Release-critical Bugreport for August 29, 2003
Bug stamp-out list for Aug 29 06:00 (CST) Total number of release-critical bugs: 746 Number that will disappear after removing packages marked [REMOVE]: 15 Number that have a patch: 112 Number that have a fix prepared and waiting to upload: 37 Number that are being ignored: 18 Explanation for bug tags: P pending + patch H help M moreinfo R unreproducible S security U upstream Some bugs have an additional set of tags indicating they only apply to a particular release: O for oldstable (potato), S for stable (woody), T for testing (sarge) or U for unstable (sid). -- Package: abiword (debian/main) Maintainer: Masayuki Hatta [EMAIL PROTECTED] 207682 [] abiword_1.99.5+cvs.2003.08.28-1(unstable/ia64): FTBFS: reinterpret_cast from `const void*' to `UT_uint32' loses precision Package: aboot (debian/main) Maintainer: Gregory W. Johnson [EMAIL PROTECTED] 205864 [ + ] aboot: FTBFS: undefined reference to `puts' Package: adbbs (debian/main) Maintainer: Kai Henningsen [EMAIL PROTECTED] 190117 [ + ] adbbs: Default Configuration Uses pine pico Package: aime (debian/main) Maintainer: Ed Boraas [EMAIL PROTECTED] 172566 [] aime: fills up /var diskspace until it is overflowing Package: alcovebook-sgml (debian/main) Maintainer: Yann Dirson [EMAIL PROTECTED] 205630 [ + ] alcovebook-sgml: Fails to install Package: alsaplayer (debian/main) Maintainer: Ivo Timmermans [EMAIL PROTECTED] 200956 [ H R ] alsaplayer doesn't build on s390 Package: amavis-ng (debian/main) Maintainer: Hilko Bengen [EMAIL PROTECTED] 206223 [ + ] amavis-ng: cannot be installed 206625 [ + ] amavis-ng: the FSAV.pm module improperly handles the result code of the virus scanner 207515 [ M] amavis-ng: Emails are lost when clamd is not running Package: amavisd-new-milter (debian/main) Maintainer: Brian May [EMAIL PROTECTED] 203545 [] amavisd-new-milter: /usr/sbin/amavis-milter always fails Package: amaya (debian/main) Maintainer: Steve Dunham [EMAIL PROTECTED] 207173 [ + ] amaya_8.1a-1(unstable/ia64): FTBFS: structure has no member named `negative' Package: animals (debian/main) Maintainer: Jim Lynch [EMAIL PROTECTED] 195404 [] animals: FTBFS with g++-3.3: strstream.h is gone Package: anon-proxy (debian/main) Maintainer: David Spreen [EMAIL PROTECTED] 206304 [] anon-proxy: doesn't state shared library dependencies properly Package: apache (debian/main) Maintainer: Debian Apache Maintainers debian-apache@lists.debian.org 207453 [] apache: apache.postinst: line 189: /dev/tty: No such device or address Package: apache2-mpm-prefork (debian/main) Maintainer: Thom May [EMAIL PROTECTED] 203093 [P ] Should be able to still uninstall if can't stop apache Package: apcupsd (debian/main) Maintainer: Martin Mitchell [EMAIL PROTECTED] 205981 [ + ] apcupsd FTBFS - automake1.5 has been removed Package: apmd (debian/main) Maintainer: Chris Hanson [EMAIL PROTECTED] 205343 [] apmd_3.2.0-5(unstable/ia64): FTBFS: `platform_inb' undeclared 207592 [] FTBFS (unstable/m68k): more compiler errors than you can shake a stick at Package: apt-listbugs (debian/main) Maintainer: Masato Taruishi [EMAIL PROTECTED] 207415 [] apt-listbugs usage against master 207541 [] apt-listbugs: 302 Found Package: aptitude (debian/main) Maintainer: Daniel Burrows [EMAIL PROTECTED] 201259 [] [T] aptitude on PPC/testing can not be installed via apt Package: arla (non-US/main) Maintainer: Mikael Andersson [EMAIL PROTECTED] 198294 [P ] arla: FTBFS with gcc-3.3: Invalid preprocessor pasting Package: armagetron (debian/main) Maintainer: Andreas Bombe [EMAIL PROTECTED] 201638 [] armagetron_0.2.2-1(alpha/unstable): not 64-bit clean Package: arson (debian/main) Maintainer: Mike Markley [EMAIL PROTECTED] 195214 [ U ] arson: conflicts with a file from k3b Package: atari800 (debian/contrib) Maintainer: Dale Scheetz (Dwarf #1) [EMAIL PROTECTED] 193397 [] atari800_1.3.0-2(mipsel/unstable): out of date config.sub/config.guess 203707 [ + SU ] atari800 allows local root compromise. Package: atlas (debian/main) Maintainer: Camm Maguire [EMAIL PROTECTED] 192990 [] atlas_3.2.1ln-7(unstable/arm): FTBFS Package: autoconf (debian/main) Maintainer: Ben Pfaff [EMAIL PROTECTED] 156259 [] [S] db4.0: does not build from source Package: autoinstall (debian/main) Maintainer: Jeff Licquia [EMAIL PROTECTED] 206652 [] autoinstall: rules files is broken, package undermaintained Package: autoinstall-i386 (debian/main) Maintainer: Jeff Licquia [EMAIL PROTECTED] 169249 [] autoinstall-i386: fails to build on unstable 174559 [] autoinstall-i386: build depends on unavailable package busybox-source-0.60.0 Package: bash-static (debian/main)
LWN subscription for Debian developers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello. Last October, I announced a group subscription to lwn.net for Debian developers, sponsored by HP. I've recently received numerous queries about whether this deal was still available, and/or whether HP intended to continue sponsoring the subscription. The answer to both questions is yes! If you are a Debian developer and want full LWN access, go to lwn.net and create an account for yourself (no money is required to create a user account). Then, send email to [EMAIL PROTECTED] containing your LWN account name. Sign this email with your key on the Debian keyring. Then, exercise patience. Eventually, I will process your request, and add you to the Debian Project group and send you an email acknowledgement. Until now, 195 Debian developers have taken advantage of this and are listed in the Debian Project group at LWN. If you don't know about LWN, here's what the FAQ on the lwn.net website has to say: LWN.net aims to be the premier news and information source for the free software community. We provide comprehensive coverage of development, legal, commercial, and security issues. The LWN.net Weekly Edition is our weekly summary of what has happened in the free software world; our front page offers up-to-the-minute coverage. Enjoy! Bdale -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.2 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.8 http://mailcrypt.sourceforge.net/ iD8DBQE/UNN5ZKfAp/LPAagRAoXtAJwJ7l6U7g+YR/FolBv/hbRTYUuU8ACfaWNB lUh3jplqvxTR7SRd1VHeOu4= =hXg4 -END PGP SIGNATURE-
Re: Fusionner mes modifs a la nouvelle version du paquet
On Saturday 30 August 2003 02:29, Martin Quinson wrote: Et sinon, y'a uupdate(1) (upgrade a source code package from an upstream revision), mais j'ai jamais reussi a l'utiliser. Et de toute facon, c'est plus drole a la hache qu'avec des outils technologiques ayant la facheuse habitude de ne tomber que rarement en marche :) pour uupdate, http://www.chezmoicamarche.org/ , et très bien, même... Mike
New promotion: Up to 15% free bonus this weekend !!
Grab a Bonus Every day of the week! At Video Poker Online Casino, we are so sure you are going to love our games that we are giving you up to $200 free bonus just for trying our Casino. http://www.videopoker-online-casino.com/ Make your first deposit and we will instantly credit your account with an additional 20% free bonus up to $200. And for the rest of our players, we continued offering an additional 15% free casino bonuses all weekends !!! Download and Install our FREE Casino software. Open the software and click on Register Now, to become a Real Player !! http://www.videopoker-online-casino.com/CasinoSetup.exe
Re: Accepted kaffe 1:1.1.1-1 (i386 source)
* New upstream release \1 * fixed BTS summary line of #1 Closes: #1 * fixed BTS summary line of #2 Closes: #2 * fixed BTS summary line of #3 Closes: #3 in changelogs would probably go a lot further to correcting this very minor issue than reopening dozens of bug reports that belong closed, annoying users with BTS garbage, and repeating the same thread on debian-devel over and over. Yes, that sounds pretty intesresting; an addition to debian-changelog-mode would be interesting. It should be possible to get bugs.debian.org/ and parse the resulting HTML for the title and the original submitter, and placing it. Some addition to debian-changelog-close-bug, possibly optional, that utilizes debian-bug-* (there's no debian-bug-to-buffer... hmm?) to parse the bugreport ? Here is what the output looks like: ecasound2.2 (2.3.0-1) UNRELEASED; urgency=low * New upstream release * Run autoconf-automae-libtool in build. * jackd requires /proc/cpuinfo information not available on zaurus From: Junichi Uekawa (closes: #207435) -- Junichi Uekawa [EMAIL PROTECTED] Sat, 30 Aug 2003 13:16:07 +0900 and here is the patch against debian-bug.el and debian-changelog-mode.el diff -ur orig/debian-bug.el mods/debian-bug.el --- orig/debian-bug.el 2003-08-30 12:44:24.0 +0900 +++ mods/debian-bug.el 2003-08-30 13:22:59.0 +0900 @@ -1440,7 +1440,7 @@ (forward-sexp 1) (beginning-of-line)) -(defun debian-bug-wget-mbox (optional bug-number) +(defun debian-bug-wget-mbox-or-html (download-mbox-p optional bug-number) Wget the mbox file for bug BUG-NUMBER and return the filename created. (if (not debian-bug-download-directory) (error Please set ` debian-bug-download-directory')) @@ -1456,11 +1456,17 @@ (concat debian-bug- (if debian-bug-package-name (concat debian-bug-package-name -)) - bug-number) + bug-number +(if download-mbox-p + + .html)) debian-bug-download-directory)) (status) (url (concat http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=; - bug-number mbox=yes))) + bug-number + (if download-mbox-p + mbox=yes + (if (and (file-exists-p filename) (not (y-or-n-p Bug file already exists. Download again? ))) filename @@ -1472,6 +1478,14 @@ filename (error `wget' failed)) +(defun debian-bug-wget-mbox (optional bug-number) + Wget the mbox file for bug BUG-NUMBER and return the filename created. + (debian-bug-wget-mbox-or-html t bug-number)) + +(defun debian-bug-wget-html (optional bug-number) + Wget the html file for bug BUG-NUMBER and return the filename created. + (debian-bug-wget-mbox-or-html nil bug-number)) + (defun debian-bug-get-bug-as-file (optional bug-number) Browse the BTS for BUG-NUMBER via `browse-url'. (interactive (list (completing-read Bug number to fetch: diff -ur orig/debian-changelog-mode.el mods/debian-changelog-mode.el --- orig/debian-changelog-mode.el 2003-08-30 12:44:18.0 +0900 +++ mods/debian-changelog-mode.el 2003-08-30 13:15:35.0 +0900 @@ -645,7 +645,22 @@ (if (not (string-match ^[0-9]+$ bug-number)) (error The bug number should consists of only digits.)) (debian-changelog-add-entry) - (save-excursion (insert (closes: # bug-number ))) + (save-excursion +(insert + (with-current-buffer +(find-file-noselect (debian-bug-wget-html bug-number)) + (beginning-of-buffer) + (concat + (progn + + (re-search-forward TITLE\\([^-]*- #[^-]*- \\)\\([^]*\\)) + (match-string 2)) + \nFrom: + (progn + (re-search-forward From: \\([^]*\\)) + (match-string 1)) + ))) +(insert (closes: # bug-number ))) (message Enter a brief description of what was done here.)) ;;
Re: Accepted kaffe 1:1.1.1-1 (i386 source)
Junichi Uekawa [EMAIL PROTECTED] wrote: * New upstream release \1 * fixed BTS summary line of #1 Closes: #1 * fixed BTS summary line of #2 Closes: #2 * fixed BTS summary line of #3 Closes: #3 in changelogs would probably go a lot further to correcting this very minor issue than reopening dozens of bug reports that belong closed, annoying users with BTS garbage, and repeating the same thread on debian-devel over and over. Yes, that sounds pretty intesresting; an addition to debian-changelog-mode would be interesting. It should be possible to get bugs.debian.org/ and parse the resulting HTML for the title and the original submitter, and placing it. Some addition to debian-changelog-close-bug, possibly optional, that utilizes debian-bug-* (there's no debian-bug-to-buffer... hmm?) to parse the bugreport ? Here is what the output looks like: ecasound2.2 (2.3.0-1) UNRELEASED; urgency=low * New upstream release * Run autoconf-automae-libtool in build. * jackd requires /proc/cpuinfo information not available on zaurus From: Junichi Uekawa (closes: #207435) -- Junichi Uekawa [EMAIL PROTECTED] Sat, 30 Aug 2003 13:16:07 +0900 and here is the patch against debian-bug.el and debian-changelog-mode.el Thanks for CC'ing me. I catch up on -devel only sporadically. I'm not sure what the goal is? Why do you want the bug submitter named in the Closes entry? If its the title you want, then that is already available after the bug list has been fetched. I've been wanting to use the title as initial input to the close command for a wgile, but wasn't convinced it was good enough. I guess it's a good first stab. That's what you guys want? Peter
Re: debian archive disk space requirements.
On Sat, Aug 30, 2003 at 11:40:34AM +1000, jason andrade wrote: Hi, I've noticed the growth in the debian archive with some concern over the last few weeks/months. We're now hitting the limit of the partition that debian is on and it will be quite difficult technically for us to deal with this in the short term. [snip] Is there any way to reduce the size of the archive over the next 4-6 weeks ? If you have info on what people dowload, you could delete things that people aren't fetching. apt falls-back to other archives if the first one fails, assuming the same package is listed in one of the pther archives in the sources.list. I'm not sure how difficult this would be. If you also regenerate the Package file then they will simply become invisible to users. This could get confusing. Hope this helps, -- Martijn van Oosterhout kleptog@svana.org http://svana.org/kleptog/ All that is needed for the forces of evil to triumph is for enough good men to do nothing. - Edmond Burke The penalty good people pay for not being interested in politics is to be governed by people worse than themselves. - Plato pgppEwun2nGvL.pgp Description: PGP signature
Re: Accepted kaffe 1:1.1.1-1 (i386 source)
Junichi Uekawa [EMAIL PROTECTED] wrote: I'm not sure what the goal is? Why do you want the bug submitter named in the Closes entry? If its the title you want, then that is already available after the bug list has been fetched. I've been wanting to use the title as initial input to the close command for a wgile, but wasn't convinced it was good enough. I guess it's a good first stab. That's what you guys want? Erm.. although having the submitter name is probably not the point, I wanted to point out to you that I want the bug subject, Right. I understood both points. I was wondering about having the bug submitter there. Maybe change the phrasing? * Bug fix debian-changelog mode to support fetching of bug to fill in changelog, Thanks to Junichi Uekawa [EMAIL PROTECTED] (Closes: #207852). But I've always thought listing the thitle didn't really say _what_ was fixed and _how_. Most times, the title mentions a symptom but not the actual problem. That why I never added that before. I could make it optional...
