Release-critical Bugreport for August 29, 2003

2003-08-30 Thread BugScan reporter
Bug stamp-out list for Aug 29 06:00 (CST)

Total number of release-critical bugs: 746
Number that will disappear after removing packages marked [REMOVE]: 15
Number that have a patch: 112
Number that have a fix prepared and waiting to upload: 37
Number that are being ignored: 18

Explanation for bug tags:

   P  pending
   +  patch
   H  help
   M  moreinfo
   R  unreproducible
   S  security
   U  upstream

Some bugs have an additional set of tags indicating they only apply
to a particular release: O for oldstable (potato), S for stable (woody),
T for testing (sarge) or U for unstable (sid).

--

Package: abiword (debian/main)
Maintainer: Masayuki Hatta [EMAIL PROTECTED]
  207682 [] abiword_1.99.5+cvs.2003.08.28-1(unstable/ia64): FTBFS: 
reinterpret_cast from `const void*' to `UT_uint32' loses precision

Package: aboot (debian/main)
Maintainer: Gregory W. Johnson [EMAIL PROTECTED]
  205864 [ +  ] aboot: FTBFS: undefined reference to `puts'

Package: adbbs (debian/main)
Maintainer: Kai Henningsen [EMAIL PROTECTED]
  190117 [ +  ] adbbs: Default Configuration Uses pine  pico

Package: aime (debian/main)
Maintainer: Ed Boraas [EMAIL PROTECTED]
  172566 [] aime: fills up /var diskspace until it is overflowing

Package: alcovebook-sgml (debian/main)
Maintainer: Yann Dirson [EMAIL PROTECTED]
  205630 [ +  ] alcovebook-sgml: Fails to install

Package: alsaplayer (debian/main)
Maintainer: Ivo Timmermans [EMAIL PROTECTED]
  200956 [  H R   ] alsaplayer doesn't build on s390

Package: amavis-ng (debian/main)
Maintainer: Hilko Bengen [EMAIL PROTECTED]
  206223 [ +  ] amavis-ng: cannot be installed
  206625 [ +  ] amavis-ng: the FSAV.pm module improperly handles the result 
code of the virus scanner
  207515 [   M] amavis-ng: Emails are lost when clamd is not running 

Package: amavisd-new-milter (debian/main)
Maintainer: Brian May [EMAIL PROTECTED]
  203545 [] amavisd-new-milter: /usr/sbin/amavis-milter always fails

Package: amaya (debian/main)
Maintainer: Steve Dunham [EMAIL PROTECTED]
  207173 [ +  ] amaya_8.1a-1(unstable/ia64): FTBFS: structure has no member 
named `negative'

Package: animals (debian/main)
Maintainer: Jim Lynch [EMAIL PROTECTED]
  195404 [] animals: FTBFS with g++-3.3: strstream.h is gone

Package: anon-proxy (debian/main)
Maintainer: David Spreen [EMAIL PROTECTED]
  206304 [] anon-proxy: doesn't state shared library dependencies 
properly

Package: apache (debian/main)
Maintainer: Debian Apache Maintainers debian-apache@lists.debian.org
  207453 [] apache: apache.postinst: line 189: /dev/tty: No such device 
or address

Package: apache2-mpm-prefork (debian/main)
Maintainer: Thom May [EMAIL PROTECTED]
  203093 [P   ] Should be able to still uninstall if can't stop apache

Package: apcupsd (debian/main)
Maintainer: Martin Mitchell [EMAIL PROTECTED]
  205981 [ +  ] apcupsd FTBFS - automake1.5 has been removed

Package: apmd (debian/main)
Maintainer: Chris Hanson [EMAIL PROTECTED]
  205343 [] apmd_3.2.0-5(unstable/ia64): FTBFS: `platform_inb' 
undeclared
  207592 [] FTBFS (unstable/m68k): more compiler errors than you can 
shake a stick at

Package: apt-listbugs (debian/main)
Maintainer: Masato Taruishi [EMAIL PROTECTED]
  207415 [] apt-listbugs usage against master
  207541 [] apt-listbugs: 302 Found

Package: aptitude (debian/main)
Maintainer: Daniel Burrows [EMAIL PROTECTED]
  201259 [] [T] aptitude on PPC/testing can not be installed via apt

Package: arla (non-US/main)
Maintainer: Mikael Andersson [EMAIL PROTECTED]
  198294 [P   ] arla: FTBFS with gcc-3.3: Invalid preprocessor pasting

Package: armagetron (debian/main)
Maintainer: Andreas Bombe [EMAIL PROTECTED]
  201638 [] armagetron_0.2.2-1(alpha/unstable): not 64-bit clean

Package: arson (debian/main)
Maintainer: Mike Markley [EMAIL PROTECTED]
  195214 [  U ] arson: conflicts with a file from k3b

Package: atari800 (debian/contrib)
Maintainer: Dale Scheetz (Dwarf #1) [EMAIL PROTECTED]
  193397 [] atari800_1.3.0-2(mipsel/unstable): out of date 
config.sub/config.guess
  203707 [ +   SU ] atari800 allows local root compromise.

Package: atlas (debian/main)
Maintainer: Camm Maguire [EMAIL PROTECTED]
  192990 [] atlas_3.2.1ln-7(unstable/arm): FTBFS

Package: autoconf (debian/main)
Maintainer: Ben Pfaff [EMAIL PROTECTED]
  156259 [] [S] db4.0: does not build from source

Package: autoinstall (debian/main)
Maintainer: Jeff Licquia [EMAIL PROTECTED]
  206652 [] autoinstall: rules files is broken, package undermaintained

Package: autoinstall-i386 (debian/main)
Maintainer: Jeff Licquia [EMAIL PROTECTED]
  169249 [] autoinstall-i386: fails to build on unstable
  174559 [] autoinstall-i386: build depends on unavailable package 
busybox-source-0.60.0

Package: bash-static (debian/main)

LWN subscription for Debian developers

2003-08-30 Thread Bdale Garbee
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hello.

Last October, I announced a group subscription to lwn.net for Debian 
developers, sponsored by HP.  I've recently received numerous queries 
about whether this deal was still available, and/or whether HP intended
to continue sponsoring the subscription.  

The answer to both questions is yes!

If you are a Debian developer and want full LWN access, go to lwn.net and 
create an account for yourself (no money is required to create a user 
account).  Then, send email to 

[EMAIL PROTECTED] 

containing your LWN account name.  Sign this email with your key on the 
Debian keyring.  Then, exercise patience.  Eventually, I will process your 
request, and add you to the Debian Project group and send you an email
acknowledgement.

Until now, 195 Debian developers have taken advantage of this and are listed 
in the Debian Project group at LWN.  

If you don't know about LWN, here's what the FAQ on the lwn.net website has
to say:

   LWN.net aims to be the premier news and information source for the free 
   software community. We provide comprehensive coverage of development, 
   legal, commercial, and security issues. The LWN.net Weekly Edition is our 
   weekly summary of what has happened in the free software world; our front 
   page offers up-to-the-minute coverage.

Enjoy!

Bdale
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.8 http://mailcrypt.sourceforge.net/

iD8DBQE/UNN5ZKfAp/LPAagRAoXtAJwJ7l6U7g+YR/FolBv/hbRTYUuU8ACfaWNB
lUh3jplqvxTR7SRd1VHeOu4=
=hXg4
-END PGP SIGNATURE-




Re: Fusionner mes modifs a la nouvelle version du paquet

2003-08-30 Thread Mike Hommey
On Saturday 30 August 2003 02:29, Martin Quinson wrote:
 Et sinon, y'a uupdate(1) (upgrade a source code package from an upstream
 revision), mais j'ai jamais reussi a l'utiliser. Et de toute facon, c'est
 plus drole a la hache qu'avec des outils technologiques ayant la facheuse
 habitude de ne tomber que rarement en marche :)

pour uupdate, http://www.chezmoicamarche.org/ , et très bien, même...

Mike




New promotion: Up to 15% free bonus this weekend !!

2003-08-30 Thread
Grab a Bonus Every day of the week!

At Video Poker Online Casino, we are so sure you are going to love our games 
that we are giving you up to $200 free bonus just for trying our Casino.

http://www.videopoker-online-casino.com/

Make your first deposit and we will instantly credit your account with an 
additional 20% free bonus up to $200.

And for the rest of our players, we continued offering an additional 15% free 
casino bonuses all weekends !!!

Download and Install our FREE Casino software. 
Open the software and click on Register Now, to become a Real Player !!

http://www.videopoker-online-casino.com/CasinoSetup.exe








Re: Accepted kaffe 1:1.1.1-1 (i386 source)

2003-08-30 Thread Junichi Uekawa
  * New upstream release \1
* fixed BTS summary line of #1 Closes: #1
* fixed BTS summary line of #2 Closes: #2
* fixed BTS summary line of #3 Closes: #3
  
  in changelogs would probably go a lot further to correcting this very minor
  issue than reopening dozens of bug reports that belong closed, annoying 
  users
  with BTS garbage, and repeating the same thread on debian-devel over and 
  over.
 
 Yes, that sounds pretty intesresting; an addition to debian-changelog-mode
 would be interesting.
 
 It should be possible to get bugs.debian.org/ and parse the resulting 
 HTML for the title and the original submitter, and placing it.
 
 Some addition to debian-changelog-close-bug, possibly optional, 
 that utilizes debian-bug-* (there's no debian-bug-to-buffer... hmm?)
 to parse the bugreport ?


Here is what the output looks like:

ecasound2.2 (2.3.0-1) UNRELEASED; urgency=low

  * New upstream release
  * Run autoconf-automae-libtool in build.
  * jackd requires /proc/cpuinfo information not available on zaurus
From: Junichi Uekawa  (closes: #207435)

 -- Junichi Uekawa [EMAIL PROTECTED]  Sat, 30 Aug 2003 13:16:07 +0900

and here is the patch against debian-bug.el and debian-changelog-mode.el

diff -ur orig/debian-bug.el mods/debian-bug.el
--- orig/debian-bug.el  2003-08-30 12:44:24.0 +0900
+++ mods/debian-bug.el  2003-08-30 13:22:59.0 +0900
@@ -1440,7 +1440,7 @@
   (forward-sexp 1)
   (beginning-of-line))
 
-(defun debian-bug-wget-mbox (optional bug-number)
+(defun debian-bug-wget-mbox-or-html (download-mbox-p optional bug-number)
   Wget the mbox file for bug BUG-NUMBER and return the filename created.
   (if (not debian-bug-download-directory)
   (error Please set ` debian-bug-download-directory'))
@@ -1456,11 +1456,17 @@
  (concat debian-bug-
  (if debian-bug-package-name
  (concat debian-bug-package-name -))
- bug-number)
+ bug-number
+(if download-mbox-p 
+
+  .html))
  debian-bug-download-directory))
   (status)
   (url (concat http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=;
-   bug-number mbox=yes)))
+   bug-number
+  (if download-mbox-p
+  mbox=yes 
+
   (if (and (file-exists-p filename)
(not (y-or-n-p Bug file already exists.  Download again? )))
   filename
@@ -1472,6 +1478,14 @@
 filename
   (error `wget' failed))
 
+(defun debian-bug-wget-mbox (optional bug-number)
+  Wget the mbox file for bug BUG-NUMBER and return the filename created.  
+  (debian-bug-wget-mbox-or-html t bug-number))
+
+(defun debian-bug-wget-html (optional bug-number)
+  Wget the html file for bug BUG-NUMBER and return the filename created.
+  (debian-bug-wget-mbox-or-html nil bug-number))
+
 (defun debian-bug-get-bug-as-file (optional bug-number)
   Browse the BTS for BUG-NUMBER via `browse-url'.
   (interactive (list (completing-read Bug number to fetch: 
diff -ur orig/debian-changelog-mode.el mods/debian-changelog-mode.el
--- orig/debian-changelog-mode.el   2003-08-30 12:44:18.0 +0900
+++ mods/debian-changelog-mode.el   2003-08-30 13:15:35.0 +0900
@@ -645,7 +645,22 @@
   (if (not (string-match ^[0-9]+$ bug-number))
   (error The bug number should consists of only digits.))
   (debian-changelog-add-entry)
-  (save-excursion (insert  (closes: # bug-number )))
+  (save-excursion
+(insert
+ (with-current-buffer
+(find-file-noselect (debian-bug-wget-html bug-number))
+   (beginning-of-buffer)
+   (concat 
+   (progn 
+ 
+ (re-search-forward TITLE\\([^-]*- #[^-]*- \\)\\([^]*\\))
+ (match-string 2))
+   \nFrom: 
+   (progn 
+ (re-search-forward From: \\([^]*\\))
+ (match-string 1))
+   )))
+(insert  (closes: # bug-number )))
   (message Enter a brief description of what was done here.))
 
 ;;




Re: Accepted kaffe 1:1.1.1-1 (i386 source)

2003-08-30 Thread Peter S Galbraith
Junichi Uekawa [EMAIL PROTECTED] wrote:

   * New upstream release \1
 * fixed BTS summary line of #1 Closes: #1
 * fixed BTS summary line of #2 Closes: #2
 * fixed BTS summary line of #3 Closes: #3
   
   in changelogs would probably go a lot further to correcting this
   very minor issue than reopening dozens of bug reports that belong
   closed, annoying users with BTS garbage, and repeating the same
   thread on debian-devel over and over.
  
  Yes, that sounds pretty intesresting; an addition to debian-changelog-mode
  would be interesting.
  
  It should be possible to get bugs.debian.org/ and parse the resulting 
  HTML for the title and the original submitter, and placing it.
  
  Some addition to debian-changelog-close-bug, possibly optional, 
  that utilizes debian-bug-* (there's no debian-bug-to-buffer... hmm?)
  to parse the bugreport ?
 
 
 Here is what the output looks like:
 
 ecasound2.2 (2.3.0-1) UNRELEASED; urgency=low
 
   * New upstream release
   * Run autoconf-automae-libtool in build.
   * jackd requires /proc/cpuinfo information not available on zaurus
 From: Junichi Uekawa  (closes: #207435)
 
  -- Junichi Uekawa [EMAIL PROTECTED]  Sat, 30 Aug 2003 13:16:07 +0900
 
 and here is the patch against debian-bug.el and debian-changelog-mode.el

Thanks for CC'ing me.  I catch up on -devel only sporadically.

I'm not sure what the goal is?
Why do you want the bug submitter named in the Closes entry?
If its the title you want, then that is already available after the bug
list has been fetched.  I've been wanting to use the title as initial
input to the close command for a wgile, but wasn't convinced it was good
enough.  I guess it's a good first stab.  That's what you guys want?

Peter




Re: debian archive disk space requirements.

2003-08-30 Thread Martijn van Oosterhout
On Sat, Aug 30, 2003 at 11:40:34AM +1000, jason andrade wrote:
 
 Hi,
 
 I've noticed the growth in the debian archive with some concern
 over the last few weeks/months.  We're now hitting the limit of
 the partition that debian is on and it will be quite difficult
 technically for us to deal with this in the short term.

[snip]

 Is there any way to reduce the size of the archive over the next
 4-6 weeks ?

If you have info on what people dowload, you could delete things that people
aren't fetching. apt falls-back to other archives if the first one fails,
assuming the same package is listed in one of the pther archives in the
sources.list. I'm not sure how difficult this would be. If you also
regenerate the Package file then they will simply become invisible to users.
This could get confusing.

Hope this helps,
-- 
Martijn van Oosterhout   kleptog@svana.org   http://svana.org/kleptog/
 All that is needed for the forces of evil to triumph is for enough good
 men to do nothing. - Edmond Burke
 The penalty good people pay for not being interested in politics is to be
 governed by people worse than themselves. - Plato


pgppEwun2nGvL.pgp
Description: PGP signature


Re: Accepted kaffe 1:1.1.1-1 (i386 source)

2003-08-30 Thread Peter S Galbraith
Junichi Uekawa [EMAIL PROTECTED] wrote:

  I'm not sure what the goal is?
  Why do you want the bug submitter named in the Closes entry?
  If its the title you want, then that is already available after the bug
  list has been fetched.  I've been wanting to use the title as initial
  input to the close command for a wgile, but wasn't convinced it was good
  enough.  I guess it's a good first stab.  That's what you guys want?
 
 Erm.. although having the submitter name is probably not the point,
 I wanted to point out to you that I want the bug subject,

Right.  I understood both points.  I was wondering about having the bug
submitter there.  Maybe change the phrasing?

  * Bug fix debian-changelog mode to support fetching of bug to fill
   in changelog, Thanks to Junichi Uekawa [EMAIL PROTECTED]
   (Closes: #207852).

