Re: glibc, bug 438179 et avenir de/dans etch

2007-09-27 Thread Julien Cristau
On Wed, Sep 26, 2007 at 17:18:35 +0200, Pierre Habouzit wrote:

 On Wed, Sep 26, 2007 at 03:55:56PM +, [EMAIL PROTECTED] wrote:
La migration de Sarge à Etch casse donc ce fonctionnement, ce qui
 
   Non etch n'a pas ça. Seul lenny est concernée.
 
Le monsieur a raison, getaddrinfo() dans etch fait le tri.

Julien


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: glibc, bug 438179 et avenir de/dans etch

2007-09-27 Thread Pierre Habouzit
On Thu, Sep 27, 2007 at 09:28:04AM +, Julien Cristau wrote:
 On Wed, Sep 26, 2007 at 17:18:35 +0200, Pierre Habouzit wrote:
 
  On Wed, Sep 26, 2007 at 03:55:56PM +, [EMAIL PROTECTED] wrote:
 La migration de Sarge à Etch casse donc ce fonctionnement, ce qui
  
Non etch n'a pas ça. Seul lenny est concernée.
  
 Le monsieur a raison, getaddrinfo() dans etch fait le tri.

  Euh je suis surpris parce que Uli prétend le contraire Oo... En tout
cas son test est foireux, parce que il ne teste la rule 9 que ssi il
testait sur le host qui finit en 165. Pour faire le test correctement il
faudrait le faire sur des préfixes qui varient bien plus tot.

  De plus il faudrait etre sur de le faire sans nscd ni aucun cache (qui
parfois te choisissent un ordre). Donc en ayant bien vérifié avant que
dig renvoie des paquets DNS où il y a de la variabilité aussi...

-- 
·O·  Pierre Habouzit
··O[EMAIL PROTECTED]
OOOhttp://www.madism.org


pgpozZPnGar1J.pgp
Description: PGP signature


Re: glibc, bug 438179 et avenir de/dans etch

2007-09-27 Thread j . combes . ml
Bonjour,

Le 26.09.2007 19:16, Pierre Habouzit a écrit  :
   Je ne sais pas quelles sont les conditions d'utilisation du programme,
 donc il est difficile de valider quoi que ce soit. Il y a mille raisons
 pour lesquelles ça a l'air d'être trié (nscd notamment). Mais:

   (1) la rule 9 est à propos des plus longs préfixes, or vu que la
   différence entre 165 et 166 est uniquement sur les deux derniers
   bits, le test est tout simplement idiot.

Mon test est probablement idiot, mais il met en évidence un comportement que
j'ai sur plusieurs dizaines de serveurs et que j'essaye tant bien que mal de
comprendre depuis plusieurs jours. Avant de venir passer pour un âne sur une
liste debian-devel archivée sur internet (ce qui n'était pas franchement mon
rêve je dois bien te l'avouer ;-) ), j'ai parlé du problème à un ami qui a pu le
reproduire sur ses propres serveurs en Debian etch.

Le rapprochement entre mon problème et le bug  438179 est peut-être malheureux.
Néanmoins, j'ai un problème, qui touche la glibc de Etch, qui n'est apparemment
pas si isolé que cela puisque nous sommes au minimum deux à l'avoir.

Peut-être est-il lié à l'environnement (matériel, logiciel, ou réseau) mais je
dois bien avouer que je suis à cours de piste. Par ailleurs, en patchant la
glibc 2.3.6 au niveau de la règle 9 (voir plus bas), je n'ai plus le problème.

Si je refais le test sur la glibc de Etch avec le petit programme du mail
précédent et en arrêtant le plus de démons possibles (voir fichier ps-ed.txt
joint) :
$ cat /etc/debian_version
4.0

$ dpkg -l libc6* |grep ^i
ii  libc6   2.3.6.ds1-13etch2 GNU C Library: Shared libraries

Avec getaddrinfo :
$  ./reso-dns ldaprs.mon.domaine getaddrinfo
getaddrinfo :   ldaprs.mon.domaine   10.xxx.yyy.165  10.xxx.yyy.166
$  ./reso-dns ldaprs.mon.domaine getaddrinfo
getaddrinfo :   ldaprs.mon.domaine   10.xxx.yyy.165  10.xxx.yyy.166
$  ./reso-dns ldaprs.mon.domaine getaddrinfo
getaddrinfo :   ldaprs.mon.domaine   10.xxx.yyy.165  10.xxx.yyy.166
$  ./reso-dns ldaprs.mon.domaine getaddrinfo
getaddrinfo :   ldaprs.mon.domaine   10.xxx.yyy.165  10.xxx.yyy.166

Avec gethostbyname :
$  ./reso-dns ldaprs.mon.domaine gethostbyname
gethostbyname : ldaprs.mon.domaine   10.xxx.yyy.165  10.xxx.yyy.166
$  ./reso-dns ldaprs.mon.domaine gethostbyname
gethostbyname : ldaprs.mon.domaine   10.xxx.yyy.166  10.xxx.yyy.165
$  ./reso-dns ldaprs.mon.domaine gethostbyname
gethostbyname : ldaprs.mon.domaine   10.xxx.yyy.165  10.xxx.yyy.166
$  ./reso-dns ldaprs.mon.domaine gethostbyname
gethostbyname : ldaprs.mon.domaine   10.xxx.yyy.166  10.xxx.yyy.165

Non seulement, il y a un tri, mais en plus sur des adresses proches...

De plus si j'applique ce patch à la glibc 2.3.6 [1], je n'ai plus le problème :
--- glibc-backup/sysdeps/posix/getaddrinfo.c2005-10-16 12:15:30.0 
+0200
+++ glibc-2.3.6/sysdeps/posix/getaddrinfo.c 2007-09-25 11:29:46.0 
+0200
@@ -1392,7 +1392,7 @@
   int bit1 = 0;
   int bit2 = 0;

-  if (a1-dest_addr-ai_family == PF_INET)
+  if (a1-dest_addr-ai_family == PF_INET  0)
{
  assert (a1-source_addr.ss_family == PF_INET);
  assert (a2-source_addr.ss_family == PF_INET);


Or ce patch s'applique pile ici dans la fonction getaddrinfo de la glibc 2.3.6 :
  /* Rule 9: Use longest matching prefix.  */
  if (a1-got_source_addr
   a1-dest_addr-ai_family == a2-dest_addr-ai_family)
{
  int bit1 = 0;
  int bit2 = 0;

  if (a1-dest_addr-ai_family == PF_INET)
{
  assert (a1-source_addr.ss_family == PF_INET);
  assert (a2-source_addr.ss_family == PF_INET);

[1] méthode utilisée pour appliquer le patch :
- dans l'archive debian  de la glibc-2.3.6, création d'un fichier
debian/patches/any/patch-sortv4.diff avec ce patch.
- ajout de any/patch-sortv4.diff -p 1 à la suite des any/ dans le fichier
debian/patches/series

Voici les tests des getaddrinfo avec la glibc patchée :
$ ./reso-dns ldaprs.mon.domaine getaddrinfo
getaddrinfo :   ldaprs.mon.domaine   10.xxx.yyy.165  10.xxx.yyy.166
$ ./reso-dns ldaprs.mon.domaine getaddrinfo
getaddrinfo :   ldaprs.mon.domaine   10.xxx.yyy.166  10.xxx.yyy.165
$ ./reso-dns ldaprs.mon.domaine getaddrinfo
getaddrinfo :   ldaprs.mon.domaine   10.xxx.yyy.165  10.xxx.yyy.166
$ ./reso-dns ldaprs.mon.domaine getaddrinfo
getaddrinfo :   ldaprs.mon.domaine   10.xxx.yyy.166  10.xxx.yyy.165

Je suis prêt à faire d'autre test si cela peut aider.

Cordialement,
Julien$ ps -ef
UIDPID  PPID  C STIME TTY  TIME CMD
root 1 0  0 Sep04 ?00:00:01 init [2]
root 2 1  0 Sep04 ?00:00:00 [migration/0]
root 3 1  0 Sep04 ?00:00:00 [ksoftirqd/0]
root 4 1  0 Sep04 ?00:00:00 [migration/1]
root 5 1  0 Sep04 ?00:00:00 [ksoftirqd/1]
root 6 1  0 Sep04 ?00:00:00 [events/0]
root 7 1  0 Sep04 ?00:00:00 [events/1]
root 8 1  0 Sep04 ?

Re: glibc, bug 438179 et avenir de/dans etch

2007-09-27 Thread Pierre Habouzit
On Thu, Sep 27, 2007 at 11:39:03AM +, [EMAIL PROTECTED] wrote:
 Bonjour,
 
 Le 26.09.2007 19:16, Pierre Habouzit a écrit  :
Je ne sais pas quelles sont les conditions d'utilisation du programme,
  donc il est difficile de valider quoi que ce soit. Il y a mille raisons
  pour lesquelles ça a l'air d'être trié (nscd notamment). Mais:
 
(1) la rule 9 est à propos des plus longs préfixes, or vu que la
différence entre 165 et 166 est uniquement sur les deux derniers
bits, le test est tout simplement idiot.
 