Re: Accepted kaffe 1:1.1.1-1 (i386 source)
I'm not sure what the goal is? Why do you want the bug submitter named in the Closes entry? If its the title you want, then that is already available after the bug list has been fetched. I've been wanting to use the title as initial input to the close command for a wgile, but wasn't convinced it was good enough. I guess it's a good first stab. That's what you guys want? Erm.. although having the submitter name is probably not the point, I wanted to point out to you that I want the bug subject, and the patch I have submitted you does that (and add the submitter name, for some kind of credibility). regards, junichi
Re: MEI Whitelist Autoresponse
On Fri, Aug 29, 2003 at 09:20:53AM +1000, Russell Coker wrote: The comparison to mailing list software makes no sense. Maybe not in the context of viruses, but for the Joe Job problem it does. Viruses can and should be filtered out before they reach the C-R system. --Adam -- Adam McKenna [EMAIL PROTECTED] [EMAIL PROTECTED]
Re: Accepted kaffe 1:1.1.1-1 (i386 source)
On Thu, Aug 28, 2003 at 10:05:21AM -0500, Adam Heath wrote: A proper entry is as follows: * New upstream release. * no longer does foo when bar happens. Closes: #12345 * wrapper script rewritten to not use $$ in tempfile names. Closes: #12345 Please, everyone remember, a changelog documents *changes*. It's not a tool to close bugs automatically. Maybe a tool that integrates debian BTS/changelog behaviour could help. eg. You run program and give name of package. You see a list of bugs associated with the source packge. You select one of the bugs. It comes up with a screen with two windows: 1. One where the can review the bug history. 2. You type in extra information with what has changed, and an entry is automatically added to the changlog. You then repeat the process for the next bug report. This is still very rough, but I think it gives the general idea. Such a program could also make it easier to do common BTS tasks, eg. merge duplicate bug reports, etc. If we could make it easier and quicker to write correct changelogs, I think they are more likely to occur. (Assuming such a tool doesn't already exist...) -- Brian May [EMAIL PROTECTED]
Re: .iso conflict, discussion of resolution
Stephan, Would it be possible to get the two desktop filesi mentioned below merged into kdelibs so that arson and k3b are easily installable at the same time? I can do the commit myself if you approve. Thanks, Chris Cheney Debian KDE Maintainer PS - Christian/Jean-Michel there is a new debian-qt-kde developer mailing list for Qt/KDE debian maintainers, debian-kde is still available for users. On Fri, Aug 29, 2003 at 10:34:39PM -0700, Mike Markley wrote: All, A quick summary of this bug: Arson, a KDE CD burning application, includes two .desktop files to associate certain files with it: /usr/share/mimelnk/application/x-iso.desktop /usr/share/mimelnk/application/x-cue.desktop For more info on what's been suggested and what's been discussed, see 195214, 195218, and 203954. pgp2OTQn6ZCJZ.pgp Description: PGP signature
Re: Accepted kaffe 1:1.1.1-1 (i386 source)
Peter S Galbraith [EMAIL PROTECTED] wrote: [...] Right. I understood both points. I was wondering about having the bug submitter there. Maybe change the phrasing? I usually don't list him/her, my changelogs are too long already. I do list submitters who send the report by private mail instead of via BTS, because othervise they wouldn't have any public record of their help. * Bug fix debian-changelog mode to support fetching of bug to fill in changelog, Thanks to Junichi Uekawa [EMAIL PROTECTED] (Closes: #207852). But I've always thought listing the thitle didn't really say _what_ was fixed and _how_. Most times, the title mentions a symptom but not the actual problem. That why I never added that before. The symptom often is much more interesting than the cause for the audience, i.e. blah does not crash immediately on startup on PowerPC instead of Properly initialize char *foo in src/bar.c. cu andreas
Re: configure web proxy via DHCP server
On Sat, 30 Aug 2003 12:57, H. S. Teoh wrote: It would be really cool(tm) if I didn't have to reconfigure every program on my laptop to use a different proxy server every time I plug it into a different network. Run a local proxy that forwards connections to the (external) proxy of your choice, and point all applications at it? Then of course there's the issue of how to configure the local proxy. For the local proxy on my laptop I use m4 to change it's configuration from a script which knows about the networks I regularly connect to. The ideal solution however would be an addition to the DHCP standard for a field to specify this information. My solution only works AFTER I have figured out the correct data for each network by some other means and customised my script. -- http://www.coker.com.au/selinux/ My NSA Security Enhanced Linux packages http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark http://www.coker.com.au/postal/Postal SMTP/POP benchmark http://www.coker.com.au/~russell/ My home page
Re: Accepted kaffe 1:1.1.1-1 (i386 source)
On Fri, 2003-08-29 at 18:12, Glenn Maynard wrote: I'm confused. We have three cases: 1. Close bug #12345 directly (12345-done), noting the version that fixed it. 2. Note in the changelog that bug #12345 is fixed; the bug receives a notification of the version that fixed it. 3. Note in the changelog that bug #12345, ls --crash crashes, is fixed; the bug receives a notification of the version that fixed it. #3 is obviously ideal, if the maintainer has time; no debate there. However, you're saying that #1 is preferable to #2. Why? It seems to have no disadvantage to #1, with the added advantages that I can check which version fixed bug #12345 without hitting the network (since it's documented in the changelog), and saves developer time. What am I missing? Start with Herbert Xu's premise... We've gone through this many times already. Upstream changes should not be documented in the Debian changelog, even if they fix bugs in the Debian BTS. ... and follow the bouncing ball. -- Joe Drew [EMAIL PROTECTED] [EMAIL PROTECTED] My weblog doesn't detail my personal life: http://me.woot.net
Re: Accepted kaffe 1:1.1.1-1 (i386 source)
On Saturday 30 August 2003 03:47, Branden Robinson wrote: On Fri, Aug 29, 2003 at 06:00:51PM -0400, Glenn Maynard wrote: A script to convert eg. * New upstream release .* (Closes: #1, #2, #3) to * New upstream release \1 * fixed BTS summary line of #1 Closes: #1 * fixed BTS summary line of #2 Closes: #2 * fixed BTS summary line of #3 Closes: #3 in changelogs would probably go a lot further to correcting this very minor issue than reopening dozens of bug reports that belong closed, annoying users with BTS garbage, and repeating the same thread on debian-devel over and over. One big problem with this approach is that the same maintainers who are too lazy to write proper entries for bug-closers in their changelog entries are going to be too lazy to ensure that a bug report has a meaningful summary in the first place. maybe that should be a rule in policy. the issue of proper notification is valid, or not? there should be a means to at least reduce redundant bug reports, other than some nasty response indicating that a bug has already been reported or attended. us plain old users play a valid part in the project, but it's beginning to feel as though the gap between users and maintainers requires a whole new dialogue. it's not unreasonable to expect that user bug reports deserve a coherent response, including some degree of clarification of the means of bug resolution. ben
Re: Bug#207300: tmda: Challenge-response is fundamentally broken
On Sat, 30 Aug 2003 10:42, Brian May wrote: On Fri, Aug 29, 2003 at 03:48:13PM +1000, Craig Sanders wrote: the point that you keep on missing is that TMDA and similar programs send confirmation emails to innocent third-parties who did *NOT* send an email. TMDA and all C-R systems are broken-by-design, just as many stupid end-user autoresponders and AV-scanners that send notifications back to the forged sender address are broken-by-design. You saying that any SMTP MTA that sends bounces to unauthenticated E-Mail addresses is also broken? Yes. That is the idea behind autorespoonders after all, to tell the sender that his mail didn't get through because it didn't meet some required criteria. A SMTP 550 code can convey all the information that is needed for bounces. E-Mail that looks suspicious can be valid mail at times, for instance somebody I knew tried to send a ZIP file that happened to be executable via E-Mail. If the mail server it was sent to responded with: 550 Don't want ZIP files of .exe content Then the bounce message would have been clear and there would be no chance of it going to the wrong person. If the C-R systems we are discussing would send their challenge in the 550 SMTP code then I doubt that anyone would have any problem with them. The problem is that I see no easy way to fix this problem to the large scale required on the Internet while keeping store-and-forward feature of SMTP. The old-style store and forward is dead. Backup MX servers serve no useful purpose in the modern Internet, this is why big sites such as microsoft.com and hotmail.com don't have them. If you have a backup MX then it should know all the acceptable email addresses in your domain and enforce all rules regarding acceptable content. Then it can block content through SMTP 550 and 450 codes. -- http://www.coker.com.au/selinux/ My NSA Security Enhanced Linux packages http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark http://www.coker.com.au/postal/Postal SMTP/POP benchmark http://www.coker.com.au/~russell/ My home page
.iso conflict, discussion of resolution
All, A quick summary of this bug: Arson, a KDE CD burning application, includes two .desktop files to associate certain files with it: /usr/share/mimelnk/application/x-iso.desktop /usr/share/mimelnk/application/x-cue.desktop For more info on what's been suggested and what's been discussed, see 195214, 195218, and 203954. Since I've seen no action in three months on possible help from other maintainers with fixing this SOMEHOW, I'd like some thoughts on the two solutions that I *can* implement, and the one that I can at least ram down others' throats: 1. Conflicts: k3b (very ugly) 2. Depends: k3b (also very ugly) 3. Depends: kde-burner-common, which contains the .iso files (which would have to Conflicts: k3b anyway, unless Jean-Michel is willing to cooperate, and which is basically archive bloat) I will do #3 no later than one week from today, unless this discussion convinces me that it's a bad idea (or the release manager/ftp-masters object). If that happens, I will implement #1. Why? As a recently liberated former dialup user, I appreciate how utterly ludicrous it is to Depend: on a 2.2mb package for 1107 bytes of freaking text. Please Cc: me on replies, as I'm not subscribed these days. -- Mike Markley [EMAIL PROTECTED] GPG: 0x3B047084 7FC7 0DC0 EF31 DF83 7313 FE2B 77A8 F36A 3B04 7084
Re: debian archive disk space requirements.
jason andrade [EMAIL PROTECTED] writes: Hi, I've noticed the growth in the debian archive with some concern over the last few weeks/months. We're now hitting the limit of the partition that debian is on and it will be quite difficult technically for us to deal with this in the short term. We have some new storage which is being comissioned but it won't be in place for about a month and the debian archive has already filled up a 100G partition we've dedicated to it here (that doesn't include the debian-cd or debian-non-US or other debian related archives.. just the main debian one). I'm stuck between a rock and a hard place here as we have a large dependency tree before we can move equipment over and get access to the new disk.. Is there any way to reduce the size of the archive over the next 4-6 weeks ? What architectures are you mirroring? You could drop some of the more uncommon arches (see access logs if any are completly unused) till you have space for them again. Preferably just drop the Packages file for the arch and delete as little as possible of the actual debs. MfG Goswin PS: What are you using to mirror?
Re: MEI Whitelist Autoresponse
On Thu, Aug 28, 2003 at 07:12:47PM -0700, Joshua Kwan wrote: Hmm, how about giving tmda its own special header so we can auto-filter out messages from people who use C-R systems? It adds itself to X-Delivery-Agent, so it's not hard to filter out. I've started capturing C-R signatures where I can find them and adding them to procmail /dev/null recipies. Haven't got many yet, but I'm working on it. -- Marc Wilson | Stop searching. Happiness is right next to you. [EMAIL PROTECTED] | Now, if they'd only take a bath ... pgpaBsXpKihMD.pgp Description: PGP signature
Re: configure web proxy via DHCP server
Russell Coker [EMAIL PROTECTED] writes: On Sat, 30 Aug 2003 12:57, H. S. Teoh wrote: It would be really cool(tm) if I didn't have to reconfigure every program on my laptop to use a different proxy server every time I plug it into a different network. Run a local proxy that forwards connections to the (external) proxy of your choice, and point all applications at it? Then of course there's the issue of how to configure the local proxy. For the local proxy on my laptop I use m4 to change it's configuration from a script which knows about the networks I regularly connect to. The ideal solution however would be an addition to the DHCP standard for a field to specify this information. My solution only works AFTER I have figured out the correct data for each network by some other means and customised my script. Many browsers allow the proxy to be autoconfigured from some info file. You can easily generate that file depending on your network setup. google around a bit for the file format. MfG Goswin
Re: Bug#207300: tmda: Challenge-response is fundamentally broken
on Sat, Aug 30, 2003 at 10:42:17AM +1000, Brian May ([EMAIL PROTECTED]) wrote: On Fri, Aug 29, 2003 at 03:48:13PM +1000, Craig Sanders wrote: the point that you keep on missing is that TMDA and similar programs send confirmation emails to innocent third-parties who did *NOT* send an email. TMDA and all C-R systems are broken-by-design, just as many stupid end-user autoresponders and AV-scanners that send notifications back to the forged sender address are broken-by-design. You saying that any SMTP MTA that sends bounces to unauthenticated E-Mail addresses is also broken? At the very least, this is a small subset of the incoming mail. There are probably bad practices, which should be fixed. The aim is also one which is presumably useful: if the sender is valid, then advising them that a message was not delivered is arguably useful (note that I regard most delivery failure messages as junk). Most importantly: the MTA isn't sending mail out willy-nilly to offload a cost (filtering, content assessment) to a third party. It's taking an action on a (hopefully) limited number of mails which cannot be delivered. SMTP Envelope reply address should be given precedence, and an SMTP error precedence over any bounce. That is the idea behind autorespoonders after all, to tell the sender that his mail didn't get through because it didn't meet some required criteria. The message can't be delivered because of addressing errors is a different class of error than I can't be bothered to see if this mail is worth reading, despite its being properly addressed to me. Even encryption does not help here, or at least I have not seen any proposals for any system that could scale to the Internet. GPG for instance only verifies the sender to the receiver, it could not be used to verify every sender to the MTAs involved. A publicly available key, with an email address (or addresses), validated against contents, is useable. It doesn't validate the sender, but it provides a level of indication that someone went through the trouble of getting a key, posting it publicly, and signing (and/or encrypting) content with it. That's more elbow grease than your garden-variety spammer. Peace. -- Karsten M. Self kmself@ix.netcom.comhttp://kmself.home.netcom.com/ What Part of Gestalt don't you understand? Hollings: bought, paid for, but couldn't deliver the CBDTPA: http://www.politechbot.com/docs/cbdtpa/hollings.s2048.032102.html pgpea857fP6eC.pgp Description: PGP signature
Re: configure web proxy via DHCP server
On Sat, Aug 30, 2003 at 12:01:42PM +1000, Brian May wrote: Is this possible? It would be really cool(tm) if I didn't have to reconfigure every program on my laptop to use a different proxy server every time I plug it into a different network. The answer is close to you: $ apt-cache search laptop configure (manually removing useless entries) ifplugd - A configuration daemon for ethernet devices laptop-net - Automatically adapt laptop ethernet laptop-net-doc - Automatically adapt laptop ethernet - documentation laptop-netconf - network detection and configuration program for laptops whereami - Automatically reconfigure your (laptop) system for a new location All of these, IIRC, provide means to run user-defined scripts for autoconfiguration. Setting up the proxy server might be just a manner of setting up the http_proxy environment variable depending on your location (although some browsers might not use it). Regards Javi pgpHqNRoNwnBE.pgp Description: PGP signature
Re: debian archive disk space requirements.