But I've always thought listing the thitle didn't really say _what_ was
fixed and _how_.  Most times, the title mentions a symptom but not the
actual problem.  That why I never added that before.

I could make it optional...




Re: Accepted kaffe 1:1.1.1-1 (i386 source)

2003-08-30 Thread Junichi Uekawa
 I'm not sure what the goal is?
 Why do you want the bug submitter named in the Closes entry?
 If its the title you want, then that is already available after the bug
 list has been fetched.  I've been wanting to use the title as initial
 input to the close command for a wgile, but wasn't convinced it was good
 enough.  I guess it's a good first stab.  That's what you guys want?

Erm.. although having the submitter name is probably not the point,
I wanted to point out to you that I want the bug subject,
and the patch I have submitted you does that (and add the submitter name,
for some kind of credibility).



regards,
junichi





Re: MEI Whitelist Autoresponse

2003-08-30 Thread Adam McKenna
On Fri, Aug 29, 2003 at 09:20:53AM +1000, Russell Coker wrote:
 The comparison to mailing list software makes no sense.

Maybe not in the context of viruses, but for the Joe Job problem it does.

Viruses can and should be filtered out before they reach the C-R system.

--Adam
-- 
Adam McKenna  [EMAIL PROTECTED]  [EMAIL PROTECTED]




Re: Accepted kaffe 1:1.1.1-1 (i386 source)

2003-08-30 Thread Brian May
On Thu, Aug 28, 2003 at 10:05:21AM -0500, Adam Heath wrote:
 A proper entry is as follows:
 
 * New upstream release.
   * no longer does foo when bar happens. Closes: #12345
   * wrapper script rewritten to not use $$ in tempfile names.  Closes: #12345
 
 Please, everyone remember, a changelog documents *changes*.  It's not a tool
 to close bugs automatically.

Maybe a tool that integrates debian BTS/changelog behaviour could help.

eg. You run program and give name of package.

You see a list of bugs associated with the source packge.

You select one of the bugs.

It comes up with a screen with two windows:

1. One where the can review the bug history.

2. You type in extra information with what has changed,
and an entry is automatically added to the changlog.

You then repeat the process for the next bug report.

This is still very rough, but I think it gives the general idea.

Such a program could also make it easier to do common BTS tasks,
eg. merge duplicate bug reports, etc.

If we could make it easier and quicker to write correct changelogs,
I think they are more likely to occur.


(Assuming such a tool doesn't already exist...)
-- 
Brian May [EMAIL PROTECTED]




Re: .iso conflict, discussion of resolution

2003-08-30 Thread Chris Cheney
Stephan,

Would it be possible to get the two desktop filesi mentioned below merged
into kdelibs so that arson and k3b are easily installable at the same time? 
I can do the commit myself if you approve.

Thanks,

Chris Cheney
Debian KDE Maintainer

PS - Christian/Jean-Michel there is a new debian-qt-kde developer mailing
 list for Qt/KDE debian maintainers, debian-kde is still available
 for users.


On Fri, Aug 29, 2003 at 10:34:39PM -0700, Mike Markley wrote:
 All,
 
 A quick summary of this bug:
 Arson, a KDE CD burning application, includes two .desktop files to
 associate certain files with it:
 /usr/share/mimelnk/application/x-iso.desktop
 /usr/share/mimelnk/application/x-cue.desktop
 
 For more info on what's been suggested and what's been discussed, see
 195214, 195218, and 203954.


pgp2OTQn6ZCJZ.pgp
Description: PGP signature


Re: Accepted kaffe 1:1.1.1-1 (i386 source)

2003-08-30 Thread Andreas Metzler
Peter S Galbraith [EMAIL PROTECTED] wrote:
[...]
 Right.  I understood both points.  I was wondering about having the bug
 submitter there.  Maybe change the phrasing?

I usually don't list him/her, my changelogs are too long already. I do
list submitters who send the report by private mail instead of via
BTS, because othervise they wouldn't have any public record of their
help.

  * Bug fix debian-changelog mode to support fetching of bug to fill
   in changelog, Thanks to Junichi Uekawa [EMAIL PROTECTED]
   (Closes: #207852).

 But I've always thought listing the thitle didn't really say _what_ was
 fixed and _how_.  Most times, the title mentions a symptom but not the
 actual problem.  That why I never added that before.

The symptom often is much more interesting than the cause for the
audience, i.e. blah does not crash immediately on startup on PowerPC
instead of Properly initialize char *foo in src/bar.c.
cu andreas




Re: configure web proxy via DHCP server

2003-08-30 Thread Russell Coker
On Sat, 30 Aug 2003 12:57, H. S. Teoh wrote:
  It would be really cool(tm) if I didn't have to reconfigure every
  program on my laptop to use a different proxy server every time I plug
  it into a different network.

 Run a local proxy that forwards connections to the (external) proxy of
 your choice, and point all applications at it?

Then of course there's the issue of how to configure the local proxy.

For the local proxy on my laptop I use m4 to change it's configuration from a 
script which knows about the networks I regularly connect to.

The ideal solution however would be an addition to the DHCP standard for a 
field to specify this information.  My solution only works AFTER I have 
figured out the correct data for each network by some other means and 
customised my script.

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page




Re: Accepted kaffe 1:1.1.1-1 (i386 source)

2003-08-30 Thread Joe Drew
On Fri, 2003-08-29 at 18:12, Glenn Maynard wrote:
 I'm confused.  We have three cases:
 
 1. Close bug #12345 directly (12345-done), noting the version that fixed it.
 2. Note in the changelog that bug #12345 is fixed; the bug receives a
 notification of the version that fixed it.
 3. Note in the changelog that bug #12345, ls --crash crashes, is
 fixed; the bug receives a notification of the version that fixed it.
 
 #3 is obviously ideal, if the maintainer has time; no debate there.
 
 However, you're saying that #1 is preferable to #2.  Why?  It seems to
 have no disadvantage to #1, with the added advantages that I can check
 which version fixed bug #12345 without hitting the network (since it's
 documented in the changelog), and saves developer time.  What am I missing?

Start with Herbert Xu's premise...
 We've gone through this many times already.  Upstream changes should
 not be documented in the Debian changelog, even if they fix bugs in
 the Debian BTS.

... and follow the bouncing ball.

-- 
Joe Drew [EMAIL PROTECTED] [EMAIL PROTECTED]

My weblog doesn't detail my personal life: http://me.woot.net




Re: Accepted kaffe 1:1.1.1-1 (i386 source)

2003-08-30 Thread benfoley
On Saturday 30 August 2003 03:47, Branden Robinson wrote:
 On Fri, Aug 29, 2003 at 06:00:51PM -0400, Glenn Maynard wrote:
  A script to convert eg.
 
  * New upstream release .* (Closes: #1, #2, #3)
 
  to
 
  * New upstream release \1
* fixed BTS summary line of #1 Closes: #1
* fixed BTS summary line of #2 Closes: #2
* fixed BTS summary line of #3 Closes: #3
 
  in changelogs would probably go a lot further to correcting this very
  minor issue than reopening dozens of bug reports that belong closed,
  annoying users with BTS garbage, and repeating the same thread on
  debian-devel over and over.

 One big problem with this approach is that the same maintainers who are
 too lazy to write proper entries for bug-closers in their changelog
 entries are going to be too lazy to ensure that a bug report has a
 meaningful summary in the first place.

maybe that should be a rule in policy. the issue of proper notification is 
valid, or not?  there should be a means to at least reduce redundant bug 
reports, other than some nasty response indicating that a bug has already 
been reported or attended. us plain old users play a valid part in the 
project, but it's beginning to feel as though the gap between users and 
maintainers requires a whole new dialogue. it's not unreasonable to expect 
that user bug reports deserve a coherent response, including some degree of 
clarification of the means of bug resolution.

ben




Re: Bug#207300: tmda: Challenge-response is fundamentally broken

2003-08-30 Thread Russell Coker
On Sat, 30 Aug 2003 10:42, Brian May wrote:
 On Fri, Aug 29, 2003 at 03:48:13PM +1000, Craig Sanders wrote:
  the point that you keep on missing is that TMDA and similar programs send
  confirmation emails to innocent third-parties who did *NOT* send an
  email.
 
  TMDA and all C-R systems are broken-by-design, just as many stupid
  end-user autoresponders and AV-scanners that send notifications back to
  the forged sender address are broken-by-design.

 You saying that any SMTP MTA that sends bounces to unauthenticated
 E-Mail addresses is also broken?

Yes.

 That is the idea behind autorespoonders after all, to tell the sender
 that his mail didn't get through because it didn't meet some required
 criteria.

A SMTP 550 code can convey all the information that is needed for bounces.

 E-Mail that looks suspicious can be valid mail at times, for instance
 somebody I knew tried to send a ZIP file that happened to be executable
 via E-Mail.

If the mail server it was sent to responded with:
550 Don't want ZIP files of .exe content

Then the bounce message would have been clear and there would be no chance of 
it going to the wrong person.

If the C-R systems we are discussing would send their challenge in the 550 
SMTP code then I doubt that anyone would have any problem with them.

 The problem is that I see no easy way to fix this problem to the large
 scale required on the Internet while keeping store-and-forward feature
 of SMTP.

The old-style store and forward is dead.

Backup MX servers serve no useful purpose in the modern Internet, this is why 
big sites such as microsoft.com and hotmail.com don't have them.

If you have a backup MX then it should know all the acceptable email addresses 
in your domain and enforce all rules regarding acceptable content.  Then it 
can block content through SMTP 550 and 450 codes.

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page




.iso conflict, discussion of resolution

2003-08-30 Thread Mike Markley
All,

A quick summary of this bug:
Arson, a KDE CD burning application, includes two .desktop files to
associate certain files with it:
/usr/share/mimelnk/application/x-iso.desktop
/usr/share/mimelnk/application/x-cue.desktop

For more info on what's been suggested and what's been discussed, see
195214, 195218, and 203954.

Since I've seen no action in three months on possible help from other
maintainers with fixing this SOMEHOW, I'd like some thoughts on the
two solutions that I *can* implement, and the one that I can at least
ram down others' throats:

1. Conflicts: k3b (very ugly)
2. Depends: k3b (also very ugly)
3. Depends: kde-burner-common, which contains the .iso files (which
would have to Conflicts: k3b anyway, unless Jean-Michel is willing to
cooperate, and which is basically archive bloat)

I will do #3 no later than one week from today, unless this discussion
convinces me that it's a bad idea (or the release manager/ftp-masters
object). If that happens, I will implement #1. Why? As a recently
liberated former dialup user, I appreciate how utterly ludicrous it is
to Depend: on a 2.2mb package for 1107 bytes of freaking text.

Please Cc: me on replies, as I'm not subscribed these days.

-- 
Mike Markley [EMAIL PROTECTED]
GPG: 0x3B047084 7FC7 0DC0 EF31 DF83 7313  FE2B 77A8 F36A 3B04 7084




Re: debian archive disk space requirements.

2003-08-30 Thread Goswin von Brederlow
jason andrade [EMAIL PROTECTED] writes:

 Hi,
 
 I've noticed the growth in the debian archive with some concern
 over the last few weeks/months.  We're now hitting the limit of
 the partition that debian is on and it will be quite difficult
 technically for us to deal with this in the short term.
 
 We have some new storage which is being comissioned but it won't
 be in place for about a month and the debian archive has already
 filled up a 100G partition we've dedicated to it here (that doesn't
 include the debian-cd or debian-non-US or other debian related
 archives.. just the main debian one).
 
 I'm stuck between a rock and a hard place here as we have a large
 dependency tree before we can move equipment over and get access
 to the new disk..
 
 Is there any way to reduce the size of the archive over the next
 4-6 weeks ?

What architectures are you mirroring? You could drop some of the more
uncommon arches (see access logs if any are completly unused) till you
have space for them again. Preferably just drop the Packages file for
the arch and delete as little as possible of the actual debs.

MfG
Goswin

PS: What are you using to mirror?




Re: MEI Whitelist Autoresponse

2003-08-30 Thread Marc Wilson
On Thu, Aug 28, 2003 at 07:12:47PM -0700, Joshua Kwan wrote:
 Hmm, how about giving tmda its own special header so we can auto-filter
 out messages from people who use C-R systems?

It adds itself to X-Delivery-Agent, so it's not hard to filter out.  I've
started capturing C-R signatures where I can find them and adding them to
procmail /dev/null recipies.  Haven't got many yet, but I'm working on it.

-- 
 Marc Wilson | Stop searching.  Happiness is right next to you.
 [EMAIL PROTECTED] | Now, if they'd only take a bath ...


pgpaBsXpKihMD.pgp
Description: PGP signature


Re: configure web proxy via DHCP server

2003-08-30 Thread Goswin von Brederlow
Russell Coker [EMAIL PROTECTED] writes:

 On Sat, 30 Aug 2003 12:57, H. S. Teoh wrote:
   It would be really cool(tm) if I didn't have to reconfigure every
   program on my laptop to use a different proxy server every time I plug
   it into a different network.
 
  Run a local proxy that forwards connections to the (external) proxy of
  your choice, and point all applications at it?
 
 Then of course there's the issue of how to configure the local proxy.
 
 For the local proxy on my laptop I use m4 to change it's configuration from a 
 script which knows about the networks I regularly connect to.
 
 The ideal solution however would be an addition to the DHCP standard for a 
 field to specify this information.  My solution only works AFTER I have 
 figured out the correct data for each network by some other means and 
 customised my script.

Many browsers allow the proxy to be autoconfigured from some info
file. You can easily generate that file depending on your network
setup. google around a bit for the file format.

MfG
Goswin




Re: Bug#207300: tmda: Challenge-response is fundamentally broken

2003-08-30 Thread Karsten M. Self
on Sat, Aug 30, 2003 at 10:42:17AM +1000, Brian May ([EMAIL PROTECTED]) wrote:
 On Fri, Aug 29, 2003 at 03:48:13PM +1000, Craig Sanders wrote:
  the point that you keep on missing is that TMDA and similar programs send
  confirmation emails to innocent third-parties who did *NOT* send an email.
  
  TMDA and all C-R systems are broken-by-design, just as many stupid end-user
  autoresponders and AV-scanners that send notifications back to the forged
  sender address are broken-by-design.
 
 You saying that any SMTP MTA that sends bounces to unauthenticated
 E-Mail addresses is also broken?

At the very least, this is a small subset of the incoming mail.  There
are probably bad practices, which should be fixed.

The aim is also one which is presumably useful:  if the sender is valid,
then advising them that a message was not delivered is arguably useful
(note that I regard most delivery failure messages as junk).

Most importantly:  the MTA isn't sending mail out willy-nilly to offload
a cost (filtering, content assessment) to a third party.  It's taking an
action on a (hopefully) limited number of mails which cannot be
delivered.

SMTP Envelope reply address should be given precedence, and an SMTP
error precedence over any bounce.

 That is the idea behind autorespoonders after all, to tell the sender
 that his mail didn't get through because it didn't meet some required
 criteria.

The message can't be delivered because of addressing errors is a
different class of error than I can't be bothered to see if this mail
is worth reading, despite its being properly addressed to me.

 Even encryption does not help here, or at least I have not seen any
 proposals for any system that could scale to the Internet. GPG for
 instance only verifies the sender to the receiver, it could not be used
 to verify every sender to the MTAs involved.

A publicly available key, with an email address (or addresses),
validated against contents, is useable.  It doesn't validate the sender,
but it provides a level of indication that someone went through the
trouble of getting a key, posting it publicly, and signing (and/or
encrypting) content with it.

That's more elbow grease than your garden-variety spammer.

Peace.

-- 
Karsten M. Self kmself@ix.netcom.comhttp://kmself.home.netcom.com/
 What Part of Gestalt don't you understand?
   Hollings:  bought, paid for, but couldn't deliver the CBDTPA:
 http://www.politechbot.com/docs/cbdtpa/hollings.s2048.032102.html


pgpea857fP6eC.pgp
Description: PGP signature


Re: configure web proxy via DHCP server

2003-08-30 Thread Javier Fernández-Sanguino Peña
On Sat, Aug 30, 2003 at 12:01:42PM +1000, Brian May wrote:
 Is this possible?
 
 It would be really cool(tm) if I didn't have to reconfigure every
 program on my laptop to use a different proxy server every time I plug
 it into a different network.
 

The answer is close to you:
$ apt-cache search laptop configure
(manually removing useless entries)
ifplugd - A configuration daemon for ethernet devices
laptop-net - Automatically adapt laptop ethernet
laptop-net-doc - Automatically adapt laptop ethernet - documentation
laptop-netconf - network detection and configuration program for laptops
whereami - Automatically reconfigure your (laptop) system for a new 
location

All of these, IIRC, provide means to run user-defined scripts for
autoconfiguration. Setting up the proxy server might be just a manner of
setting up the http_proxy environment variable depending on your location
(although some browsers might not use it). 