 Mon test est probablement idiot, mais il met en évidence un comportement que
 j'ai sur plusieurs dizaines de serveurs et que j'essaye tant bien que mal de
 comprendre depuis plusieurs jours. Avant de venir passer pour un âne sur une
 liste debian-devel archivée sur internet (ce qui n'était pas franchement mon
 rêve je dois bien te l'avouer ;-) ), j'ai parlé du problème à un ami qui a pu 
 le
 reproduire sur ses propres serveurs en Debian etch.

  Disons que la règle 9 met en tete les adresses qui partagent le plus
long préfixe possible avec l'ip de la machine locale. Donc un test où la
variation du préfixe n'est sensible que sur les deux derniers bits
n'aura du sens que si le test est fait sur l'une des deux machines
concernées. Voilà pourquoi le test est mauvais.


 De plus si j'applique ce patch à la glibc 2.3.6 [1], je n'ai plus le problème 
 :
 --- glibc-backup/sysdeps/posix/getaddrinfo.c  2005-10-16 12:15:30.0 
 +0200
 +++ glibc-2.3.6/sysdeps/posix/getaddrinfo.c   2007-09-25 11:29:46.0 
 +0200
 @@ -1392,7 +1392,7 @@
int bit1 = 0;
int bit2 = 0;
 
 -  if (a1-dest_addr-ai_family == PF_INET)
 +  if (a1-dest_addr-ai_family == PF_INET  0)
   {
 assert (a1-source_addr.ss_family == PF_INET);
 assert (a2-source_addr.ss_family == PF_INET);
 
 
 Or ce patch s'applique pile ici dans la fonction getaddrinfo de la glibc 
 2.3.6 :
   /* Rule 9: Use longest matching prefix.  */
   if (a1-got_source_addr
a1-dest_addr-ai_family == a2-dest_addr-ai_family)
 {
   int bit1 = 0;
   int bit2 = 0;
 
   if (a1-dest_addr-ai_family == PF_INET)
   {
 assert (a1-source_addr.ss_family == PF_INET);
 assert (a2-source_addr.ss_family == PF_INET);

  Okay bah en effet, le code de tri de la rule 9 est présent depuis bien
plus de temps que ce que Uli dit p/r à la rfc 3484. Aurélien a fait un
patch qui au lien de mettre  0 à cet endroit, utilise un réglage de
gai.conf pour ce faire, le patch est attaché, et devrait du coup sans
doute s'appliquer directement en glibc 2.3.X (en tout cas sans trop de
grosses difficultés).

  Avec le patch il suffit de mettre dans /etc/gai.conf: sortv4 no

  Désolé d'avoir été vite agacé donc, mais j'en ai un peu marre de me
faire taper dessus pour un changement de comportement de la glibc alors
que je suis qu'un des packagers, et pas l'upstream, donc j'ai tendance à
partir au 1/4 de tour sur ce problème.
-- 
·O·  Pierre Habouzit
··O[EMAIL PROTECTED]
OOOhttp://www.madism.org
2007-08-16  Aurelien Jarno  [EMAIL PROTECTED]

* sysdeps/posix/getaddrinfo.c (gaiconf_reload_flag): Move
to the top of the file. 
(gaiconf_mtime): Likewise.
(sortv4): New configuration variable.
(gaiconf_init): Parse the sortv4 option in the configuration
file.
(rfc3484_sort): Ignore rule 9 for IPv4 adresses if sortv4
is false.
* posix/gai.conf: Add the new sortv4 option.


--- posix/gai.conf  2007-08-16 22:59:03.0 +0200
+++ posix/gai.conf  2007-08-16 22:58:48.0 +0200
@@ -15,6 +15,11 @@
 #changed and if necessary reload.  This option should not really be
 #used.  There are possible runtime problems.  The default is no.
 #
+# sortv4  yes|no
+#If set to no, getaddrinfo(3) will ignore IPv4 adresses in rule 9.  See
+#section 6 in RFC 3484.  The default is yes.  Setting this option to 
+#no breaks conformance to RFC 3484.
+#
 # label   mask   value
 #Add another rule to the RFC 3484 label table.  See section 2.1 in
 #RFC 3484.  The default is:
--- sysdeps/posix/getaddrinfo.c 2007-08-16 23:02:34.0 +0200
+++ sysdeps/posix/getaddrinfo.c 2007-08-16 22:31:53.0 +0200
@@ -79,6 +79,16 @@
 # define UNIX_PATH_MAX  108
 #endif
 
+/* Nozero if we are supposed to reload the config file automatically
+   whenever it changed.  */
+static int gaiconf_reload_flag;
+
+/* Zero if we are supposed to ignore rule 9 for IPv4 addresses */
+static int gaiconf_sortv4_flag = 1;
+
+/* Last modification time.  */
+static struct timespec gaiconf_mtime;
+
 struct gaih_service
   {
 const char *name;
@@ -1344,7 +1354,7 @@
   int bit1 = 0;
   int bit2 = 0;
 
-  if (a1-dest_addr-ai_family == PF_INET)
+  if (a1-dest_addr-ai_family == PF_INET  gaiconf_sortv4_flag)
{
  assert 

Re: glibc, bug 438179 et avenir de/dans etch

2007-09-27 Thread j . combes . ml
Le 27.09.2007 13:49, Pierre Habouzit a écrit  :

   Okay bah en effet, le code de tri de la rule 9 est présent depuis bien
 plus de temps que ce que Uli dit p/r à la rfc 3484. Aurélien a fait un
 patch qui au lien de mettre  0 à cet endroit, utilise un réglage de
 gai.conf pour ce faire, le patch est attaché, et devrait du coup sans
 doute s'appliquer directement en glibc 2.3.X (en tout cas sans trop de
 grosses difficultés).

Bon, ca ne va pas être tout à fait trivial (mais pas forcement très compliquer)
: la patch commence par s'occuper d'un fichier posix/gai.conf qui n'existe pas
dans la glibc 2.3.6 et les numero de lignes ne correspondent pas ensuite. Je
regarde (probablement demain, une sombre histoire d'acl ldap à régler avant ;) )
si j'arrive à l'adapter pour cette version de la glibc. Je te tiens au courant.

   Désolé d'avoir été vite agacé donc, mais j'en ai un peu marre de me
 faire taper dessus pour un changement de comportement de la glibc alors
 que je suis qu'un des packagers, et pas l'upstream, donc j'ai tendance à
 partir au 1/4 de tour sur ce problème.

Pas grave ;)
Qu'on soit bien d'accord, je ne cherche pas de coupable, j'essaye juste d'une
part de bien comprendre un problème qui touche mes serveurs et comment tout cela
va ou peut évoluer et d'autre part de le régler la meilleur façon possible.

Julien


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Welcome to A Single Blade Of Grass

2007-09-27 Thread A Single Blade Of Grass

The subscription of the email address: 

debian-devel-french@lists.debian.org

To the mailing list: 

A Single Blade Of Grass

is all set. Thanks for subscribing! 

Date of this subscription: Thu Sep 27 15:40:18 2007

Please save this email message for future reference. 

---

You may automatically unsubscribe from this list at any time by 
visiting the following URL:

http://infinitepossibility.ralf.netmindz.net/cgi-local/dada/mail.cgi?f=ul=single[EMAIL
 PROTECTED]p=14264063

If the above URL is inoperable, make sure that you have copied the 
entire address. Some mail readers will wrap a long URL and thus break
this automatic unsubscribe mechanism. 

You may also change your subscription by visiting this list's main screen: 

http://infinitepossibility.ralf.netmindz.net/cgi-local/dada/mail.cgi?f=listl=single

If you're still having trouble, please contact the list owner at: 

mailto:[EMAIL PROTECTED]

The following physical address is associated with this mailing list: 

 

- mailto:[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: glibc, bug 438179 et avenir de/dans etch

2007-09-27 Thread Julien Cristau
On Thu, Sep 27, 2007 at 12:02:45 +0200, Pierre Habouzit wrote:

   Euh je suis surpris parce que Uli prétend le contraire Oo... En tout
 cas son test est foireux, parce que il ne teste la rule 9 que ssi il
 testait sur le host qui finit en 165. Pour faire le test correctement il
 faudrait le faire sur des préfixes qui varient bien plus tot.
 
   De plus il faudrait etre sur de le faire sans nscd ni aucun cache (qui
 parfois te choisissent un ordre). Donc en ayant bien vérifié avant que
 dig renvoie des paquets DNS où il y a de la variabilité aussi...
 
Je me suis contenté de comparer getent hosts security.debian.org et
getent ahosts security.debian.org.  Dans le premier cas ca tourne, dans
le 2eme cas 212.211.132.32 et 212.211.132.250 sont toujours avant
128.31.0.36 (et l'ordre entre les deux premiers change).

Julien


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



A Single Blade Of Grass Unsubscription

2007-09-27 Thread A Single Blade Of Grass

The removal of the email address:

debian-devel-french@lists.debian.org

From the mailing list: 

A Single Blade Of Grass 

is all set.