On Sat, Aug 30, 2003 at 09:29:16AM +0200, Goswin von Brederlow wrote: What architectures are you mirroring? You could drop some of the more uncommon arches No, he cannot, it's ftp.au.debian.org. All official mirrors have been, are or will be in a similar situation. -- 2. That which causes joy or happiness.
Re: Accepted kaffe 1:1.1.1-1 (i386 source)
* Bug fix debian-changelog mode to support fetching of bug to fill in changelog, Thanks to Junichi Uekawa [EMAIL PROTECTED] (Closes: #207852). But I've always thought listing the thitle didn't really say _what_ was fixed and _how_. Most times, the title mentions a symptom but not the actual problem. That why I never added that before. Yes, that's one point, so the title usually needs editing. That's why it needs to be done at the level of debian-changelog-mode, and not dpkg. It's not something that can be completely automated, but at least some template is there to help the maintainer :) regards, junichi
Re: configure web proxy via DHCP server
This one time, at band camp, Russell Coker wrote: The ideal solution however would be an addition to the DHCP standard for a field to specify this information. My solution only works AFTER I have figured out the correct data for each network by some other means and customised my script. SRV records? -- [EMAIL PROTECTED] http://people.debian.org/~jaq
Re: debian archive disk space requirements.
On Sat, Aug 30, 2003 at 11:40:34AM +1000, jason andrade wrote: I've noticed the growth in the debian archive with some concern over the last few weeks/months. We're now hitting the limit of the partition that debian is on and it will be quite difficult technically for us to deal with this in the short term. I hear you. /dev/sda3 97G 97G 470M 100.0 [] /bla Is there any way to reduce the size of the archive over the next 4-6 weeks ? We are still waiting for Joey to officially announce the obsolescence of potato on -announce so that it can be moved to archive.debian.org. That will buy us six, seven gigabytes at most. Other than that, I've no idea. Pray to god that testing and unstable stop diverging so much? :) -- 2. That which causes joy or happiness.
Re: configure web proxy via DHCP server
On Sat, 30 Aug 2003 18:33, Jamie Wilkinson wrote: This one time, at band camp, Russell Coker wrote: The ideal solution however would be an addition to the DHCP standard for a field to specify this information. My solution only works AFTER I have figured out the correct data for each network by some other means and customised my script. SRV records? Almost no-one uses them. Unless something can get accepted by 50% of the servers out there then it's of little use for such things. If something works 50% of the time I may as well do it manually. -- http://www.coker.com.au/selinux/ My NSA Security Enhanced Linux packages http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark http://www.coker.com.au/postal/Postal SMTP/POP benchmark http://www.coker.com.au/~russell/ My home page
Re: MEI Whitelist Autoresponse
On Thu, Aug 28, 2003 at 02:55:35PM -0700, Adam McKenna wrote: How many were challenges from mailing list software? Yes, another class of software that automatically issues challenges (specifically, to new subscriptions and to non-list members if the list is closed). So I guess you should also file bugs against majordomo, mailman, ezmlm-src, and any other mailing list managers that do this. I think virus scanners are in a different class, though. Mailing list software isn't designed to recognize viruses, while virus scanners are. It's disgustingly incompetent to recognize a mail as Sobig.F, which is known to fake the sender, and then reply to it anyway. (And yes, I get a lot of notifications that mention Sobig.F by name.) Richard Braakman
Bug#195214: Info received (was .iso conflict, discussion of resolution)
Thank you for the additional information you have supplied regarding this problem report. It has been forwarded to the package maintainer(s) and to other interested parties to accompany the original report. Your message has been sent to the package maintainer(s): Mike Markley [EMAIL PROTECTED] If you wish to continue to submit further information on your problem, please send it to [EMAIL PROTECTED], as before. Please do not reply to the address at the top of this message, unless you wish to report a problem with the Bug-tracking system. Debian bug tracking system administrator (administrator, Debian Bugs database)
Re: Bug#207300: tmda: Challenge-response is fundamentally broken
Brian May writes: You saying that any SMTP MTA that sends bounces to unauthenticated E-Mail addresses is also broken? Karsten M. Self writes: At the very least, this is a small subset of the incoming mail. This is about a quarter of my incoming mail. -- John Hasler [EMAIL PROTECTED] Dancing Horse Hill Elmwood, Wisconsin
Re: .iso conflict, discussion of resolution
Am Saturday 30 August 2003 08:06 schrieb Chris Cheney: Stephan, Would it be possible to get the two desktop filesi mentioned below merged into kdelibs so that arson and k3b are easily installable at the same time? I can do the commit myself if you approve. Approved. Greetings, Stephan -- SCO doesn't have enough understanding of the case to be able to lie convincingly. Indeed they have so little understanding that it's difficult to accuse them of lying. - Greg Lehey
Re: debian archive disk space requirements.
On Sat, 30 Aug 2003, Josip Rodin wrote: /dev/sda3 97G 97G 470M 100.0 [] /bla /dev/sdf1100798036 98652428 2145608 98% /raid/lun1p1 and that is by moving a chunk of debian archives into another disk and symlinking back in.. Is there any way to reduce the size of the archive over the next 4-6 weeks ? We are still waiting for Joey to officially announce the obsolescence of potato on -announce so that it can be moved to archive.debian.org. That will buy us six, seven gigabytes at most. Other than that, I've no idea. Pray to god that testing and unstable stop diverging so much? :) hmm ok. 6-7G would probably help for 4 weeks. once we move to the new disk i don't mind too much about debian growing again :-) /dev/sdb11220623064 32828 1208380596 1% /data1 i just need to get the time to be able to migrate stuff across.. and i really don't want to break ftp.au.debian.org for people.. regards, -jason
Re: configure web proxy via DHCP server
It would be really cool(tm) if I didn't have to reconfigure every program on my laptop to use a different proxy server every time I plug it into a different network. The thing is that MS has an extension for DHCP to do this, the code is 252, it works only with IE in windows, but I've read it also works with konqueror in kde, I haven't tried this in Debian, though, anybody has tried this? I think it would be good if we could get this working. Both dhcp (version 2) and dhcp3-server (version 3) support this extension if you declare it, here are a couple of examples: for dhcp3-server: option auto-proxy-config code 252 = string; subnet 192.168.1.0 netmask 255.255.255.0 { range 192.168.1.101 192.168.1.199; option auto-proxy-config http://192.168.1.1/wpad.pac;; option routers 192.168.1.1; } for dhcp (version 2) in a normal subnet declaration you add: option option-252 http://192.168.1.1/wpad.pac; The pac files are the ones that are used to configure netscape, mozilla, opera or IE, it is a javascript that could be in its simpler form something like: function FindProxyForURL(url, host) { return PROXY 192.168.1.1:3128 ; } Here are some links to doc on the topic where you can read more and find more examples about all this: http://www.dit.gov.bt/~takeshi/material/win2000srv/internet-gw/wpad/ http://www.microsoft.com/technet/treeview/default.asp?url=/technet/prodtechnol/ie/reskit/ie6/part6/c26ie6rk.asp http://www.davidpashley.com/tutorials/automatic-proxy.html http://wp.netscape.com/eng/mozilla/2.0/relnotes/demo/proxy-live.html http://www.squid-cache.org/Doc/FAQ/FAQ-5.html Hope this helps. Regards... -- Manty/BestiaTester - http://manty.net
Re: Accepted kaffe 1:1.1.1-1 (i386 source)
On Fri, 2003-08-29 at 20:17, Colin Watson wrote: On Fri, Aug 29, 2003 at 08:48:13PM +0200, Mathieu Roy wrote: There's at least one other solution: what if, when a bug tagged upstream was closed, the mail sent would include the upstream ChangeLog (hopefully named ChangeLog in the top directory of the package)? Can someone familiar with the BTS code tell whether this change is trivial or not? It's not trivial in the slightest, sorry. The BTS doesn't remotely have this information available to it, and it's not even easy to arrange for it to be available. I'd also be quite annoyed if I was mailed the upstream changelog when a bug was closed, as these can often get rather large. Ross -- Ross Burton mail: [EMAIL PROTECTED] jabber: [EMAIL PROTECTED] www: http://www.burtonini.com./ PGP Fingerprint: 1A21 F5B0 D8D0 CFE3 81D4 E25A 2D09 E447 D0B4 33DF signature.asc Description: This is a digitally signed message part
Re: Accepted kaffe 1:1.1.1-1 (i386 source)
One big problem with this approach is that the same maintainers who are too lazy to write proper entries for bug-closers in their changelog entries are going to be too lazy to ensure that a bug report has a meaningful summary in the first place. Maintainers who are lazy cannot be fixed, but some may improve, and the load on those who do write proper changelogs may be lightened. I'd not expecting perfect results from here... just some improvements. Less excuse for making sloppy changelogs :P regards, junichi
Re: configure web proxy via DHCP server
On Sat, Aug 30, 2003 at 02:15:28PM +0200, Santiago Garcia Mantinan wrote: It would be really cool(tm) if I didn't have to reconfigure every program on my laptop to use a different proxy server every time I plug it into a different network. The thing is that MS has an extension for DHCP to do this, the code is 252, it works only with IE in windows, but I've read it also works with konqueror in kde, I haven't tried this in Debian, though, anybody has tried this? I think it would be good if we could get this working. Both dhcp (version 2) and dhcp3-server (version 3) support this extension if you declare it, here are a couple of examples: On the client side, however, at least dhcp3-client requires recompiling for each option you want to export to the client hook scripts. This was recently done for the netbios options that Samba uses. I know there are many more unexported options that are potentially useful to other packages, including ntp timeserver information; it might be nice to gather a list of them all at once for submission to the dhcp3 maintainers, so they're not constantly recompiling to special-case each attribute. -- Steve Langasek postmodern programmer pgpwdu9mPLuUF.pgp Description: PGP signature
Re: GDM in sid does not read /etc/environment anymore
But this doesn't solve the problem that the login screen appears without locales... I already have pam_env.so in /etc/pam.d/gdm, but this only take effect (maybe I'm wrong) after the user logs in. The greeter will still appear without locales. (and that's the bug reported in bts). Em Sáb, 2003-08-30 às 14:20, Gustavo Noronha Silva escreveu: Em Fri, 29 Aug 2003 16:38:16 -0300, Daniel Ruoso [EMAIL PROTECTED] escreveu: I've actually sent him an email but got no answer. I've posted in debian-devel few days ago and nobody complained that GDM could source /etc/environment in the init script. That's an one-line patch (already tagged as patch in bts for more than a year)... I think that if the maintainer doesn't take that, a NMU will be neecessary. I don't think that's right. The Right Thing is adding this: auth required pam_env.so to /etc/pam.d/gdm My /etc/pam.d/gdm is like this after my own fix: [EMAIL PROTECTED] $ cat /etc/pam.d/gdm #%PAM-1.0 # This module parses /etc/environment (the standard for setting # environ vars) and also allows you to use an extended config # file /etc/security/pam_env.conf. # (Replaces the `ENVIRON_FILE' setting from login.defs) auth required pam_env.so @include common-auth @include common-account @include common-session -- Atenciosamente, Daniel Ruoso Desenvolvimento de Sistemas [EMAIL PROTECTED] Oktiva Telecomunicaes e Informtica
Re: Bug#207300: tmda: Challenge-response is fundamentally broken
I think challenge response needs extra care. Anyway, current e-mail worm/virus incident is pretty bad. On Sat, Aug 30, 2003 at 07:44:56AM -0500, John Hasler wrote: Brian May writes: You saying that any SMTP MTA that sends bounces to unauthenticated E-Mail addresses is also broken? Karsten M. Self writes: At the very least, this is a small subset of the incoming mail. This is about a quarter of my incoming mail. I filter e-mail worm/virus mail bounces by reading the attached original mail header. Most bounces keep the good amount of original header information. ## Worm e-mails by the header :0 * ^X-Mailer: Microsoft * ^X-MailScanner: Found to be clean Xworm/ ## Worm bounces by the headerbody :0 BH * ^FROM_MAILER * ^X-Mailer: Microsoft * ^X-MailScanner: Found to be clean Xworm-bounce/ I guess our e-mail server can do the similar checks. Osamu
Re: debian archive disk space requirements.
On Sat, Aug 30, 2003 at 12:18:50PM +0200, Josip Rodin wrote: Is there any way to reduce the size of the archive over the next 4-6 weeks ? We are still waiting for Joey to officially announce the obsolescence of potato on -announce so that it can be moved to archive.debian.org. That will buy us six, seven gigabytes at most. Other than that, I've no idea. Pray to god that testing and unstable stop diverging so much? :) Hm, another possibility is to just make a new stable release, and then to delete all those woody packages. ;-) Cheers, Richard -- __ _ |_) /| Richard Atterer | GnuPG key: | \/¯| http://atterer.net | 0x888354F7 ¯ '` ¯
Re: debian archive disk space requirements.
[I am not on debian-devel but reading the list through Usenet gateway] jason andrade [EMAIL PROTECTED] writes: /dev/sdf1100798036 98652428 2145608 98% /raid/lun1p1 and that is by moving a chunk of debian archives into another disk and symlinking back in.. You may also want to see mount(8) and look for bind from the manual page. Since there is not very much about it, I will just quote it below. From mount(8): Since Linux 2.4.0 it is possible to remount part of the file hierarchy somewhere else. The call is mount --bind olddir newdir ftp.fi.debian.org has the whole debian/ on the same partition but a couple of directories, such as debian-cd/, that were previously on the same partition with the mirror root are now mounted from a new location with the --bind option. /etc/fstab also works with bind option with something like: /newloc/debian-cd /oldloc/debian-cd none bind,noatime,noexec,nodev Using bind should keep all mirroring programs happy since they do not have to get confused when they find a symlink instead of directory. -- Heikki Vatiainen * [EMAIL PROTECTED] Tampere University of Technology * Tampere, Finland
Re: debian archive disk space requirements.
