naught about it, it looks to me that having
something signed is better than having the same something not signed.
Sorry, but that's a snake oil rationale.
A: Why do you lock your car up[1]?
Because it makes it
On Fri, 25 Nov 2005, Nathanael Nerode wrote:
OK. So I was working on the problem of fixing dpkg-dev so that
foo Depends: foo-data {SourceVersion}, foo-libs {BinaryVersion}
or something similar actually works. By parsing the version numbers.
I'd very much like debhelper or dpkg-* to give
My biggest concern with the Heimdal in experimental, is glob() in
libroken.
To the best of my knowledge, it isn't required because libc6 glob()
does everything required.
I am concerned, because of the potential of the symbols conflicting
with the function in libc6.
The Heimdal configure script
On Fri, Nov 25, 2005 at 02:57:36PM +0100, Goswin von Brederlow wrote:
Steve Langasek [EMAIL PROTECTED] writes:
On Thu, Nov 24, 2005 at 07:17:06PM +0100, Goswin von Brederlow wrote:
That's easy: you trust the Packages file to be correct when using apt,
and it's not verified at all by
* Steve Langasek [Fri, 25 Nov 2005 17:19:01 -0800]:
how arbitrary users are supposed to verify whether a given key is in the
keyring. The debian-keyring package doesn't get updated every time there's
a key added or removed, and the web interface to keyring.debian.org doesn't
provide any
Brian May wrote:
Thiemo == Thiemo Seufer [EMAIL PROTECTED] writes:
Well, even if I know naught about it, it looks to me that having
something signed is better than having the same something not signed.
Thiemo Sorry, but that's a snake oil rationale.
A: Why do you lock
Si deseas desinscribirte de esta lista, envia un correo a [EMAIL PROTECTED] solicitandolo. Gracias
Package: wnpp
Severity: wishlist
Owner: Kari Pahula [EMAIL PROTECTED]
* Package name: gearhead
Version : 1.000
Upstream Author : Joseph Hewitt [EMAIL PROTECTED]
* URL : http://www.geocities.com/pyrrho12/programming/gearhead/
* License : LGPL
Description
On Fri, Nov 25, 2005 at 05:19:01PM -0800, Steve Langasek wrote:
Oh, and BTW, check the IPs of ftp-master.debian.org and
keyring.debian.org...
Well, at this moment those are distinct, because ftp-master is
temporarily hosted on spohr.debian.org, and not on raff.debian.org,
where keyring.d.o
[Steinar H. Gunderson]
All three might eventually be truly broken, but you can bet that MD5
will be the first to go. If you use SHA-256 today instead of MD5, you
probably buy yourself a few extra years, which you can use to smooth
out the transition to the next hash function when the world
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Thu, 24 Nov 2005 20:07:41 +0100
Source: devmapper
Binary: dmsetup libdevmapper1.02-udeb libdevmapper1.02 libdevmapper-dev
dmsetup-udeb
Architecture: source i386
Version: 2:1.02.00-1
Distribution: unstable
Urgency: low
Maintainer:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Thu, 24 Nov 2005 23:05:46 +
Source: gcc-snapshot
Binary: gcc-snapshot
Architecture: i386 powerpc source
Version: 20051124-1
Distribution: unstable
Urgency: low
Maintainer: Debian GCC Maintainers debian-gcc@lists.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Thu, 24 Nov 2005 09:52:06 -0800
Source: gdm
Binary: gdm
Architecture: source i386
Version: 2.8.0.6-2
Distribution: unstable
Urgency: low
Maintainer: Ryan Murray [EMAIL PROTECTED]
Changed-By: Ryan Murray [EMAIL PROTECTED]
Description:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 11:01:43 +0100
Source: slgtk
Binary: slang-gtk
Architecture: source i386
