Package: cron-apt
Version: 0.13.0.1
Severity: important
Dear Maintainer,
when running cron-apt as shipped it works normal, running at 4 am and sending
an email when anything can be updated. But when adding the recommended RUNSLEEP
variable to the config, the only thing that happens is
Package: cron-apt
Version: 0.13.0.1
Severity: important
Dear Maintainer,
when running cron-apt as shipped it works normal, running at 4 am and sending
an email when anything can be updated. But when adding the recommended RUNSLEEP
variable to the config, the only thing that happens is throwing
Package: cron-apt
Version: 0.13.0.1
Severity: important
X-Debbugs-Cc: sub...@bugs.debian.org
Dear Maintainer,
when running cron-apt as shipped it works normal, running at 4 am and sending
an email when anything can be updated. But when adding the recommended RUNSLEEP
variable to the config, the
On 1/14/23 07:54, Lucas Nussbaum wrote:
FAIL: t/geturl_connectivity.pl 10 - IPv* client to https://[::1]:41567
FAIL: t/geturl_connectivity.pl 11 - IPv6 client to https://[::1]:41567
FAIL: t/geturl_connectivity.pl 20 - no (unexpected) warnings (via done_testing)
Looks like a recent fix in
On 1/9/23 23:26, Sylvestre Ledru wrote:
Le 08/01/2023 à 00:46, Richard B. Kreckel a écrit :
2) Based on mozillavpn_2.9.0-1.debian.tar.xz, apply some changes to
debian/ directory:
a) -DBUILD_TESTING=OFF to dh_auto_configure argument in
debian/rules (without it it FTBFS trying to run some
On 1/9/23 10:38, Sylvestre Ledru wrote:
Or just push a fork on github. I can take it for there :)
For work-related reasons this isn't going to happen the next few weeks.
Can you, please, update to 1.12.0 and include the minor described fixes
to debian/*? It should work, afaict.
-richard.
On 1/8/23 12:36, Richard B. Kreckel wrote:
I am unfamiliar with GitLab. Sorry.
Well, then I thought that could give it a try...
Is there a simple walk-through what to do to create salsa MRs in a case
like this package?
(I've spent the whole Sunday now and I'm giving up frustrated
On Sat, 7 Jan 2023, 06:00 Franklin Yu, wrote:
> Hi maintainers, any update? Is there any plan to include the
> diff-highlight executable in the “git” package?
im not a maintainer, but it is in
in /usr/share/doc/git/contrib/diff-highlight/
just needs to be made executable and put in
Szlvestre,
On 1/8/23 00:54, Sylvestre Ledru wrote:
Could you please submit a MR here ?
https://salsa.debian.org/sylvestre/mozillavpn
I will be happy to upload it then
Is that really necessary?
I am unfamiliar with GitLab. Sorry.
-richard.
of the build failure on
mipsel and mpis64el. It makes little sense to insist on these
architectures if upstream doesn't care.
Please decide how to proceed and let me know if I can help in any way.
-richard.
--
.''`. Richard B. Kreckel
: :' :
`. `'
`-<http://in.terlu.de/~kreckel/>
Control: tags -1 patch
On Sun, 06 Nov 2022 17:58:06 + Jamie Lentin wrote:
Does the package need updating?
Can you try merge request #7 [1] to see if it works for you? You can find
pre-built .deb files in the CI artifacts [2] for that merge request.
(Disclaimer: I'm not a maintainer
I am having it too and downgrading to 107.0.1-1 fixes the problem.
It seems like someone was seeing something similar before and reported
it here <https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024351> but
the bug got closed?
-richy.
--
Richard B. Kreckel
<https://in.terlu.de/~kreckel/>
Once 1023755 is fixed, this can be closed, i think
(the patch in 475553 is similar, but not as good as the one adopted
for the other bug - longer, does not account for the format in the
journal and lacks NEWS.Debian entry)
Package: logcheck
Version: 1.3.24
Severity: important
Tags: patch
X-Debbugs-Cc: richard.lewis.deb...@googlemail.com
Dear Maintainer,
logcheck currently fails the 'piuparts test' because its postinst does a
recursive chown/chmod on all rules
- but logcheck is not the only package to install
Package: logcheck
Version: 1.3.24
Severity: important
Tags: patch
X-Debbugs-Cc: richard.lewis.deb...@googlemail.com
Dear Maintainer,
logcheck currently has a broken testsuite, and no autopkgtests. The first
attached patch fixes both of these
The second patch adds salsa-ci.yml so these run on
On Fri, 21 May 2010 11:15:58 +0200 Hannes von Haugwitz
wrote:
> Dan D Niles wrote:
> > suppose you have a program that outputs:
> >
> > This is a failure test
> >
> > This would show up a a SECURITY event. It isn't really a SECURITY
> > event, so you exclude it in violations.ignore.d.
control: tags -1 - patch
thanks
On Thu, 1 Dec 2022, 15:06 Peter Gervai, wrote:
Hi -
> Would be nice to skip extremely large >directories which the admin choose
to skip in >the scan.