Date of this removal: Thu Sep 27 16:10:14 2007

Please save this email message for future reference.

---

You may automatically subscribe from this list at any time by 
visiting the following URL:

http://infinitepossibility.ralf.netmindz.net/cgi-local/dada/mail.cgi?f=nl=singlee=debian-devel-french%40lists.debian.orgp=14264063

If the above URL is inoperable, make sure that you have copied the 
entire address. Some mail readers will wrap a long URL and thus break
this automatic unsubscribe mechanism. 

You may also change your subscription by visiting this list's main screen: 

http://infinitepossibility.ralf.netmindz.net/cgi-local/dada/mail.cgi?f=listl=single

If you're still having trouble, please contact the list owner at: 

mailto:[EMAIL PROTECTED]

The following physical address is associated with this mailing list: 

 

- mailto:[EMAIL PROTECTED]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: modified email address in debian/copyright file

2007-09-27 Thread Lars Wirzenius
to, 2007-09-27 kello 10:21 +1000, Ben Finney kirjoitti:
 Jon Dowland [EMAIL PROTECTED] writes:
 
  However if an upstream author of a package wishes to conceal their
  address, I think we should honour that.
 
 This is at odds with always have correct contact information for the
 copyright holder at the time of packaging, which I think Debian
 should strive to achieve for the sake of its users.

I'm afraid I have to disagree with that. Obfuscation which can easily be
reversed by a human, but not so easily by a computer, does not render
contact information incorrect. If I write my e-mail address as follows,
it's still correct: My full name is Lars Ivar Wirzenius, and you can
send me e-mail by taking my initials and putting them in front of the at
sign and iki.fi after it.

Mind you, I don't like obfuscation, and I think it's a nuisance myself,
but we shouldn't violate people's wish to try to avoid spam by
publishing their addresses in un-obfuscated form. That only makes people
angry at us for little or no benefit, since there are no situations when
we want to automatically send e-mails to upstream developers anyway.

 The only way to honour conceal their address at the same time as the
 above is to not distribute the package at all. I don't think that's a
 good solution.

I don't think there is any requirement to have any upstream contact
information whatsoever in order to be able to distribute a package.

-- 
Close your mind to stress and pain, hack till you're no longer sane.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



[VAC] a few days (I hope). Bretagne, France.

2007-09-27 Thread Santiago José Ruano Rincón

Hi,

Today, I'll travel to France to pursuit my Master studies in 
human-computer interaction at the ENST-Bretagne and Université de 
Bretagne Sud.


grep has a RC bug right now [1], any help to solve it will be appreciated. 
Just contact anibal.


[1] http://bugs.debian.org/181378

I hope I'll be able to continue my work on debian as soon as a I get some 
order and an INET connection there.


Best regards,

--
Santiago Ruano RincGrupo GNU/Linux Universidad del Cauca

I know but one freedom, and that is the freedom of the mind.

--Antoine de Saint-Exupery

Re: modified email address in debian/copyright file

2007-09-27 Thread Ben Finney
Lars Wirzenius [EMAIL PROTECTED] writes:

 I don't think there is any requirement to have any upstream contact
 information whatsoever in order to be able to distribute a package.

This seems to be the point of disagreement. I think this should be
required, in order that Debian users can have more confidence [0] in
the copyright status of works in Debian.


[0] not absolute confidence, of course, which is impossible; but
greater confidence than would be the case in the absence of valid
copyright holder contact details.

-- 
 \Program testing can be a very effective way to show the |
  `\presence of bugs, but is hopelessly inadequate for showing |
_o__)  their absence.  -- Edsger Dijkstra |
Ben Finney


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Building packages with exact binary matches

2007-09-27 Thread Manoj Srivastava
On Wed, 26 Sep 2007 12:31:51 +0200, Martin Uecker [EMAIL PROTECTED] said: 

 On Wed, Sep 26, 2007 at 12:25:02AM -0500, Manoj Srivastava wrote:

 Just because you have _heard_ anyone diss special relativity being
 the sole reason to believe in it is in the same ball park as
 blissful, you know, ignorance.

 It is not about hearsay. It is about finding an error in a
 predictation.  And I do not care *who* finds the error. Of course the
 predications have actually be checked. So you are right with your
 argument, if nobody actually does this, it would be ignorant to
 believe in a scientifc theory for the sole reason that nobody
 complains. Similar, if nobody recompiles the packages and checks for
 mismatches, then silence would in fact not imply that things are
 ok. But I question your premise: I have no doubt that some people
 would actually recompile packages and compare the hash. Even if it is
 not done normally, somebody would do this if doubts come up for some
 reason (e.g. some debian hosts are compromised again.).  This alone
 would actually be worth a lot.

But recompiling from what? If you do not get the exact same
 source, you have no hope of getting the same result.  And the way
 things work, the chances are that if the binary is tainted, the source
 would be tainted -- and you have got nowhere.

 The difference is evidence.  If there is some merit to the notion
 that a buildd is compromised, the solution is not bunches of people
 building from potentially tainted sources and comparing checksums.

 If know that the source code wich has hash 4457575757575 compiled in
 the build environment with hash 4837373737 gives a package with hash
 366336363, then it is actually *evidence* that something is seriously
 wrong if you end up with a package with a different hash.

So, someone replaces the binary compiled on the buildd with a
 fake one, in between the binary being built and it being signed?  All
 the work to get bit-for-bit reproducibility for such a low priority
 attack vector?

manoj

-- 
VMS is a text-only adventure game. If you win you can use Unix. Bill
Davidsen ([EMAIL PROTECTED])
Manoj Srivastava [EMAIL PROTECTED] http://www.debian.org/~srivasta/
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: semi-virtual packages?

2007-09-27 Thread Manoj Srivastava
On Wed, 26 Sep 2007 04:04:33 -0600, Bruce Sass [EMAIL PROTECTED] said: 

 On Tue September 25 2007 09:22:02 am Manoj Srivastava wrote:
 On Tue, 25 Sep 2007 02:36:24 -0600, Bruce Sass [EMAIL PROTECTED] said:
  On Sun September 23 2007 03:08:59 pm Manoj Srivastava wrote:
  On Sun, 23 Sep 2007 14:26:29 -0600, Bruce Sass [EMAIL PROTECTED]
  said:

 [I've cut a lot of duplication. If I cut something which doesn't get
 addressed below, feel free to bring it back.]

  The scheme I described was under the written assumption there are
  no such situations which would not already have a virtual package.
 
 Ah.  That assumption turns out to be incorrect.

 Haha. There is nothing wrong with the assumption. That is kinda like
 saying pylint is incorrect for spitting out errors when given a
 correct perl program. You ignored a sign which would have taken you
 down a different path, and now appear to be complaining because the
 path you ended up on took you to the wrong place---neither the sign or
 paths are incorrect, you just didn't pay attention and got lost.

Hmm? You assumed, and I quote there are no such situations
 which would not already have a virtual package.  Since there are
 situations where there is no virtual package, it certainly seems to me
 that the assumption you made is invalid.

If your assumption is correct, then I have missed something
 somewhere. 

  Why would you think any of that scheme was applicable to the case
  you were thinking of if it is a case in which there is no virtual
  package?
 
 I am not sure how to answer that.  I assumed that the scheme under
 discussion was going to be universal (or else it does not seem to be
 much good, really -- it would still leave files around that are not
 associated with anything).

 I don't see why it would need to be universal, one size stuff often
 doesn't fit anyone very well and it is not like being universal is
 pervasive and this would stand out as a wart.

If we are not talking about a policy to be made, and you are
 only talking about an opt in scheme for some  orphan files, then
 indeed, I have nothing to add to the conversation.

manoj
-- 
algorithm, n.: Trendy dance for hip programmers.
Manoj Srivastava [EMAIL PROTECTED] http://www.debian.org/~srivasta/
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#444249: ITP: pyexiv2 -- Python binding to Exiv2

2007-09-27 Thread Michal Čihař
Package: wnpp
Severity: wishlist
Owner: Michal Čihař [EMAIL PROTECTED]


* Package name: pyexiv2
  Version : 0.1
  Upstream Author : Olivier Tilloy [EMAIL PROTECTED]
* URL : http://tilloy.net/dev/pyexiv2/
* License : GPL
  Programming Lang: C++/Python
  Description : Python binding to Exiv2

 pyexiv2 is a python binding to exiv2, the C++ library for manipulation
 of EXIF and IPTC image metadata. It is a python module that allows your
 python scripts to read and write metadata (EXIF, IPTC, thumbnail)
 embedded in image files (JPEG, TIFF, ...).

 It is designed as a high level interface to the functionalities offered
 by exiv2 (and is built on top of it). Using python's built-in data
 types and standard modules, it provides easy manipulation of image
 metadata. 

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.22-2-686 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash




Re: modified email address in debian/copyright file

2007-09-27 Thread Holger Levsen
Hi,

On Thursday 27 September 2007 08:39, Ben Finney wrote:
 Lars Wirzenius [EMAIL PROTECTED] writes:
  I don't think there is any requirement to have any upstream contact
  information whatsoever in order to be able to distribute a package.
 This seems to be the point of disagreement. I think this should be
 required...