Regards

Javi


pgpHqNRoNwnBE.pgp
Description: PGP signature


Re: debian archive disk space requirements.

2003-08-30 Thread Josip Rodin
On Sat, Aug 30, 2003 at 09:29:16AM +0200, Goswin von Brederlow wrote:
 What architectures are you mirroring? You could drop some of the more
 uncommon arches

No, he cannot, it's ftp.au.debian.org. All official mirrors have been, are
or will be in a similar situation.

-- 
 2. That which causes joy or happiness.




Re: Accepted kaffe 1:1.1.1-1 (i386 source)

2003-08-30 Thread Junichi Uekawa


   * Bug fix debian-changelog mode to support fetching of bug to fill
in changelog, Thanks to Junichi Uekawa [EMAIL PROTECTED]
(Closes: #207852).
 
 But I've always thought listing the thitle didn't really say _what_ was
 fixed and _how_.  Most times, the title mentions a symptom but not the
 actual problem.  That why I never added that before.

Yes, that's one point, so the title usually needs editing.
That's why it needs to be done at the level of debian-changelog-mode, 
and not dpkg.
It's not something that can be completely automated, but at least
some template is there to help the maintainer :)


regards,
junichi




Re: configure web proxy via DHCP server

2003-08-30 Thread Jamie Wilkinson
This one time, at band camp, Russell Coker wrote:
The ideal solution however would be an addition to the DHCP standard for a 
field to specify this information.  My solution only works AFTER I have 
figured out the correct data for each network by some other means and 
customised my script.

SRV records?

-- 
[EMAIL PROTECTED]   http://people.debian.org/~jaq




Re: debian archive disk space requirements.

2003-08-30 Thread Josip Rodin
On Sat, Aug 30, 2003 at 11:40:34AM +1000, jason andrade wrote:
 I've noticed the growth in the debian archive with some concern
 over the last few weeks/months.  We're now hitting the limit of
 the partition that debian is on and it will be quite difficult
 technically for us to deal with this in the short term.

I hear you.

/dev/sda3 97G   97G  470M 100.0 [] /bla

 Is there any way to reduce the size of the archive over the next
 4-6 weeks ?

We are still waiting for Joey to officially announce the obsolescence of
potato on -announce so that it can be moved to archive.debian.org. That will
buy us six, seven gigabytes at most. Other than that, I've no idea. Pray to
god that testing and unstable stop diverging so much? :)

-- 
 2. That which causes joy or happiness.




Re: configure web proxy via DHCP server

2003-08-30 Thread Russell Coker
On Sat, 30 Aug 2003 18:33, Jamie Wilkinson wrote:
 This one time, at band camp, Russell Coker wrote:
 The ideal solution however would be an addition to the DHCP standard for a
 field to specify this information.  My solution only works AFTER I have
 figured out the correct data for each network by some other means and
 customised my script.

 SRV records?

Almost no-one uses them.  Unless something can get accepted by 50% of the 
servers out there then it's of little use for such things.  If something 
works 50% of the time I may as well do it manually.

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page




Re: MEI Whitelist Autoresponse

2003-08-30 Thread Richard Braakman
On Thu, Aug 28, 2003 at 02:55:35PM -0700, Adam McKenna wrote:
 How many were challenges from mailing list software?  Yes, another class of
 software that automatically issues challenges (specifically, to new
 subscriptions and to non-list members if the list is closed).  So I guess you
 should also file bugs against majordomo, mailman, ezmlm-src, and any other
 mailing list managers that do this.

I think virus scanners are in a different class, though.  Mailing list
software isn't designed to recognize viruses, while virus scanners are.
It's disgustingly incompetent to recognize a mail as Sobig.F, which is
known to fake the sender, and then reply to it anyway.  (And yes, I
get a lot of notifications that mention Sobig.F by name.)

Richard Braakman




Bug#195214: Info received (was .iso conflict, discussion of resolution)

2003-08-30 Thread Debian Bug Tracking System
Thank you for the additional information you have supplied regarding
this problem report.  It has been forwarded to the package maintainer(s)
and to other interested parties to accompany the original report.

Your message has been sent to the package maintainer(s):
 Mike Markley [EMAIL PROTECTED]

If you wish to continue to submit further information on your problem,
please send it to [EMAIL PROTECTED], as before.

Please do not reply to the address at the top of this message,
unless you wish to report a problem with the Bug-tracking system.

Debian bug tracking system administrator
(administrator, Debian Bugs database)




Re: Bug#207300: tmda: Challenge-response is fundamentally broken

2003-08-30 Thread John Hasler
Brian May writes:
 You saying that any SMTP MTA that sends bounces to unauthenticated
 E-Mail addresses is also broken?

Karsten M. Self writes:
 At the very least, this is a small subset of the incoming mail.

This is about a quarter of my incoming mail.
-- 
John Hasler
[EMAIL PROTECTED]
Dancing Horse Hill
Elmwood, Wisconsin




Re: .iso conflict, discussion of resolution

2003-08-30 Thread Stephan Kulow
Am Saturday 30 August 2003 08:06 schrieb Chris Cheney:
 Stephan,

 Would it be possible to get the two desktop filesi mentioned below merged
 into kdelibs so that arson and k3b are easily installable at the same time?
 I can do the commit myself if you approve.

Approved.

Greetings, Stephan

-- 
SCO doesn't have enough understanding of the case to be able
to lie convincingly. Indeed they have so little understanding
that it's difficult to accuse them of lying. - Greg Lehey




Re: debian archive disk space requirements.

2003-08-30 Thread jason andrade
On Sat, 30 Aug 2003, Josip Rodin wrote:

 /dev/sda3 97G   97G  470M 100.0 [] /bla

/dev/sdf1100798036  98652428   2145608  98% /raid/lun1p1

and that is by moving a chunk of debian archives into another disk and
symlinking back in..

  Is there any way to reduce the size of the archive over the next
  4-6 weeks ?

 We are still waiting for Joey to officially announce the obsolescence of
 potato on -announce so that it can be moved to archive.debian.org. That will
 buy us six, seven gigabytes at most. Other than that, I've no idea. Pray to
 god that testing and unstable stop diverging so much? :)

hmm ok. 6-7G would probably help for 4 weeks.  once we move to the new
disk i don't mind too much about debian growing again :-)

/dev/sdb11220623064 32828 1208380596   1% /data1

i just need to get the time to be able to migrate stuff across..

and i really don't want to break ftp.au.debian.org for people..

regards,

-jason




Re: configure web proxy via DHCP server

2003-08-30 Thread Santiago Garcia Mantinan
 It would be really cool(tm) if I didn't have to reconfigure every
 program on my laptop to use a different proxy server every time I plug
 it into a different network.

The thing is that MS has an extension for DHCP to do this, the code is 252,
it works only with IE in windows, but I've read it also works with konqueror
in kde, I haven't tried this in Debian, though, anybody has tried this?

I think it would be good if we could get this working.

Both dhcp (version 2) and dhcp3-server (version 3) support this extension if
you declare it, here are a couple of examples:

for dhcp3-server:
option auto-proxy-config code 252 = string;

subnet 192.168.1.0 netmask 255.255.255.0 {
  range 192.168.1.101 192.168.1.199;
  option auto-proxy-config http://192.168.1.1/wpad.pac;;
  option routers 192.168.1.1;
}

for dhcp (version 2) in a normal subnet declaration you add:
  option option-252 http://192.168.1.1/wpad.pac;

The pac files are the ones that are used to configure netscape, mozilla,
opera or IE, it is a javascript that could be in its simpler form something
like:

function FindProxyForURL(url, host)
{
   return PROXY 192.168.1.1:3128 ;
}

Here are some links to doc on the topic where you can read more and find
more examples about all this:

http://www.dit.gov.bt/~takeshi/material/win2000srv/internet-gw/wpad/
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/prodtechnol/ie/reskit/ie6/part6/c26ie6rk.asp
http://www.davidpashley.com/tutorials/automatic-proxy.html
http://wp.netscape.com/eng/mozilla/2.0/relnotes/demo/proxy-live.html
http://www.squid-cache.org/Doc/FAQ/FAQ-5.html

Hope this helps.

Regards...
-- 
Manty/BestiaTester - http://manty.net




Re: Accepted kaffe 1:1.1.1-1 (i386 source)

2003-08-30 Thread Ross Burton
On Fri, 2003-08-29 at 20:17, Colin Watson wrote:
 On Fri, Aug 29, 2003 at 08:48:13PM +0200, Mathieu Roy wrote:
  There's at least one other solution: what if, when a bug tagged
  upstream was closed, the mail sent would include the upstream
  ChangeLog (hopefully named ChangeLog in the top directory of the
  package)?
  Can someone familiar with the BTS code tell whether this change is
  trivial or not?
 
 It's not trivial in the slightest, sorry. The BTS doesn't remotely have
 this information available to it, and it's not even easy to arrange for
 it to be available.

I'd also be quite annoyed if I was mailed the upstream changelog when a
bug was closed, as these can often get rather large.

Ross
-- 
Ross Burton mail: [EMAIL PROTECTED]
  jabber: [EMAIL PROTECTED]
 www: http://www.burtonini.com./
 PGP Fingerprint: 1A21 F5B0 D8D0 CFE3 81D4 E25A 2D09 E447 D0B4 33DF




signature.asc
Description: This is a digitally signed message part


Re: Accepted kaffe 1:1.1.1-1 (i386 source)

2003-08-30 Thread Junichi Uekawa
 One big problem with this approach is that the same maintainers who are
 too lazy to write proper entries for bug-closers in their changelog
 entries are going to be too lazy to ensure that a bug report has a
 meaningful summary in the first place.

Maintainers who are lazy cannot be fixed, but some may improve, and 
the load on those who do write proper changelogs may be lightened.

I'd not expecting perfect results from here... just some improvements.
Less excuse for making sloppy changelogs :P


regards,
junichi




Re: configure web proxy via DHCP server

2003-08-30 Thread Steve Langasek
On Sat, Aug 30, 2003 at 02:15:28PM +0200, Santiago Garcia Mantinan wrote:
  It would be really cool(tm) if I didn't have to reconfigure every
  program on my laptop to use a different proxy server every time I plug
  it into a different network.

 The thing is that MS has an extension for DHCP to do this, the code is 252,
 it works only with IE in windows, but I've read it also works with konqueror
 in kde, I haven't tried this in Debian, though, anybody has tried this?

 I think it would be good if we could get this working.

 Both dhcp (version 2) and dhcp3-server (version 3) support this extension if
 you declare it, here are a couple of examples:

On the client side, however, at least dhcp3-client requires recompiling
for each option you want to export to the client hook scripts.  This was
recently done for the netbios options that Samba uses.  I know there are
many more unexported options that are potentially useful to other
packages, including ntp timeserver information; it might be nice to
gather a list of them all at once for submission to the dhcp3
maintainers, so they're not constantly recompiling to special-case each
attribute.

-- 
Steve Langasek
postmodern programmer


pgpwdu9mPLuUF.pgp
Description: PGP signature


Re: GDM in sid does not read /etc/environment anymore

2003-08-30 Thread Daniel Ruoso
But this doesn't solve the problem that the login screen appears without
locales... I already have pam_env.so in /etc/pam.d/gdm, but this only
take effect (maybe I'm wrong) after the user logs in. The greeter will
still appear without locales. (and that's the bug reported in bts).

Em Sáb, 2003-08-30 às 14:20, Gustavo Noronha Silva escreveu:
 Em Fri, 29 Aug 2003 16:38:16 -0300, Daniel Ruoso [EMAIL PROTECTED] escreveu:
 
  I've actually sent him an email but got no answer. I've posted in
  debian-devel few days ago and nobody complained that GDM could source
  /etc/environment in the init script. That's an one-line patch (already
  tagged as patch in bts for more than a year)... 
  
  I think that if the maintainer doesn't take that, a NMU will be
  neecessary.
 
 I don't think that's right. The Right Thing is adding this:
 
 auth   required   pam_env.so
 
 to /etc/pam.d/gdm
 
 My /etc/pam.d/gdm is like this after my own fix:
 
 [EMAIL PROTECTED] $ cat /etc/pam.d/gdm
 #%PAM-1.0
  
 # This module parses /etc/environment (the standard for setting
 # environ vars) and also allows you to use an extended config
 # file /etc/security/pam_env.conf.
 # (Replaces the `ENVIRON_FILE' setting from login.defs)
 auth   required   pam_env.so
  
 @include common-auth
 @include common-account
 @include common-session
-- 
Atenciosamente,

Daniel Ruoso
Desenvolvimento de Sistemas
[EMAIL PROTECTED]
Oktiva Telecomunicaes e Informtica




Re: Bug#207300: tmda: Challenge-response is fundamentally broken

2003-08-30 Thread Osamu Aoki
I think challenge response needs extra care.  

Anyway, current e-mail worm/virus incident is pretty bad.

On Sat, Aug 30, 2003 at 07:44:56AM -0500, John Hasler wrote:
 Brian May writes:
  You saying that any SMTP MTA that sends bounces to unauthenticated
  E-Mail addresses is also broken?
 
 Karsten M. Self writes:
  At the very least, this is a small subset of the incoming mail.
 
 This is about a quarter of my incoming mail.

I filter e-mail worm/virus mail bounces by reading the attached original
mail header.  Most bounces keep the good amount of original header
information.

## Worm e-mails by the header
:0
* ^X-Mailer: Microsoft
* ^X-MailScanner: Found to be clean
Xworm/

## Worm bounces by the headerbody
:0 BH
* ^FROM_MAILER
* ^X-Mailer: Microsoft
* ^X-MailScanner: Found to be clean
Xworm-bounce/

I guess our e-mail server can do the similar checks.

Osamu




Re: debian archive disk space requirements.

2003-08-30 Thread Richard Atterer
On Sat, Aug 30, 2003 at 12:18:50PM +0200, Josip Rodin wrote:
  Is there any way to reduce the size of the archive over the next 4-6
  weeks ?
 
 We are still waiting for Joey to officially announce the obsolescence of
 potato on -announce so that it can be moved to archive.debian.org. That
 will buy us six, seven gigabytes at most. Other than that, I've no idea.
 Pray to god that testing and unstable stop diverging so much? :)

Hm, another possibility is to just make a new stable release, and then to
delete all those woody packages. ;-)

Cheers,

  Richard

-- 
  __   _
  |_) /|  Richard Atterer |  GnuPG key:
  | \/¯|  http://atterer.net  |  0x888354F7
  ¯ '` ¯




Re: debian archive disk space requirements.

2003-08-30 Thread Heikki Vatiainen
[I am not on debian-devel but reading the list through Usenet gateway]

jason andrade [EMAIL PROTECTED] writes:

 /dev/sdf1100798036  98652428   2145608  98% /raid/lun1p1
 
 and that is by moving a chunk of debian archives into another disk and
 symlinking back in..

You may also want to see mount(8) and look for bind from the manual
page. Since there is not very much about it, I will just quote it
below. From mount(8):

   Since Linux 2.4.0 it is possible to remount part of the file
   hierarchy somewhere else. The call is
  mount --bind olddir newdir

ftp.fi.debian.org has the whole debian/ on the same partition but a
couple of directories, such as debian-cd/, that were previously on the
same partition with the mirror root are now mounted from a new
location with the --bind option.  /etc/fstab also works with bind
option with something like:

/newloc/debian-cd /oldloc/debian-cd none bind,noatime,noexec,nodev

Using bind should keep all mirroring programs happy since they do not
have to get confused when they find a symlink instead of
directory.

-- 
Heikki Vatiainen  * [EMAIL PROTECTED]
Tampere University of Technology  * Tampere, Finland




Re: debian archive disk space requirements.