>Typical examples are /var/lib/backuppc or >similar backup dirs, or various
large mounts.
>
not sure i would
On Wed, 9 Nov 2022, 08:37 Trent W. Buck, wrote:
> My old (Debian 9) notes about different techniques are here:
>
> https://github.com/cyberitsolutions/prisonpc-systemd-lockdown/tree/main/systemd/system/0-EXAMPLES
>
>
This is an amazing resource! (did you consider trying to introduce it into
a
Package: logcheck
Version: 1.3.24
Tags: patch
X-Debbugs-Cc: richard.lewis.deb...@googlemail.com
logcheck should check the systemd journal by default.
Support is available, but not currently enabled by default.
To enable support you should (as root):
a) touch /var/lib/logcheck/offset.journal
b)
On Wed, 7 Dec 2022, 01:46 Mathias Gibbens, wrote:
> On Tue, 2022-12-06 at 23:55 +0000, Richard Lewis wrote:
> > On Tue, 6 Dec 2022 at 01:34, Richard Lewis
> > wrote:
> > > I didnt do a proper patch yet
> >
> > And now i have:
> > https://salsa.debi
On Tue, 6 Dec 2022 at 01:34, Richard Lewis
wrote:
> I didnt do a proper patch yet
And now i have: https://salsa.debian.org/debian/logcheck/-/merge_requests/15
equest submitted for
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1020827 - i think
#1020827 is almost as important to fix as this bug.
Richard
Package: debhelper
Version: 13.11.1
Severity: wishlist
Currently the `--no-enable` and `--no-start` options can be passed to
`dh_installinit` and `dh_installsystemd` to control whether a daemon is enabled
or started during `postinst`. For my use case, this is not flexible enough; I
want to be
IMO, this bug can be closed. There's been the decision by the OpenSSL
Managment Board to reinstate RIPEMD160 (and only that) to the default
providers in release 3.0.7.
The other algorithm, MD4 is unsafe and remains in the legacy provider.
References:
OMC decision:
On 10/6/22 06:39, Uwe Kleine-König wrote:
Using something like
ip -json a show dev $if
as source would be more appropriate
It does use the `ip` command; it just attempts `ifconfig` first, and falls back to
`ip` if `ifconfig` fails:
On Wed, 2021-05-26 16:14:08 -0400 Xavier Douville wrote:
May 21 03:49:37 localhost ddclient[18629]: WARNING: Wait at least 5 minutes
between update attempts.
Please try adding the following to your /etc/ddclient.conf:
min-interval=0
(or any interval you feel is appropriate, such as 5s
bootstrap completes
successfully.
It appears that the relevant portion of the script is not guarding
against the possibility of an empty package list.
--Daniel
--
Daniel Richard G. || sk...@iskunk.org
My ASCII-art .sig got a bad case of Times New Roman.
|On Wed, 9 Nov 2022 at 16:09, Stefan Kangas wrote:
> In rsyslog 8.2210.0-3, the timestamp format was changed to be high
> precision by default. It now looks like this:
>
> 2022-11-09T15:02:03.157819+01:00
>
> I believe this part of all rules:
>
> ^\w{3} [ :[:digit:]]{11}
>
> Must be
Makes sense.
Just wanted to add a link to the related logcheck bug which just got
filed: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023755
- even if this gets fixed in logcheck, users of rsyslog need to make
the same change to all locally-written logcheck rules (and there are
probably
Hi trent - i am interested in this approach:
i see you are binding msmtp over /usr/sbin/sendmail - i dont
understand how this would lead to a different outcome: how else does
msmtp know where to send the mail? is there some implicit assumption
about local delivery here? i tried testing but
Package: xfce4-goodies
Version: 4.14.0
Severity: important
X-Debbugs-Cc: rakirc...@gmail.com
Dear Maintainer,
I justed wanted to add "Notes plugin (xfce4-notes-plugin)" to my latest Debian
11.5 installation, but the "add new items" to the Panel did not include
the Notes plugin. Therefore, I
control: tags -1 +patch
On Fri, 14 Oct 2022, 08:24 Thomas Dorner, wrote:
> same here, I've patched it locally and just wanted to supply the patch.