Whether or not it its an requirement to be able to contact the author, doesnt 
have anything to do with obfuscating the email address or not. (Assuming its 
not obfuscated beyond recognitition.) (*)

Unless you talk about the requirement to be able to contact the author without 
human intervention. But I haven't read anybody requiring that.

And as Lars wrote in the email you replied to:

 Mind you, I don't like obfuscation, and I think it's a nuisance myself,
 but we shouldn't violate people's wish to try to avoid spam by
 publishing their addresses in un-obfuscated form. That only makes people
 angry at us for little or no benefit, since there are no situations when
 we want to automatically send e-mails to upstream developers anyway.

I completly agree with those five lines.


regards,
Holger

(*) BTW, I dont have an example at hand, but I'm pretty sure I have seen code 
in Debian written by anonymous and friends. You can't contact them either.


pgp1ZwP7gNX1Y.pgp
Description: PGP signature


Re: Changing name of source package

2007-09-27 Thread Francesco P. Lovergine
On Wed, Sep 26, 2007 at 07:26:51PM -0700, Steve Langasek wrote:
 
 The only other thing you need to worry about is filing a bug report against
 ftp.debian.org to get the old php4-ps source package removed, since this
 won't happen automatically.
 

If it is not still required in stable/oldstable isn't it?

-- 
Francesco P. Lovergine


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Building packages with exact binary matches

2007-09-27 Thread Martin Uecker
Ben Finney [EMAIL PROTECTED] wrote:

 Martin Uecker [EMAIL PROTECTED] writes:

  On Tue, Sep 25, 2007 at 06:33:40PM -0500, Manoj Srivastava wrote:
   Ah, security through blissful ignorance :) You do not
actually trust the archive, or the developers, you trust the
silence.
  
  I trust special relativity, because nobody has disproven it yet.

 Really? I trust the theory of special relativity because there is
 enormous evidence supporting it, and little evidence against it.

There is enormous evidence for the Aristotle' believe that more
massive objects fall faster and little evidence against it.
Only a carefully crafted experiment shows that it is false.

 In the case of there are no messages, therefore I trust the security
 of the system, that's faith â belief in spite of an utter lack of
 evidence.

The predictions must be testable by everbody and - of course -
some must actually try to falsify them. Exact binary matches
would allow everbody to check the integrity of the binary
packages and I am quite sure that some people would do it.
In this case no messages stating that something is wrong
is not the same as lack of evidence, it is actually evidence
for the assumption that everything is ok.

  Do you think this is blissfull ignorance, too? 

 Worse, it's foolish.

It is foolish to base his trust purely on the authority
of some person. People's belief that massive objects
fall faster was based on the authority of Aristotle.
Debian user's trust in the integrity of some binary package
is based on the authority of the person putting a gpg
signature on it.

 In the lack of *any* evidence either way on a question, it's foolish
 to hold any position but unknown;

That is a common misbelief. Some things are inherently more
probable than other.

 and, if the question is important for a matter of trust,
 it's imperative to *get* some evidence before extending any trust.

That is certainly true.


Martin









Re: Changing name of source package

2007-09-27 Thread Adeodato Simó
* Francesco P. Lovergine [Thu, 27 Sep 2007 11:01:34 +0200]:

 On Wed, Sep 26, 2007 at 07:26:51PM -0700, Steve Langasek wrote:

  The only other thing you need to worry about is filing a bug report against
  ftp.debian.org to get the old php4-ps source package removed, since this
  won't happen automatically.

 If it is not still required in stable/oldstable isn't it?

Removals by ftpmaster (whether of binaries, source, or both) normally
happen against unstable only. The removal then propagates to testing,
which means that the *next* stable release won't have them.

Cheers,

-- 
Adeodato Simó dato at net.com.org.es
Debian Developer  adeodato at debian.org
 
Listening to: Joan Manuel Serrat - Algo personal


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Building packages with exact binary matches

2007-09-27 Thread Martin Uecker
On Thu, Sep 27, 2007 at 02:26:49AM -0500, Manoj Srivastava wrote:
 On Wed, 26 Sep 2007 12:31:51 +0200, Martin Uecker [EMAIL PROTECTED] said: 
 
  On Wed, Sep 26, 2007 at 12:25:02AM -0500, Manoj Srivastava wrote:
 
  Just because you have _heard_ anyone diss special relativity being
  the sole reason to believe in it is in the same ball park as
  blissful, you know, ignorance.
 
  It is not about hearsay. It is about finding an error in a
  predictation.  And I do not care *who* finds the error. Of course the
  predications have actually be checked. So you are right with your
  argument, if nobody actually does this, it would be ignorant to
  believe in a scientifc theory for the sole reason that nobody
  complains. Similar, if nobody recompiles the packages and checks for
  mismatches, then silence would in fact not imply that things are
  ok. But I question your premise: I have no doubt that some people
  would actually recompile packages and compare the hash. Even if it is
  not done normally, somebody would do this if doubts come up for some
  reason (e.g. some debian hosts are compromised again.).  This alone
  would actually be worth a lot.
 
 But recompiling from what? If you do not get the exact same
  source, you have no hope of getting the same result. 

I had the impression that Debian distributes the source code from which 
the binaries are actually compiled and not some random variation.

  And the way things work, the chances are that if the binary is tainted,
  the source would be tainted -- and you have got nowhere.

If I wanted to hide a trojan somewhere I would to it in the binary
and not in the source code. People actually look into source code
on a regular basis but they seldom disassemble a binary.
 
  The difference is evidence.  If there is some merit to the notion
  that a buildd is compromised, the solution is not bunches of people
  building from potentially tainted sources and comparing checksums.
 
  If know that the source code wich has hash 4457575757575 compiled in
  the build environment with hash 4837373737 gives a package with hash
  366336363, then it is actually *evidence* that something is seriously
  wrong if you end up with a package with a different hash.
 
 So, someone replaces the binary compiled on the buildd with a
  fake one, in between the binary being built and it being signed?  All
  the work to get bit-for-bit reproducibility for such a low priority
  attack vector?

I do not think it is a low priority attack vector. If I would be a
cracker and had a rootkit installed on a debian build host it would
certainly insert a backdoor in ssh everytime it is compiled: Access
to all debian running computers world wide!

BTW I did some tests and for 'dpkg' the only files which change
between builds are the manpages and that's just because gzip
stores the date of the orginal in the compressed file.

Martin



Releasing packages with 'pending' RC bugs

2007-09-27 Thread Daniel Baumann
Hi,

out of curiousity.. imagine a package where:

  * the Debian maintainer is also upstream maintainer
  * the package has practically no users (popcon  10)
  * the package has RC bugs
  * the RC bugs are fixed upstream
  * the RC bugs are tagged pending in the BTS
  * the fixed package doesn't get uploaded (e.g. due to ENOSPONSOR)

If I am not wrong (otherwise please do correct me) such a package would
enter testing on the normal way, and hence, would be part of the
upcoming stable release.

I don't know if many of these cases extists, but, are they actually
dealt with somehow by someone, or are they currently slipping through?

Regards,
Daniel

-- 
Address:Daniel Baumann, Burgunderstrasse 3, CH-4562 Biberist
Email:  [EMAIL PROTECTED]
Internet:   http://people.panthera-systems.net/~daniel-baumann/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Releasing packages with 'pending' RC bugs

2007-09-27 Thread Adam D. Barratt

Daniel Baumann wrote, Thursday, September 27, 2007 11:43 AM


out of curiousity.. imagine a package where:

 * the Debian maintainer is also upstream maintainer
 * the package has practically no users (popcon  10)
 * the package has RC bugs
 * the RC bugs are fixed upstream
 * the RC bugs are tagged pending in the BTS
 * the fixed package doesn't get uploaded (e.g. due to ENOSPONSOR)

If I am not wrong (otherwise please do correct me) such a package would
enter testing on the normal way, and hence, would be part of the
upcoming stable release.


You're wrong. Assuming that the RC bugs are not present in testing already, 
the testing scripts will not allow the package to migrate. Tagging bugs as 
pending does not stop them being RC and makes no difference to their impact 
on testing migration.


If the package in testing is RC buggy it will get removed by the release 
team before release anyway.


Adam 



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Packaging a library that requires cross-compiled code

2007-09-27 Thread David Anderson
On 9/27/07, Bernd Zeimetz [EMAIL PROTECTED] wrote:
  4) Give up and stay away from the Debian main repositories, just put
  the package up on a private package repository.

 Please don't choose this way to solve the problem. Lego Mindstorms are
 used a lot for education, including universities, as it is just very
 easy to build objects with Lego bricks, so you have more time to think
 about the code then about how to handle metal or other raw material.

I agree. As I said, I want to do things right if I can.

 Unfortunately I still have no clue about cross-compiling, but please let
 me know if you need any help with the python parts. Feel free to join
 #debian-python on OFTC, all questions regarding python apps/modules are
 welcome there

Thanks, I'll be there, since I actually do have a few questions on
that part as well.