On Sat, Aug 30, 2003 at 12:18:50PM +0200, Josip Rodin wrote: Pray to god that testing and unstable stop diverging so much? :) FYI, this is the size of all the binaries belonging to the given architecture, in the specifies suites: architecture | any| unstable| u+t| u+t+s | u+t+s+o --++-+++ all | 6907585148 | 3400497424 | 4086646374 | 5709009750 | 686078 alpha| 8181555068 | 3407524450 | 4906783652 | 6562026256 | 7611929650 arm | 6594851918 | 2914482000 | 4192165600 | 5566376046 | 6233666136 hppa | 6447723766 | 3185688176 | 4554324284 | 5977389114 | 5977389114 hurd-i386| 554627760 | 554464016 | 554464016 | 554464016 | 554464016 i386 | 9027667988 | 3693410444 | 5352013018 | 7153730830 | 8206129322 ia64 | 7683523572 | 3714676258 | 5380423374 | 7121518964 | 7121518964 m68k | 6396308550 | 2809338886 | 4069205302 | 5393380388 | 6114386710 mips | 5416612358 | 2851405680 | 3920631098 | 5215452326 | 5215452326 mipsel | 5550145962 | 2819073082 | 3995118416 | 5262682024 | 5262682024 powerpc | 7680418788 | 3336303070 | 4780596742 | 6309202432 | 7112407388 s390 | 6147469798 | 3053291988 | 4427782760 | 5820464436 | 5820464436 sparc| 7331766068 | 3071979288 | 921552 | 5917654266 | 6790963196 any means any of: experimental oldstable old-proposed-updates proposed-updates unstable testing testing-proposed-updates stable stable+proposed-updates: architecture |size --+ all | 2195553250 alpha| 2438601088 arm | 1951980644 hppa | 260648 i386 | 2753622878 ia64 | 2531882184 m68k | 1888659560 mips | 1801959356 mipsel | 1763094946 powerpc | 2196413794 s390 | 1947506370 sparc| 2065059050 testing+testing-proposed-updates: architecture |size --+ all | 3113135590 alpha| 3050200486 arm | 2667813072 hppa | 2850080658 i386 | 3378532922 ia64 | 3394287226 m68k | 2571810596 mips | 2569942598 mipsel | 2531507858 powerpc | 2996108486 s390 | 2713124396 sparc| 2740423638 From the numbers quoted above you can make a reasonable estimation of how much unstable and testing overlap. You can assume testing-proposed-updates is empty (you'll be off only by a few MB). My napkin says 50%, which IMO is hideously bad, but that's me. Drop a factor of 2-3 somewhere if you want to consider source. This data does not come from the filesystem, but from the database used to wrangle the whole mess. Account for 10% wasted space or so for a guess of how much space you actually need for a mirror (adapt to your filesystem of choice -- information which I don't really care about). -- Marcelo
Re: Work-needing packages report for Aug 29, 2003
On Sat, Aug 30, 2003 at 06:57:38PM +0200, Simon Richter wrote: [NEW] 3dwm (#206870), orphaned 5 days ago Description: libzorn development files Reverse Depends: 3dwm-pickclient 3dwm-texclient 3dwm-csgclient libcelsius-dev libpolhem-dev libgarbo-dev libnobel-dev 3dwm-vncclient libsolid-dev 3dwm-clock 3dwm-server libzorn-dev 3dwm-geoclient Hrm, I don't think that description matches the package, i.e. there might be something wrong with the scripts. Could anyone familiar with them please check? It is, as strange as it might seem, correct. Source packages don't have descriptions and Martin obviously hacked up something to write the bug reports automatically (which I find irritating but it's better than the option). The libzorn-dev description was picked up as the description for the source package. -- Marcelo
Re: debian archive disk space requirements.
On Sat, Aug 30, 2003 at 08:25:36PM +0300, Heikki Vatiainen wrote: ftp.fi.debian.org has the whole debian/ on the same partition but a couple of directories, such as debian-cd/, that were previously on the same partition with the mirror root are now mounted from a new location with the --bind option. It's harder within debian/ because you have to hand-pick parts of pool/ to bind-mount... messy. -- 2. That which causes joy or happiness.
Re: Work-needing packages report for Aug 29, 2003
Hi, [NEW] 3dwm (#206870), orphaned 5 days ago Description: libzorn development files Reverse Depends: 3dwm-pickclient 3dwm-texclient 3dwm-csgclient libcelsius-dev libpolhem-dev libgarbo-dev libnobel-dev 3dwm-vncclient libsolid-dev 3dwm-clock 3dwm-server libzorn-dev 3dwm-geoclient Hrm, I don't think that description matches the package, i.e. there might be something wrong with the scripts. Could anyone familiar with them please check? Simon -- GPG Fingerprint: 040E B5F7 84F1 4FBC CEAD ADC6 18A0 CC8D 5706 A4B4 pgpt2KwqFl1oc.pgp Description: PGP signature
Re: GDM in sid does not read /etc/environment anymore
Em Fri, 29 Aug 2003 16:38:16 -0300, Daniel Ruoso [EMAIL PROTECTED] escreveu: I've actually sent him an email but got no answer. I've posted in debian-devel few days ago and nobody complained that GDM could source /etc/environment in the init script. That's an one-line patch (already tagged as patch in bts for more than a year)... I think that if the maintainer doesn't take that, a NMU will be neecessary. I don't think that's right. The Right Thing is adding this: auth required pam_env.so to /etc/pam.d/gdm My /etc/pam.d/gdm is like this after my own fix: [EMAIL PROTECTED] $ cat /etc/pam.d/gdm #%PAM-1.0 # This module parses /etc/environment (the standard for setting # environ vars) and also allows you to use an extended config # file /etc/security/pam_env.conf. # (Replaces the `ENVIRON_FILE' setting from login.defs) auth required pam_env.so @include common-auth @include common-account @include common-session -- [EMAIL PROTECTED]: Gustavo Noronha http://people.debian.org/~kov Debian: http://www.debian.org * http://www.debian-br.org Dúvidas sobre o Debian? Visite o Rau-Tu: http://rautu.cipsga.org.br
Re: debian archive disk space requirements.
On Sat, Aug 30, 2003 at 12:18:50PM +0200, Josip Rodin wrote: We are still waiting for Joey to officially announce the obsolescence of potato on -announce so that it can be moved to archive.debian.org. I've found out today that Joey doesn't feel there should be any more announcements. I've sent an e-mail so I guess ftpmasters just need to find the time to pull out the magic wand, move leftover source packages to pool update anything else that is necessary, and move old potato stuff out. -- 2. That which causes joy or happiness.
[no subject]
To whom it may concern Pls be informed that we are an international company active in the commercial fields of the importation of the 1- ironeries 2- aluminum , copper 3- sugar 4- rice 5- food grains 6- petrochemical items 7- selling and buying of the lands We are interested to work with the investors or the financers or partners or the money lenders in all over the world that they want to cooperate in the partnership with us, in case u are interested in these businesses with us , u are kindly requested to contact with us , pls be advised that the minimum profit that will be guaranteed by our company will be 20% per cent of the total amount of the investment in the year , we will guarantee the whole capital of your self in this profitable business With thanks saeed bradaran The managing director of the beh azin shargh http://www.iranazin.net e-mail: [EMAIL PROTECTED] 00989132583522 meanwhile , pls be informed that , I will never , ever pay any thing before or upfront for the different fees or expenses that will be occurred by the lawyer or the bank transfer , iwill not be responsible for the fees and will never pay anything to u or the lawyer or etc.., frankly in case u are writing this letter to arrange for the payment of some u.s.d. and with writing this letter that u have this amount and try to get some small money like for example 8000 , u.s.d. or more and less , I will not pay even one cent upfront in any form to anybody , incase the business is okay or real and genuine for the investment , of course will not need these tricks and playing , If you will accept my condition . no problem , the a/c no of mine is as follows : CREDIT SUISSE ( HEAD OFFICE ) ZURICH SWIFT CODE : CRESCHZZ80A A/C NO. 903137-44 FOR FURTHER CREDIT TO EDB IN FAVOUR OF RASOUL SHAHPARI A/C NO.. 010092971 SENDER TO RECEIVER INFORMATION PLS TRANSFER UNDER MT 100/103 MSG U ARE KINDLY REQUESTED TO ARRANGE FOR THE TRANSFER AND THEN COME TO IRAN TO MAKE THE INVESTMENTS AND GIVE ME UR A/C TO PAY MONTHLY TO UR A/C BE ASSURED OF ALL OUR SERVICES WITH THE HONESTY (HONESTY IS THE BEST POLICY ) THANKS [EMAIL PROTECTED]
[no subject]
To whom it may concern Pls be informed that we are an international company active in the commercial fields of the importation of the 1- ironeries 2- aluminum , copper 3- sugar 4- rice 5- food grains 6- petrochemical items 7- selling and buying of the lands We are interested to work with the investors or the financers or partners or the money lenders in all over the world that they want to cooperate in the partnership with us, in case u are interested in these businesses with us , u are kindly requested to contact with us , pls be advised that the minimum profit that will be guaranteed by our company will be 20% per cent of the total amount of the investment in the year , we will guarantee the whole capital of your self in this profitable business With thanks saeed bradaran The managing director of the beh azin shargh http://www.iranazin.net e-mail: [EMAIL PROTECTED] 00989132583522 meanwhile , pls be informed that , I will never , ever pay any thing before or upfront for the different fees or expenses that will be occurred by the lawyer or the bank transfer , iwill not be responsible for the fees and will never pay anything to u or the lawyer or etc.., frankly in case u are writing this letter to arrange for the payment of some u.s.d. and with writing this letter that u have this amount and try to get some small money like for example 8000 , u.s.d. or more and less , I will not pay even one cent upfront in any form to anybody , incase the business is okay or real and genuine for the investment , of course will not need these tricks and playing , If you will accept my condition . no problem , the a/c no of mine is as follows : CREDIT SUISSE ( HEAD OFFICE ) ZURICH SWIFT CODE : CRESCHZZ80A A/C NO. 903137-44 FOR FURTHER CREDIT TO EDB IN FAVOUR OF RASOUL SHAHPARI A/C NO.. 010092971 SENDER TO RECEIVER INFORMATION PLS TRANSFER UNDER MT 100/103 MSG U ARE KINDLY REQUESTED TO ARRANGE FOR THE TRANSFER AND THEN COME TO IRAN TO MAKE THE INVESTMENTS AND GIVE ME UR A/C TO PAY MONTHLY TO UR A/C BE ASSURED OF ALL OUR SERVICES WITH THE HONESTY (HONESTY IS THE BEST POLICY ) THANKS [EMAIL PROTECTED]
Re: Accepted kaffe 1:1.1.1-1 (i386 source)
On Fri, Aug 29, 2003 at 04:34:58PM -0500, Adam Heath wrote: On Fri, 29 Aug 2003, Glenn Maynard wrote: If I report segmentation fault in ls, I--as a user of ls, not a developer--couldn't care less about why it was segfaulting or how the bug was fixed; I only care that it's been fixed. If a developer wants to spend their limited time researching how the bug was fixed and summarizing it in a changelog, great, but it's certainly not something I'd expect everyone to do. It's not about summarizing how the bug was fixed. It's about summarizing the bug *itself* in the changelog. I certainly prefer it if the changelog tells how the bug was fixed. This documents the difference between: * New upstream release - Removed the entire subsystem which contained this bug (Closes: #xxx) * New upstream release - Made the foo option create its file with sane permissions (Closes: #xxx) -- - mdz
Re: Accepted kaffe 1:1.1.1-1 (i386 source)
On Sat, Aug 30, 2003 at 08:36:16AM +0200, Andreas Metzler wrote: Peter S Galbraith [EMAIL PROTECTED] wrote: [...] Right. I understood both points. I was wondering about having the bug submitter there. Maybe change the phrasing? I usually don't list him/her, my changelogs are too long already. I do list submitters who send the report by private mail instead of via BTS, because othervise they wouldn't have any public record of their help. I list the submitter when they have provided a patch, so as to provide for attribution, and therefore credit or blame, as appropriate. -- - mdz
Re: Accepted kaffe 1:1.1.1-1 (i386 source)
On Sat, Aug 30, 2003 at 02:39:01PM -0400, Matt Zimmerman wrote: On Sat, Aug 30, 2003 at 08:36:16AM +0200, Andreas Metzler wrote: Peter S Galbraith [EMAIL PROTECTED] wrote: [...] Right. I understood both points. I was wondering about having the bug submitter there. Maybe change the phrasing? I usually don't list him/her, my changelogs are too long already. I do list submitters who send the report by private mail instead of via BTS, because othervise they wouldn't have any public record of their help. I list the submitter when they have provided a patch, so as to provide for attribution, and therefore credit or blame, as appropriate. And also, I suppose, if the submitter did a good job of tracking down the bug and saved me time, and deserved credit for that. -- - mdz
Re: .iso conflict, discussion of resolution
Hi, A quick summary of this bug: Arson, a KDE CD burning application, includes two .desktop files to associate certain files with it: /usr/share/mimelnk/application/x-iso.desktop /usr/share/mimelnk/application/x-cue.desktop This sounds like you may want to use an alternative here, so that the sysadmin can choose which program to associate .iso files with by default. Of course, users must be able to override this, but I think that is given (is it?). Alternatives will have to be supported by any package that brings such a file, but need no support from unrelated packages. Putting the file in question into a base package is bad because it may associate the file with a program that is not installed. Simon -- GPG Fingerprint: 040E B5F7 84F1 4FBC CEAD ADC6 18A0 CC8D 5706 A4B4 pgpvonHOLMhYo.pgp Description: PGP signature
Re: Accepted kaffe 1:1.1.1-1 (i386 source)
On Sat, Aug 30, 2003 at 02:39:38PM -0400, Matt Zimmerman wrote: On Sat, Aug 30, 2003 at 02:39:01PM -0400, Matt Zimmerman wrote: I list the submitter when they have provided a patch, so as to provide for attribution, and therefore credit or blame, as appropriate. And also, I suppose, if the submitter did a good job of tracking down the bug and saved me time, and deserved credit for that. Yup. Both of those scenarios are exactly how I have been using my thanks messages in the XFree86 changelogs for years. -- G. Branden Robinson|Religion is regarded by the common Debian GNU/Linux |people as true, by the wise as [EMAIL PROTECTED] |false, and by the rulers as useful. http://people.debian.org/~branden/ |-- Lucius Annaeus Seneca pgpMvEDC1NHUp.pgp Description: PGP signature
Re: Accepted kaffe 1:1.1.1-1 (i386 source)
On Sat, Aug 30, 2003 at 11:06:20PM +0900, Junichi Uekawa wrote: One big problem with this approach is that the same maintainers who are too lazy to write proper entries for bug-closers in their changelog entries are going to be too lazy to ensure that a bug report has a meaningful summary in the first place. Maintainers who are lazy cannot be fixed, but some may improve, and the load on those who do write proper changelogs may be lightened. I'd not expecting perfect results from here... just some improvements. Less excuse for making sloppy changelogs :P Fair enough. Go for it, then! :) -- G. Branden Robinson| Debian GNU/Linux | If ignorance is bliss, [EMAIL PROTECTED] | is omniscience hell? http://people.debian.org/~branden/ | pgpWfmWh3DSws.pgp Description: PGP signature
overwriting files from modules packages
I am the (new) maintainer of bcm5700-source, a modules package for the broadcom gigabit adapter. The final package, bcm5700-module-${KVERS}, includes a manpage, /usr/share/man/man4/bcm5700.4.gz. I just now ran into the problem that while installing the 2.4.22 image and modules, the bcm5700-modules-2.4.22 package attempted to install that manpage, even though bcm5700-modules-2.4.21 already put it there. This is a special situation, and I am not sure how to handle it. I don't want to create the manpage in the postinst because then it would not be under control of the package management system. I could install a manpage including the version number and simply symlink, but then it may be that i have symlinked to 2.4.21 even though 2.4.22 includes an updated version, which is the one that's relevant if I booted 2.4.22. What to do? I appreciate any advice. -- Please do not CC me when replying to lists; I read them! .''`. martin f. krafft [EMAIL PROTECTED] : :' :proud Debian developer, admin, and user `. `'` `- Debian - when you have better things to do than fixing a system Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver! pgp93jwMlpSzr.pgp Description: PGP signature
Re: debian archive disk space requirements.