>
> Hmm, I've just noticed, there actually already seems to be one. I send
> this nonetheless.
Hi Thomas - i provided the previous patch: you
On Tue, 27 Sep 2022, 09:27 Stefano Callegari, wrote:
> I have an email like this every cron
> grep: warning: stray \ before !
> grep: warning: stray \ before "
> grep: warning: stray \ before "
> grep: warning: stray \ before &
> grep: warning: stray \ before "
> grep: warning: stray \ before "
On 9/27/22 08:15, Sebastian Andrzej Siewior wrote:
It is not part of any standard.
It could hardly be less standardized. See ISO/IEC 10118-3:2018.
-richy.
--
Richard B. Kreckel
<https://in.terlu.de/~kreckel/>
ready once
the upstream change to make them non-fatal was uploaded to Debian. But
given I'm submitting another patch, I'll leave it open.
If you have further commentary on this part, let's discuss in 971523.
Also, the output is qualitatively different from what it used to be not
very long ago
to Debian. But given
I'm submitting another patch, I'll leave it open.
--
Richard
OpenPGP_signature
Description: OpenPGP digital signature
W.r.t. RIPEMD160, this seems to be a mistake:
https://github.com/openssl/openssl/issues/16994
Also, Fedora seems to have worked around this.
lib.py", line 123, in
__get_builtin_constructor
raise ValueError('unsupported hash type ' + name)
ValueError: unsupported hash type ripemd160
-richy.
--
Richard B. Kreckel
<https://in.terlu.de/~kreckel/>
OpenPGP_signature
Description: OpenPGP digital signature
/evp_fetch.c:373:Global
default library context, Algorithm (RIPEMD160 : 99), Properties ()
40A761FE947F:error:0386:digital envelope
routines:evp_md_init_internal:initialization
error:../crypto/evp/digest.c:252:
All other digests seem to work fine.
-richy.
--
Richard B. Kreckel
<ht
Not sure this will help you, but no-one else replied so: i have previously
looked at the logcheck code and i didnt see any way for there to be a bug
where a rule matches but have output be sent anyway - (the way the paranoid
level is implemented is less clear, but that does not apply here as far
I had the same experience. After the upgrade to anacron 2.3-34
the systemd anacron.service and anacron.timer were left in a disabled state
and had to be manually enabled and started.
>From systemctl list-unit-files -
UNIT FILE STATEPRESET
anacron.service
On Fri, 9 Sep 2022 07:24:34 -0500 "Marc F. Clemente" wrote:
> I upgraded grep from version 3.7-1 to 3.8-1. Something in the readme
> says that "Upstream has made egrep and fgrep obsolecent."
>
> Now chkrootkit spews a bunch of relatively harmless warnings:
>
> egrep: warning: egrep is
I am unable to reproduce the above compile-time error.
Package: ifupdown
Version: 0.8.37
Followup-For: Bug #959985
X-Debbugs-Cc: richard.sonnenf...@nmt.edu
Dear Maintainer,
This is my first bug report -- but am a 20 year Linux user and hope I
am doing it right. My main point is that this bug persists in 0.8.37
and the "important" severity is
On Mon, 1 Aug 2022 20:34:27 +0200 Romain Francoise
wrote:
> There’s nothing tmux can do right now about systemd killing user
> sessions without lingering enabled; just run `sudo loginctl
> enable-linger $USER`.
I start tmux with
$ systemd-run --scope --user tmux -2 # etc
and it seems to work
xed anytime soon, it's best to work
around in Debian.
-richy.
--
Richard B. Kreckel
<https://in.terlu.de/~kreckel/>
. thunderbird 102.)
-richy.
--
Richard B. Kreckel
<https://in.terlu.de/~kreckel/>
temd
system and service manager
or systemd-tmpfiles
Package not available
apt install systemd-standalone-tmpfiles
resolves the issue.
R.
--
richard lucassen
http://contact.xaq.nl/
Package: dbus-daemon
Version: 1.14.0-1
Severity: critical
Justification: breaks unrelated software
Version 1.14.0-2 seems to depend on systemd which breaks my sys-V system and an
update will remove many packages. There is no mention of a dependency change in
the changelogs.