 Imho one very fast way to solve the problem would be to package all the
 python tools, including fwflash - but without the actual firmware blob.
 Instead you ask the people to download the file or let the tool handle
 this automatically - at least this would make sure people are able to
 use your tools with mindstorms while you have enough time to figure out
 how to ship the precompiled firmware in a debian package. For example
 you could build the firmware package on arm only and let your tools
 download and extract the package.

If you look at the previous version of my library, which is in C and
builds with SCons ( http://code.google.com/p/libnxt/ ), in C I
embedded the binary image directly into the source code before
compiling, using a small python script. And that python script does
detect the absence of the compiled firmware image, and asks the user
whether the binary should be downloaded from code.google.com. The
alternative is to abort the build, make the binary image locally, and
rerun.

While this is a workable solution, I find it annoying because it
places part of the burden of packaging on the user, for an
implementation detail. I have seen this kind of thing done before, but
for licensing reasons (non-free firmware that cannot be bundled in the
package), whereas this seems to be a purely technical issue.

Could the same kind of thing be done at package creation time, ie.
prompt the packager to either build or download a working version of
the binary image when the package is built (or just download it
automatically if non-interactive is required) ? The end result is the
same, except that end users don't have to care any more, which is
always nice.

If you couldn't tell btw: I think that the first solution I mentionned
would work well. The flash driver is tiny, and so trivial that it is
highly unlikely that it will change in the future, so I consider
bundling it a debian-specific fix to the upstream build system more
than anything else (so that the packaging process doesn't need to
download something from the web, which is what the python setup.py is
likely going to do to get around the cross-compiler issue).

- Dave


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: modified email address in debian/copyright file

2007-09-27 Thread Darren Salt
I demand that Lars Wirzenius may or may not have written...

[snip]
 Obfuscation which can easily be reversed by a human, but not so easily by a
 computer, does not render contact information incorrect. If I write my
 e-mail address as follows, it's still correct: My full name is Lars Ivar
 Wirzenius, and you can send me e-mail by taking my initials and putting
 them in front of the at sign and iki.fi after it.

But is that LIW or liw or Liw or...? :-)

[snip]
-- 
| Darren Salt| linux or ds at  | nr. Ashington, | Toon
| RISC OS, Linux | youmustbejoking,demon,co,uk | Northumberland | Army
| + Travel less. Share transport more.   PRODUCE LESS CARBON DIOXIDE.

A clean and tidy desk is a sign of a *very* sick mind.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: modified email address in debian/copyright file

2007-09-27 Thread Stephen Gran
This one time, at band camp, Darren Salt said:
 I demand that Lars Wirzenius may or may not have written...
 
 [snip]
  Obfuscation which can easily be reversed by a human, but not so easily by a
  computer, does not render contact information incorrect. If I write my
  e-mail address as follows, it's still correct: My full name is Lars Ivar
  Wirzenius, and you can send me e-mail by taking my initials and putting
  them in front of the at sign and iki.fi after it.
 
 But is that LIW or liw or Liw or...? :-)

I know it was a joke, but since email is (usually) case-insensitive, it
won't matter in practice.
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Re: Maintainer of package joystick may be missing

2007-09-27 Thread laszlo kajan
Dear Aníbal,

I uploaded the button and axis remapping patch against
joystick/20051019-1.1. This most recent patch also includes updates for
the jscal manpage, documenting the new command line arguments.

Thank you for your help.

Best regards,

Laszlo Kajan


Aníbal Monsalve Salazar wrote:
 On Tue, Sep 25, 2007 at 05:24:14PM +0200, laszlo kajan wrote:
 Please show me the way I can have my patch included in jscal.c of the
 joystick package. I believe it is useful and I immediately wanted to
 share it with others.
 
 Please file a bug report (including the patch) against the joystick
 package.
 
 Aníbal Monsalve Salazar


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: modified email address in debian/copyright file

2007-09-27 Thread paddy
On Thu, Sep 27, 2007 at 12:59:18PM +0100, Stephen Gran wrote:
 This one time, at band camp, Darren Salt said:
  I demand that Lars Wirzenius may or may not have written...
  
  [snip]
   Obfuscation which can easily be reversed by a human, but not so easily by 
   a
   computer, does not render contact information incorrect. If I write my
   e-mail address as follows, it's still correct: My full name is Lars Ivar
   Wirzenius, and you can send me e-mail by taking my initials and putting
   them in front of the at sign and iki.fi after it.
  
  But is that LIW or liw or Liw or...? :-)
 
 I know it was a joke, but since email is (usually) case-insensitive, it
 won't matter in practice.

not at all. 

rfc2821 2.4 The local-part of a mailbox MUST BE treated as case sensitive.

So, senders should use LIW@ but the MTA at the other end is free to accept
liw@ and Liw@ etc ...

;-)

Regards,
Paddy


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Packaging a library that requires cross-compiled code

2007-09-27 Thread Bastian Blank
On Wed, Sep 26, 2007 at 06:38:02PM -0700, Steve Langasek wrote:
 (Otherwise, you'd be building the arch: all package from the binary-arch
 rule on arm only; this would work, but cause brain-twistiness wrt the
 separation between arch: all and arch: any.)

sbuild does not allow this.

Bastian

-- 
If a man had a child who'd gone anti-social, killed perhaps, he'd still
tend to protect that child.
-- McCoy, The Ultimate Computer, stardate 4731.3


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Releasing packages with 'pending' RC bugs

2007-09-27 Thread Daniel Baumann
Adam D. Barratt wrote:
 You're wrong.

that...

 If the package in testing is RC buggy it will get removed by the release
 team before release anyway.

and that is good to know, thanks for the correction/explenation ;)

-- 
Address:Daniel Baumann, Burgunderstrasse 3, CH-4562 Biberist
Email:  [EMAIL PROTECTED]
Internet:   http://people.panthera-systems.net/~daniel-baumann/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Proposed menu changes

2007-09-27 Thread Bill Allombert
On Fri, Sep 21, 2007 at 03:23:04AM -0500, Manoj Srivastava wrote:
 Hi,
 
 While in the process of working on a new fvwm package, I
  noticed that the Menu policy has changed some of the old titles to new

I was hoping I had sufficiently advertised the proposal and the changes
so that it would have reached you sooner.

  ones.  For example, WindowManagers = Window Managers, Modules =
  FVWM Module (which is incorrect; the correct way to address the wm
  is Fvwm). 

In that case, please report a bug to debian-policy requesting the
change. This is a trivial matter to fix.

 But this means that people  who use Debian menus in fvwm have
  now got to change their .fvwm/.fvwmrc files; and use the new names.
  For example, 
 + WindowManagers Popup /Debian/WindowManagers
 + FVWM Modules Popup /Debian/Modules
  nust become.
 + FVWM Modules Popup /Debian/FVWM_Modules
 + Window Managers Popup /Debian/Window_Managers
 
 So, with the new menu policy, Fvwm users have to edit their
  configuration files.  Are there any plans for preserving backwards
  compatibility, or at least a transition plan?

I would say it is a job for the menu-method, not for menu itself.
Does FVWM allow to define aliases to menu section, or something similar?
You could define WindowManagers as an alias for Window Managers,
etc.

Cheers,
-- 
Bill. [EMAIL PROTECTED]

Imagine a large red swirl here. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Packaging a library that requires cross-compiled code

2007-09-27 Thread Daniel Jacobowitz
On Thu, Sep 27, 2007 at 02:59:16AM +0200, David Anderson wrote:
 1) Ship a built copy of the code in the package's .diff.gz, and DTRT
 at package creation time to move the .bin from debian/ to the right
 place in the staging tree. The source code for the .bin is in
 .orig.tar.gz, under a free license. Anyone is free to modify or
 rebuild the .bin, provided they obtain an arm7 cross-compiler by
 non-debian means (instructions provided). People who just want to
 rebuild the package can do so, without caring that there is
 cross-compiled code involved.

I think this is the way to go unless you get some concrete objections.
There is certainly precedent - see for instance the ia32-libs /
amd64-libs packages (which are frowned upon for whole different
reasons).

-- 
Daniel Jacobowitz
CodeSourcery


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: modified email address in debian/copyright file

2007-09-27 Thread Stephen Gran
This one time, at band camp, [EMAIL PROTECTED] said:
 On Thu, Sep 27, 2007 at 12:59:18PM +0100, Stephen Gran wrote:
  This one time, at band camp, Darren Salt said:
   I demand that Lars Wirzenius may or may not have written...
   
   [snip]
Obfuscation which can easily be reversed by a human, but not so easily 
by a
computer, does not render contact information incorrect. If I write my
e-mail address as follows, it's still correct: My full name is Lars 
Ivar
Wirzenius, and you can send me e-mail by taking my initials and putting
them in front of the at sign and iki.fi after it.
   
   But is that LIW or liw or Liw or...? :-)
  
  I know it was a joke, but since email is (usually) case-insensitive, it
  won't matter in practice.
 
 not at all. 
 
 rfc2821 2.4 The local-part of a mailbox MUST BE treated as case sensitive.
 