2003-08-30 Thread Marcelo E. Magallon
On Sat, Aug 30, 2003 at 12:18:50PM +0200, Josip Rodin wrote:

  Pray to god that testing and unstable stop diverging so much? :)

 FYI, this is the size of all the binaries belonging to the given
 architecture, in the specifies suites:

 architecture | any| unstable| u+t| u+t+s  | u+t+s+o
--++-+++
 all  | 6907585148 | 3400497424  | 4086646374 | 5709009750 | 686078
 alpha| 8181555068 | 3407524450  | 4906783652 | 6562026256 | 7611929650
 arm  | 6594851918 | 2914482000  | 4192165600 | 5566376046 | 6233666136
 hppa | 6447723766 | 3185688176  | 4554324284 | 5977389114 | 5977389114
 hurd-i386|  554627760 |  554464016  |  554464016 |  554464016 |  554464016
 i386 | 9027667988 | 3693410444  | 5352013018 | 7153730830 | 8206129322
 ia64 | 7683523572 | 3714676258  | 5380423374 | 7121518964 | 7121518964
 m68k | 6396308550 | 2809338886  | 4069205302 | 5393380388 | 6114386710
 mips | 5416612358 | 2851405680  | 3920631098 | 5215452326 | 5215452326
 mipsel   | 5550145962 | 2819073082  | 3995118416 | 5262682024 | 5262682024
 powerpc  | 7680418788 | 3336303070  | 4780596742 | 6309202432 | 7112407388
 s390 | 6147469798 | 3053291988  | 4427782760 | 5820464436 | 5820464436
 sparc| 7331766068 | 3071979288  | 921552 | 5917654266 | 6790963196

 any means any of:

 experimental
 oldstable
 old-proposed-updates
 proposed-updates
 unstable
 testing
 testing-proposed-updates
 stable

 stable+proposed-updates:

 architecture |size
--+
 all  | 2195553250
 alpha| 2438601088
 arm  | 1951980644
 hppa | 260648
 i386 | 2753622878
 ia64 | 2531882184
 m68k | 1888659560
 mips | 1801959356
 mipsel   | 1763094946
 powerpc  | 2196413794
 s390 | 1947506370
 sparc| 2065059050

 testing+testing-proposed-updates:

 architecture |size
--+
 all  | 3113135590
 alpha| 3050200486
 arm  | 2667813072
 hppa | 2850080658
 i386 | 3378532922
 ia64 | 3394287226
 m68k | 2571810596
 mips | 2569942598
 mipsel   | 2531507858
 powerpc  | 2996108486
 s390 | 2713124396
 sparc| 2740423638

 From the numbers quoted above you can make a reasonable estimation of
 how much unstable and testing overlap.  You can assume
 testing-proposed-updates is empty (you'll be off only by a few MB).  My
 napkin says 50%, which IMO is hideously bad, but that's me.

 Drop a factor of 2-3 somewhere if you want to consider source.

 This data does not come from the filesystem, but from the database used
 to wrangle the whole mess.  Account for 10% wasted space or so for a
 guess of how much space you actually need for a mirror (adapt to your
 filesystem of choice -- information which I don't really care about).

-- 
Marcelo




Re: Work-needing packages report for Aug 29, 2003

2003-08-30 Thread Marcelo E. Magallon
On Sat, Aug 30, 2003 at 06:57:38PM +0200, Simon Richter wrote:

   [NEW] 3dwm (#206870), orphaned 5 days ago
Description: libzorn development files
Reverse Depends: 3dwm-pickclient 3dwm-texclient 3dwm-csgclient
libcelsius-dev libpolhem-dev libgarbo-dev libnobel-dev
3dwm-vncclient libsolid-dev 3dwm-clock 3dwm-server libzorn-dev
3dwm-geoclient
  
  Hrm, I don't think that description matches the package, i.e. there
  might be something wrong with the scripts. Could anyone familiar with
  them please check?

 It is, as strange as it might seem, correct.  Source packages don't
 have descriptions and Martin obviously hacked up something to write the
 bug reports automatically (which I find irritating but it's better than
 the option).  The libzorn-dev description was picked up as the
 description for the source package.

-- 
Marcelo




Re: debian archive disk space requirements.

2003-08-30 Thread Josip Rodin
On Sat, Aug 30, 2003 at 08:25:36PM +0300, Heikki Vatiainen wrote:
 ftp.fi.debian.org has the whole debian/ on the same partition but a
 couple of directories, such as debian-cd/, that were previously on the
 same partition with the mirror root are now mounted from a new
 location with the --bind option.

It's harder within debian/ because you have to hand-pick parts of pool/ to
bind-mount... messy.

-- 
 2. That which causes joy or happiness.




Re: Work-needing packages report for Aug 29, 2003

2003-08-30 Thread Simon Richter
Hi,

 [NEW] 3dwm (#206870), orphaned 5 days ago
  Description: libzorn development files
  Reverse Depends: 3dwm-pickclient 3dwm-texclient 3dwm-csgclient
  libcelsius-dev libpolhem-dev libgarbo-dev libnobel-dev
  3dwm-vncclient libsolid-dev 3dwm-clock 3dwm-server libzorn-dev
  3dwm-geoclient

Hrm, I don't think that description matches the package, i.e. there
might be something wrong with the scripts. Could anyone familiar with
them please check?

   Simon

-- 
GPG Fingerprint: 040E B5F7 84F1 4FBC CEAD  ADC6 18A0 CC8D 5706 A4B4


pgpt2KwqFl1oc.pgp
Description: PGP signature


Re: GDM in sid does not read /etc/environment anymore

2003-08-30 Thread Gustavo Noronha Silva
Em Fri, 29 Aug 2003 16:38:16 -0300, Daniel Ruoso [EMAIL PROTECTED] escreveu:

 I've actually sent him an email but got no answer. I've posted in
 debian-devel few days ago and nobody complained that GDM could source
 /etc/environment in the init script. That's an one-line patch (already
 tagged as patch in bts for more than a year)... 
 
 I think that if the maintainer doesn't take that, a NMU will be
 neecessary.

I don't think that's right. The Right Thing is adding this:

auth   required   pam_env.so

to /etc/pam.d/gdm

My /etc/pam.d/gdm is like this after my own fix:

[EMAIL PROTECTED] $ cat /etc/pam.d/gdm
#%PAM-1.0
 
# This module parses /etc/environment (the standard for setting
# environ vars) and also allows you to use an extended config
# file /etc/security/pam_env.conf.
# (Replaces the `ENVIRON_FILE' setting from login.defs)
auth   required   pam_env.so
 
@include common-auth
@include common-account
@include common-session


-- 
[EMAIL PROTECTED]: Gustavo Noronha http://people.debian.org/~kov
Debian: http://www.debian.org  *  http://www.debian-br.org
Dúvidas sobre o Debian? Visite o Rau-Tu: http://rautu.cipsga.org.br




Re: debian archive disk space requirements.

2003-08-30 Thread Josip Rodin
On Sat, Aug 30, 2003 at 12:18:50PM +0200, Josip Rodin wrote:
 We are still waiting for Joey to officially announce the obsolescence of
 potato on -announce so that it can be moved to archive.debian.org.

I've found out today that Joey doesn't feel there should be any more
announcements. I've sent an e-mail so I guess ftpmasters just need to find
the time to pull out the magic wand, move leftover source packages to pool
update anything else that is necessary, and move old potato stuff out.

-- 
 2. That which causes joy or happiness.




[no subject]

2003-08-30 Thread Dr. Rasoul Shahpari




To whom it may concern 

Pls be informed that we are 
an international company active in the commercial fields of the importation of 
the 
1- 
ironeries
2- 
aluminum , 
copper 
3- 
sugar 

4- 
rice
5- 
food 
grains
6- 
petrochemical 
items
7- 
selling and 
buying of the lands
We are interested to work 
with the investors or the financers or partners or the money lenders in all over 
the world that they want to cooperate in the partnership with 
us,
in case u are interested in 
these businesses with us , u are kindly requested to contact with us 
,
pls be advised that the 
minimum profit that will be guaranteed by our company will be 20% per cent of the total amount of the investment in 
the year , we will guarantee the 
whole capital of your self in this profitable business 

With thanks 

saeed 
bradaran
The managing director of 
the beh azin shargh
http://www.iranazin.net
e-mail: [EMAIL PROTECTED]
00989132583522
meanwhile , pls be informed 
that , I will never , ever pay any thing before or upfront for the different 
fees or expenses that will be occurred by the lawyer or the bank transfer , 
iwill not be responsible for the fees and will never pay anything to u or the 
lawyer or 
etc..,
frankly in case u are 
writing this letter to arrange for the payment of some u.s.d. and with writing 
this letter that u have this amount and try to get some small money like for 
example 8000 , u.s.d. or more and less , I will not pay even one cent upfront in 
any form to anybody , incase the business is okay or real and genuine for the 
investment , of course will not need these tricks and playing , If you will accept my condition . no 
problem , the a/c no of mine is as follows :
CREDIT SUISSE ( HEAD OFFICE 
)  ZURICH
SWIFT CODE : CRESCHZZ80A 

A/C NO. 
903137-44
FOR FURTHER CREDIT TO 
EDB
IN FAVOUR OF  RASOUL 
SHAHPARI
A/C NO.. 
010092971
SENDER TO RECEIVER 
INFORMATION 

PLS TRANSFER UNDER MT 
100/103 MSG
U ARE KINDLY REQUESTED TO 
ARRANGE FOR THE TRANSFER AND THEN COME TO 
IRAN TO MAKE THE INVESTMENTS AND GIVE ME 
UR A/C TO PAY MONTHLY TO UR A/C 
BE ASSURED OF ALL OUR 
SERVICES WITH THE HONESTY 
(HONESTY IS THE BEST POLICY 
)
THANKS 

[EMAIL PROTECTED]


[no subject]

2003-08-30 Thread Dr. Rasoul Shahpari




To whom it may concern 

Pls be informed that we are 
an international company active in the commercial fields of the importation of 
the 
1- 
ironeries
2- 
aluminum , 
copper 
3- 
sugar 

4- 
rice
5- 
food 
grains
6- 
petrochemical 
items
7- 
selling and 
buying of the lands
We are interested to work 
with the investors or the financers or partners or the money lenders in all over 
the world that they want to cooperate in the partnership with 
us,
in case u are interested in 
these businesses with us , u are kindly requested to contact with us 
,
pls be advised that the 
minimum profit that will be guaranteed by our company will be 20% per cent of the total amount of the investment in 
the year , we will guarantee the 
whole capital of your self in this profitable business 

With thanks 

saeed 
bradaran
The managing director of 
the beh azin shargh
http://www.iranazin.net
e-mail: [EMAIL PROTECTED]
00989132583522
meanwhile , pls be informed 
that , I will never , ever pay any thing before or upfront for the different 
fees or expenses that will be occurred by the lawyer or the bank transfer , 
iwill not be responsible for the fees and will never pay anything to u or the 
lawyer or 
etc..,
frankly in case u are 
writing this letter to arrange for the payment of some u.s.d. and with writing 
this letter that u have this amount and try to get some small money like for 
example 8000 , u.s.d. or more and less , I will not pay even one cent upfront in 
any form to anybody , incase the business is okay or real and genuine for the 
investment , of course will not need these tricks and playing , If you will accept my condition . no 
problem , the a/c no of mine is as follows :
CREDIT SUISSE ( HEAD OFFICE 
)  ZURICH
SWIFT CODE : CRESCHZZ80A 

A/C NO. 
903137-44
FOR FURTHER CREDIT TO 
EDB
IN FAVOUR OF  RASOUL 
SHAHPARI
A/C NO.. 
010092971
SENDER TO RECEIVER 
INFORMATION 

PLS TRANSFER UNDER MT 
100/103 MSG
U ARE KINDLY REQUESTED TO 
ARRANGE FOR THE TRANSFER AND THEN COME TO 
IRAN TO MAKE THE INVESTMENTS AND GIVE ME 
UR A/C TO PAY MONTHLY TO UR A/C 
BE ASSURED OF ALL OUR 
SERVICES WITH THE HONESTY 
(HONESTY IS THE BEST POLICY 
)
THANKS 

[EMAIL PROTECTED]


Re: Accepted kaffe 1:1.1.1-1 (i386 source)

2003-08-30 Thread Matt Zimmerman
On Fri, Aug 29, 2003 at 04:34:58PM -0500, Adam Heath wrote:

 On Fri, 29 Aug 2003, Glenn Maynard wrote:
 
  If I report segmentation fault in ls, I--as a user of ls, not a
  developer--couldn't care less about why it was segfaulting or how the
  bug was fixed; I only care that it's been fixed.  If a developer wants
  to spend their limited time researching how the bug was fixed and
  summarizing it in a changelog, great, but it's certainly not something I'd
  expect everyone to do.
 
 It's not about summarizing how the bug was fixed.  It's about summarizing the
 bug *itself* in the changelog.

I certainly prefer it if the changelog tells how the bug was fixed.  This
documents the difference between:

 * New upstream release
   - Removed the entire subsystem which contained this bug (Closes: #xxx)

 * New upstream release
   - Made the foo option create its file with sane permissions (Closes: #xxx)

-- 
 - mdz




Re: Accepted kaffe 1:1.1.1-1 (i386 source)

2003-08-30 Thread Matt Zimmerman
On Sat, Aug 30, 2003 at 08:36:16AM +0200, Andreas Metzler wrote:

 Peter S Galbraith [EMAIL PROTECTED] wrote: [...]
  Right.  I understood both points.  I was wondering about having the bug
  submitter there.  Maybe change the phrasing?
 
 I usually don't list him/her, my changelogs are too long already. I do
 list submitters who send the report by private mail instead of via BTS,
 because othervise they wouldn't have any public record of their help.

I list the submitter when they have provided a patch, so as to provide for
attribution, and therefore credit or blame, as appropriate.

-- 
 - mdz




Re: Accepted kaffe 1:1.1.1-1 (i386 source)

2003-08-30 Thread Matt Zimmerman
On Sat, Aug 30, 2003 at 02:39:01PM -0400, Matt Zimmerman wrote:

 On Sat, Aug 30, 2003 at 08:36:16AM +0200, Andreas Metzler wrote:
 
  Peter S Galbraith [EMAIL PROTECTED] wrote: [...]
   Right.  I understood both points.  I was wondering about having the bug
   submitter there.  Maybe change the phrasing?
  
  I usually don't list him/her, my changelogs are too long already. I do
  list submitters who send the report by private mail instead of via BTS,
  because othervise they wouldn't have any public record of their help.
 
 I list the submitter when they have provided a patch, so as to provide for
 attribution, and therefore credit or blame, as appropriate.

And also, I suppose, if the submitter did a good job of tracking down the
bug and saved me time, and deserved credit for that.

-- 
 - mdz




Re: .iso conflict, discussion of resolution

2003-08-30 Thread Simon Richter
Hi,

 A quick summary of this bug:
 Arson, a KDE CD burning application, includes two .desktop files to
 associate certain files with it:
 /usr/share/mimelnk/application/x-iso.desktop
 /usr/share/mimelnk/application/x-cue.desktop

This sounds like you may want to use an alternative here, so that the
sysadmin can choose which program to associate .iso files with by
default. Of course, users must be able to override this, but I think
that is given (is it?).

Alternatives will have to be supported by any package that brings such a
file, but need no support from unrelated packages. Putting the file in
question into a base package is bad because it may associate the file
with a program that is not installed.

   Simon

-- 
GPG Fingerprint: 040E B5F7 84F1 4FBC CEAD  ADC6 18A0 CC8D 5706 A4B4


pgpvonHOLMhYo.pgp
Description: PGP signature


Re: Accepted kaffe 1:1.1.1-1 (i386 source)

2003-08-30 Thread Branden Robinson
On Sat, Aug 30, 2003 at 02:39:38PM -0400, Matt Zimmerman wrote:
 On Sat, Aug 30, 2003 at 02:39:01PM -0400, Matt Zimmerman wrote:
  I list the submitter when they have provided a patch, so as to provide for
  attribution, and therefore credit or blame, as appropriate.
 
 And also, I suppose, if the submitter did a good job of tracking down the
 bug and saved me time, and deserved credit for that.

Yup.  Both of those scenarios are exactly how I have been using my
thanks messages in the XFree86 changelogs for years.

-- 
G. Branden Robinson|Religion is regarded by the common
Debian GNU/Linux   |people as true, by the wise as
[EMAIL PROTECTED] |false, and by the rulers as useful.
http://people.debian.org/~branden/ |-- Lucius Annaeus Seneca


pgpMvEDC1NHUp.pgp
Description: PGP signature


Re: Accepted kaffe 1:1.1.1-1 (i386 source)

2003-08-30 Thread Branden Robinson
On Sat, Aug 30, 2003 at 11:06:20PM +0900, Junichi Uekawa wrote:
  One big problem with this approach is that the same maintainers who are
  too lazy to write proper entries for bug-closers in their changelog
  entries are going to be too lazy to ensure that a bug report has a
  meaningful summary in the first place.
 
 Maintainers who are lazy cannot be fixed, but some may improve, and 
 the load on those who do write proper changelogs may be lightened.
 