Richard.
-- System
.
Cheers,
Richard
syslog.gz
Description: application/gzip
that. The BTS UI doesn't seem to allow searching on
the content of bug discussions; only subject and other metadata. I can't
see any other debian-installer bugs that mention ca-certificates in the
subject.
Cheers,
Richard
Package: debian-installer
Severity: important
Dear Maintainer,
Using netinst bullseye 11.4 installer:
https://cdimage.debian.org/debian-cd/current/amd64/iso-cd/debian-11.4.0-amd64-netinst.iso
I chose to add a network mirror, using https, and the default
'deb.debian.org'.
I used
I try to use reportbug with debian-installer (having found a
bug page with many bugs under that name), reportbug tells me there is no
such package.
Is that how it's supposed to work?
Cheers,
Richard
ction like
updating
the package?
Or how else should I achieve the desired effect?
Best Regards
Richard
-- Package-specific info:
System tainted due to merged-usr-via-aliased-dirs.
-- System Information:
Debian Release: 11.4
APT prefers stable-security
APT policy: (500, 'stable-security'), (50
> The pattern for rsyslogd can be improved. Please add the following
> line:
>
> imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' \(fd 3\) from
> systemd. \[v8.2206.0\]
>
> You might want to generalize the fd (on my system it is always fd 3,
> but I don't know if this is general) and
and the
older versions of VirtualBox.
Regards,
Richard
On Fri, 2022-07-08 at 17:31 -0700, Mike Kupfer wrote:
> Bastian Blank wrote:
>
> > As Virtualbox uses it's own kernel module, we can't provide any
> > help.
> > You need to ask them for a fixed version to work with that kerne
egards,
Richard
testing or provide any logs you can suggest.
Regards,
Richard
espacing
(e.g. match upstream ntpsec more closely)*, I don't think it's a good
idea to attempt that now. That increases the number of transitions.
* I'm not even sure that we have a consensus that it is a good idea to
do this rename at all, at least while the upstream "ntp" project still
exists.
--
--
Richard
On Fri, 1 Jul 2022 11:54:58 +0200 Mathieu Malaterre
wrote:
valgrind should apply the following patch:
sed -i -e 's/cortex-a8/generic-armv7-a+vfpv3-d16/g' Makefile.all.am
A better change would be
sed -i -e 's/cortex-a8/generic-armv7-a/g' Makefile.all.am
There's no need for the fpu
On 01/07/2022 10:58, Mathieu Malaterre wrote:
Hi Richard !
I've suggested valgrind people the following patch:
% sed -i -e 's/cortex-a8/generic-armv7-a+vfpv3-d16/g' Makefile.all.am
Hopefully my understanding is correct this time.
Pretty close, but -mcpu=generic-armv7-a is actually
I think the problem is valgrind's Makefiles are passing -mcpu=cortex-a8
to the compiler. Cortex-a8 has Neon and the compiler now makes use of that.
On the subject of the configuration of GCC
--with-arch=armv7-a+fp
*is* the correct configuration for the baseline GCC; it adds a vfpv3
with 16
I think this is because it Depends: a kernel << 5.18 and not
Conflicts/Breaks a kernel >= 5.18. Since you can install multiple kernel
packages, your existing kernel package is satisfying the dependency.
--
Richard
OpenPGP_signature
Description: OpenPGP digital signature
[Responding on mobile.] I’ll take a look at it, as obviously it should be made
to work. But on Debian, there shouldn’t be a need for ntpleapfetch, as the
tzdata package ships the leap second file.
--
Richard
> On Jun 11, 2022, at 22:33, Martin Maney wrote:
>
>
> Correction: do
On 03/06/2022 12:38, Vasyl Gello wrote:
Dear Richard!
Thanks for investigation!
I am going to solve the (missing) webinterface issue
by packaging elm-chorus which is the newest rewrite of Chorus2 in Elm
maintained
by Kodi team members Kolja Lampe (@razze) and GSoC students.
What we need now
lstat("/usr/share/javascript/iscroll",
9020 <... lstat resumed>{st_mode=S_IFDIR|0755, st_size=4096, ...}) = 0
9020 lstat("/usr/share/javascript/iscroll/iscroll-min.js", ...>
9020 <... lstat resumed>{st_mode=S_IFREG|0644, st_size=38987, ...}) = 0
9020 lstat("
Package: electrum
Version: 4.0.9-1
Severity: important
X-Debbugs-Cc: ri...@ulrichard.ch
Dear Maintainer,
Up to yesterday, electrum worked perfectly well. But when I wanted to start it
today, I was greeted with the following error:
electrum: 'SilentTaskGroup' object has no attribute '_closed'
GTK 4), of course.
