Bug#293937: aptitude: apt-secure features not enabled

2005-02-06 Thread Daniel Burrows
severity 293937 important
severity 293935 normal
thanks

On Sunday 06 February 2005 05:25 pm, Sam Morris wrote:
> Package: aptitude
> Version: 0.3.1-4
> Severity: grave
> Tags: experimental
> Justification: security hole

  Please try to exercise a little judgement about severity levels...if this is 
a grave bug, then you need to file one against apt 0.5 as well. ;-)  Crashing 
when popping up the help screen may be annoying, but marking it "important" 
just clutters up the bug list even more.

> Furthermore, when run in command line mode, aptitude doesn't even
> display the warning during the update operation.

  Known missing feature; only the visual interface warns you about security 
violations right now.

  Daniel

-- 
/--- Daniel Burrows <[EMAIL PROTECTED]> --\
|If you wish to live wisely,|
|ignore sayings--including this one.|
\ Evil Overlord, Inc: http://www.eviloverlord.com --/


pgpoIAAc9UwSP.pgp
Description: PGP signature


Bug#293937: aptitude: apt-secure features not enabled

2005-02-06 Thread Daniel Burrows
severity 293937 important
severity 293935 normal
thanks

On Sunday 06 February 2005 05:25 pm, Sam Morris wrote:
> Package: aptitude
> Version: 0.3.1-4
> Severity: grave
> Tags: experimental
> Justification: security hole

  Please try to exercise a little judgement about severity levels...if this is 
a grave bug, then you need to file one against apt 0.5 as well. ;-)  Crashing 
when popping up the help screen may be annoying, but marking it "important" 
just clutters up the bug list even more.

> Furthermore, when run in command line mode, aptitude doesn't even
> display the warning during the update operation.

  Known missing feature; only the visual interface warns you about security 
violations right now.

  Daniel

-- 
/--- Daniel Burrows <[EMAIL PROTECTED]> --\
|If you wish to live wisely,|
|ignore sayings--including this one.|
\ Evil Overlord, Inc: http://www.eviloverlord.com --/


pgphWPxTE18Ek.pgp
Description: PGP signature


Bug#293937: aptitude: apt-secure features not enabled

2005-02-06 Thread Daniel Burrows
On Sunday 06 February 2005 05:25 pm, Sam Morris wrote:
> Although running an update in the GUI does throw up a warning if a
> package repository could not be verified, there is no later warning if
> the user attempts to install a package from an unverified repository.

  It seems to work fine for me (in visual mode of course).  Could you give me 
a concrete example?

  Daniel

-- 
/--- Daniel Burrows <[EMAIL PROTECTED]> --\
|"Is it too late to extricate myself|
| from this plot line?" |
|"Yes." -- Fluble   |
\-- (if (not (understand-this)) (go-to http://www.schemers.org)) ---/


pgp4ULNnOyAdU.pgp
Description: PGP signature


Processed: Re: Bug#293937: aptitude: apt-secure features not enabled

2005-02-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 293937 important
Bug#293937: aptitude: apt-secure features not enabled
Severity set to `important'.

> severity 293935 normal
Bug#293935: aptitude: Segfault when pressing '?'
Severity set to `normal'.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#293937: aptitude: apt-secure features not enabled

2005-02-06 Thread Sam Morris
Package: aptitude
Version: 0.3.1-4
Severity: grave
Tags: experimental
Justification: security hole

Aptitude does not seem to use the features of apt 0.6 (aka apt-secure).
Although running an update in the GUI does throw up a warning if a
package repository could not be verified, there is no later warning if
the user attempts to install a package from an unverified repository.

Furthermore, when run in command line mode, aptitude doesn't even
display the warning during the update operation.

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (700, 'testing'), (600, 'unstable'), (550, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-2-k7
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)

Versions of packages aptitude depends on:
ii  apt [libapt-pkg-libc6.3-5-3 0.6.25   Advanced front-end for dpkg
ii  libc6   2.3.2.ds1-20 GNU C Library: Shared libraries an
ii  libgcc1 1:3.4.3-6GCC support library
ii  libncurses5 5.4-4Shared libraries for terminal hand
ii  libsigc++-2.0-0 2.0.7-1  type-safe Signal Framework for C++
ii  libstdc++5  1:3.3.5-5The GNU Standard C++ Library v3

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]