Version: 0.5.15.r4-6
Distribution: unstable
Urgency: low
Maintainer: Debian JED Group [EMAIL PROTECTED]
Changed-By: Rafael Laboissiere [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Thu, 24 Nov 2005 13:08:41 +0100
Source: tmsnc
Binary: tmsnc
Architecture: source i386
Version: 0.3.1-1
Distribution: unstable
Urgency: low
Maintainer: Miriam Ruiz [EMAIL PROTECTED]
Changed-By: Miriam Ruiz [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 11:58:16 +0100
Source: wzdftpd
Binary: wzdftpd-mod-perl wzdftpd-back-mysql wzdftpd-dev wzdftpd-back-pgsql
wzdftpd wzdftpd-mod-tcl
Architecture: source i386
Version: 0.5.5-5
Distribution: unstable
Urgency: low
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 09:14:13 -0200
Source: discover1
Binary: libdiscover1 discover1 libdiscover1-pic discover1-udeb libdiscover1-dev
Architecture: source powerpc
Version: 1.7.16
Distribution: unstable
Urgency: low
Maintainer: Debian
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 09:40:57 -0200
Source: discover1-data
Binary: discover1-data discover1-data-udeb
Architecture: source all
Version: 1.2005.11.25
Distribution: unstable
Urgency: low
Maintainer: Debian Install System Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 10:30:25 +0100
Source: curl
Binary: libcurl3-dbg libcurl3 libcurl3-dev libcurl3-gnutls-dev
libcurl3-openssl-dev libcurl3-gnutls curl
Architecture: source i386 all
Version: 7.15.0-5
Distribution: unstable
Urgency:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Mon, 21 Nov 2005 11:18:05 +0100
Source: 915resolution
Binary: 915resolution
Architecture: source i386
Version: 0.4.8-1
Distribution: unstable
Urgency: low
Maintainer: Steffen Joeris [EMAIL PROTECTED]
Changed-By: Steffen Joeris [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 01:41:28 -0800
Source: sylpheed-claws-gtk2
Binary: sylpheed-claws-gtk2-spamassassin sylpheed-claws-gtk2-plugins
sylpheed-claws-gtk2 sylpheed-claws-gtk2-i18n sylpheed-claws-gtk2-pgpinline
libsylpheed-claws-gtk2-dev
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Thu, 24 Nov 2005 13:24:25 +
Source: glunarclock
Binary: glunarclock
Architecture: source i386
Version: 1:0.32.4-4
Distribution: unstable
Urgency: low
Maintainer: Yoshito Komatsu [EMAIL PROTECTED]
Changed-By: Yoshito Komatsu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 11:04:57 +0100
Source: dh-make-php
Binary: dh-make-php
Architecture: source all
Version: 0.0.12-1
Distribution: unstable
Urgency: low
Maintainer: Uwe Steinmann [EMAIL PROTECTED]
Changed-By: Uwe Steinmann [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 15:55:05 +0100
Source: pilot-link
Binary: libpisock9 libpda-pilot-perl pilot-link libpisync0 python-pisock
libpisock-dev
Architecture: source i386
Version: 0.11.8-0.12.0-pre4-3
Distribution: experimental
Urgency:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Wed, 23 Nov 2005 19:22:09 +0100
Source: mail-expire
Binary: mail-expire
Architecture: source all
Version: 0.6
Distribution: unstable
Urgency: low
Maintainer: Eduard Bloch [EMAIL PROTECTED]
Changed-By: Eduard Bloch [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Wed, 23 Nov 2005 11:49:26 +
Source: libcommandline-ruby
Binary: libcommandline-ruby libcommandline-ruby1.8
Architecture: source all
Version: 0.7.10-2
Distribution: unstable
Urgency: low
Maintainer: Esteban Manchado Velázquez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Tue, 13 Sep 2005 12:29:27 +0200
Source: revelation
Binary: revelation
Architecture: source i386
Version: 0.4.5-2
Distribution: unstable
Urgency: low