--
Richard
I really don't know. Are other GTK apps working? If so, GTK 2 apps
specifically?
--
Richard
FYI, there is a long discussion on this issue at
https://github.com/corecode/dma/issues/18
Much of it centers around RFC2822's "Each line of characters MUST be no
more than 998 characters" verbiage.
--Daniel
--
Daniel Richard G. || sk...@iskunk.org
My ASCII-art .sig got
On 5/20/22 01:56, Evangelos Ribeiro Tzaras wrote:
Hi,
On Thu, 2022-05-19 at 22:23 -0500, Richard Laager wrote:
On 5/19/22 04:04, Evangelos Ribeiro Tzaras wrote:
Thanks for the patch! I'll upload a fixed version soon.
If you upload a new version, you (or I) can then close the binNMU
request
On 5/19/22 04:04, Evangelos Ribeiro Tzaras wrote:
Thanks for the patch! I'll upload a fixed version soon.
If you upload a new version, you (or I) can then close the binNMU
request, bug #1011201.
--
Richard
OpenPGP_signature
Description: OpenPGP digital signature
t a versioned
Build-Depends to ensure it cannot be built against an old libpurple0
(not that such a thing should happen). And a lintian override needs
updating. Here is a MR for that:
https://salsa.debian.org/DebianOnMobile-team/chatty/-/merge_requests/21
--
Richard
OpenPGP_signature
Descript
libpurple0 2.14.9-2 so chatty gains an
appropriate runpath.
nmu chatty_0.6.3-1 . ANY -m 'Rebuild against libpurple0 2.14.9-2 to
correct runpath'
--
Richard
OpenPGP_signature
Description: OpenPGP digital signature
Package: inn2
Version: 2.6.4-2
Severity: important
Dear Maintainer,
*** Reporter, please consider answering these questions, where appropriate ***
We are building a bullseye replacement of a buster server that uses inn2 to
act as a local usenet server. When we try to start the service using
This bug affects two of my computers, a desktop workstation connected via
Ethernet and a laptop connected via Wi-Fi. When I updated the computers, I
didn't pay close enough attention to what Apt was doing until it had
already removed Network Manager. I was able to reinstall Network Manager
on
any device
Regards
Richard
-- System Information:
Debian Release: 11.3
APT prefers stable-security
APT policy: (500, 'stable-security'), (500, 'stable'), (100, 'testing')
Architecture: i386 (x86_64)
Foreign Architectures: amd64
Kernel: Linux 5.10.0-14-amd64 (SMP w/2 CPU threads)
Locale: LANG
This has hopefully been fully fixed now (upstream). It will land in the
2.14.9 release, which should be coming next week. However, I've uploaded
a backport of it now.
--
Richard
version, I can still re-add it.
Rgds
Richard
Am Sonntag, dem 10.04.2022 um 22:08 +0200 schrieb Moritz Muehlenhoff:
> Source: python-keepkey
> Version: 0.7.3-1
> Severity: serious
>
> Your package came up as a candidate for removal from Debian:
>
> - Still depends on Pyth
I think this lint warning is relevant:
https://lintian.debian.org/tags/package-contains-no-arch-dependent-files?version=2.114.162
Might be best to mark it as
Architecture: all
Richard
Package: torbrowser-launcher
Version: 0.3.5-2
Severity: wishlist
X-Debbugs-Cc: r...@linux-m68k.org
Dear Maintainer,
I am running a multiarch system and tried to install torbrowser-launcher:amd64
instead of the x86 version, in the belief that this would download the 64bit
version
This did not
ld be mentioned in the README. Or indeed.. if there is a
known workaround to make it work without reboot/logout it would be
very nice to mention it there.
* how about asking for a list of users to add to the wireshark group
during configuration?
Regards
Richard
issue?
Yes that patch fixes it.
-richy.
--
Richard B. Kreckel
<https://in.terlu.de/~kreckel/>
/05b11936073c8d6b7a28c07cc...@stwm.de/, I
just removed the iwlwifi.ko module and it boots just fine now.
-richy.
--
Richard B. Kreckel
<https://in.terlu.de/~kreckel/>
Thanks Andrew,
I've done so, resulting in https://bugzilla.samba.org/show_bug.cgi?id=14978 .