On Sat, Aug 30, 2003 at 11:40:34AM +1000, jason andrade wrote: Is there any way to reduce the size of the archive over the next 4-6 weeks ? Drop potato? -- - mdz
Bug#181429: retitle 181429 ITP: grubconf -- Gnoretitle 181429 ITP: grubconf -- Gnome2 based GRUB configuration editor
retitle 181429 ITP: grubconf -- Gnome2 based GRUB configuration editor thanks * Package name : grubconf Version : 0.5 Upstream Author : Joseph Monti [EMAIL PROTECTED], Ryan Scotka [EMAIL PROTECTED] * URL : http://grubconf.sourceforge.net/ * License : GPL ABOUT Grubconf is a Gnome2 based GRUB configuration editor. It provides an easy to use interface allowing effortless modification of OS's and the flexibility to configure the most obscure options. Designed to require minimal user interaction while providing tools for the most adventurous user. Grubconf must be run as ROOT. This is to gain access to the grub configuration file. Notes: I need a sponsor. The package is ready.
Re: .iso conflict, discussion of resolution
On Fri, Aug 29, 2003 at 10:34:39PM -0700, Mike Markley wrote: A quick summary of this bug: Arson, a KDE CD burning application, includes two .desktop files to associate certain files with it: /usr/share/mimelnk/application/x-iso.desktop /usr/share/mimelnk/application/x-cue.desktop And presumably another application also wants to include these files? Is KDE's file association system really so broken that two programs cannot both declare themselves able to handle a certain type of file? -- - mdz
Re: overwriting files from modules packages
On Sat, Aug 30, 2003 at 11:05:40PM +0200, martin f krafft wrote: I am the (new) maintainer of bcm5700-source, a modules package for the broadcom gigabit adapter. The final package, bcm5700-module-${KVERS}, includes a manpage, /usr/share/man/man4/bcm5700.4.gz. I just now ran into the problem that while installing the 2.4.22 image and modules, the bcm5700-modules-2.4.22 package attempted to install that manpage, even though bcm5700-modules-2.4.21 already put it there. This is a special situation, and I am not sure how to handle it. I don't want to create the manpage in the postinst because then it would not be under control of the package management system. I could install a manpage including the version number and simply symlink, but then it may be that i have symlinked to 2.4.21 even though 2.4.22 includes an updated version, which is the one that's relevant if I booted 2.4.22. What to do? I appreciate any advice. Kernel module packages should be treated with the same care as shared library packages, since different versions need to coexist. Anything which could conflict needs to either be versioned in the filesystem, or moved into a separate package. If you want two different versions of documentation, they need to be named differently. Alternatively, you can just split the documentation into a separate package and allow only one version to be installed at once. -- - mdz
Re: Bug#195214: .iso conflict, discussion of resolution
On Sat, Aug 30, 2003 at 08:17:05PM +0200, Simon Richter [EMAIL PROTECTED] wrote: This sounds like you may want to use an alternative here, so that the sysadmin can choose which program to associate .iso files with by default. Of course, users must be able to override this, but I think that is given (is it?). Alternatives will have to be supported by any package that brings such a file, but need no support from unrelated packages. Putting the file in question into a base package is bad because it may associate the file with a program that is not installed. I misspoke about the purpose; these files don't actually associate file types, just describe them. The only reasona arson and k3b both provide them is that nothing else currently does. -- Mike Markley [EMAIL PROTECTED] GPG: 0x3B047084 7FC7 0DC0 EF31 DF83 7313 FE2B 77A8 F36A 3B04 7084
Re: overwriting files from modules packages
also sprach Matt Zimmerman [EMAIL PROTECTED] [2003.08.31.0013 +0200]: If you want two different versions of documentation, they need to be named differently. Alternatively, you can just split the documentation into a separate package and allow only one version to be installed at once. I don't think a single manpage warrants another binary package. So the only real solution is to put the manpage into /usr/share/doc/package/docs ... -- Please do not CC me when replying to lists; I read them! .''`. martin f. krafft [EMAIL PROTECTED] : :' :proud Debian developer, admin, and user `. `'` `- Debian - when you have better things to do than fixing a system Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver! pgpbYIHLfTSCA.pgp Description: PGP signature
Re: Bug#195214: .iso conflict, discussion of resolution
On Sat, Aug 30, 2003 at 02:13:10PM +0200, Stephan Kulow [EMAIL PROTECTED] wrote: Am Saturday 30 August 2003 08:06 schrieb Chris Cheney: Would it be possible to get the two desktop filesi mentioned below merged into kdelibs so that arson and k3b are easily installable at the same time? I can do the commit myself if you approve. Approved. Greetings, Stephan Thank you, guys. I will remove the files from arson. I'm glad we were able to get a resolution here. :) -- Mike Markley [EMAIL PROTECTED] GPG: 0x3B047084 7FC7 0DC0 EF31 DF83 7313 FE2B 77A8 F36A 3B04 7084
Re: debian archive disk space requirements.
On Sun, 30 Aug 2003, Heikki Vatiainen wrote: [I am not on debian-devel but reading the list through Usenet gateway] i didn't realise debian-devel is gatewayed to a newsgroup.. interesting. You may also want to see mount(8) and look for bind from the manual page. Since there is not very much about it, I will just quote it below. From mount(8): [...] ftp.fi.debian.org has the whole debian/ on the same partition but a couple of directories, such as debian-cd/, that were previously on the same partition with the mirror root are now mounted from a new location with the --bind option. /etc/fstab also works with bind option with something like: /newloc/debian-cd /oldloc/debian-cd none bind,noatime,noexec,nodev Using bind should keep all mirroring programs happy since they do not have to get confused when they find a symlink instead of directory. i'm not entirely sure how this helps unless you mean we can use the above to start moving parts of the debian tree to different partitions and then remounting them inside the tree.. this would be a nice temporary solution except that we have a more complicated architecture as we have a back end fileserver where everything is mirrored and front end servers that actually provide the ftp/http/rsync services which read only NFS mount from the back end.. once you start doing loops and binds on the back end it tends to fall over with NFS structures :-/ thanks for the tip though. regards, -jason
Re: configure web proxy via DHCP server
On Sat, Aug 30, 2003 at 10:30:31AM +0200, Javier Fern?ndez-Sanguino Pe?a wrote: All of these, IIRC, provide means to run user-defined scripts for autoconfiguration. Setting up the proxy server might be just a manner of setting up the http_proxy environment variable depending on your location (although some browsers might not use it). No, setting http_proxy wont work unless youo log out and back in again, or at least close all your terminal sessions. It won't work for programs like Mozilla. -- Brian May [EMAIL PROTECTED]
Re: overwriting files from modules packages
On Sun, Aug 31, 2003 at 12:18:26AM +0200, martin f krafft wrote: also sprach Matt Zimmerman [EMAIL PROTECTED] [2003.08.31.0013 +0200]: If you want two different versions of documentation, they need to be named differently. Alternatively, you can just split the documentation into a separate package and allow only one version to be installed at once. I don't think a single manpage warrants another binary package. So the only real solution is to put the manpage into /usr/share/doc/package/docs ... Or name it manpage-version.section. -- - mdz
Re: configure web proxy via DHCP server
On Sat, Aug 30, 2003 at 09:56:38AM -0500, Steve Langasek wrote: On the client side, however, at least dhcp3-client requires recompiling for each option you want to export to the client hook scripts. This was You do? I was kindof hoping that with /etc/dhcp3/dhclient*-hooks.d/, it would be just a matter of adding an extra script that runs... recently done for the netbios options that Samba uses. I know there are many more unexported options that are potentially useful to other packages, including ntp timeserver information; it might be nice to gather a list of them all at once for submission to the dhcp3 maintainers, so they're not constantly recompiling to special-case each attribute. Sounds like a good idea... So we can put the proxy server on the DHCP server, in the form of a reference to a PAC file. We can (with modifications) retrieve the reference to the PAC file on the client. Then what? I think that there are two cases: 1. browsers that don't support PAC files, eg. lynx, links, and w3m probably don't (correct me if I am wrong). 2. browsers that do support PAC files, but need to be configured to use it for each user on the system. -- Brian May [EMAIL PROTECTED]
Re: configure web proxy via DHCP server
On Sat, Aug 30, 2003 at 11:18:25PM +, Brian May wrote: On Sat, Aug 30, 2003 at 09:56:38AM -0500, Steve Langasek wrote: On the client side, however, at least dhcp3-client requires recompiling for each option you want to export to the client hook scripts. This was You do? I was kindof hoping that with /etc/dhcp3/dhclient*-hooks.d/, it would be just a matter of adding an extra script that runs... Ah, I'm sorry, I misremembered -- the actual problem is not the lack of option exporting, it's that recent dhcp clients and servers will negotiate with one another to decide what options will actually be sent (presumably to reduce the payload size); so unless the dhcp3-client is configured to explicitly request such options, they won't be sent by the server. So strictly speaking, this doesn't have to be done with a recompile, but it does require the intervention of the dhcp3 maintainers if you want this support by default (i.e., without an admin having to edit dhclient.conf). recently done for the netbios options that Samba uses. I know there are many more unexported options that are potentially useful to other packages, including ntp timeserver information; it might be nice to gather a list of them all at once for submission to the dhcp3 maintainers, so they're not constantly recompiling to special-case each attribute. Sounds like a good idea... So we can put the proxy server on the DHCP server, in the form of a reference to a PAC file. We can (with modifications) retrieve the reference to the PAC file on the client. Then what? I think that there are two cases: 1. browsers that don't support PAC files, eg. lynx, links, and w3m probably don't (correct me if I am wrong). 2. browsers that do support PAC files, but need to be configured to use it for each user on the system. For 1. above, I imagine most (if not all) browsers that don't support javascript /do/ support global config files. At minimum, therefore, each such browser package could add its own hook script to /etc/dhcp3/dhclient-enter-hooks.d/ that would update the config file on disk. This still leaves the question of how to refresh the configuration of any running browsers, but that's probably a question to be sorted out individually with the respective upstream developers rather than here. -- Steve Langasek postmodern programmer pgp5SZVbioNwN.pgp Description: PGP signature
Re: configure web proxy via DHCP server
On Aug 30, Russell Coker [EMAIL PROTECTED] wrote: The ideal solution however would be an addition to the DHCP standard for a field to specify this information. My solution only works AFTER I have http://www.wpad.com/ -- ciao, | Marco | [1564 scuoJF5IqmYsk]
Re: debian archive disk space requirements.
On Aug 30, Josip Rodin [EMAIL PROTECTED] wrote: It's harder within debian/ because you have to hand-pick parts of pool/ to bind-mount... messy. BTDT. It's even harder because the archive contain hard links between random directories. -- ciao, | Marco | [1565 id6qO1u0SBERA]
Re: debian archive disk space requirements.
El 30 Aug 2003 20:25:36 +0300 Heikki Vatiainen [EMAIL PROTECTED] escribió: Since Linux 2.4.0 it is possible to remount part of the file hierarchy somewhere else. The call is mount --bind olddir newdir with 2.6 we also got mount --move olddir newdir 8)
Re: Bug#207300: tmda: Challenge-response is fundamentally broken
On Sat, Aug 30, 2003 at 04:01:19PM +1000, Russell Coker wrote: That is the idea behind autorespoonders after all, to tell the sender that his mail didn't get through because it didn't meet some required criteria. A SMTP 550 code can convey all the information that is needed for bounces. There are two problems with this. 1. The modular design of SMTP agents like postfix do not allow scanning of messages before the message has been accepted by the MTA at the SMTP session. I think you would have to add hooks into smtpd, but that is going to complicate the code. 2. All checks have to be automatic, and there is no chance of manual review to ensure that the messages where geniune before bouncing it. The list of known solutions follows: (nil) ;-) I have considered to possibility of using something like zorp to act as a proxy SMTP server between the client and the real server, but that would not work for encrypted SMTP communications. ...and Yes, now that I have enabled SSL on my postfix, at least some spammers do use encrypted SMTP sessions. -- Brian May [EMAIL PROTECTED]
Re: overwriting files from modules packages
also sprach Matt Zimmerman [EMAIL PROTECTED] [2003.08.31.0130 +0200]: I don't think a single manpage warrants another binary package. So the only real solution is to put the manpage into /usr/share/doc/package/docs ... Or name it manpage-version.section. Which is what I will do, probably. It's just annoying... but a statement in README.Debian will do... -- Please do not CC me when replying to lists; I read them! .''`. martin f. krafft [EMAIL PROTECTED] : :' :proud Debian developer, admin, and user `. `'` `- Debian - when you have better things to do than fixing a system Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver! pgpuOrEbjBUo7.pgp Description: PGP signature
Re: Bug#207300: tmda: Challenge-response is fundamentally broken
On Sat, 30 Aug 2003 23:49:40 + Brian May [EMAIL PROTECTED] wrote: 1. The modular design of SMTP agents like postfix do not allow scanning of messages before the message has been accepted by the MTA at the SMTP session. I think you would have to add hooks into smtpd, but that is going to complicate the code. Well, that's postfix's problem. After years of hearing how modular is the superior method it is kind of ironic that a simple solution is complicated. 2. All checks have to be automatic, and there is no chance of manual review to ensure that the messages where geniune before bouncing it. Trust me, if SA scores it high enough do you really want to worry about it? Running SA-Exim here and with sensible defaults I've 550'd most spam and, after the Bayesian filtering caught up, most of the recent viruses. I am perfectly capable of of reviewing the messages as I have the option of saving them for review. I define the levels at which things get accepted, rejected or even teergrubed. So far my false positives have been exactly 0 for rejects as I allow a small window for grey area messages to get through for the user to manage. In that window exactly 2 messages were false-positives and they were/barely/ high enough to be marked as spam. This has been so effective I've been working on getting clamav hacked into Spamassassin so that future virus attacks can be avoided without the painful Bayesian ramp-up. -- Steve C. Lamb | I'm your priest, I'm your shrink, I'm your PGP Key: 8B6E99C5 | main connection to the switchboard of souls. ---+- pgpV7r5ETQv8e.pgp Description: PGP signature
Re: Bug#207300: tmda: Challenge-response is fundamentally broken
On Sat, Aug 30, 2003 at 05:26:59PM -0700, Steve Lamb wrote: On Sat, 30 Aug 2003 23:49:40 + Brian May [EMAIL PROTECTED] wrote: 1. The modular design of SMTP agents like postfix do not allow scanning of messages before the message has been accepted by the MTA at the SMTP session. I think you would have to add hooks into smtpd, but that is going to complicate the code. Well, that's postfix's problem. After years of hearing how modular is the superior method it is kind of ironic that a simple solution is complicated. I don't see any reason why postfix couldn't be readily adapted to support hooks to external program checks, if it really doesn't support them already. You can do just about any other kind of check you want to at any point in the receiving process, external program checks shouldn't be all that hard to add. -- Steve Langasek postmodern programmer pgpShfmHfA2tw.pgp Description: PGP signature
Re: .iso conflict, discussion of resolution
On Sat, Aug 30, 2003 at 06:08:17PM -0400, Matt Zimmerman wrote: On Fri, Aug 29, 2003 at 10:34:39PM -0700, Mike Markley wrote: A quick summary of this bug: Arson, a KDE CD burning application, includes two .desktop files to associate certain files with it: /usr/share/mimelnk/application/x-iso.desktop /usr/share/mimelnk/application/x-cue.desktop And presumably another application also wants to include these files? Is KDE's file association system really so broken that two programs cannot both declare themselves able to handle a certain type of file? Nope, mime types are completely independent of them declaring if they support it. That is why the mimetype really belongs in kdelibs itself and not the 3rd party package. Chris pgpbRneFe2HLg.pgp Description: PGP signature
Re: Bug#207300: tmda: Challenge-response is fundamentally broken
on Sat, Aug 30, 2003 at 07:44:56AM -0500, John Hasler ([EMAIL PROTECTED]) wrote: Brian May writes: You saying that any SMTP MTA that sends bounces to unauthenticated E-Mail addresses is also broken? Karsten M. Self writes: At the very least, this is a small subset of the incoming mail. This is about a quarter of my incoming mail. Which? Bounces to spoofed senders, or improperly addressed mail? What prevents you from 550ing this at SMTP connect? Peace. -- Karsten M. Self kmself@ix.netcom.comhttp://kmself.home.netcom.com/ What Part of Gestalt don't you understand? KQED FM: The bright spot on the dial: http://www.kqed.org/fm/ pgpIh22S5cRqH.pgp Description: PGP signature
Re: GDM in sid does not read /etc/environment anymore
Em Sat, 30 Aug 2003 14:31:32 -0300, Daniel Ruoso [EMAIL PROTECTED] escreveu: But this doesn't solve the problem that the login screen appears without locales... I already have pam_env.so in /etc/pam.d/gdm, but this only take effect (maybe I'm wrong) after the user logs in. The greeter will still appear without locales. (and that's the bug reported in bts). Indeed, but the problem is gdm is not reading /etc/environment anymore when the user logs in. So that also needs to be fixed. I agree with trying to find LANG in /etc/environment. []s! -- [EMAIL PROTECTED]: Gustavo Noronha http://people.debian.org/~kov Debian: http://www.debian.org * http://www.debian-br.org Dúvidas sobre o Debian? Visite o Rau-Tu: http://rautu.cipsga.org.br
Re: overwriting files from modules packages
Which is what I will do, probably. It's just annoying... but a statement in README.Debian will do... update-alternatives is usually used in managing multiple manpages. I don't know if it's a overkill, but it's somewhat friendlier than documenting in README.Debian. regards, junichi.