 I'd not expecting perfect results from here... just some improvements.
 Less excuse for making sloppy changelogs :P

Fair enough.  Go for it, then!  :)

-- 
G. Branden Robinson|
Debian GNU/Linux   |   If ignorance is bliss,
[EMAIL PROTECTED] |   is omniscience hell?
http://people.debian.org/~branden/ |


pgpWfmWh3DSws.pgp
Description: PGP signature


overwriting files from modules packages

2003-08-30 Thread martin f krafft
I am the (new) maintainer of bcm5700-source, a modules package for
the broadcom gigabit adapter. The final package,
bcm5700-module-${KVERS}, includes a manpage,
/usr/share/man/man4/bcm5700.4.gz. I just now ran into the problem
that while installing the 2.4.22 image and modules, the
bcm5700-modules-2.4.22 package attempted to install that manpage,
even though bcm5700-modules-2.4.21 already put it there.

This is a special situation, and I am not sure how to handle it.
I don't want to create the manpage in the postinst because then it
would not be under control of the package management system. I could
install a manpage including the version number and simply symlink,
but then it may be that i have symlinked to 2.4.21 even though
2.4.22 includes an updated version, which is the one that's relevant
if I booted 2.4.22.

What to do? I appreciate any advice.

-- 
Please do not CC me when replying to lists; I read them!
 
 .''`. martin f. krafft [EMAIL PROTECTED]
: :'  :proud Debian developer, admin, and user
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver!


pgp93jwMlpSzr.pgp
Description: PGP signature


Re: debian archive disk space requirements.

2003-08-30 Thread Matt Zimmerman
On Sat, Aug 30, 2003 at 11:40:34AM +1000, jason andrade wrote:

 Is there any way to reduce the size of the archive over the next
 4-6 weeks ?

Drop potato?

-- 
 - mdz




Bug#181429: retitle 181429 ITP: grubconf -- Gnoretitle 181429 ITP: grubconf -- Gnome2 based GRUB configuration editor

2003-08-30 Thread Luis R. Rodriguez
retitle 181429 ITP: grubconf -- Gnome2 based GRUB configuration editor
thanks

* Package name : grubconf
Version : 0.5
Upstream Author :   Joseph Monti [EMAIL PROTECTED],
Ryan Scotka [EMAIL PROTECTED]
* URL : http://grubconf.sourceforge.net/
* License : GPL


ABOUT

Grubconf is a Gnome2 based GRUB configuration editor. It provides
an easy to use interface allowing effortless modification of OS's
and the flexibility to configure the most obscure options.
Designed to require minimal user interaction while providing tools
for the most adventurous user.

Grubconf must be run as ROOT. This is to gain access to the
grub configuration file.

Notes: I need a sponsor. The package is ready. 




Re: .iso conflict, discussion of resolution

2003-08-30 Thread Matt Zimmerman
On Fri, Aug 29, 2003 at 10:34:39PM -0700, Mike Markley wrote:

 A quick summary of this bug:
 Arson, a KDE CD burning application, includes two .desktop files to
 associate certain files with it:
 /usr/share/mimelnk/application/x-iso.desktop
 /usr/share/mimelnk/application/x-cue.desktop

And presumably another application also wants to include these files?  Is
KDE's file association system really so broken that two programs cannot both
declare themselves able to handle a certain type of file?

-- 
 - mdz




Re: overwriting files from modules packages

2003-08-30 Thread Matt Zimmerman
On Sat, Aug 30, 2003 at 11:05:40PM +0200, martin f krafft wrote:

 I am the (new) maintainer of bcm5700-source, a modules package for the
 broadcom gigabit adapter. The final package, bcm5700-module-${KVERS},
 includes a manpage, /usr/share/man/man4/bcm5700.4.gz. I just now ran into
 the problem that while installing the 2.4.22 image and modules, the
 bcm5700-modules-2.4.22 package attempted to install that manpage, even
 though bcm5700-modules-2.4.21 already put it there.
 
 This is a special situation, and I am not sure how to handle it.  I don't
 want to create the manpage in the postinst because then it would not be
 under control of the package management system. I could install a manpage
 including the version number and simply symlink, but then it may be that i
 have symlinked to 2.4.21 even though 2.4.22 includes an updated version,
 which is the one that's relevant if I booted 2.4.22.
 
 What to do? I appreciate any advice.

Kernel module packages should be treated with the same care as shared
library packages, since different versions need to coexist.  Anything which
could conflict needs to either be versioned in the filesystem, or moved into
a separate package.

If you want two different versions of documentation, they need to be named
differently.  Alternatively, you can just split the documentation into a
separate package and allow only one version to be installed at once.

-- 
 - mdz




Re: Bug#195214: .iso conflict, discussion of resolution

2003-08-30 Thread Mike Markley
On Sat, Aug 30, 2003 at 08:17:05PM +0200, Simon Richter [EMAIL PROTECTED] 
wrote:
 This sounds like you may want to use an alternative here, so that the
 sysadmin can choose which program to associate .iso files with by
 default. Of course, users must be able to override this, but I think
 that is given (is it?).
 
 Alternatives will have to be supported by any package that brings such a
 file, but need no support from unrelated packages. Putting the file in
 question into a base package is bad because it may associate the file
 with a program that is not installed.

I misspoke about the purpose; these files don't actually associate
file types, just describe them. The only reasona arson and k3b both
provide them is that nothing else currently does.

-- 
Mike Markley [EMAIL PROTECTED]
GPG: 0x3B047084 7FC7 0DC0 EF31 DF83 7313  FE2B 77A8 F36A 3B04 7084




Re: overwriting files from modules packages

2003-08-30 Thread martin f krafft
also sprach Matt Zimmerman [EMAIL PROTECTED] [2003.08.31.0013 +0200]:
 If you want two different versions of documentation, they need to
 be named differently.  Alternatively, you can just split the
 documentation into a separate package and allow only one version
 to be installed at once.

I don't think a single manpage warrants another binary package. So
the only real solution is to put the manpage into
/usr/share/doc/package/docs ...

-- 
Please do not CC me when replying to lists; I read them!
 
 .''`. martin f. krafft [EMAIL PROTECTED]
: :'  :proud Debian developer, admin, and user
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver!


pgpbYIHLfTSCA.pgp
Description: PGP signature


Re: Bug#195214: .iso conflict, discussion of resolution

2003-08-30 Thread Mike Markley
On Sat, Aug 30, 2003 at 02:13:10PM +0200, Stephan Kulow [EMAIL PROTECTED] 
wrote:
 Am Saturday 30 August 2003 08:06 schrieb Chris Cheney:
  Would it be possible to get the two desktop filesi mentioned below merged
  into kdelibs so that arson and k3b are easily installable at the same time?
  I can do the commit myself if you approve.
 
 Approved.
 
 Greetings, Stephan

Thank you, guys. I will remove the files from arson. I'm glad we were
able to get a resolution here. :)

-- 
Mike Markley [EMAIL PROTECTED]
GPG: 0x3B047084 7FC7 0DC0 EF31 DF83 7313  FE2B 77A8 F36A 3B04 7084




Re: debian archive disk space requirements.

2003-08-30 Thread jason andrade
On Sun, 30 Aug 2003, Heikki Vatiainen wrote:

 [I am not on debian-devel but reading the list through Usenet gateway]

i didn't realise debian-devel is gatewayed to a newsgroup.. interesting.

 You may also want to see mount(8) and look for bind from the manual
 page. Since there is not very much about it, I will just quote it
 below. From mount(8):

[...]

 ftp.fi.debian.org has the whole debian/ on the same partition but a
 couple of directories, such as debian-cd/, that were previously on the
 same partition with the mirror root are now mounted from a new
 location with the --bind option.  /etc/fstab also works with bind
 option with something like:

 /newloc/debian-cd /oldloc/debian-cd none bind,noatime,noexec,nodev

 Using bind should keep all mirroring programs happy since they do not
 have to get confused when they find a symlink instead of
 directory.

i'm not entirely sure how this helps unless you mean we can use the
above to start moving parts of the debian tree to different partitions
and then remounting them inside the tree..  this would be a nice
temporary solution except that we have a more complicated architecture
as we have a back end fileserver where everything is mirrored and
front end servers that actually provide the ftp/http/rsync services
which read only NFS mount from the back end..

once you start doing loops and binds on the back end it tends to
fall over with NFS structures :-/

thanks for the tip though.

regards,

-jason




Re: configure web proxy via DHCP server

2003-08-30 Thread Brian May
On Sat, Aug 30, 2003 at 10:30:31AM +0200, Javier Fern?ndez-Sanguino Pe?a wrote:
 All of these, IIRC, provide means to run user-defined scripts for
 autoconfiguration. Setting up the proxy server might be just a manner of
 setting up the http_proxy environment variable depending on your location
 (although some browsers might not use it). 

No, setting http_proxy wont work unless youo log out and back in again,
or at least close all your terminal sessions.

It won't work for programs like Mozilla.
-- 
Brian May [EMAIL PROTECTED]




Re: overwriting files from modules packages

2003-08-30 Thread Matt Zimmerman
On Sun, Aug 31, 2003 at 12:18:26AM +0200, martin f krafft wrote:

 also sprach Matt Zimmerman [EMAIL PROTECTED] [2003.08.31.0013 +0200]:
  If you want two different versions of documentation, they need to
  be named differently.  Alternatively, you can just split the
  documentation into a separate package and allow only one version
  to be installed at once.
 
 I don't think a single manpage warrants another binary package. So
 the only real solution is to put the manpage into
 /usr/share/doc/package/docs ...

Or name it manpage-version.section.

-- 
 - mdz




Re: configure web proxy via DHCP server

2003-08-30 Thread Brian May
On Sat, Aug 30, 2003 at 09:56:38AM -0500, Steve Langasek wrote:
 On the client side, however, at least dhcp3-client requires recompiling
 for each option you want to export to the client hook scripts.  This was

You do? I was kindof hoping that with /etc/dhcp3/dhclient*-hooks.d/,
it would be just a matter of adding an extra script that runs...

 recently done for the netbios options that Samba uses.  I know there are
 many more unexported options that are potentially useful to other
 packages, including ntp timeserver information; it might be nice to
 gather a list of them all at once for submission to the dhcp3
 maintainers, so they're not constantly recompiling to special-case each
 attribute.

Sounds like a good idea...

So we can put the proxy server on the DHCP server, in the form
of a reference to a PAC file.

We can (with modifications) retrieve the reference to the PAC
file on the client.

Then what?

I think that there are two cases:

1. browsers that don't support PAC files, eg. lynx, links, and
w3m probably don't (correct me if I am wrong).

2. browsers that do support PAC files, but need to be configured
to use it for each user on the system.
-- 
Brian May [EMAIL PROTECTED]




Re: configure web proxy via DHCP server

2003-08-30 Thread Steve Langasek
On Sat, Aug 30, 2003 at 11:18:25PM +, Brian May wrote:
 On Sat, Aug 30, 2003 at 09:56:38AM -0500, Steve Langasek wrote:
  On the client side, however, at least dhcp3-client requires recompiling
  for each option you want to export to the client hook scripts.  This was

 You do? I was kindof hoping that with /etc/dhcp3/dhclient*-hooks.d/,
 it would be just a matter of adding an extra script that runs...

Ah, I'm sorry, I misremembered -- the actual problem is not the lack of
option exporting, it's that recent dhcp clients and servers will
negotiate with one another to decide what options will actually be sent
(presumably to reduce the payload size); so unless the dhcp3-client is
configured to explicitly request such options, they won't be sent by the
server.  So strictly speaking, this doesn't have to be done with a
recompile, but it does require the intervention of the dhcp3 maintainers
if you want this support by default (i.e., without an admin having to
edit dhclient.conf).

  recently done for the netbios options that Samba uses.  I know there are
  many more unexported options that are potentially useful to other
  packages, including ntp timeserver information; it might be nice to
  gather a list of them all at once for submission to the dhcp3
  maintainers, so they're not constantly recompiling to special-case each
  attribute.

 Sounds like a good idea...

 So we can put the proxy server on the DHCP server, in the form
 of a reference to a PAC file.

 We can (with modifications) retrieve the reference to the PAC
 file on the client.

 Then what?

 I think that there are two cases:

 1. browsers that don't support PAC files, eg. lynx, links, and
 w3m probably don't (correct me if I am wrong).

 2. browsers that do support PAC files, but need to be configured
 to use it for each user on the system.

For 1. above, I imagine most (if not all) browsers that don't support
javascript /do/ support global config files.  At minimum, therefore,
each such browser package could add its own hook script to
/etc/dhcp3/dhclient-enter-hooks.d/ that would update the config file on
disk.  This still leaves the question of how to refresh the
configuration of any running browsers, but that's probably a question to
be sorted out individually with the respective upstream developers
rather than here.

-- 
Steve Langasek
postmodern programmer


pgp5SZVbioNwN.pgp
Description: PGP signature


Re: configure web proxy via DHCP server

2003-08-30 Thread Marco d'Itri
On Aug 30, Russell Coker [EMAIL PROTECTED] wrote:

 The ideal solution however would be an addition to the DHCP standard for a 
 field to specify this information.  My solution only works AFTER I have 
http://www.wpad.com/

-- 
ciao, |
Marco | [1564 scuoJF5IqmYsk]




Re: debian archive disk space requirements.

2003-08-30 Thread Marco d'Itri
On Aug 30, Josip Rodin [EMAIL PROTECTED] wrote:

 It's harder within debian/ because you have to hand-pick parts of pool/ to
 bind-mount... messy.
BTDT. It's even harder because the archive contain hard links between
random directories.

-- 
ciao, |
Marco | [1565 id6qO1u0SBERA]




Re: debian archive disk space requirements.

2003-08-30 Thread Diego Calleja Garca
El 30 Aug 2003 20:25:36 +0300 Heikki Vatiainen [EMAIL PROTECTED] escribió:

Since Linux 2.4.0 it is possible to remount part of the file
hierarchy somewhere else. The call is
   mount --bind olddir newdir

with 2.6 we also got mount --move olddir newdir 8)




Re: Bug#207300: tmda: Challenge-response is fundamentally broken

2003-08-30 Thread Brian May
On Sat, Aug 30, 2003 at 04:01:19PM +1000, Russell Coker wrote:
  That is the idea behind autorespoonders after all, to tell the sender
  that his mail didn't get through because it didn't meet some required
  criteria.
 
 A SMTP 550 code can convey all the information that is needed for bounces.

There are two problems with this.

1. The modular design of SMTP agents like postfix do not allow 
scanning of messages before the message has been accepted by the
MTA at the SMTP session. I think you would have to add hooks
into smtpd, but that is going to complicate the code.

2. All checks have to be automatic, and there is no chance of manual
review to ensure that the messages where geniune before bouncing it.

The list of known solutions follows:

(nil)


;-)

I have considered to possibility of using something like
zorp to act as a proxy SMTP server between the client and the
real server, but that would not work for encrypted SMTP
communications.

...and Yes, now that I have enabled SSL on my postfix,
at least some spammers do use encrypted SMTP sessions.
-- 
Brian May [EMAIL PROTECTED]




Re: overwriting files from modules packages

2003-08-30 Thread martin f krafft
also sprach Matt Zimmerman [EMAIL PROTECTED] [2003.08.31.0130 +0200]:
  I don't think a single manpage warrants another binary package. So
  the only real solution is to put the manpage into
  /usr/share/doc/package/docs ...
 
 Or name it manpage-version.section.

Which is what I will do, probably. It's just annoying... but
a statement in README.Debian will do...

-- 
Please do not CC me when replying to lists; I read them!
 
 .''`. martin f. krafft [EMAIL PROTECTED]
: :'  :proud Debian developer, admin, and user
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver!


pgpuOrEbjBUo7.pgp
Description: PGP signature


Re: Bug#207300: tmda: Challenge-response is fundamentally broken

2003-08-30 Thread Steve Lamb
On Sat, 30 Aug 2003 23:49:40 +
Brian May [EMAIL PROTECTED] wrote:
 1. The modular design of SMTP agents like postfix do not allow 
 scanning of messages before the message has been accepted by the
 MTA at the SMTP session. I think you would have to add hooks
 into smtpd, but that is going to complicate the code.

Well, that's postfix's problem.  After years of hearing how modular is the
superior method it is kind of ironic that a simple solution is complicated.
 
 2. All checks have to be automatic, and there is no chance of manual
 review to ensure that the messages where geniune before bouncing it.

Trust me, if SA scores it high enough do you really want to worry
about it?  Running SA-Exim here and with sensible defaults I've 550'd most
spam and, after the Bayesian filtering caught up, most of the recent viruses.
I am perfectly capable of of reviewing the messages as I have the option of
saving them for review.  I define the levels at which things get accepted,
rejected or even teergrubed. So far my false positives have been exactly 0 for
rejects as I allow a small window for grey area messages to get through for
the user to manage.  In that window exactly 2 messages were false-positives
and they were/barely/ high enough to be marked as spam.  This has been so
effective I've been working on getting clamav hacked into Spamassassin so that
future virus attacks can be avoided without the painful Bayesian ramp-up.