Maintainer: Stefan Voelkel [EMAIL PROTECTED]
Description:
revelation - GNOME2
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 18:20:49 +0100
Source: postgrey
Binary: postgrey
Architecture: source all
Version: 1.23-1
Distribution: unstable
Urgency: low
Maintainer: Adrian von Bidder [EMAIL PROTECTED]
Changed-By: Adrian von Bidder [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 10:41:34 -0700
Source: cl-sql
Binary: cl-sql-sqlite3 cl-sql-oracle cl-sql-aodbc cl-sql-postgresql-socket
cl-sql-postgresql cl-sql-odbc cl-sql cl-sql-uffi cl-sql-tests cl-sql-sqlite
cl-sql-mysql
Architecture: source
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Thu, 24 Nov 2005 20:54:23 +0100
Source: udev
Binary: udev udev-udeb
Architecture: source i386
Version: 0.076-1
Distribution: unstable
Urgency: medium
Maintainer: Marco d'Itri [EMAIL PROTECTED]
Changed-By: Marco d'Itri [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 11:29:35 -0500
Source: speex
Binary: speex-doc libspeex-dev speex libspeex1
Architecture: source all i386
Version: 1.1.11-1
Distribution: unstable
Urgency: low
Maintainer: Debian VoIP Team [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 11:06:17 -0700
Source: azureus
Binary: azureus
Architecture: source all
Version: 2.3.0.6-1
Distribution: unstable
Urgency: low
Maintainer: Shaun Jackman [EMAIL PROTECTED]
Changed-By: Shaun Jackman [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 19:37:56 +0100
Source: xmms-crossfade
Binary: xmms-crossfade
Architecture: source i386
Version: 0.3.8-2
Distribution: unstable
Urgency: low
Maintainer: Florian Ernst [EMAIL PROTECTED]
Changed-By: Florian Ernst [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 19:26:09 +
Source: cdrdao
Binary: cdrdao
Architecture: source i386
Version: 1:1.2.1-2
Distribution: unstable
Urgency: low
Maintainer: Andrew Suffield [EMAIL PROTECTED]
Changed-By: Andrew Suffield [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 20:28:45 +0100
Source: beagle
Binary: beagle
Architecture: source i386
Version: 0.1.2-2
Distribution: unstable
Urgency: low
Maintainer: Jose Carlos Garcia Sogo [EMAIL PROTECTED]
Changed-By: Jose Carlos Garcia Sogo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 10:30:49 -0500
Source: zsh
Binary: zsh zsh-static zsh-doc
Architecture: source sparc all
Version: 4.2.5-24
Distribution: unstable
Urgency: low
Maintainer: Clint Adams [EMAIL PROTECTED]
Changed-By: Clint Adams [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 20:50:49 +
Source: newt
Binary: libnewt0.52 libnewt-dev libnewt-pic newt-tcl whiptail python-newt
Architecture: source i386
Version: 0.52.1-3
Distribution: experimental
Urgency: low
Maintainer: Alastair McKinstry
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 20:27:21 +
Source: console-common
Binary: dh-consoledata console-common
Architecture: source all
Version: 0.7.55
Distribution: unstable
Urgency: low
Maintainer: Alastair McKinstry [EMAIL PROTECTED]
Changed-By:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Wed, 23 Nov 2005 23:28:53 +0100
Source: evolution-sharp
Binary: libevolution-cil
Architecture: source i386
Version: 0.10.2-2
Distribution: unstable
Urgency: low
Maintainer: Jose Carlos Garcia Sogo [EMAIL PROTECTED]
Changed-By: Jose
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 12:11:56 -0500
Source: k3b-i18n
Binary: k3b-i18n
Architecture: source all
Version: 0.12.8-1
Distribution: unstable
Urgency: low
Maintainer: Jean-Michel Kelbert [EMAIL PROTECTED]
Changed-By: Francois Marier [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 12:02:49 -0500