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1914420 seems to
have the same backtrace as well.
-Richard
Imho this "feature" promotes a very unsafe key exchange method where
an attacker can easily exchange trusted and verified keys by any keys
he likes.
Thunderbird support has been dropped although it does support
some kind of key exchange that is in some aspect "compatible" with
autocrypt. Last
Hello!
Thanks for reporting this, but an alternate fix was applied 1 year ago
to the code in git, not yet released as a package:
https://github.com/kisli/vmime/commit/ec5b8f7cfe38e58b38eb5613b63b4b8f1a8343e0
Vincent
Le 19/01/2022 à 18:23, László Böszörményi (GCS) a écrit :
Source:
/
In stable, no; see:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002563
--
Richard
OpenPGP_signature
Description: OpenPGP digital signature
:
https://standards.ieee.org/develop/regauth/oui/oui.txt
I found Ubuntu's bug on this:
https://bugs.launchpad.net/ubuntu/+source/ieee-data/+bug/1796047
That suggests this URL, which works (note http only; https hangs):
http://standards-oui.ieee.org/oui/oui.txt
--
Richard
On 1/25/22 17:08, Christoph Anton Mitterer wrote:
On Tue, 2022-01-25 at 16:34 -0600, Richard Laager wrote:
Consider a powerful attacker who a) runs a clocksource one trusts and
b) can block traffic to any other sources in the pool one uses?
Does NTP(sec) complain eventually (like too many
On 1/25/22 10:45, Christoph Anton Mitterer wrote:
On Tue, 2022-01-25 at 00:54 -0600, Richard Laager wrote:
There are two potential issues:
A) the server serves bogus/malicious time
B) a MITM messes with the time.
(A) is kinda what I'd want to prevent by having -g removed... at least
I'm relatively set on the idea of breaking out ntpdig, since it's the
renamed replacement for sntp which is broken out in src:ntp, which we
are talking (on debian-devel) about ntpsec replacing.
--
Richard
OpenPGP_signature
Description: OpenPGP digital signature
Control: reopen -1
On 1/24/22 13:25, Christoph Anton Mitterer wrote:
On Tue, 2022-01-18 at 21:52 -0600, Richard Laager wrote:
Shouldn't -g be removed?
First off, note that the stock ntpsec.service has Restart=no, not
Restart=yes. So in the malicious/broken server scenario described,
ntpd
. The DHCP bit can be turned off in /etc/default/ntpsec-ntpdate.
Disabling running ntpdate on ifup would require deleting the hook script.
--
Richard
OpenPGP_signature
Description: OpenPGP digital signature
nother thing to say is that we're planning eventually to move all the
git repos to gitlab because it's a more free software friendly
solution compared to github.
Rich.
--
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http:/
Package: openssh-client-ssh1
Version: 1:7.5p1-13
Severity: wishlist
It would be nice if ssh1 looks for /etc/ssh/ssh1_config before ssh_config. If
exists, it will read ssh1_config.
R.
-- System Information:
Debian Release: bookworm/sid
APT prefers testing
APT policy: (500, 'testing')
n
- merely an exercise in understanding the existing code (which needs
further simplifications in my view).
if debian goes in another direction i will probably rebase and amend
commits to follow
On Wed, 8 Dec 2021, 19:50 Richard Lewis, <
richard.lewis.deb...@googlemail.com> wrot
t may well be that the documentation can be improved - constructive
suggestions welcome
Regards, and happy Christmas
Richard
On Fri, 24 Dec 2021 at 02:15, Harry Sintonen wrote:
>
> Package: chkrootkit
> Version: 0.55-4
> Severity: normal
>
> Hello,
>
> chkrootkit gives a false positive &
Package: torbrowser-launcher
Version: 0.3.3-6
Severity: grave
Justification: renders package unusable
X-Debbugs-Cc: r...@linux-m68k.org
Dear Maintainer,
the version in Bullseye seems to old, it never succeeds
downloading the Tor Browser. I see there are newer packages
in testing/unstable, could
control: fixed -1 0.55-4
thanks
On Thu, 23 Dec 2021 21:36:11 +0100 Paul Gevers wrote:
> So let's assume the results will be OK, then you can just close this bug
> with fixed version 0.55-4 and ignore it further.
Thanks, it seems 0.55-4 is indeed testing fine everywhere, according to the
401 - 500 of 3987 matches
Mail list logo