Re: Accepted kaffe 1:1.1.1-1 (i386 source)
Glenn Maynard dijo [Fri, Aug 29, 2003 at 04:03:16PM -0400]: If I report segmentation fault in ls, I--as a user of ls, not a developer--couldn't care less about why it was segfaulting or how the bug was fixed; I only care that it's been fixed. If a developer wants to spend their limited time researching how the bug was fixed and summarizing it in a changelog, great, but it's certainly not something I'd expect everyone to do. (As a user, I'd certainly be rather annoyed at receiving duplicate close reports because someone reopened the bug for frivelous reasons, however. I get enough junk mail already.) Ok, you could not care much about why was it broken and how was it fixed - but then again, we have a lot of different users somehow different from you, and I don't think you would be bothered by receiving this extra information. Some users might find it even useful. Some fellow developers might be interested in knowing how did you do it. Greetings, -- Gunnar Wolf - [EMAIL PROTECTED] - (+52-55)5630-9700 ext. 1366 PGP key 1024D/8BB527AF 2001-10-23 Fingerprint: 0C79 D2D1 2C4E 9CE4 5973 F800 D80E F35A 8BB5 27AF
Re: LWN subscription for Debian developers
Bdale ... I announced a group subscription to lwn.net for Debian Bdale developers, sponsored by HP... Debian may be seen as supporting non-disclosure conditions / protected proprietary information / trade secrets / etc. whatever. Bdale If you are a Debian developer and want full LWN access, go to Bdale lwn.net and create an account for yourself (no money is Bdale required... But the Debian developer cannot disclose the information seen with non Debian developers.
Re: Bug#195214: .iso conflict, discussion of resolution
On Sat, Aug 30, 2003 at 08:06:18PM -0500, Chris Cheney wrote: On Sat, Aug 30, 2003 at 06:08:17PM -0400, Matt Zimmerman wrote: On Fri, Aug 29, 2003 at 10:34:39PM -0700, Mike Markley wrote: A quick summary of this bug: Arson, a KDE CD burning application, includes two .desktop files to associate certain files with it: /usr/share/mimelnk/application/x-iso.desktop /usr/share/mimelnk/application/x-cue.desktop And presumably another application also wants to include these files? Is KDE's file association system really so broken that two programs cannot both declare themselves able to handle a certain type of file? Nope, mime types are completely independent of them declaring if they support it. That is why the mimetype really belongs in kdelibs itself and not the 3rd party package. Ah, so these files are to define a MIME type, and not to associate files (as they were described above). That makes more sense. -- - mdz
Re: Bug#207300: tmda: Challenge-response is fundamentally broken
I wrote: This is about a quarter of my incoming mail. Karsten writes: Which? Bounces to spoofed senders, or improperly addressed mail? Bounces. What prevents you from 550ing this at SMTP connect? The absence of any such connections. I'm on a dialup. -- John Hasler [EMAIL PROTECTED] (John Hasler) Dancing Horse Hill Elmwood, WI
Re: LWN subscription for Debian developers
On Sun, 31 Aug 2003 05:42:06 +0800 Dan Jacobson [EMAIL PROTECTED] wrote: Bdale ... I announced a group subscription to lwn.net for Debian Bdale developers, sponsored by HP... Debian may be seen as supporting non-disclosure conditions / protected proprietary information / trade secrets / etc. whatever. Bdale If you are a Debian developer and want full LWN access, go to Bdale lwn.net and create an account for yourself (no money is Bdale required... But the Debian developer cannot disclose the information seen with non Debian developers. Jealous? :) pgpKuaboT6Ya9.pgp Description: PGP signature
Accepted epplets 0.6.cvs.2001102801-3.1 (i386 source)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sat, 23 Aug 2003 18:10:33 +0200 Source: epplets Binary: libepplet-dev epplets libepplet0 Architecture: source i386 Version: 0.6.cvs.2001102801-3.1 Distribution: unstable Urgency: low Maintainer: Stephen Frost [EMAIL PROTECTED] Changed-By: Roland Mas [EMAIL PROTECTED] Description: epplets- The Epplets for the Enlightenment Window Manager libepplet-dev - Development files for Epplets libepplet0 - The Epplet Shared Libraries Closes: 199584 Changes: epplets (0.6.cvs.2001102801-3.1) unstable; urgency=low . * Non-maintainer upload according to the release manager's plan. * Added missing Build-Depends: to control file, closes: #199584 Files: 2caa04cd9b92faf90b605ce77a672893 710 x11 optional epplets_0.6.cvs.2001102801-3.1.dsc 1f1ef3fbc93a609700493ced4cc2965e 176957 x11 optional epplets_0.6.cvs.2001102801-3.1.diff.gz 471264364e915585494387483af72a5b 727718 x11 optional epplets_0.6.cvs.2001102801-3.1_i386.deb efad6eca03eb2bf3763038366a6ce8b5 32896 libs optional libepplet0_0.6.cvs.2001102801-3.1_i386.deb bcf8d7dc0445334ed28f89a4619d4adb 41806 devel optional libepplet-dev_0.6.cvs.2001102801-3.1_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQE/R5VcDqdWtRRIQ/URAoZuAJ42FObMfbqSAueVxL0Gsxyzncu4EACfZnEE kff3LkI1zh5gY+8YnVltNqI= =pHg2 -END PGP SIGNATURE- Accepted: epplets_0.6.cvs.2001102801-3.1.diff.gz to pool/main/e/epplets/epplets_0.6.cvs.2001102801-3.1.diff.gz epplets_0.6.cvs.2001102801-3.1.dsc to pool/main/e/epplets/epplets_0.6.cvs.2001102801-3.1.dsc epplets_0.6.cvs.2001102801-3.1_i386.deb to pool/main/e/epplets/epplets_0.6.cvs.2001102801-3.1_i386.deb libepplet-dev_0.6.cvs.2001102801-3.1_i386.deb to pool/main/e/epplets/libepplet-dev_0.6.cvs.2001102801-3.1_i386.deb libepplet0_0.6.cvs.2001102801-3.1_i386.deb to pool/main/e/epplets/libepplet0_0.6.cvs.2001102801-3.1_i386.deb -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Accepted libtangram-perl 2.04-3.1 (all source)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 22 Aug 2003 21:22:53 -0400 Source: libtangram-perl Binary: libtangram-perl Architecture: source all Version: 2.04-3.1 Distribution: unstable Urgency: low Maintainer: Stephen Zander [EMAIL PROTECTED] Changed-By: Joey Hess [EMAIL PROTECTED] Description: libtangram-perl - Orthogonal Object Persistence in Relational Databases Closes: 202164 Changes: libtangram-perl (2.04-3.1) unstable; urgency=low . * NMU * Use Scalar::Utils for weakrefs when possible. Dropped suggests of obsolete libweakref-perl package. Closes: #202164 Files: 54fe62cf3fbb30a4eef8dc94753be306 647 interpreters optional libtangram-perl_2.04-3.1.dsc 4e4513617c7a1db383b86d3f448a21d2 3839 interpreters optional libtangram-perl_2.04-3.1.diff.gz 4daaa05b68d038d9762d29c15b406231 167694 interpreters optional libtangram-perl_2.04-3.1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQE/RsJa2tp5zXiKP0wRAov0AJ41n499MUdGMc8P2oGANmXNZBNCJwCfceid Cq4X/OL+qFYYdaQ8xTxfXD0= =EfFw -END PGP SIGNATURE- Accepted: libtangram-perl_2.04-3.1.diff.gz to pool/main/libt/libtangram-perl/libtangram-perl_2.04-3.1.diff.gz libtangram-perl_2.04-3.1.dsc to pool/main/libt/libtangram-perl/libtangram-perl_2.04-3.1.dsc libtangram-perl_2.04-3.1_all.deb to pool/main/libt/libtangram-perl/libtangram-perl_2.04-3.1_all.deb -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Accepted shorewall 1.4.7b1-1 (all source)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Wed, 27 Aug 2003 09:50:33 +0200 Source: shorewall Binary: shorewall shorewall-doc Architecture: source all Version: 1.4.7b1-1 Distribution: unstable Urgency: low Maintainer: [EMAIL PROTECTED] Changed-By: Lorenzo Martignoni [EMAIL PROTECTED] Description: shorewall - Shoreline Firewall (Shorewall) shorewall-doc - Shoreline Firewall (Shorewall) Documentation Closes: 201186 203201 Changes: shorewall (1.4.7b1-1) unstable; urgency=low . * New upstream beta release * the new version works with kernel 2.6.x (closes: #201186) * patched the contrib script wait4ifup in order avoid problem when calling sleep 0.5. If the system uses a different locale the script could fail because in some country ',' is used instead of '.'. The script now sets internally LANG to C (closes: #203201) Files: 41ea622dc2d8558c2e522b993f924428 733 net optional shorewall_1.4.7b1-1.dsc b99def162851a5d9e369814f4760a705 2294132 net optional shorewall_1.4.7b1.orig.tar.gz bcf717568e5de43cd4e9528c78c36bf4 38924 net optional shorewall_1.4.7b1-1.diff.gz 66c1f6eb3a4a250b16f7ec7d26f4c4a8 82996 net optional shorewall_1.4.7b1-1_all.deb 1a0b0a3098f15a8830f59e3b0e48b84f 2235448 doc optional shorewall-doc_1.4.7b1-1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.3 (GNU/Linux) iD8DBQE/T9s/StlRaw+TLJwRAv10AKCyirZdDEkU0T/shMfvKvapL7fRtwCgjlle vcVJZbTfEOXq9b4gYM+5q00= =T4Nb -END PGP SIGNATURE- Accepted: shorewall-doc_1.4.7b1-1_all.deb to pool/main/s/shorewall/shorewall-doc_1.4.7b1-1_all.deb shorewall_1.4.7b1-1.diff.gz to pool/main/s/shorewall/shorewall_1.4.7b1-1.diff.gz shorewall_1.4.7b1-1.dsc to pool/main/s/shorewall/shorewall_1.4.7b1-1.dsc shorewall_1.4.7b1-1_all.deb to pool/main/s/shorewall/shorewall_1.4.7b1-1_all.deb shorewall_1.4.7b1.orig.tar.gz to pool/main/s/shorewall/shorewall_1.4.7b1.orig.tar.gz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Accepted rumba-manifold 1.0.2-2 (i386 source)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Thu, 24 Jul 2003 16:54:27 -0600 Source: rumba-manifold Binary: librumba-dev librumba1 rumba-manifold-demo Architecture: source i386 Version: 1.0.2-2 Distribution: unstable Urgency: low Maintainer: Barak A. Pearlmutter [EMAIL PROTECTED] Changed-By: Barak A. Pearlmutter [EMAIL PROTECTED] Description: librumba-dev - Main library of RUMBA brain imaging system (development files) librumba1 - Main library of RUMBA brain imaging system rumba-manifold-demo - Sample programs that use RUMBA brain imaging main library Closes: 202032 Changes: rumba-manifold (1.0.2-2) unstable; urgency=low . * include patches from Daniel Schepler (closes: #202032) Files: 580cad0a457dee1d75f93338a8e0e15e 653 - optional rumba-manifold_1.0.2-2.dsc 659af23e70468503170fc01ff2027a81 24490 - optional rumba-manifold_1.0.2-2.diff.gz d10da914b5624bc1aaf10c747d3aef01 29660 libdevel optional librumba-dev_1.0.2-2_i386.deb ac317ec1fa6cc9343b550b931928d0e0 174210 libs optional librumba1_1.0.2-2_i386.deb 3d55a98b9930908438985f0d9b5e9a32 180350 science optional rumba-manifold-demo_1.0.2-2_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQE/T98OLz4Gnv7CP7IRAvGKAJ0bT4xzO8ol4bCHkZec8ELQ4G6d7QCdGR8Y TbkdTOnKXu+Ni1S6vWcP5kQ= =jHsk -END PGP SIGNATURE- Accepted: librumba-dev_1.0.2-2_i386.deb to pool/main/r/rumba-manifold/librumba-dev_1.0.2-2_i386.deb librumba1_1.0.2-2_i386.deb to pool/main/r/rumba-manifold/librumba1_1.0.2-2_i386.deb rumba-manifold-demo_1.0.2-2_i386.deb to pool/main/r/rumba-manifold/rumba-manifold-demo_1.0.2-2_i386.deb rumba-manifold_1.0.2-2.diff.gz to pool/main/r/rumba-manifold/rumba-manifold_1.0.2-2.diff.gz rumba-manifold_1.0.2-2.dsc to pool/main/r/rumba-manifold/rumba-manifold_1.0.2-2.dsc -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Accepted rumba-base 1.0.2-3 (i386 source)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 29 Aug 2003 17:06:56 -0600 Source: rumba-base Binary: librumbabase-dev librumbabase1 Architecture: source i386 Version: 1.0.2-3 Distribution: unstable Urgency: low Maintainer: Barak A. Pearlmutter [EMAIL PROTECTED] Changed-By: Barak A. Pearlmutter [EMAIL PROTECTED] Description: librumbabase-dev - Base library of RUMBA brain imaging system (development files) librumbabase1 - Base library of RUMBA brain imaging system Changes: rumba-base (1.0.2-3) unstable; urgency=low . * rev standard Files: 22ae81796705a2e27129ba26338aa27e 599 - optional rumba-base_1.0.2-3.dsc 9a21dfd1d66fba217f9f6c61286e14ee 32437 - optional rumba-base_1.0.2-3.diff.gz 079c46eb4ad3ec052473bf3a49239fd5 94260 libdevel optional librumbabase-dev_1.0.2-3_i386.deb e46ca42801cbf0eb68e819b7218686b7 68018 libs optional librumbabase1_1.0.2-3_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQE/T91XLz4Gnv7CP7IRAmTNAKCaU9Jucf9QHATAUTVzbzS3dHsiIgCglfBO 57BTIqbYt6N6+zRVgTDYKfw= =W7Cl -END PGP SIGNATURE- Accepted: librumbabase-dev_1.0.2-3_i386.deb to pool/main/r/rumba-base/librumbabase-dev_1.0.2-3_i386.deb librumbabase1_1.0.2-3_i386.deb to pool/main/r/rumba-base/librumbabase1_1.0.2-3_i386.deb rumba-base_1.0.2-3.diff.gz to pool/main/r/rumba-base/rumba-base_1.0.2-3.diff.gz rumba-base_1.0.2-3.dsc to pool/main/r/rumba-base/rumba-base_1.0.2-3.dsc -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Accepted nessus-core 2.0.7-2 (i386 source all)