-- 
 Steve C. Lamb | I'm your priest, I'm your shrink, I'm your
   PGP Key: 8B6E99C5   | main connection to the switchboard of souls.
---+-


pgpV7r5ETQv8e.pgp
Description: PGP signature


Re: Bug#207300: tmda: Challenge-response is fundamentally broken

2003-08-30 Thread Steve Langasek
On Sat, Aug 30, 2003 at 05:26:59PM -0700, Steve Lamb wrote:
 On Sat, 30 Aug 2003 23:49:40 +
 Brian May [EMAIL PROTECTED] wrote:
  1. The modular design of SMTP agents like postfix do not allow 
  scanning of messages before the message has been accepted by the
  MTA at the SMTP session. I think you would have to add hooks
  into smtpd, but that is going to complicate the code.

 Well, that's postfix's problem.  After years of hearing how modular is the
 superior method it is kind of ironic that a simple solution is complicated.

I don't see any reason why postfix couldn't be readily adapted to
support hooks to external program checks, if it really doesn't support
them already.  You can do just about any other kind of check you want to
at any point in the receiving process, external program checks shouldn't
be all that hard to add.

-- 
Steve Langasek
postmodern programmer


pgpShfmHfA2tw.pgp
Description: PGP signature


Re: .iso conflict, discussion of resolution

2003-08-30 Thread Chris Cheney
On Sat, Aug 30, 2003 at 06:08:17PM -0400, Matt Zimmerman wrote:
 On Fri, Aug 29, 2003 at 10:34:39PM -0700, Mike Markley wrote:
 
  A quick summary of this bug:
  Arson, a KDE CD burning application, includes two .desktop files to
  associate certain files with it:
  /usr/share/mimelnk/application/x-iso.desktop
  /usr/share/mimelnk/application/x-cue.desktop
 
 And presumably another application also wants to include these files?  Is
 KDE's file association system really so broken that two programs cannot both
 declare themselves able to handle a certain type of file?

Nope, mime types are completely independent of them declaring if they
support it. That is why the mimetype really belongs in kdelibs itself
and not the 3rd party package.

Chris


pgpbRneFe2HLg.pgp
Description: PGP signature


Re: Bug#207300: tmda: Challenge-response is fundamentally broken

2003-08-30 Thread Karsten M. Self
on Sat, Aug 30, 2003 at 07:44:56AM -0500, John Hasler ([EMAIL PROTECTED]) wrote:
 Brian May writes:
  You saying that any SMTP MTA that sends bounces to unauthenticated
  E-Mail addresses is also broken?
 
 Karsten M. Self writes:
  At the very least, this is a small subset of the incoming mail.
 
 This is about a quarter of my incoming mail.

Which?  Bounces to spoofed senders, or improperly addressed mail?

What prevents you from 550ing this at SMTP connect?

Peace.

-- 
Karsten M. Self kmself@ix.netcom.comhttp://kmself.home.netcom.com/
 What Part of Gestalt don't you understand?
   KQED FM:  The bright spot on the dial:  http://www.kqed.org/fm/


pgpIh22S5cRqH.pgp
Description: PGP signature


Re: GDM in sid does not read /etc/environment anymore

2003-08-30 Thread Gustavo Noronha Silva
Em Sat, 30 Aug 2003 14:31:32 -0300, Daniel Ruoso [EMAIL PROTECTED] escreveu:

 But this doesn't solve the problem that the login screen appears without
 locales... I already have pam_env.so in /etc/pam.d/gdm, but this only
 take effect (maybe I'm wrong) after the user logs in. The greeter will
 still appear without locales. (and that's the bug reported in bts).

Indeed, but the problem is gdm is not reading /etc/environment anymore
when the user logs in. So that also needs to be fixed. I agree with
trying to find LANG in /etc/environment.

[]s!

-- 
[EMAIL PROTECTED]: Gustavo Noronha http://people.debian.org/~kov
Debian: http://www.debian.org  *  http://www.debian-br.org
Dúvidas sobre o Debian? Visite o Rau-Tu: http://rautu.cipsga.org.br




Re: overwriting files from modules packages

2003-08-30 Thread Junichi Uekawa
 Which is what I will do, probably. It's just annoying... but
 a statement in README.Debian will do...

update-alternatives is usually used in managing multiple 
manpages.

I don't know if it's a overkill, but it's somewhat friendlier than documenting 
in README.Debian.



regards,
junichi.




Re: Accepted kaffe 1:1.1.1-1 (i386 source)

2003-08-30 Thread Gunnar Wolf
Glenn Maynard dijo [Fri, Aug 29, 2003 at 04:03:16PM -0400]:
 If I report segmentation fault in ls, I--as a user of ls, not a
 developer--couldn't care less about why it was segfaulting or how the
 bug was fixed; I only care that it's been fixed.  If a developer wants
 to spend their limited time researching how the bug was fixed and
 summarizing it in a changelog, great, but it's certainly not something I'd
 expect everyone to do.
 
 (As a user, I'd certainly be rather annoyed at receiving duplicate close
 reports because someone reopened the bug for frivelous reasons, however.
 I get enough junk mail already.)

Ok, you could not care much about why was it broken and how was it fixed
- but then again, we have a lot of different users somehow different
from you, and I don't think you would be bothered by receiving this
extra information. Some users might find it even useful. Some fellow
developers might be interested in knowing how did you do it.

Greetings,

-- 
Gunnar Wolf - [EMAIL PROTECTED] - (+52-55)5630-9700 ext. 1366
PGP key 1024D/8BB527AF 2001-10-23
Fingerprint: 0C79 D2D1 2C4E 9CE4 5973  F800 D80E F35A 8BB5 27AF




Re: LWN subscription for Debian developers

2003-08-30 Thread Dan Jacobson
Bdale ... I announced a group subscription to lwn.net for Debian
Bdale developers, sponsored by HP...

Debian may be seen as supporting non-disclosure conditions /
protected proprietary information / trade secrets / etc. whatever.

Bdale If you are a Debian developer and want full LWN access, go to
Bdale lwn.net and create an account for yourself (no money is
Bdale required...

But the Debian developer cannot disclose the information seen with non
Debian developers.




Re: Bug#195214: .iso conflict, discussion of resolution

2003-08-30 Thread Matt Zimmerman
On Sat, Aug 30, 2003 at 08:06:18PM -0500, Chris Cheney wrote:

 On Sat, Aug 30, 2003 at 06:08:17PM -0400, Matt Zimmerman wrote:
  On Fri, Aug 29, 2003 at 10:34:39PM -0700, Mike Markley wrote:
  
   A quick summary of this bug:
   Arson, a KDE CD burning application, includes two .desktop files to
   associate certain files with it:
   /usr/share/mimelnk/application/x-iso.desktop
   /usr/share/mimelnk/application/x-cue.desktop
  
  And presumably another application also wants to include these files?  Is
  KDE's file association system really so broken that two programs cannot both
  declare themselves able to handle a certain type of file?
 
 Nope, mime types are completely independent of them declaring if they
 support it. That is why the mimetype really belongs in kdelibs itself
 and not the 3rd party package.

Ah, so these files are to define a MIME type, and not to associate files (as
they were described above).  That makes more sense.

-- 
 - mdz




Re: Bug#207300: tmda: Challenge-response is fundamentally broken

2003-08-30 Thread John Hasler
I wrote:
 This is about a quarter of my incoming mail.

Karsten writes:
 Which?  Bounces to spoofed senders, or improperly addressed mail?

Bounces.

 What prevents you from 550ing this at SMTP connect?

The absence of any such connections.  I'm on a dialup.
-- 
John Hasler
[EMAIL PROTECTED] (John Hasler)
Dancing Horse Hill
Elmwood, WI




Re: LWN subscription for Debian developers

2003-08-30 Thread David B Harris
On Sun, 31 Aug 2003 05:42:06 +0800
Dan Jacobson [EMAIL PROTECTED] wrote:
 Bdale ... I announced a group subscription to lwn.net for Debian
 Bdale developers, sponsored by HP...
 
 Debian may be seen as supporting non-disclosure conditions /
 protected proprietary information / trade secrets / etc. whatever.
 
 Bdale If you are a Debian developer and want full LWN access, go to
 Bdale lwn.net and create an account for yourself (no money is
 Bdale required...
 
 But the Debian developer cannot disclose the information seen with non
 Debian developers.

Jealous? :)


pgpKuaboT6Ya9.pgp
Description: PGP signature


Accepted epplets 0.6.cvs.2001102801-3.1 (i386 source)

2003-08-30 Thread Roland Mas
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 23 Aug 2003 18:10:33 +0200
Source: epplets
Binary: libepplet-dev epplets libepplet0
Architecture: source i386
Version: 0.6.cvs.2001102801-3.1
Distribution: unstable
Urgency: low
Maintainer: Stephen Frost [EMAIL PROTECTED]
Changed-By: Roland Mas [EMAIL PROTECTED]
Description: 
 epplets- The Epplets for the Enlightenment Window Manager
 libepplet-dev - Development files for Epplets
 libepplet0 - The Epplet Shared Libraries
Closes: 199584
Changes: 
 epplets (0.6.cvs.2001102801-3.1) unstable; urgency=low
 .
   * Non-maintainer upload according to the release manager's plan.
   * Added missing Build-Depends: to control file, closes: #199584
Files: 
 2caa04cd9b92faf90b605ce77a672893 710 x11 optional epplets_0.6.cvs.2001102801-3.1.dsc
 1f1ef3fbc93a609700493ced4cc2965e 176957 x11 optional 
epplets_0.6.cvs.2001102801-3.1.diff.gz
 471264364e915585494387483af72a5b 727718 x11 optional 
epplets_0.6.cvs.2001102801-3.1_i386.deb
 efad6eca03eb2bf3763038366a6ce8b5 32896 libs optional 
libepplet0_0.6.cvs.2001102801-3.1_i386.deb
 bcf8d7dc0445334ed28f89a4619d4adb 41806 devel optional 
libepplet-dev_0.6.cvs.2001102801-3.1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/R5VcDqdWtRRIQ/URAoZuAJ42FObMfbqSAueVxL0Gsxyzncu4EACfZnEE
kff3LkI1zh5gY+8YnVltNqI=
=pHg2
-END PGP SIGNATURE-


Accepted:
epplets_0.6.cvs.2001102801-3.1.diff.gz
  to pool/main/e/epplets/epplets_0.6.cvs.2001102801-3.1.diff.gz
epplets_0.6.cvs.2001102801-3.1.dsc
  to pool/main/e/epplets/epplets_0.6.cvs.2001102801-3.1.dsc
epplets_0.6.cvs.2001102801-3.1_i386.deb
  to pool/main/e/epplets/epplets_0.6.cvs.2001102801-3.1_i386.deb
libepplet-dev_0.6.cvs.2001102801-3.1_i386.deb
  to pool/main/e/epplets/libepplet-dev_0.6.cvs.2001102801-3.1_i386.deb
libepplet0_0.6.cvs.2001102801-3.1_i386.deb
  to pool/main/e/epplets/libepplet0_0.6.cvs.2001102801-3.1_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted libtangram-perl 2.04-3.1 (all source)

2003-08-30 Thread Joey Hess
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 22 Aug 2003 21:22:53 -0400
Source: libtangram-perl
Binary: libtangram-perl
Architecture: source all
Version: 2.04-3.1
Distribution: unstable
Urgency: low
Maintainer: Stephen Zander [EMAIL PROTECTED]
Changed-By: Joey Hess [EMAIL PROTECTED]
Description: 
 libtangram-perl - Orthogonal Object Persistence in Relational Databases
Closes: 202164
Changes: 
 libtangram-perl (2.04-3.1) unstable; urgency=low
 .
   * NMU
   * Use Scalar::Utils for weakrefs when possible. Dropped suggests of
 obsolete libweakref-perl package. Closes: #202164
Files: 
 54fe62cf3fbb30a4eef8dc94753be306 647 interpreters optional 
libtangram-perl_2.04-3.1.dsc
 4e4513617c7a1db383b86d3f448a21d2 3839 interpreters optional 
libtangram-perl_2.04-3.1.diff.gz
 4daaa05b68d038d9762d29c15b406231 167694 interpreters optional 
libtangram-perl_2.04-3.1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/RsJa2tp5zXiKP0wRAov0AJ41n499MUdGMc8P2oGANmXNZBNCJwCfceid
Cq4X/OL+qFYYdaQ8xTxfXD0=
=EfFw
-END PGP SIGNATURE-


Accepted:
libtangram-perl_2.04-3.1.diff.gz
  to pool/main/libt/libtangram-perl/libtangram-perl_2.04-3.1.diff.gz
libtangram-perl_2.04-3.1.dsc
  to pool/main/libt/libtangram-perl/libtangram-perl_2.04-3.1.dsc
libtangram-perl_2.04-3.1_all.deb
  to pool/main/libt/libtangram-perl/libtangram-perl_2.04-3.1_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted shorewall 1.4.7b1-1 (all source)

2003-08-30 Thread Lorenzo Martignoni
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 27 Aug 2003 09:50:33 +0200
Source: shorewall
Binary: shorewall shorewall-doc
Architecture: source all
Version: 1.4.7b1-1
Distribution: unstable
Urgency: low
Maintainer: [EMAIL PROTECTED]
Changed-By: Lorenzo Martignoni [EMAIL PROTECTED]
Description: 
 shorewall  - Shoreline Firewall (Shorewall)
 shorewall-doc - Shoreline Firewall (Shorewall) Documentation
Closes: 201186 203201
Changes: 
 shorewall (1.4.7b1-1) unstable; urgency=low
 .
   * New upstream beta release
   * the new version works with kernel 2.6.x (closes: #201186)
   * patched the contrib script wait4ifup in order avoid problem when calling
 sleep 0.5. If the system uses a different locale the script could fail
 because in some country ',' is used instead of '.'.  The script now sets
 internally LANG to C (closes: #203201)
Files: 
 41ea622dc2d8558c2e522b993f924428 733 net optional shorewall_1.4.7b1-1.dsc
 b99def162851a5d9e369814f4760a705 2294132 net optional shorewall_1.4.7b1.orig.tar.gz
 bcf717568e5de43cd4e9528c78c36bf4 38924 net optional shorewall_1.4.7b1-1.diff.gz
 66c1f6eb3a4a250b16f7ec7d26f4c4a8 82996 net optional shorewall_1.4.7b1-1_all.deb
 1a0b0a3098f15a8830f59e3b0e48b84f 2235448 doc optional shorewall-doc_1.4.7b1-1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQE/T9s/StlRaw+TLJwRAv10AKCyirZdDEkU0T/shMfvKvapL7fRtwCgjlle
vcVJZbTfEOXq9b4gYM+5q00=
=T4Nb
-END PGP SIGNATURE-


Accepted:
shorewall-doc_1.4.7b1-1_all.deb
  to pool/main/s/shorewall/shorewall-doc_1.4.7b1-1_all.deb
shorewall_1.4.7b1-1.diff.gz
  to pool/main/s/shorewall/shorewall_1.4.7b1-1.diff.gz
shorewall_1.4.7b1-1.dsc
  to pool/main/s/shorewall/shorewall_1.4.7b1-1.dsc
shorewall_1.4.7b1-1_all.deb
  to pool/main/s/shorewall/shorewall_1.4.7b1-1_all.deb
shorewall_1.4.7b1.orig.tar.gz
  to pool/main/s/shorewall/shorewall_1.4.7b1.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted rumba-manifold 1.0.2-2 (i386 source)

2003-08-30 Thread Barak A. Pearlmutter
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 24 Jul 2003 16:54:27 -0600
Source: rumba-manifold
Binary: librumba-dev librumba1 rumba-manifold-demo
Architecture: source i386
Version: 1.0.2-2
Distribution: unstable
Urgency: low
Maintainer: Barak A. Pearlmutter [EMAIL PROTECTED]
Changed-By: Barak A. Pearlmutter [EMAIL PROTECTED]
Description: 
 librumba-dev - Main library of RUMBA brain imaging system (development files)
 librumba1  - Main library of RUMBA brain imaging system
 rumba-manifold-demo - Sample programs that use RUMBA brain imaging main library
Closes: 202032
Changes: 
 rumba-manifold (1.0.2-2) unstable; urgency=low
 .
   * include patches from Daniel Schepler (closes: #202032)
Files: 
 580cad0a457dee1d75f93338a8e0e15e 653 - optional rumba-manifold_1.0.2-2.dsc
 659af23e70468503170fc01ff2027a81 24490 - optional rumba-manifold_1.0.2-2.diff.gz
 d10da914b5624bc1aaf10c747d3aef01 29660 libdevel optional librumba-dev_1.0.2-2_i386.deb
 ac317ec1fa6cc9343b550b931928d0e0 174210 libs optional librumba1_1.0.2-2_i386.deb
 3d55a98b9930908438985f0d9b5e9a32 180350 science optional 
rumba-manifold-demo_1.0.2-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/T98OLz4Gnv7CP7IRAvGKAJ0bT4xzO8ol4bCHkZec8ELQ4G6d7QCdGR8Y
TbkdTOnKXu+Ni1S6vWcP5kQ=
=jHsk
-END PGP SIGNATURE-


