Sergey Bugaev <buga...@gmail.com> writes: > Hi, > > On Mon, May 22, 2023 at 6:49 PM jbra...@dismail.de <jbra...@dismail.de> wrote: >> +upgrade to the bleeding edge Debian GNU/Hurd: >> + >> + $ wget >> http://ftp.de.debian.org/debian/pool/main/d/debian-ports-archive-keyring/debian-ports-archive-keyring_2023.02.01_all.deb >> + # dpkg -i debian-ports-archive-keyring_2023.02.01_all.deb > > Is this secure though? You're fetching a package through unprotected > HTTP, then installing it as a trusted keyring.
Probably not. I actually just copied janneke's recent email. I have not executed the above commands. Is there a more secure way to install that keyring? > >> +modify your /boot/grub/grub.cfg like so: >> + >> + # multiboot /boot/gnumach-1.8-486.gz root=part:2:device:hd0 >> console=com0 >> + multiboot /boot/gnumach-1.8-486.gz root=part:2:device:wd0 >> console=com0 noide > > But /boot/grub/grub.cfg is going to be rebuilt next time you update > your kernel image (or something) and dpkg runs update-grub2 / > grub2-mkconfig. > > Instead, add GRUB_CMDLINE_GNUMACH="noide" to /etc/default/grub, run > update-grub2 yourself, and make sure that it does generate "noide" in > /boot/grub/grub.cfg. > > Sergey I will update the patch with your edits and resend again. Thanks. Joshua > -- Joshua Branson Sent from the Hurd