Source: k3b
Binary: k3blibs k3blibs-dev k3b
Architecture: source i386
Version: 0.12.8-1
Distribution: unstable
Urgency: low
Maintainer: Jean-Michel Kelbert [EMAIL PROTECTED]
Changed-By: Francois Marier
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 13:12:23 -0500
Source: commons-httpclient
Binary: libcommons-httpclient-java-doc libcommons-httpclient-java
Architecture: source all
Version: 2.0.2-2
Distribution: unstable
Urgency: low
Maintainer: Debian Java
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Sun, 20 Nov 2005 13:05:52 +0200
Source: php-clamavlib
Binary: php4-clamavlib php5-clamavlib
Architecture: source i386
Version: 0.12a-1
Distribution: unstable
Urgency: low
Maintainer: Jonas Genannt [EMAIL PROTECTED]
Changed-By: Jonas
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 21:12:12 +0100
Source: pinentry
Binary: pinentry-doc pinentry-gtk pinentry-qt pinentry-gtk2 pinentry-curses
Architecture: source i386 all
Version: 0.7.2-3
Distribution: unstable
Urgency: low
Maintainer: Peter
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 22:07:08 +0100
Source: autotrace
Binary: libautotrace-dev libautotrace3 autotrace
Architecture: source i386
Version: 0.31.1-11
Distribution: unstable
Urgency: low
Maintainer: Henning Makholm [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 19:55:56 +0200
Source: aspell-he
Binary: aspell-he
Architecture: source all
Version: 0.9+0-4
Distribution: unstable
Urgency: low
Maintainer: Debian Hebrew Packaging Team [EMAIL PROTECTED]
Changed-By: Lior Kaplan
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Format: 1.7
Date: Mon, 31 Oct 2005 23:29:24 -0800
Source: gimp-gap
Binary: gimp-gap
Architecture: source i386
Version: 2.2.0-1
Distribution: unstable
Urgency: low
Maintainer: Emil Soleyman-Zomalan [EMAIL PROTECTED]
Changed-By: Emil
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 21:13:23 +0100
Source: apt-rpm
Binary: apt-rpm-repository libapt-rpm-pkg-libc6.3-6-0 libapt-rpm-pkg-dev
Architecture: source i386
Version: 0.5.15cnc6-7
Distribution: unstable
Urgency: low
Maintainer: Peter Eisentraut
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 18:03:21 +
Source: taskjuggler
Binary: taskjuggler
Architecture: source i386
Version: 2.2+beta2-2
Distribution: unstable
Urgency: low
Maintainer: Debian KDE Extras Team [EMAIL PROTECTED]
Changed-By: Mark Purcell
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Sat, 29 Oct 2005 16:40:00 +0200
Source: laptop-mode-tools
Binary: laptop-mode-tools
Architecture: source all
Version: 1.11-1
Distribution: unstable
Urgency: low
Maintainer: Bart Samwel [EMAIL PROTECTED]
Changed-By: Bart Samwel [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 13:20:38 -0800
Source: libofx
Binary: libofx2c2a ofx libofx-dev
Architecture: source powerpc
Version: 1:0.8.0-8
Distribution: unstable
Urgency: low
Maintainer: Thomas Bushnell, BSG [EMAIL PROTECTED]
Changed-By:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Wed, 26 Nov 2003 12:06:55 -0700
Source: pmccabe
Binary: pmccabe
Architecture: source i386
Version: 2.3-1
Distribution: unstable
Urgency: low
Maintainer: [EMAIL PROTECTED]
Changed-By: Paul Bame [EMAIL PROTECTED]
Description:
pmccabe
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 25 Nov 2005 19:15:54 -0500
Source: vips
Binary: libvips-tools libvips10c2a libvips-doc libvips10-dev
Architecture: source all i386
Version: 7.10.16-2
Distribution: unstable
Urgency: low
Maintainer: Jay Berkenbilt [EMAIL
1 - 100 of 111 matches
Mail list logo