 So, senders should use LIW@ but the MTA at the other end is free to accept
 liw@ and Liw@ etc ...

  However, exploiting the case sensitivity of mailbox local-parts impedes 
  interoperability and is discouraged.

Hence the '(usually) case-insensitive'.
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Re: semi-virtual packages?

2007-09-27 Thread Bruce Sass
On Thu September 27 2007 01:33:21 am Manoj Srivastava wrote:
 On Wed, 26 Sep 2007 04:04:33 -0600, Bruce Sass [EMAIL PROTECTED] said:

 Hmm? You assumed, and I quote there are no such situations
  which would not already have a virtual package.  Since there are
  situations where there is no virtual package, it certainly seems to
 me that the assumption you made is invalid.

That is not correct, what I assumed was:
a, no, to the above [question]

What you quoted is not a primary assumption (as you've been treating it 
as), it is based on a condition having been met.

 If your assumption is correct, then I have missed something
  somewhere.

The bit you're still missing is the first part of the question you 
didn't answer: Is there any situation where ownership has collided

IOW: if the file shared by many packages isn't having ownership problems 
there is no need to consider it (no point trying to fix something that 
is not broken, eh).


  I don't see why it would need to be universal, one size stuff
  often doesn't fit anyone very well and it is not like being
  universal is pervasive and this would stand out as a wart.

 If we are not talking about a policy to be made, and you are
  only talking about an opt in scheme for some  orphan files, then
  indeed, I have nothing to add to the conversation.

s/some/all but a few/I suspect


- Bruce


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: modified email address in debian/copyright file

2007-09-27 Thread paddy
On Thu, Sep 27, 2007 at 02:54:08PM +0100, Stephen Gran wrote:
 This one time, at band camp, [EMAIL PROTECTED] said:
  On Thu, Sep 27, 2007 at 12:59:18PM +0100, Stephen Gran wrote:
   This one time, at band camp, Darren Salt said:
I demand that Lars Wirzenius may or may not have written...

[snip]
 Obfuscation which can easily be reversed by a human, but not so 
 easily by a
 computer, does not render contact information incorrect. If I write my
 e-mail address as follows, it's still correct: My full name is Lars 
 Ivar
 Wirzenius, and you can send me e-mail by taking my initials and 
 putting
 them in front of the at sign and iki.fi after it.

But is that LIW or liw or Liw or...? :-)
   
   I know it was a joke, but since email is (usually) case-insensitive, it
   won't matter in practice.
  
  not at all. 
  
  rfc2821 2.4 The local-part of a mailbox MUST BE treated as case sensitive.
  
  So, senders should use LIW@ but the MTA at the other end is free to accept
  liw@ and Liw@ etc ...
 
   However, exploiting the case sensitivity of mailbox local-parts impedes 
   interoperability and is discouraged.
 
 Hence the '(usually) case-insensitive'.

yes, I caught that '(usually)'. figured that was what you meant :-)

I don't think that drawing the conclusion I did counts as 
exploiting the case sensititivity of mailbox local-parts,
it being explictly covered in the passage I quoted, although 
I would agree that perhaps Lars should be discouraged from 
depending on this interpretation ...  ;-)

On the other hand, relying on the case-insensitivity of the local-part is
explicitly broken, even if it works in practice :-)

I'm so glad we have standards to make these things clear ;-)

Regards,
Paddy


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: modified email address in debian/copyright file

2007-09-27 Thread Ben Finney
Holger Levsen [EMAIL PROTECTED] writes:

 Whether or not it its an requirement to be able to contact the
 author, doesnt have anything to do with obfuscating the email
 address or not. (Assuming its not obfuscated beyond recognitition.)

That just pushes the question to a different location, without
answering it: what do we accept as a valid email address, and what do
we categorise as so far obfuscated that it's no longer useful.

It also puts one in the untenable position of having to make
*individual* decisions on every case of obfuscation: is this one too
far munged? Is that one? On what do I base my judgement of too far?

I argue that the only fair place to draw the line is valid RFC 2821
email address. The alternative is to leave it to ongoing subjective
judgement of unspecified Debian parties as to which addresses make
sense or not — or to avoid the question of valid contact information
altogether, as seems to be current practice.

 (*) BTW, I dont have an example at hand, but I'm pretty sure I have
 seen code in Debian written by anonymous and friends. You can't
 contact them either.

I don't doubt that's true. It's a regrettable situation, because the
copyright statement for that person's work is unverifiable even at the
time the code is accepted into Debian, let alone later in the future.

-- 
 \   Eccles: I just saw the Earth through the clouds!  Lew: Did |
  `\ it look round?  Eccles: Yes, but I don't think it saw me.  |
_o__)  -- The Goon Show, _Wings Over Dagenham_ |
Ben Finney


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Packaging a library that requires cross-compiled code

2007-09-27 Thread Shachar Shemesh
David Anderson wrote:
 Therefore, question: how should I get from this situation to having a
 working .deb (including the cross-compiled driver), while at the same
 time playing nicely with Debian packaging policies?
   
In the general case, the problem is much wider. Let me give you an example.

We currently package Xen and other free virtualization solutions. Some
of them can even run proprietary OSes, such as Windows. Now, suppose
that one would like to improve the way Windows runs under Xen by
writing, say, a custom mouse driver for Windows that para-virtualizes
the mouse on Windows. Such things are quite common in todays' world.

The problem is that this driver is a kernel level driver for Windows. If
it were user space we could still claim it could be compiled with
cross-mingw, but this is not the case here. Setting up an environment
for compiling Windows kernel drivers merely so we can build this tiny
blob seems out of proportion.

I think we need a change in policy for handling cases where free
software requires free software in order to compile which is, non the
less, non buildable on the same platform.

Shachar


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Packaging a library that requires cross-compiled code

2007-09-27 Thread Julien BLACHE
Shachar Shemesh [EMAIL PROTECTED] wrote:

 I think we need a change in policy for handling cases where free
 software requires free software in order to compile which is, non the
 less, non buildable on the same platform.

It exists already, it's called the contrib section of the archive.

JB.

-- 
 Julien BLACHE - Debian  GNU/Linux Developer - [EMAIL PROTECTED] 
 
 Public key available on http://www.jblache.org - KeyID: F5D6 5169 
 GPG Fingerprint : 935A 79F1 C8B3 3521 FD62 7CC7 CD61 4FD7 F5D6 5169 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: User-Agent strings, privacy and Debian browsers

2007-09-27 Thread Michelle Konzack
Sorry for the late reply but currently I am porting a new architecture
and have not very much time...

Am 2007-09-21 18:03:05, schrieb Peter Eckersley:
 Consider for a moment a typical User-Agent string sent by a Debian web 
 browser:
 
 Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.6) Gecko/20070802 
 Iceape/1.1.4 (Debian-1.1.4-1)
 
 Unfortunately, the fact that this information identifies a specific
 package and version of that package means that Debian users (already a
 select group) have their browsing identities further distinguished by
 their User-Agent strings.

Which quiet helpful IF YOU NEED complex websites which MUST work
with ANY browsers

 This means, in practice, that many sites will be able to track Debian
 users by their User-Agent, even if (say) the user is blocking cookies or
 limiting them to a single session and is changing IP address regularly.

Tracking $USER is not possibel if you check the popularity-contest.
Mean:  there 100th of thousands Debian-User using the same Program.

 What do people think of picking a single User-Agent string for all
 versions of all of Debian's Gecko-based browsers?

Which leed to errors while trying to resolv bugs.

 Would there be any serious harm in terms of browser debugging?  Are
 there many sites which usefully treat different Gecko browsers
 differently?

Yes, at least my Website an some Intranet-Sites of the french military...

 As a far more hypothetical question, what would people think of picking
 a single User-Agent for Gecko-based browsers for a larger set of
 GNU/Linux distributions?  Obviously, there is much more politics there,
 because any distributions that joined would be losing the ability to
 measure their desktop market share by looking at web statistics.

Thanks, Greetings and nice Day
Michelle Konzack
Systemadministrator
Tamay Dogan Network
Debian GNU/Linux Consultant


-- 
Linux-User #280138 with the Linux Counter, http://counter.li.org/
# Debian GNU/Linux Consultant #
Michelle Konzack   Apt. 917  ICQ #328449886
   50, rue de Soultz MSN LinuxMichi
0033/6/6192519367100 Strasbourg/France   IRC #Debian (irc.icq.com)


signature.pgp
Description: Digital signature


Re: User-Agent strings, privacy and Debian browsers

2007-09-27 Thread Michelle Konzack
Am 2007-09-22 11:16:55, schrieb Peter Eckersley:
 But maybe you use open wifi networks, and other Debian users also use
 those networks.  Maybe there are other Debian users behind your NAT.
 Maybe your friends come over sometimes and they also use Debian.  In
 those cases, standardising the User-Agent string increases the size of
 your anonymity sets for various activities.