Accepted:
librumba-dev_1.0.2-2_i386.deb
  to pool/main/r/rumba-manifold/librumba-dev_1.0.2-2_i386.deb
librumba1_1.0.2-2_i386.deb
  to pool/main/r/rumba-manifold/librumba1_1.0.2-2_i386.deb
rumba-manifold-demo_1.0.2-2_i386.deb
  to pool/main/r/rumba-manifold/rumba-manifold-demo_1.0.2-2_i386.deb
rumba-manifold_1.0.2-2.diff.gz
  to pool/main/r/rumba-manifold/rumba-manifold_1.0.2-2.diff.gz
rumba-manifold_1.0.2-2.dsc
  to pool/main/r/rumba-manifold/rumba-manifold_1.0.2-2.dsc


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted rumba-base 1.0.2-3 (i386 source)

2003-08-30 Thread Barak A. Pearlmutter
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 29 Aug 2003 17:06:56 -0600
Source: rumba-base
Binary: librumbabase-dev librumbabase1
Architecture: source i386
Version: 1.0.2-3
Distribution: unstable
Urgency: low
Maintainer: Barak A. Pearlmutter [EMAIL PROTECTED]
Changed-By: Barak A. Pearlmutter [EMAIL PROTECTED]
Description: 
 librumbabase-dev - Base library of RUMBA brain imaging system (development files)
 librumbabase1 - Base library of RUMBA brain imaging system
Changes: 
 rumba-base (1.0.2-3) unstable; urgency=low
 .
   * rev standard
Files: 
 22ae81796705a2e27129ba26338aa27e 599 - optional rumba-base_1.0.2-3.dsc
 9a21dfd1d66fba217f9f6c61286e14ee 32437 - optional rumba-base_1.0.2-3.diff.gz
 079c46eb4ad3ec052473bf3a49239fd5 94260 libdevel optional 
librumbabase-dev_1.0.2-3_i386.deb
 e46ca42801cbf0eb68e819b7218686b7 68018 libs optional librumbabase1_1.0.2-3_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/T91XLz4Gnv7CP7IRAmTNAKCaU9Jucf9QHATAUTVzbzS3dHsiIgCglfBO
57BTIqbYt6N6+zRVgTDYKfw=
=W7Cl
-END PGP SIGNATURE-


Accepted:
librumbabase-dev_1.0.2-3_i386.deb
  to pool/main/r/rumba-base/librumbabase-dev_1.0.2-3_i386.deb
librumbabase1_1.0.2-3_i386.deb
  to pool/main/r/rumba-base/librumbabase1_1.0.2-3_i386.deb
rumba-base_1.0.2-3.diff.gz
  to pool/main/r/rumba-base/rumba-base_1.0.2-3.diff.gz
rumba-base_1.0.2-3.dsc
  to pool/main/r/rumba-base/rumba-base_1.0.2-3.dsc


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted nessus-core 2.0.7-2 (i386 source all)

2003-08-30 Thread Javier Fernandez-Sanguino Pen~a
-BEGIN PGP SIGNED MESSAGE-

Format: 1.7
Date: Sat, 30 Aug 2003 01:29:19 +0200
Source: nessus-core
Binary: nessus nessusd nessus-dev
Architecture: source i386 all
Version: 2.0.7-2
Distribution: unstable
Urgency: low
Maintainer: Josip Rodin [EMAIL PROTECTED]
Changed-By: Javier Fernandez-Sanguino Pen~a [EMAIL PROTECTED]
Description: 
 nessus - Remote network security auditor, the client
 nessus-dev - Nessus development header files
 nessusd- Remote network security auditor, the server
Closes: 200947 204872
Changes: 
 nessus-core (2.0.7-2) unstable; urgency=low
 .
   * Tightened Build-Depends, now depends on libnessus-dev = 2.0.7
   (Closes: #200947)
   * Provided nessusd.con now uses 'max_checks' instead of 'max_threads'
   (Closes: #204872)
Files: 
 6c63531931bc7e399a9bc676c34ab111 932 admin optional nessus-core_2.0.7-2.dsc
 e389b9439b624855c40f9ec3e2e20e79 36512 admin optional nessus-core_2.0.7-2.diff.gz
 0dae4c030d48a135b9bd30a844e3468e 30620 devel optional nessus-dev_2.0.7-2_all.deb
 0c67c3ae0296d286d3405644a4f824a5 250178 admin optional nessus_2.0.7-2_i386.deb
 ec441e973f576a7756312c55147c2014 150258 admin optional nessusd_2.0.7-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: 2.6.3ia
Charset: noconv

iQCVAwUBP0/mSftEPvakNq0lAQFmLAP+PZ7tBcyUzsjagkXzcxPbiKAURPQF6E/q
amkiCBnk48p5XwS2aDQw4uHafFfU3cSqeaCJbrga8i8esvJ8r6DKJSUkc7XECo1N
DojoZHaC5y/dOwMw220hfGNR4bCHOP7YCME2TP3qudRV3fet7KCbMicwtXm2l+lJ
n3F66aTgiJQ=
=dWCb
-END PGP SIGNATURE-


Accepted:
nessus-core_2.0.7-2.diff.gz
  to pool/main/n/nessus-core/nessus-core_2.0.7-2.diff.gz
nessus-core_2.0.7-2.dsc
  to pool/main/n/nessus-core/nessus-core_2.0.7-2.dsc
nessus-dev_2.0.7-2_all.deb
  to pool/main/n/nessus-core/nessus-dev_2.0.7-2_all.deb
nessus_2.0.7-2_i386.deb
  to pool/main/n/nessus-core/nessus_2.0.7-2_i386.deb
nessusd_2.0.7-2_i386.deb
  to pool/main/n/nessus-core/nessusd_2.0.7-2_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted gtkmm2.0 2.2.7-1 (i386 source all)

2003-08-30 Thread Bradley Bell
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 25 Aug 2003 10:15:19 -0700
Source: gtkmm2.0
Binary: libgtkmm2.0-1c102 libgtkmm2.0-doc libgtkmm2.0-dev
Architecture: source i386 all
Version: 2.2.7-1
Distribution: unstable
Urgency: low
Maintainer: Bradley Bell [EMAIL PROTECTED]
Changed-By: Bradley Bell [EMAIL PROTECTED]
Description: 
 libgtkmm2.0-1c102 - C++ wrappers for GTK+ 2.0 (shared libraries)
 libgtkmm2.0-dev - C++ wrappers for GTK+ 2.0 (development files)
 libgtkmm2.0-doc - C++ wrappers for GTK+ 2.0 (documentation)
Changes: 
 gtkmm2.0 (2.2.7-1) unstable; urgency=low
 .
   * New upstream release
Files: 
 d52a83e2434801ce2a2bd7d8e89bd1f7 727 libs optional gtkmm2.0_2.2.7-1.dsc
 47c67dfdc801ef2d4c95408dcf7ecd81 5373968 libs optional gtkmm2.0_2.2.7.orig.tar.gz
 1b9114577108ec694630b0cea32b1604 60982 libs optional gtkmm2.0_2.2.7-1.diff.gz
 b767ad8278a9dd7d7838f5b4a380bbf0 3153642 doc optional libgtkmm2.0-doc_2.2.7-1_all.deb
 9bab37579e5270ba1682363defb6aaa3 1588636 libdevel optional 
libgtkmm2.0-dev_2.2.7-1_i386.deb
 9c972b1c6e72b4d4c31874980db8c24c 928992 libs optional 
libgtkmm2.0-1c102_2.2.7-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/SlWwteAcXeZ40aERAttiAJ9f7/aeh47rbEmhzW5oTyZW6fiAbQCg3RlB
Am43W/1HktgMhMvjJ6nodgs=
=efTv
-END PGP SIGNATURE-


Accepted:
gtkmm2.0_2.2.7-1.diff.gz
  to pool/main/g/gtkmm2.0/gtkmm2.0_2.2.7-1.diff.gz
gtkmm2.0_2.2.7-1.dsc
  to pool/main/g/gtkmm2.0/gtkmm2.0_2.2.7-1.dsc
gtkmm2.0_2.2.7.orig.tar.gz
  to pool/main/g/gtkmm2.0/gtkmm2.0_2.2.7.orig.tar.gz
libgtkmm2.0-1c102_2.2.7-1_i386.deb
  to pool/main/g/gtkmm2.0/libgtkmm2.0-1c102_2.2.7-1_i386.deb
libgtkmm2.0-dev_2.2.7-1_i386.deb
  to pool/main/g/gtkmm2.0/libgtkmm2.0-dev_2.2.7-1_i386.deb
libgtkmm2.0-doc_2.2.7-1_all.deb
  to pool/main/g/gtkmm2.0/libgtkmm2.0-doc_2.2.7-1_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted libglademm2.0 2.1.0-1 (i386 source)

2003-08-30 Thread Bradley Bell
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 29 Aug 2003 16:36:47 -0700
Source: libglademm2.0
Binary: libglademm2.0-dev libglademm2.0-1c102
Architecture: source i386
Version: 2.1.0-1
Distribution: unstable
Urgency: low
Maintainer: Bradley Bell [EMAIL PROTECTED]
Changed-By: Bradley Bell [EMAIL PROTECTED]
Description: 
 libglademm2.0-1c102 - C++ wrappers for libglade2 (shared library)
 libglademm2.0-dev - C++ wrappers for libglade2 (development files)
Changes: 
 libglademm2.0 (2.1.0-1) unstable; urgency=low
 .
   * New upstream release
Files: 
 cb84f2592646df291437f8f85dd6df17 694 libs optional libglademm2.0_2.1.0-1.dsc
 bc63040ccc7317fe508c25b96d4f8f37 333567 libs optional libglademm2.0_2.1.0.orig.tar.gz
 193e95470db7fa2675ac08f796439bb4 21345 libs optional libglademm2.0_2.1.0-1.diff.gz
 c81f2c83aa2bdc3e8fe2e72bd8805d3a 1295076 devel optional 
libglademm2.0-dev_2.1.0-1_i386.deb
 6cc120fd95b68ee4dc648b0a73b5360c 18834 libs optional 
libglademm2.0-1c102_2.1.0-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/T+YxteAcXeZ40aERAvr1AKCIx4/11BtyttShoqaS+OXtXsBwzgCeOnbV
LiZLgn7Bf8frF0MaAR1vT1Y=
=BnfV
-END PGP SIGNATURE-


Accepted:
libglademm2.0-1c102_2.1.0-1_i386.deb
  to pool/main/libg/libglademm2.0/libglademm2.0-1c102_2.1.0-1_i386.deb
libglademm2.0-dev_2.1.0-1_i386.deb
  to pool/main/libg/libglademm2.0/libglademm2.0-dev_2.1.0-1_i386.deb
libglademm2.0_2.1.0-1.diff.gz
  to pool/main/libg/libglademm2.0/libglademm2.0_2.1.0-1.diff.gz
libglademm2.0_2.1.0-1.dsc
  to pool/main/libg/libglademm2.0/libglademm2.0_2.1.0-1.dsc
libglademm2.0_2.1.0.orig.tar.gz
  to pool/main/libg/libglademm2.0/libglademm2.0_2.1.0.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted nessus-plugins 2.0.7-2 (i386 source)

2003-08-30 Thread Javier Fernandez-Sanguino Pen~a
-BEGIN PGP SIGNED MESSAGE-

Format: 1.7
Date: Sat, 30 Aug 2003 01:43:09 +0200
Source: nessus-plugins
Binary: nessus-plugins
Architecture: source i386
Version: 2.0.7-2
Distribution: unstable
Urgency: low
Maintainer: Josip Rodin [EMAIL PROTECTED]
Changed-By: Javier Fernandez-Sanguino Pen~a [EMAIL PROTECTED]
Description: 
 nessus-plugins - Nessus plugins
Closes: 201591 204830
Changes: 
 nessus-plugins (2.0.7-2) unstable; urgency=low
 .
   * Localstatedir is now defined as /var/lib/ instead of
   /var/lib/nessus/, which makes nessus-update-plugins work correctly
   now (Closes: #204830)
   * Substituted buggy nmap-wrapper with the  1.101 version in the CVS
   which now compiles fine (and also provides support for nmap 3.0)
   (Closes: #201591)
Files: 
 0a2ad46a4e1134baccb9ee93d3fab38c 860 admin optional nessus-plugins_2.0.7-2.dsc
 55658aa47d3fafbc684f64de899a6120 44987 admin optional nessus-plugins_2.0.7-2.diff.gz
 bb0bbee63b82a3c9460ca5b37eac2596 1270144 admin optional 
nessus-plugins_2.0.7-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: 2.6.3ia
Charset: noconv

iQCVAwUBP0/rCPtEPvakNq0lAQEphwP/cFhaHQi8YYzN/CCwduP85tJF+g7OmcSL
9SD7jAcZBtgsYsGp8Orxw8vJa9EuKXMgXdzWGiWompzNuKUuMHdrccFMmo0qOets
pQBm5JMj84x9BZWQBoDfEHYO6kRHT00iyNz/GYxym6ps2iaKyvVtS8XK67OJsD5p
4jXpy69z82c=
=UpSm
-END PGP SIGNATURE-


Accepted:
nessus-plugins_2.0.7-2.diff.gz
  to pool/main/n/nessus-plugins/nessus-plugins_2.0.7-2.diff.gz
nessus-plugins_2.0.7-2.dsc
  to pool/main/n/nessus-plugins/nessus-plugins_2.0.7-2.dsc
nessus-plugins_2.0.7-2_i386.deb
  to pool/main/n/nessus-plugins/nessus-plugins_2.0.7-2_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted tin 1:1.7.1+20030828-1 (i386 source)

2003-08-30 Thread Marco d'Itri
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 30 Aug 2003 01:16:48 +0200
Source: tin
Binary: tin
Architecture: source i386
Version: 1:1.7.1+20030828-1
Distribution: unstable
Urgency: medium
Maintainer: Marco d'Itri [EMAIL PROTECTED]
Changed-By: Marco d'Itri [EMAIL PROTECTED]
Description: 
 tin- A full-screen easy to use Usenet newsreader
Closes: 188052 200524 205447
Changes: 
 tin (1:1.7.1+20030828-1) unstable; urgency=medium
 .
   * New upstream snapshot. (Closes: #188052)
   * Added support for /etc/news/organization. (Closes: #205447)
   * Fixed memory deallocation error at exit time on powerpc. (Closes: #200524)
   * Added libcanlock version 2a.
Files: 
 151e84ca0b890a13970c4f42f31b25e2 609 news optional tin_1.7.1+20030828-1.dsc
 c685200f78be34cc3dab8e0be088fc62 1564397 news optional tin_1.7.1+20030828.orig.tar.gz
 e97badbec7adb312fedd2d86cc01e4e3 16936 news optional tin_1.7.1+20030828-1.diff.gz
 315c7d8a20f2fe16660fa40be1dc86c0 461714 news optional tin_1.7.1+20030828-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/T+mpFGfw2OHuP7ERArvtAJ94iYjM5Jh4oca+ffIDyCobo1uuKACfYPaQ
weZCOVCRnKRh+dfsaV2AMmk=
=869m
-END PGP SIGNATURE-


Accepted:
tin_1.7.1+20030828-1.diff.gz
  to pool/main/t/tin/tin_1.7.1+20030828-1.diff.gz
tin_1.7.1+20030828-1.dsc
  to pool/main/t/tin/tin_1.7.1+20030828-1.dsc
tin_1.7.1+20030828-1_i386.deb
  to pool/main/t/tin/tin_1.7.1+20030828-1_i386.deb
tin_1.7.1+20030828.orig.tar.gz
  to pool/main/t/tin/tin_1.7.1+20030828.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted libnasl 2.0.7-2 (i386 source)