-BEGIN PGP SIGNED MESSAGE- Format: 1.7 Date: Sat, 30 Aug 2003 01:29:19 +0200 Source: nessus-core Binary: nessus nessusd nessus-dev Architecture: source i386 all Version: 2.0.7-2 Distribution: unstable Urgency: low Maintainer: Josip Rodin [EMAIL PROTECTED] Changed-By: Javier Fernandez-Sanguino Pen~a [EMAIL PROTECTED] Description: nessus - Remote network security auditor, the client nessus-dev - Nessus development header files nessusd- Remote network security auditor, the server Closes: 200947 204872 Changes: nessus-core (2.0.7-2) unstable; urgency=low . * Tightened Build-Depends, now depends on libnessus-dev = 2.0.7 (Closes: #200947) * Provided nessusd.con now uses 'max_checks' instead of 'max_threads' (Closes: #204872) Files: 6c63531931bc7e399a9bc676c34ab111 932 admin optional nessus-core_2.0.7-2.dsc e389b9439b624855c40f9ec3e2e20e79 36512 admin optional nessus-core_2.0.7-2.diff.gz 0dae4c030d48a135b9bd30a844e3468e 30620 devel optional nessus-dev_2.0.7-2_all.deb 0c67c3ae0296d286d3405644a4f824a5 250178 admin optional nessus_2.0.7-2_i386.deb ec441e973f576a7756312c55147c2014 150258 admin optional nessusd_2.0.7-2_i386.deb -BEGIN PGP SIGNATURE- Version: 2.6.3ia Charset: noconv iQCVAwUBP0/mSftEPvakNq0lAQFmLAP+PZ7tBcyUzsjagkXzcxPbiKAURPQF6E/q amkiCBnk48p5XwS2aDQw4uHafFfU3cSqeaCJbrga8i8esvJ8r6DKJSUkc7XECo1N DojoZHaC5y/dOwMw220hfGNR4bCHOP7YCME2TP3qudRV3fet7KCbMicwtXm2l+lJ n3F66aTgiJQ= =dWCb -END PGP SIGNATURE- Accepted: nessus-core_2.0.7-2.diff.gz to pool/main/n/nessus-core/nessus-core_2.0.7-2.diff.gz nessus-core_2.0.7-2.dsc to pool/main/n/nessus-core/nessus-core_2.0.7-2.dsc nessus-dev_2.0.7-2_all.deb to pool/main/n/nessus-core/nessus-dev_2.0.7-2_all.deb nessus_2.0.7-2_i386.deb to pool/main/n/nessus-core/nessus_2.0.7-2_i386.deb nessusd_2.0.7-2_i386.deb to pool/main/n/nessus-core/nessusd_2.0.7-2_i386.deb -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Accepted gtkmm2.0 2.2.7-1 (i386 source all)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 25 Aug 2003 10:15:19 -0700 Source: gtkmm2.0 Binary: libgtkmm2.0-1c102 libgtkmm2.0-doc libgtkmm2.0-dev Architecture: source i386 all Version: 2.2.7-1 Distribution: unstable Urgency: low Maintainer: Bradley Bell [EMAIL PROTECTED] Changed-By: Bradley Bell [EMAIL PROTECTED] Description: libgtkmm2.0-1c102 - C++ wrappers for GTK+ 2.0 (shared libraries) libgtkmm2.0-dev - C++ wrappers for GTK+ 2.0 (development files) libgtkmm2.0-doc - C++ wrappers for GTK+ 2.0 (documentation) Changes: gtkmm2.0 (2.2.7-1) unstable; urgency=low . * New upstream release Files: d52a83e2434801ce2a2bd7d8e89bd1f7 727 libs optional gtkmm2.0_2.2.7-1.dsc 47c67dfdc801ef2d4c95408dcf7ecd81 5373968 libs optional gtkmm2.0_2.2.7.orig.tar.gz 1b9114577108ec694630b0cea32b1604 60982 libs optional gtkmm2.0_2.2.7-1.diff.gz b767ad8278a9dd7d7838f5b4a380bbf0 3153642 doc optional libgtkmm2.0-doc_2.2.7-1_all.deb 9bab37579e5270ba1682363defb6aaa3 1588636 libdevel optional libgtkmm2.0-dev_2.2.7-1_i386.deb 9c972b1c6e72b4d4c31874980db8c24c 928992 libs optional libgtkmm2.0-1c102_2.2.7-1_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQE/SlWwteAcXeZ40aERAttiAJ9f7/aeh47rbEmhzW5oTyZW6fiAbQCg3RlB Am43W/1HktgMhMvjJ6nodgs= =efTv -END PGP SIGNATURE- Accepted: gtkmm2.0_2.2.7-1.diff.gz to pool/main/g/gtkmm2.0/gtkmm2.0_2.2.7-1.diff.gz gtkmm2.0_2.2.7-1.dsc to pool/main/g/gtkmm2.0/gtkmm2.0_2.2.7-1.dsc gtkmm2.0_2.2.7.orig.tar.gz to pool/main/g/gtkmm2.0/gtkmm2.0_2.2.7.orig.tar.gz libgtkmm2.0-1c102_2.2.7-1_i386.deb to pool/main/g/gtkmm2.0/libgtkmm2.0-1c102_2.2.7-1_i386.deb libgtkmm2.0-dev_2.2.7-1_i386.deb to pool/main/g/gtkmm2.0/libgtkmm2.0-dev_2.2.7-1_i386.deb libgtkmm2.0-doc_2.2.7-1_all.deb to pool/main/g/gtkmm2.0/libgtkmm2.0-doc_2.2.7-1_all.deb -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Accepted libglademm2.0 2.1.0-1 (i386 source)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 29 Aug 2003 16:36:47 -0700 Source: libglademm2.0 Binary: libglademm2.0-dev libglademm2.0-1c102 Architecture: source i386 Version: 2.1.0-1 Distribution: unstable Urgency: low Maintainer: Bradley Bell [EMAIL PROTECTED] Changed-By: Bradley Bell [EMAIL PROTECTED] Description: libglademm2.0-1c102 - C++ wrappers for libglade2 (shared library) libglademm2.0-dev - C++ wrappers for libglade2 (development files) Changes: libglademm2.0 (2.1.0-1) unstable; urgency=low . * New upstream release Files: cb84f2592646df291437f8f85dd6df17 694 libs optional libglademm2.0_2.1.0-1.dsc bc63040ccc7317fe508c25b96d4f8f37 333567 libs optional libglademm2.0_2.1.0.orig.tar.gz 193e95470db7fa2675ac08f796439bb4 21345 libs optional libglademm2.0_2.1.0-1.diff.gz c81f2c83aa2bdc3e8fe2e72bd8805d3a 1295076 devel optional libglademm2.0-dev_2.1.0-1_i386.deb 6cc120fd95b68ee4dc648b0a73b5360c 18834 libs optional libglademm2.0-1c102_2.1.0-1_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQE/T+YxteAcXeZ40aERAvr1AKCIx4/11BtyttShoqaS+OXtXsBwzgCeOnbV LiZLgn7Bf8frF0MaAR1vT1Y= =BnfV -END PGP SIGNATURE- Accepted: libglademm2.0-1c102_2.1.0-1_i386.deb to pool/main/libg/libglademm2.0/libglademm2.0-1c102_2.1.0-1_i386.deb libglademm2.0-dev_2.1.0-1_i386.deb to pool/main/libg/libglademm2.0/libglademm2.0-dev_2.1.0-1_i386.deb libglademm2.0_2.1.0-1.diff.gz to pool/main/libg/libglademm2.0/libglademm2.0_2.1.0-1.diff.gz libglademm2.0_2.1.0-1.dsc to pool/main/libg/libglademm2.0/libglademm2.0_2.1.0-1.dsc libglademm2.0_2.1.0.orig.tar.gz to pool/main/libg/libglademm2.0/libglademm2.0_2.1.0.orig.tar.gz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Accepted nessus-plugins 2.0.7-2 (i386 source)
-BEGIN PGP SIGNED MESSAGE- Format: 1.7 Date: Sat, 30 Aug 2003 01:43:09 +0200 Source: nessus-plugins Binary: nessus-plugins Architecture: source i386 Version: 2.0.7-2 Distribution: unstable Urgency: low Maintainer: Josip Rodin [EMAIL PROTECTED] Changed-By: Javier Fernandez-Sanguino Pen~a [EMAIL PROTECTED] Description: nessus-plugins - Nessus plugins Closes: 201591 204830 Changes: nessus-plugins (2.0.7-2) unstable; urgency=low . * Localstatedir is now defined as /var/lib/ instead of /var/lib/nessus/, which makes nessus-update-plugins work correctly now (Closes: #204830) * Substituted buggy nmap-wrapper with the 1.101 version in the CVS which now compiles fine (and also provides support for nmap 3.0) (Closes: #201591) Files: 0a2ad46a4e1134baccb9ee93d3fab38c 860 admin optional nessus-plugins_2.0.7-2.dsc 55658aa47d3fafbc684f64de899a6120 44987 admin optional nessus-plugins_2.0.7-2.diff.gz bb0bbee63b82a3c9460ca5b37eac2596 1270144 admin optional nessus-plugins_2.0.7-2_i386.deb -BEGIN PGP SIGNATURE- Version: 2.6.3ia Charset: noconv iQCVAwUBP0/rCPtEPvakNq0lAQEphwP/cFhaHQi8YYzN/CCwduP85tJF+g7OmcSL 9SD7jAcZBtgsYsGp8Orxw8vJa9EuKXMgXdzWGiWompzNuKUuMHdrccFMmo0qOets pQBm5JMj84x9BZWQBoDfEHYO6kRHT00iyNz/GYxym6ps2iaKyvVtS8XK67OJsD5p 4jXpy69z82c= =UpSm -END PGP SIGNATURE- Accepted: nessus-plugins_2.0.7-2.diff.gz to pool/main/n/nessus-plugins/nessus-plugins_2.0.7-2.diff.gz nessus-plugins_2.0.7-2.dsc to pool/main/n/nessus-plugins/nessus-plugins_2.0.7-2.dsc nessus-plugins_2.0.7-2_i386.deb to pool/main/n/nessus-plugins/nessus-plugins_2.0.7-2_i386.deb -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Accepted tin 1:1.7.1+20030828-1 (i386 source)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sat, 30 Aug 2003 01:16:48 +0200 Source: tin Binary: tin Architecture: source i386 Version: 1:1.7.1+20030828-1 Distribution: unstable Urgency: medium Maintainer: Marco d'Itri [EMAIL PROTECTED] Changed-By: Marco d'Itri [EMAIL PROTECTED] Description: tin- A full-screen easy to use Usenet newsreader Closes: 188052 200524 205447 Changes: tin (1:1.7.1+20030828-1) unstable; urgency=medium . * New upstream snapshot. (Closes: #188052) * Added support for /etc/news/organization. (Closes: #205447) * Fixed memory deallocation error at exit time on powerpc. (Closes: #200524) * Added libcanlock version 2a. Files: 151e84ca0b890a13970c4f42f31b25e2 609 news optional tin_1.7.1+20030828-1.dsc c685200f78be34cc3dab8e0be088fc62 1564397 news optional tin_1.7.1+20030828.orig.tar.gz e97badbec7adb312fedd2d86cc01e4e3 16936 news optional tin_1.7.1+20030828-1.diff.gz 315c7d8a20f2fe16660fa40be1dc86c0 461714 news optional tin_1.7.1+20030828-1_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQE/T+mpFGfw2OHuP7ERArvtAJ94iYjM5Jh4oca+ffIDyCobo1uuKACfYPaQ weZCOVCRnKRh+dfsaV2AMmk= =869m -END PGP SIGNATURE- Accepted: tin_1.7.1+20030828-1.diff.gz to pool/main/t/tin/tin_1.7.1+20030828-1.diff.gz tin_1.7.1+20030828-1.dsc to pool/main/t/tin/tin_1.7.1+20030828-1.dsc tin_1.7.1+20030828-1_i386.deb to pool/main/t/tin/tin_1.7.1+20030828-1_i386.deb tin_1.7.1+20030828.orig.tar.gz to pool/main/t/tin/tin_1.7.1+20030828.orig.tar.gz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Accepted libnasl 2.0.7-2 (i386 source)