...and if you have a faulty browser in your network?
(e.g. forgotten to make a security-update or an interrupted one)

Thanks, Greetings and nice Day
Michelle Konzack
Systemadministrator
Tamay Dogan Network
Debian GNU/Linux Consultant


-- 
Linux-User #280138 with the Linux Counter, http://counter.li.org/
# Debian GNU/Linux Consultant #
Michelle Konzack   Apt. 917  ICQ #328449886
   50, rue de Soultz MSN LinuxMichi
0033/6/6192519367100 Strasbourg/France   IRC #Debian (irc.icq.com)


signature.pgp
Description: Digital signature


Re: Changing name of source package

2007-09-27 Thread Magnus Holmgren
On torsdagen den 27 september 2007, Francesco P. Lovergine wrote:
 On Wed, Sep 26, 2007 at 07:26:51PM -0700, Steve Langasek wrote:
  The only other thing you need to worry about is filing a bug report
  against ftp.debian.org to get the old php4-ps source package removed,
  since this won't happen automatically.

 If it is not still required in stable/oldstable isn't it?

ftpmaster doesn't delete the source package, he just tells the system that the 
package is no longer wanted. When no suite references the package any longer, 
it is deleted, and _that_ part happens automatically.

-- 
Magnus Holmgren[EMAIL PROTECTED]
   (No Cc of list mail needed, thanks)


signature.asc
Description: This is a digitally signed message part.


Bug#444334: ITP: libmowgli -- a high performance development framework for C

2007-09-27 Thread Patrick Schoenfeld
Package: wnpp
Severity: wishlist
Owner: Patrick Schoenfeld [EMAIL PROTECTED]

* Package name: libmowgli
  Version : 0.4.0
  Upstream Author : Atheme Project
* URL : http://www.atheme-project.org/projects/mowgli.shtml
* License : BSD
  Programming Lang: C
  Description : a high performance development framework for C

mowgli is a development framework for C (like GLib), which provides high
performance and highly flexible algorithms. It can be used as a suppliment
to GLib (to add additional functions (dictionaries, hashes), or replace some
of the slow GLib list manipulation functions), or stand alone. It also provides
a powerful hook system and convenient logging for your code, as well as a high
performance block allocator.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.22-2-k7 (SMP w/1 CPU core)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Call for tests: new ThinkFinger package in experimental (PAM-0.99.7.1)

2007-09-27 Thread Luca Capello
Hello!

A new ThinkFinger [1] package has been uploaded to experimental [2]:
this package was built with PAM in unstable and since a while it's
working with no major problems on my sid.  I wrote major because
there're indeed some problems (links available at [2])...

1) not all the application that perform authentication supports
   ThinkFinger, the worst being screensavers and gksudo [3]

2) a really annoying problem is the SSH segfault [4]: this is still
   unsolved and could deserve an RC bug (but I'd go anyway to lenny
   for wider testing (comments welcome)

So, this is call for people who have an UPEK/STMicroelectronics
fingerprint reader (0483:2016), usually found either as a standalone
USB device, built into USB keyboards or built into laptops (usually
From Dell, IBM/Lenovo and Toshiba).  Please test the package in
experimental and report any (unknown) problem in the BTS.  Otherwise,
I'll upload the experimental package to unstable after 10 days from
this mail (and after lenny to bakcports, too).

Thx, bye,
Gismo / Luca

Footnotes: 
[1] http://thinkfinger.sourceforge.net
[2] 
http://lists.alioth.debian.org/pipermail/fingerforce-devel/2007-September/07.html
[3] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444059
[4] 
http://news.gmane.org/group/gmane.linux.drivers.thinkfinger/thread=434/force_load=t


pgpaHyFt1flOb.pgp
Description: PGP signature


Re: Building packages with exact binary matches

2007-09-27 Thread Manoj Srivastava
On Thu, 27 Sep 2007 11:28:47 +0200, Martin Uecker [EMAIL PROTECTED] said: 

 On Thu, Sep 27, 2007 at 02:26:49AM -0500, Manoj Srivastava wrote:
 On Wed, 26 Sep 2007 12:31:51 +0200, Martin Uecker [EMAIL PROTECTED]
 said:
 
  On Wed, Sep 26, 2007 at 12:25:02AM -0500, Manoj Srivastava wrote:
 
  Just because you have _heard_ anyone diss special relativity being
  the sole reason to believe in it is in the same ball park as
  blissful, you know, ignorance.
 
  It is not about hearsay. It is about finding an error in a
  predictation.  And I do not care *who* finds the error. Of course
  the predications have actually be checked. So you are right with
  your argument, if nobody actually does this, it would be ignorant
  to believe in a scientifc theory for the sole reason that nobody
  complains. Similar, if nobody recompiles the packages and checks
  for mismatches, then silence would in fact not imply that things
  are ok. But I question your premise: I have no doubt that some
  people would actually recompile packages and compare the hash. Even
  if it is not done normally, somebody would do this if doubts come
  up for some reason (e.g. some debian hosts are compromised again.).
  This alone would actually be worth a lot.
 
 But recompiling from what? If you do not get the exact same source,
 you have no hope of getting the same result.

 I had the impression that Debian distributes the source code from
 which the binaries are actually compiled and not some random
 variation.

Yup, complete with all the trojans in the binary and all.

 And the way things work, the chances are that if the binary is
 tainted, the source would be tainted -- and you have got nowhere.

 If I wanted to hide a trojan somewhere I would to it in the binary and
 not in the source code. People actually look into source code on a
 regular basis but they seldom disassemble a binary.

The window of opportunity is small. You have to replace the
 binary .deb in between the time it was built, and it was signed. 

  The difference is evidence.  If there is some merit to the notion
  that a buildd is compromised, the solution is not bunches of
  people building from potentially tainted sources and comparing
  checksums.
 
  If know that the source code wich has hash 4457575757575 compiled
  in the build environment with hash 4837373737 gives a package with
  hash 366336363, then it is actually *evidence* that something is
  seriously wrong if you end up with a package with a different hash.
 
 So, someone replaces the binary compiled on the buildd with a fake
 one, in between the binary being built and it being signed?  All the
 work to get bit-for-bit reproducibility for such a low priority
 attack vector?

 I do not think it is a low priority attack vector. If I would be a
 cracker and had a rootkit installed on a debian build host it would
 certainly insert a backdoor in ssh everytime it is compiled: Access to
 all debian running computers world wide!

Compromise gcc? I see. So, fro all you know, every copy of gcc
 in the world now has the compile trojan into ssh built in, and again,
 no way for people peering at bits to see if there is a trojan buried in
 there to find out.

 BTW I did some tests and for 'dpkg' the only files which change
 between builds are the manpages and that's just because gzip stores
 the date of the orginal in the compressed file.

This is one of the things, yes. ANy package with a tar archive
 would suffer similarly.

manoj
-- 
The bug starts here.
Manoj Srivastava [EMAIL PROTECTED] http://www.debian.org/~srivasta/
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: semi-virtual packages?

2007-09-27 Thread Manoj Srivastava
On Thu, 27 Sep 2007 08:08:49 -0600, Bruce Sass [EMAIL PROTECTED] said: 

 The bit you're still missing is the first part of the question you
 didn't answer: Is there any situation where ownership has collided

 IOW: if the file shared by many packages isn't having ownership
 problems there is no need to consider it (no point trying to fix
 something that is not broken, eh).

The start of this thread was a rant about not loose files
 floating around in /etc; not necessarily about whether these files in
 themselves had ownership problems (whtever that means).

Here is the original context. Note how you say the problem
 (actually, design flaw) is about current tools do not catch files
 created by Maintainer scripts?

Nice to see the design flaw has become stuff that is not broken
 and does not have to be fixed.  That is all I cared about, really.

manoj

On Fri, 21 Sep 2007 03:25:23 + (UTC), Oleg Verych (Gmane)
[EMAIL PROTECTED] said:  

 19-09-2007, Bruce Sass: []
  I like this too. Finding what a package has just installed is one
  of the biggest holes in Debian right now, IMO. I have to use dpkg
  -L to figure this out, and that's just too crude to be a real
  solution.
 
 Too crude?  That's a simple command, easily found in a relevant
 manpage.  In true Unix fashion, its output can be easily piped to
 other commands.  What's crude about it?
 
 It doesn't catch files created by Maintainer scripts?

 This is the design flaw in those scripts (even in whole package
 management).

-- 
You know how to win a victory, Hannibal, but not how to use it. Maharbal
Manoj Srivastava [EMAIL PROTECTED] http://www.debian.org/~srivasta/
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: semi-virtual packages?

2007-09-27 Thread Bruce Sass
On Thu September 27 2007 05:38:53 pm Manoj Srivastava wrote:
 On Thu, 27 Sep 2007 08:08:49 -0600, Bruce Sass [EMAIL PROTECTED] said:
  The bit you're still missing is the first part of the question you
  didn't answer: Is there any situation where ownership has
  collided
 
  IOW: if the file shared by many packages isn't having ownership
  problems there is no need to consider it (no point trying to fix
  something that is not broken, eh).

 The start of this thread was a rant about not loose files
  floating around in /etc; not necessarily about whether these files
 in themselves had ownership problems (whtever that means).

