Accepted byacc 1.9.1-1 (i386 source)

2002-09-27 Thread Jason Henry Parker
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 27 Sep 2002 16:25:27 -0400 Source: byacc Binary: byacc Architecture: source i386 Version: 1.9.1-1 Distribution: unstable Urgency: low Maintainer: Jason Henry Parker [EMAIL PROTECTED] Changed-By: Jason Henry Parker [EMAIL

Re: Bug#81397: [authorization] fails silently for normal users, cannot start server

2001-01-07 Thread Jason Henry Parker
Eray Ozkural (exa) [EMAIL PROTECTED] writes: On Sat, Jan 06, 2001 at 11:03:57PM -0600, Steve Langasek wrote: The display manager starts the X server, not the other way around, which means that the X server has no control over the display manager's behavior; and the authentication failure

Re: Bug#81397: [authorization] fails silently for normal users, cannot start server

2001-01-07 Thread Jason Henry Parker
Eray Ozkural (exa) [EMAIL PROTECTED] writes: On Sun, Jan 07, 2001 at 11:36:24AM +0100, Martin Bialasinski wrote: You behaviour wrt bugs is more than lacking. You report something, without making a report that has enough relevant info to deal with it (read [EMAIL PROTECTED] again and

ITP: libcrypt-ssleay-perl

2000-12-27 Thread Jason Henry Parker
[This message has been submitted as a wishlist bug against wnpp; the bug number is 80584.] Crypt::SSLeay allows LWP::UserAgent objects (among others) to correctly perform GET and POST operations over HTTPS. Since it uses SSL, the package will depend on libssl095a (and build-depend on the

Re: Bug#80544: [rename] can't rename dir with valid permissions

2000-12-27 Thread Jason Henry Parker
Eray Ozkural (exa) [EMAIL PROTECTED] writes: Check it out for yourself: orion:Stuff$ ls -ald desktop.* -rwxrwxr-x1 root windows 125 Nov 20 1998 desktop.ini orion:Stuff$ mv desktop.ini desktop.what! orion:Stuff$ ls -ald desktop.* -rwxrwxr-x1 root windows 125

Re: RBL report..

2000-03-26 Thread Jason Henry Parker
Nils Jeppe [EMAIL PROTECTED] writes: And taking people off the list is automatic. Fix it, enter the IP in their form, it gets re-cehcekd and taken off the list. Works like a charm. My recent experience with ORBS backs this up. If people configured their servers correctly, they'd never get on

Re: RBL report..

2000-03-26 Thread Jason Henry Parker
Nils Jeppe [EMAIL PROTECTED] writes: Four weeks? Did they change this? When we got blacklisted coz a customer (open relay) used us as a smart host, they gave us four days ;-). All I can report is my experience. I got four weeks. Yeah, me too. They're competent, cool people, and their system

Re: RBL report..

2000-03-26 Thread Jason Henry Parker
Steve Robbins [EMAIL PROTECTED] writes: This is misleading. What ORBS does is *test* mail servers to ensure that it *is* an open relay, before adding the relay's address to the list. They do NOT (according to the web page) scan the net for open relays. Rather, the list is generated

Re: RBL report..

2000-03-26 Thread Jason Henry Parker
Hamish Moffatt [EMAIL PROTECTED] writes: On Sun, Mar 26, 2000 at 04:00:54PM +0200, Nils Jeppe wrote: I don't see how you can create a false positive on a relay test. Either the message gets through, and you're an open relay, or it doesn't, and you're fine. It's quite simple, really.