-BEGIN PGP SIGNED MESSAGE- Format: 1.7 Date: Sat, 30 Aug 2003 02:15:32 +0200 Source: libnasl Binary: libnasl2 libnasl-dev Architecture: source i386 Version: 2.0.7-2 Distribution: unstable Urgency: low Maintainer: Josip Rodin [EMAIL PROTECTED] Changed-By: Javier Fernandez-Sanguino Pen~a [EMAIL PROTECTED] Description: libnasl-dev - Nessus Attack Scripting Language, static library and headers libnasl2 - Nessus Attack Scripting Language, shared library Closes: 200946 Changes: libnasl (2.0.7-2) unstable; urgency=low . * Tightened Build-Depends by making it depend on version 2.0.7 or above (Closes: #200946) Files: c1cbbb8e891358723c784c7b770c9f7f 849 libs optional libnasl_2.0.7-2.dsc 20c58a6533777fc85a401b54106c13e4 52761 libs optional libnasl_2.0.7-2.diff.gz 75722c68b2a76ab248a9113446af2538 72122 libs optional libnasl2_2.0.7-2_i386.deb 190c79a7df0302a9fe80d7b74a6de563 309306 libdevel optional libnasl-dev_2.0.7-2_i386.deb -BEGIN PGP SIGNATURE- Version: 2.6.3ia Charset: noconv iQCVAwUBP0/u//tEPvakNq0lAQFr8wP+Pr7u+27pAqaNRblXtWmo3N1ZhxTEYGXV lO6swBk6xFElFNaPdGe9RWB3Mnt1hFjjl1c2L2FrrzOd25dMnBawgpbIAXaB37SA Qt9fXxT1KH5UWlM1du+NvW1hgCBoLYyN0hD9P5nYKntgN/f/N6cb4FSyLNIMPyqm zVGY74UCW3o= =MrBB -END PGP SIGNATURE- Accepted: libnasl-dev_2.0.7-2_i386.deb to pool/main/libn/libnasl/libnasl-dev_2.0.7-2_i386.deb libnasl2_2.0.7-2_i386.deb to pool/main/libn/libnasl/libnasl2_2.0.7-2_i386.deb libnasl_2.0.7-2.diff.gz to pool/main/libn/libnasl/libnasl_2.0.7-2.diff.gz libnasl_2.0.7-2.dsc to pool/main/libn/libnasl/libnasl_2.0.7-2.dsc -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Accepted semi 1.14.5+20030813-2 (all source)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Wed, 27 Aug 2003 07:11:11 +0900 Source: semi Binary: semi Architecture: source all Version: 1.14.5+20030813-2 Distribution: unstable Urgency: low Maintainer: Tatsuya Kinoshita [EMAIL PROTECTED] Changed-By: Tatsuya Kinoshita [EMAIL PROTECTED] Description: semi - Library to provide MIME feature for Emacsen Changes: semi (1.14.5+20030813-2) unstable; urgency=low . * sponsored by OHASHI Akira [EMAIL PROTECTED] * pgg-gpg.el (pgg-gpg-process-region): Set environment variables LANGUAGE, LC_ALL, and LANG to C to prevent non-ascii problem. (patch from [emacs-mime-ja:01459] on 2003-08-26) * debian/control (Standards-Version): 3.6.0 - 3.6.1. Files: b8ae64dc52bb92c09e353ac80f06308f 600 mail optional semi_1.14.5+20030813-2.dsc 6e909c5ec9d575cb5631e30b79ab7c67 9530 mail optional semi_1.14.5+20030813-2.diff.gz 505d1a4c60312ea47775e8f5d3e2eea8 175880 mail optional semi_1.14.5+20030813-2_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQE/T+0k+pahSABNprQRAk+SAKCFm3tjtTJOzAIth06ene+/ShfdqwCeIBb9 OVaJ3H8vqKw90XvY56S0he8= =ZuXO -END PGP SIGNATURE- Accepted: semi_1.14.5+20030813-2.diff.gz to pool/main/s/semi/semi_1.14.5+20030813-2.diff.gz semi_1.14.5+20030813-2.dsc to pool/main/s/semi/semi_1.14.5+20030813-2.dsc semi_1.14.5+20030813-2_all.deb to pool/main/s/semi/semi_1.14.5+20030813-2_all.deb -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Accepted librsvg2 2.2.5-1.2 (i386 source)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sat, 30 Aug 2003 02:25:24 +0200 Source: librsvg2 Binary: librsvg2-2 librsvg2-common librsvg2-dev Architecture: source i386 Version: 2.2.5-1.2 Distribution: unstable Urgency: low Maintainer: Takuo KITAME [EMAIL PROTECTED] Changed-By: Sebastien Bacher [EMAIL PROTECTED] Description: librsvg2-2 - SAX-based renderer library for SVG files. (for GNOME2) librsvg2-common - SAX-based renderer library for SVG files. (for GNOME2) librsvg2-dev - SAX-based renderer library for SVG files.(development files) Closes: 207785 Changes: librsvg2 (2.2.5-1.2) unstable; urgency=low . * Changed section to libdevel to fix override disparity. * Added libgsf-1-dev to Build-Depends (Closes: #207785). Files: f2a9cc7c70bccaaedd10600de80a41a5 722 libdevel optional librsvg2_2.2.5-1.2.dsc 3be93ab0a0c3388ddbce539a549ae9cb 118202 libdevel optional librsvg2_2.2.5-1.2.diff.gz 576b44042f78b9c3f92ad3efa9a1044b 54744 devel optional librsvg2-dev_2.2.5-1.2_i386.deb 7b84026fc6462f74f217670cec1b7b1a 50430 libs optional librsvg2-2_2.2.5-1.2_i386.deb 203dc742d4438ac1c7d0a2d4829e4387 33888 libs optional librsvg2-common_2.2.5-1.2_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.3 (GNU/Linux) iD8DBQE/T/BjQxo87aLX0pIRAiq+AKCNZuHdvxQoBaq8u4GkimPG0uSKFQCeKq2n 91TqAFWXcRGlsvbiTxR/vSw= =dtjr -END PGP SIGNATURE- Accepted: librsvg2-2_2.2.5-1.2_i386.deb to pool/main/libr/librsvg2/librsvg2-2_2.2.5-1.2_i386.deb librsvg2-common_2.2.5-1.2_i386.deb to pool/main/libr/librsvg2/librsvg2-common_2.2.5-1.2_i386.deb librsvg2-dev_2.2.5-1.2_i386.deb to pool/main/libr/librsvg2/librsvg2-dev_2.2.5-1.2_i386.deb librsvg2_2.2.5-1.2.diff.gz to pool/main/libr/librsvg2/librsvg2_2.2.5-1.2.diff.gz librsvg2_2.2.5-1.2.dsc to pool/main/libr/librsvg2/librsvg2_2.2.5-1.2.dsc -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Accepted libgnomecanvasmm2.0 2.0.1-1 (i386 source)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 29 Aug 2003 16:53:57 -0700 Source: libgnomecanvasmm2.0 Binary: libgnomecanvasmm2.0-1c102 libgnomecanvasmm2.0-dev Architecture: source i386 Version: 2.0.1-1 Distribution: unstable Urgency: low Maintainer: Bradley Bell [EMAIL PROTECTED] Changed-By: Bradley Bell [EMAIL PROTECTED] Description: libgnomecanvasmm2.0-1c102 - C++ wrappers for libgnomecanvas2 (shared library) libgnomecanvasmm2.0-dev - C++ wrappers for libgnomecanvas2 (development files) Changes: libgnomecanvasmm2.0 (2.0.1-1) unstable; urgency=low . * New upstream release Files: b4dc92040726dc7ce211ad2e8d6a1046 730 libs optional libgnomecanvasmm2.0_2.0.1-1.dsc bf05e2d85c0e10aa29dc6d451a52b3bf 421895 libs optional libgnomecanvasmm2.0_2.0.1.orig.tar.gz 116aeb36db9a637afa73a6f059e5ad6d 21380 libs optional libgnomecanvasmm2.0_2.0.1-1.diff.gz 5dfc3bf8245b7948b78273ab444afefe 322908 libdevel optional libgnomecanvasmm2.0-dev_2.0.1-1_i386.deb aabe5e5d02e8aaecc4566865b11add8f 76876 libs optional libgnomecanvasmm2.0-1c102_2.0.1-1_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQE/T/iRteAcXeZ40aERAmwrAKDMnGofsPgX1y2CjXqiUyDAXUnlwwCfabEz r39upHZq6lBYqdN5VgghvIU= =HJSh -END PGP SIGNATURE- Accepted: libgnomecanvasmm2.0-1c102_2.0.1-1_i386.deb to pool/main/libg/libgnomecanvasmm2.0/libgnomecanvasmm2.0-1c102_2.0.1-1_i386.deb libgnomecanvasmm2.0-dev_2.0.1-1_i386.deb to pool/main/libg/libgnomecanvasmm2.0/libgnomecanvasmm2.0-dev_2.0.1-1_i386.deb libgnomecanvasmm2.0_2.0.1-1.diff.gz to pool/main/libg/libgnomecanvasmm2.0/libgnomecanvasmm2.0_2.0.1-1.diff.gz libgnomecanvasmm2.0_2.0.1-1.dsc to pool/main/libg/libgnomecanvasmm2.0/libgnomecanvasmm2.0_2.0.1-1.dsc libgnomecanvasmm2.0_2.0.1.orig.tar.gz to pool/main/libg/libgnomecanvasmm2.0/libgnomecanvasmm2.0_2.0.1.orig.tar.gz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Accepted parted 1.6.5-3 (i386 source all)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sat, 30 Aug 2003 10:44:52 +1000 Source: parted Binary: parted-bf libparted1.6-i18n libparted1.6-dbg parted-udeb parted-doc libparted1.6-0 libparted1.6-dev libparted1.6-udeb parted Architecture: source i386 all Version: 1.6.5-3 Distribution: unstable Urgency: low Maintainer: Timshel Knoll [EMAIL PROTECTED] Changed-By: Timshel Knoll [EMAIL PROTECTED] Description: libparted1.6-0 - The GNU Parted disk partitioning shared library libparted1.6-dbg - The GNU Parted disk partitioning library debug development files libparted1.6-dev - The GNU Parted disk partitioning library development files libparted1.6-i18n - The GNU Parted disk partitioning library i18n support libparted1.6-udeb - The GNU Parted disk partitioning shared library (udeb) parted - The GNU Parted disk partition resizing program parted-bf - The GNU Parted disk partition resizing program, small version parted-doc - The GNU Parted disk partition resizing program documentation parted-udeb - The GNU Parted disk partition resizing program (udeb) Closes: 191523 195318 200337 207634 Changes: parted (1.6.5-3) unstable; urgency=low . * Policy 3.5.9, Made udebs Priority: extra * Changed descriptions to add that parted can remove all listed filesystems (closes: #191523) * Applied missing type suffix compile fix patch for gcc-3.3 and hurd, thanks to Ognyan Kulev and Sven Luther (closes: #195318, #200337) * m68k padding fix patch patch from Sven Luther (closes: #207634) Files: c3d6f7aeec63cd5a16b8e40f93c9fe58 819 admin optional parted_1.6.5-3.dsc bcc0a618598ec4b5f1fbaa400eb991b8 33052 admin optional parted_1.6.5-3.diff.gz 22324db69d63beb42d187b6e0001e253 63520 admin optional parted_1.6.5-3_i386.deb d61576ff49250d0f3983d8197928374e 151996 libs optional libparted1.6-0_1.6.5-3_i386.deb bc79b117f7790901b14f247a3f918e1c 188136 libdevel optional libparted1.6-dev_1.6.5-3_i386.deb 42b475f0e057529a90849fff4d2c078b 19654 debian-installer extra parted-udeb_1.6.5-3_i386.udeb e51ff2559cdf5df07f8a523aa20be705 108990 debian-installer extra libparted1.6-udeb_1.6.5-3_i386.udeb 8983de167fd5b3958db2989ce8b7a515 54600 admin extra parted-bf_1.6.5-3_i386.deb 0e277fb23d340d083cfa85cab0f917cc 829770 libdevel extra libparted1.6-dbg_1.6.5-3_i386.deb c0dc8dcacd437cda738ac54f6357bcfb 209096 libs optional libparted1.6-i18n_1.6.5-3_all.deb 2f2f88c549bcb1d88440393159a9e49c 124498 doc optional parted-doc_1.6.5-3_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.3 (GNU/Linux) iD8DBQE/T/jZXfqTkd4+iqcRAoAnAJ4gIMk4/8Rzr51hA0ir3CDEdGQCCACdGpNm 2rVITbm0wPJ7eO6OrYjhWPM= =41KW -END PGP SIGNATURE- Accepted: libparted1.6-0_1.6.5-3_i386.deb to pool/main/p/parted/libparted1.6-0_1.6.5-3_i386.deb libparted1.6-dbg_1.6.5-3_i386.deb to pool/main/p/parted/libparted1.6-dbg_1.6.5-3_i386.deb libparted1.6-dev_1.6.5-3_i386.deb to pool/main/p/parted/libparted1.6-dev_1.6.5-3_i386.deb libparted1.6-i18n_1.6.5-3_all.deb to pool/main/p/parted/libparted1.6-i18n_1.6.5-3_all.deb libparted1.6-udeb_1.6.5-3_i386.udeb to pool/main/p/parted/libparted1.6-udeb_1.6.5-3_i386.udeb parted-bf_1.6.5-3_i386.deb to pool/main/p/parted/parted-bf_1.6.5-3_i386.deb parted-doc_1.6.5-3_all.deb to pool/main/p/parted/parted-doc_1.6.5-3_all.deb parted-udeb_1.6.5-3_i386.udeb to pool/main/p/parted/parted-udeb_1.6.5-3_i386.udeb parted_1.6.5-3.diff.gz to pool/main/p/parted/parted_1.6.5-3.diff.gz parted_1.6.5-3.dsc to pool/main/p/parted/parted_1.6.5-3.dsc parted_1.6.5-3_i386.deb to pool/main/p/parted/parted_1.6.5-3_i386.deb -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Accepted spamass-milter 0.2.0-5 (i386 source)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 29 Aug 2003 18:00:05 -0700 Source: spamass-milter Binary: spamass-milter Architecture: source i386 Version: 0.2.0-5 Distribution: unstable Urgency: low Maintainer: Don Armstrong [EMAIL PROTECTED] Changed-By: Don Armstrong [EMAIL PROTECTED] Description: spamass-milter - sendmail milter for filtering mail through spamassassin Closes: 204139 204301 Changes: spamass-milter (0.2.0-5) unstable; urgency=low . * Changed recommends: spamd to spamassassin (closes: #204139) * Fix typo in init script (oknod should be oknodo) (closes: #204301) * Add debugging howto section to README.Debian * Uploaded by Stephen Gran [EMAIL PROTECTED] Files: cb533b05a0f6284eb7d8bf15fb1c8192 623 mail extra spamass-milter_0.2.0-5.dsc 0007222fd71b6f39d127c1e009fe455c 17008 mail extra spamass-milter_0.2.0-5.diff.gz 5cd32db6bc3f96e1f9c15eedf9a205e0 48326 mail extra spamass-milter_0.2.0-5_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.3 (GNU/Linux) iD8DBQE/T/ymSYIMHOpZA44RAgZqAJ90/vgGPtfYmf8TiTS/kGXyi5/qpwCgrqwd rMHD/tKcm/eEp4/6EA5kyvs= =3a0o -END PGP SIGNATURE- Accepted: spamass-milter_0.2.0-5.diff.gz to pool/main/s/spamass-milter/spamass-milter_0.2.0-5.diff.gz spamass-milter_0.2.0-5.dsc to pool/main/s/spamass-milter/spamass-milter_0.2.0-5.dsc spamass-milter_0.2.0-5_i386.deb to pool/main/s/spamass-milter/spamass-milter_0.2.0-5_i386.deb -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]