2003-08-30 Thread Javier Fernandez-Sanguino Pen~a
-BEGIN PGP SIGNED MESSAGE-

Format: 1.7
Date: Sat, 30 Aug 2003 02:15:32 +0200
Source: libnasl
Binary: libnasl2 libnasl-dev
Architecture: source i386
Version: 2.0.7-2
Distribution: unstable
Urgency: low
Maintainer: Josip Rodin [EMAIL PROTECTED]
Changed-By: Javier Fernandez-Sanguino Pen~a [EMAIL PROTECTED]
Description: 
 libnasl-dev - Nessus Attack Scripting Language, static library and headers
 libnasl2   - Nessus Attack Scripting Language, shared library
Closes: 200946
Changes: 
 libnasl (2.0.7-2) unstable; urgency=low
 .
   * Tightened Build-Depends by making it depend on version 2.0.7 or above
(Closes: #200946)
Files: 
 c1cbbb8e891358723c784c7b770c9f7f 849 libs optional libnasl_2.0.7-2.dsc
 20c58a6533777fc85a401b54106c13e4 52761 libs optional libnasl_2.0.7-2.diff.gz
 75722c68b2a76ab248a9113446af2538 72122 libs optional libnasl2_2.0.7-2_i386.deb
 190c79a7df0302a9fe80d7b74a6de563 309306 libdevel optional libnasl-dev_2.0.7-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: 2.6.3ia
Charset: noconv

iQCVAwUBP0/u//tEPvakNq0lAQFr8wP+Pr7u+27pAqaNRblXtWmo3N1ZhxTEYGXV
lO6swBk6xFElFNaPdGe9RWB3Mnt1hFjjl1c2L2FrrzOd25dMnBawgpbIAXaB37SA
Qt9fXxT1KH5UWlM1du+NvW1hgCBoLYyN0hD9P5nYKntgN/f/N6cb4FSyLNIMPyqm
zVGY74UCW3o=
=MrBB
-END PGP SIGNATURE-


Accepted:
libnasl-dev_2.0.7-2_i386.deb
  to pool/main/libn/libnasl/libnasl-dev_2.0.7-2_i386.deb
libnasl2_2.0.7-2_i386.deb
  to pool/main/libn/libnasl/libnasl2_2.0.7-2_i386.deb
libnasl_2.0.7-2.diff.gz
  to pool/main/libn/libnasl/libnasl_2.0.7-2.diff.gz
libnasl_2.0.7-2.dsc
  to pool/main/libn/libnasl/libnasl_2.0.7-2.dsc


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted semi 1.14.5+20030813-2 (all source)

2003-08-30 Thread Tatsuya Kinoshita
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 27 Aug 2003 07:11:11 +0900
Source: semi
Binary: semi
Architecture: source all
Version: 1.14.5+20030813-2
Distribution: unstable
Urgency: low
Maintainer: Tatsuya Kinoshita [EMAIL PROTECTED]
Changed-By: Tatsuya Kinoshita [EMAIL PROTECTED]
Description: 
 semi   - Library to provide MIME feature for Emacsen
Changes: 
 semi (1.14.5+20030813-2) unstable; urgency=low
 .
   * sponsored by OHASHI Akira [EMAIL PROTECTED]
   * pgg-gpg.el (pgg-gpg-process-region): Set environment variables
 LANGUAGE, LC_ALL, and LANG to C to prevent non-ascii problem.
 (patch from [emacs-mime-ja:01459] on 2003-08-26)
   * debian/control (Standards-Version): 3.6.0 - 3.6.1.
Files: 
 b8ae64dc52bb92c09e353ac80f06308f 600 mail optional semi_1.14.5+20030813-2.dsc
 6e909c5ec9d575cb5631e30b79ab7c67 9530 mail optional semi_1.14.5+20030813-2.diff.gz
 505d1a4c60312ea47775e8f5d3e2eea8 175880 mail optional semi_1.14.5+20030813-2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/T+0k+pahSABNprQRAk+SAKCFm3tjtTJOzAIth06ene+/ShfdqwCeIBb9
OVaJ3H8vqKw90XvY56S0he8=
=ZuXO
-END PGP SIGNATURE-


Accepted:
semi_1.14.5+20030813-2.diff.gz
  to pool/main/s/semi/semi_1.14.5+20030813-2.diff.gz
semi_1.14.5+20030813-2.dsc
  to pool/main/s/semi/semi_1.14.5+20030813-2.dsc
semi_1.14.5+20030813-2_all.deb
  to pool/main/s/semi/semi_1.14.5+20030813-2_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted librsvg2 2.2.5-1.2 (i386 source)

2003-08-30 Thread Sebastien Bacher
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 30 Aug 2003 02:25:24 +0200
Source: librsvg2
Binary: librsvg2-2 librsvg2-common librsvg2-dev
Architecture: source i386
Version: 2.2.5-1.2
Distribution: unstable
Urgency: low
Maintainer: Takuo KITAME [EMAIL PROTECTED]
Changed-By: Sebastien Bacher [EMAIL PROTECTED]
Description: 
 librsvg2-2 - SAX-based renderer library for SVG files. (for GNOME2)
 librsvg2-common - SAX-based renderer library for SVG files. (for GNOME2)
 librsvg2-dev - SAX-based renderer library for SVG files.(development files)
Closes: 207785
Changes: 
 librsvg2 (2.2.5-1.2) unstable; urgency=low
 .
   * Changed section to libdevel to fix override disparity.
   * Added libgsf-1-dev to Build-Depends (Closes: #207785).
Files: 
 f2a9cc7c70bccaaedd10600de80a41a5 722 libdevel optional librsvg2_2.2.5-1.2.dsc
 3be93ab0a0c3388ddbce539a549ae9cb 118202 libdevel optional librsvg2_2.2.5-1.2.diff.gz
 576b44042f78b9c3f92ad3efa9a1044b 54744 devel optional librsvg2-dev_2.2.5-1.2_i386.deb
 7b84026fc6462f74f217670cec1b7b1a 50430 libs optional librsvg2-2_2.2.5-1.2_i386.deb
 203dc742d4438ac1c7d0a2d4829e4387 33888 libs optional 
librsvg2-common_2.2.5-1.2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQE/T/BjQxo87aLX0pIRAiq+AKCNZuHdvxQoBaq8u4GkimPG0uSKFQCeKq2n
91TqAFWXcRGlsvbiTxR/vSw=
=dtjr
-END PGP SIGNATURE-


Accepted:
librsvg2-2_2.2.5-1.2_i386.deb
  to pool/main/libr/librsvg2/librsvg2-2_2.2.5-1.2_i386.deb
librsvg2-common_2.2.5-1.2_i386.deb
  to pool/main/libr/librsvg2/librsvg2-common_2.2.5-1.2_i386.deb
librsvg2-dev_2.2.5-1.2_i386.deb
  to pool/main/libr/librsvg2/librsvg2-dev_2.2.5-1.2_i386.deb
librsvg2_2.2.5-1.2.diff.gz
  to pool/main/libr/librsvg2/librsvg2_2.2.5-1.2.diff.gz
librsvg2_2.2.5-1.2.dsc
  to pool/main/libr/librsvg2/librsvg2_2.2.5-1.2.dsc


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted libgnomecanvasmm2.0 2.0.1-1 (i386 source)

2003-08-30 Thread Bradley Bell
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 29 Aug 2003 16:53:57 -0700
Source: libgnomecanvasmm2.0
Binary: libgnomecanvasmm2.0-1c102 libgnomecanvasmm2.0-dev
Architecture: source i386
Version: 2.0.1-1
Distribution: unstable
Urgency: low
Maintainer: Bradley Bell [EMAIL PROTECTED]
Changed-By: Bradley Bell [EMAIL PROTECTED]
Description: 
 libgnomecanvasmm2.0-1c102 - C++ wrappers for libgnomecanvas2 (shared library)
 libgnomecanvasmm2.0-dev - C++ wrappers for libgnomecanvas2 (development files)
Changes: 
 libgnomecanvasmm2.0 (2.0.1-1) unstable; urgency=low
 .
   * New upstream release
Files: 
 b4dc92040726dc7ce211ad2e8d6a1046 730 libs optional libgnomecanvasmm2.0_2.0.1-1.dsc
 bf05e2d85c0e10aa29dc6d451a52b3bf 421895 libs optional 
libgnomecanvasmm2.0_2.0.1.orig.tar.gz
 116aeb36db9a637afa73a6f059e5ad6d 21380 libs optional 
libgnomecanvasmm2.0_2.0.1-1.diff.gz
 5dfc3bf8245b7948b78273ab444afefe 322908 libdevel optional 
libgnomecanvasmm2.0-dev_2.0.1-1_i386.deb
 aabe5e5d02e8aaecc4566865b11add8f 76876 libs optional 
libgnomecanvasmm2.0-1c102_2.0.1-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/T/iRteAcXeZ40aERAmwrAKDMnGofsPgX1y2CjXqiUyDAXUnlwwCfabEz
r39upHZq6lBYqdN5VgghvIU=
=HJSh
-END PGP SIGNATURE-


Accepted:
libgnomecanvasmm2.0-1c102_2.0.1-1_i386.deb
  to pool/main/libg/libgnomecanvasmm2.0/libgnomecanvasmm2.0-1c102_2.0.1-1_i386.deb
libgnomecanvasmm2.0-dev_2.0.1-1_i386.deb
  to pool/main/libg/libgnomecanvasmm2.0/libgnomecanvasmm2.0-dev_2.0.1-1_i386.deb
libgnomecanvasmm2.0_2.0.1-1.diff.gz
  to pool/main/libg/libgnomecanvasmm2.0/libgnomecanvasmm2.0_2.0.1-1.diff.gz
libgnomecanvasmm2.0_2.0.1-1.dsc
  to pool/main/libg/libgnomecanvasmm2.0/libgnomecanvasmm2.0_2.0.1-1.dsc
libgnomecanvasmm2.0_2.0.1.orig.tar.gz
  to pool/main/libg/libgnomecanvasmm2.0/libgnomecanvasmm2.0_2.0.1.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted parted 1.6.5-3 (i386 source all)

2003-08-30 Thread Timshel Knoll
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 30 Aug 2003 10:44:52 +1000
Source: parted
Binary: parted-bf libparted1.6-i18n libparted1.6-dbg parted-udeb parted-doc 
libparted1.6-0 libparted1.6-dev libparted1.6-udeb parted
Architecture: source i386 all
Version: 1.6.5-3
Distribution: unstable
Urgency: low
Maintainer: Timshel Knoll [EMAIL PROTECTED]
Changed-By: Timshel Knoll [EMAIL PROTECTED]
Description: 
 libparted1.6-0 - The GNU Parted disk partitioning shared library
 libparted1.6-dbg - The GNU Parted disk partitioning library debug development files
 libparted1.6-dev - The GNU Parted disk partitioning library development files
 libparted1.6-i18n - The GNU Parted disk partitioning library i18n support
 libparted1.6-udeb - The GNU Parted disk partitioning shared library (udeb)
 parted - The GNU Parted disk partition resizing program
 parted-bf  - The GNU Parted disk partition resizing program, small version
 parted-doc - The GNU Parted disk partition resizing program documentation
 parted-udeb - The GNU Parted disk partition resizing program (udeb)
Closes: 191523 195318 200337 207634
Changes: 
 parted (1.6.5-3) unstable; urgency=low
 .
   * Policy 3.5.9, Made udebs Priority: extra
   * Changed descriptions to add that parted can remove all listed
 filesystems (closes: #191523)
   * Applied missing type suffix compile fix patch for gcc-3.3 and hurd,
 thanks to Ognyan Kulev and Sven Luther (closes: #195318, #200337)
   * m68k padding fix patch patch from Sven Luther (closes: #207634)
Files: 
 c3d6f7aeec63cd5a16b8e40f93c9fe58 819 admin optional parted_1.6.5-3.dsc
 bcc0a618598ec4b5f1fbaa400eb991b8 33052 admin optional parted_1.6.5-3.diff.gz
 22324db69d63beb42d187b6e0001e253 63520 admin optional parted_1.6.5-3_i386.deb
 d61576ff49250d0f3983d8197928374e 151996 libs optional libparted1.6-0_1.6.5-3_i386.deb
 bc79b117f7790901b14f247a3f918e1c 188136 libdevel optional 
libparted1.6-dev_1.6.5-3_i386.deb
 42b475f0e057529a90849fff4d2c078b 19654 debian-installer extra 
parted-udeb_1.6.5-3_i386.udeb
 e51ff2559cdf5df07f8a523aa20be705 108990 debian-installer extra 
libparted1.6-udeb_1.6.5-3_i386.udeb
 8983de167fd5b3958db2989ce8b7a515 54600 admin extra parted-bf_1.6.5-3_i386.deb
 0e277fb23d340d083cfa85cab0f917cc 829770 libdevel extra 
libparted1.6-dbg_1.6.5-3_i386.deb
 c0dc8dcacd437cda738ac54f6357bcfb 209096 libs optional 
libparted1.6-i18n_1.6.5-3_all.deb
 2f2f88c549bcb1d88440393159a9e49c 124498 doc optional parted-doc_1.6.5-3_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQE/T/jZXfqTkd4+iqcRAoAnAJ4gIMk4/8Rzr51hA0ir3CDEdGQCCACdGpNm
2rVITbm0wPJ7eO6OrYjhWPM=
=41KW
-END PGP SIGNATURE-


Accepted:
libparted1.6-0_1.6.5-3_i386.deb
  to pool/main/p/parted/libparted1.6-0_1.6.5-3_i386.deb
libparted1.6-dbg_1.6.5-3_i386.deb
  to pool/main/p/parted/libparted1.6-dbg_1.6.5-3_i386.deb
libparted1.6-dev_1.6.5-3_i386.deb
  to pool/main/p/parted/libparted1.6-dev_1.6.5-3_i386.deb
libparted1.6-i18n_1.6.5-3_all.deb
  to pool/main/p/parted/libparted1.6-i18n_1.6.5-3_all.deb
libparted1.6-udeb_1.6.5-3_i386.udeb
  to pool/main/p/parted/libparted1.6-udeb_1.6.5-3_i386.udeb
parted-bf_1.6.5-3_i386.deb
  to pool/main/p/parted/parted-bf_1.6.5-3_i386.deb
parted-doc_1.6.5-3_all.deb
  to pool/main/p/parted/parted-doc_1.6.5-3_all.deb
parted-udeb_1.6.5-3_i386.udeb
  to pool/main/p/parted/parted-udeb_1.6.5-3_i386.udeb
parted_1.6.5-3.diff.gz
  to pool/main/p/parted/parted_1.6.5-3.diff.gz
parted_1.6.5-3.dsc
  to pool/main/p/parted/parted_1.6.5-3.dsc
parted_1.6.5-3_i386.deb
  to pool/main/p/parted/parted_1.6.5-3_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted spamass-milter 0.2.0-5 (i386 source)

2003-08-30 Thread Don Armstrong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 29 Aug 2003 18:00:05 -0700
Source: spamass-milter
Binary: spamass-milter
Architecture: source i386
Version: 0.2.0-5
Distribution: unstable
Urgency: low
Maintainer: Don Armstrong [EMAIL PROTECTED]
Changed-By: Don Armstrong [EMAIL PROTECTED]
Description: 
 spamass-milter - sendmail milter for filtering mail through spamassassin
Closes: 204139 204301
Changes: 
 spamass-milter (0.2.0-5) unstable; urgency=low
 .
   * Changed recommends: spamd to spamassassin (closes: #204139)
   * Fix typo in init script (oknod should be oknodo) (closes: #204301)
   * Add debugging howto section to README.Debian
   * Uploaded by Stephen Gran [EMAIL PROTECTED]
Files: 
 cb533b05a0f6284eb7d8bf15fb1c8192 623 mail extra spamass-milter_0.2.0-5.dsc
 0007222fd71b6f39d127c1e009fe455c 17008 mail extra spamass-milter_0.2.0-5.diff.gz
 5cd32db6bc3f96e1f9c15eedf9a205e0 48326 mail extra spamass-milter_0.2.0-5_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQE/T/ymSYIMHOpZA44RAgZqAJ90/vgGPtfYmf8TiTS/kGXyi5/qpwCgrqwd
rMHD/tKcm/eEp4/6EA5kyvs=
=3a0o
-END PGP SIGNATURE-


Accepted:
spamass-milter_0.2.0-5.diff.gz
  to pool/main/s/spamass-milter/spamass-milter_0.2.0-5.diff.gz
spamass-milter_0.2.0-5.dsc
  to pool/main/s/spamass-milter/spamass-milter_0.2.0-5.dsc
spamass-milter_0.2.0-5_i386.deb
  to pool/main/s/spamass-milter/spamass-milter_0.2.0-5_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



  1   2   >