 Here is the original context. Note how you say the problem
  (actually, design flaw) is about current tools do not catch files
  created by Maintainer scripts?

 Nice to see the design flaw has become stuff that is not
 broken and does not have to be fixed.  That is all I cared about,
 really.

Oleg considers it a design flaw, I have stated no such opinion and 
didn't even include his statement to that effect in my reply. Why would 
you bring it up... grasping at straws, perhaps.

The original context I was responding to, and which you jumped in on, is 
this:
-
On Sat, 22 Sep 2007 03:46:26 -0600, Bruce Sass [EMAIL PROTECTED] said: 

 On Sat September 22 2007 12:16:18 am Oleg Verych (Gmane) wrote:
 21-09-2007, Bruce Sass:
  On Thu September 20 2007 09:25:23 pm Oleg Verych (Gmane) wrote:
  19-09-2007, Bruce Sass:
   I'm hoping the dpkg triggers functionality Ian Jackson has
   been working on will help solve that wart though.
 
  How exactly?
 
  Exactly? I don't know. I haven't followed what is happening close
  enough.
 
  Basically, it allows a package to toss up a flag saying, `I'm here
  and something needs to be done.' It may require some convention
  and a little more infrastructure, but that is close to letting a
  package say, `add these paths to the list of paths which I
  control.'
 
 Sure. But i thought, we are talking about finding/listing of
 generated files.

 It is not feasible (imo) to automatically find files created by
 maintainer scripts. Having packages append package.list themselves
 would (afaict) require they know too much about dpkg's internal
 operation, and all packages generating files would need to implement
 the algorithm.

 However, maintainer scripts can easily pass a list of generated paths
 on to a shared piece of code which dpkg controls. triggers looks
 like it could be the mechanism by which a package flags that it has
 generated files, and by which dpkg exerts control.

But this does not address the case of a file shared by many
 packages but really owned by none.

manoj
-

You then proceeded to demonstrate that you: have trouble reading, 
following arguments, keeping track of what your own use case actually 
is, and using logic.  You are now finishing up with misquotes and 
misrepresentation of anothers position.  Do you wonder why you get in 
so many fights and pointless arguments. :-/

Bye-bye, and I wish you luck in whatever little fantasy world you've 
constructed for yourself.


- Bruce


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Intent to remove libxaw6 from Debian [security issues]

2007-09-27 Thread Drew Parsons
Dear Debian Developers,

the X Strike Force intends to remove libxaw6 from the archive.

The reason is explained in bug #172890.  In short, libxaw6 has a
security flaw where it displays passwords in plain text.

The flaw is fixed in libxaw7.  All packages in Debian now use libxaw7
rather than libxaw6.  We therefore consider it prudent to remove libxaw6
from the archive to avert any possible future misuses.

This has the potential to impact on any third party packages which use
libxaw6.  We don't believe this should annul the package's removal
however, because
a) these packages should be rebuilt against libxaw7 anyway, and
b) libxaw6 can still be taken from etch if really needed.

The LSB does not specify any requirements for libxaw (v7 or otherwise).

Please let us know (by replying to bug #172890) if you have any
objections or can otherwise present an argument in favour of keeping
libxaw6.

Otherwise, we will remove it in a week or so.

Drew Parsons
\hat{XSF}





signature.asc
Description: This is a digitally signed message part


Bug#444368: ITP: dvd95 -- DVD9 to DVD5 converter

2007-09-27 Thread Carlos Laviola
Package: wnpp
Severity: wishlist
Owner: Carlos Laviola [EMAIL PROTECTED]

* Package name: dvd95
  Version : 1.2p1
  Upstream Author : J. F. Coulon [EMAIL PROTECTED]
* URL : http://dvd95.sourceforge.net/
* License : GPL
  Programming Lang: C
  Description : DVD9 to DVD5 converter

  dvd95 is a GNOME application to convert DVD9 to DVD5 (4.7GB).

  * Needs no additional packages - embedded versions of vamps and
dvdauthor are used, to be as fast as possible.
  * Interface is pretty simple to use.
  * Shrinking factor may be computed for best results, or an adaptive
compression ratio method may be used.
  * DVDs can be converted to file trees or ISOs.
  * The end result can be viewed and burned with regular third party
players and DVD recording software.

  * DVD95 supports two copy modes:
  - Without menus, one video title set, multiple audio tracks and subtitles.
  - With menus, one video title set, multiple audio tracks and subtitles.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (999, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.22-2-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_US.UTF-8)
Shell: /bin/sh linked to /bin/bash



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Bug#444368: ITP: dvd95 -- DVD9 to DVD5 converter

2007-09-27 Thread Paul Wise
On Thu, 2007-09-27 at 23:26 -0300, Carlos Laviola wrote:

   * Needs no additional packages - embedded versions of vamps and
 dvdauthor are used, to be as fast as possible.

Please notify the Debian security team so they can add dvd95, vamps,
dvdauthor to their list of packages with duplicated code. 

-- 
bye,
pabs

http://wiki.debian.org/PaulWise


signature.asc
Description: This is a digitally signed message part


Re: User-Agent strings, privacy and Debian browsers

2007-09-27 Thread Drew Parsons
Peter Eckersley wrote:
 Consider for a moment a typical User-Agent string sent by a Debian web 
 browser:
 
 Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.6) Gecko/20070802 
 Iceape/1.1.4 (Debian-1.1.4-1)
 
 Unfortunately, the fact that this information identifies a specific
 package and version of that package means that Debian users (already a
 select group) have their browsing identities further distinguished by
 their User-Agent strings.
 ...
 What do people think of picking a single User-Agent string for all
 versions of all of Debian's Gecko-based browsers?


From the other responses, it seems clear that we do not want to do this
for technical reasons.

Your concern addresses a potential social problem, not a technical
problem. Perhaps you will have more success getting us to appreciate
what you're trying to say if you can explain it more thoroughly in
social terms?  

That is, what problem are you trying to solve exactly? 

Can you provide actual examples where identification by User-Agent has
led to tangible harm, or may be reasonably expected to lead to harm in
the near future, rather than than simply being some hypothetical tool
open to abuse by some future tyrannical government or corporation?

If we can be convinced the actual danger is real, then the technical
solution is of course trivial.

Drew


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted bluez-libs 3.19-1 (source i386)

2007-09-27 Thread Mario Iseli
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 08:47:11 +0200
Source: bluez-libs
Binary: libbluetooth2 libbluetooth-dev
Architecture: source i386
Version: 3.19-1
Distribution: unstable
Urgency: low
Maintainer: Debian Bluetooth Maintainers [EMAIL PROTECTED]
Changed-By: Mario Iseli [EMAIL PROTECTED]
Description: 
 libbluetooth-dev - Development files for using the BlueZ Linux Bluetooth 
library
 libbluetooth2 - Library to use the BlueZ Linux Bluetooth stack
Changes: 
 bluez-libs (3.19-1) unstable; urgency=low
 .
   * New upstream release.
   * Added XS-Vcs-* fields in debian/control.
   * Added a debian/watch file.
Files: 
 7637bbf64b41450f7802720344777b8b 910 admin optional bluez-libs_3.19-1.dsc
 40106bf5263e75c47d5033ae5085b6e2 309088 admin optional 
bluez-libs_3.19.orig.tar.gz
 8aaff394591910a9d90a9d8e1f3d99d3 4570 admin optional bluez-libs_3.19-1.diff.gz
 88edcd6cc088146dddcf46e8f4361159 66370 libdevel extra 
libbluetooth-dev_3.19-1_i386.deb
 a1897dd76f0a9e24b3ea3dadd1844e17 42926 libs optional 
libbluetooth2_3.19-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG+14lJ9EDSN0bDvcRAofqAJ4oB5mc2qQ0UkLcLB2pObB3WxVWwgCePu5r
oYLMOScK/D0h4DcJtH+59mA=
=h5UA
-END PGP SIGNATURE-


Accepted:
bluez-libs_3.19-1.diff.gz
  to pool/main/b/bluez-libs/bluez-libs_3.19-1.diff.gz
bluez-libs_3.19-1.dsc
  to pool/main/b/bluez-libs/bluez-libs_3.19-1.dsc
bluez-libs_3.19.orig.tar.gz
  to pool/main/b/bluez-libs/bluez-libs_3.19.orig.tar.gz
libbluetooth-dev_3.19-1_i386.deb
  to pool/main/b/bluez-libs/libbluetooth-dev_3.19-1_i386.deb
libbluetooth2_3.19-1_i386.deb
  to pool/main/b/bluez-libs/libbluetooth2_3.19-1_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted koffice 1:1.6.3-3 (source all amd64)

2007-09-27 Thread Ana Beatriz Guerrero Lopez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 26 Sep 2007 23:29:24 +0200
Source: koffice
Binary: koffice-data kivio koffice kugar kchart karbon kpresenter koffice-dbg 
kformula koffice-libs koshell kivio-data kspread kword koffice-doc krita 
krita-data kexi koffice-dev kword-data kthesaurus koffice-doc-html kplato 
kpresenter-data
Architecture: source amd64 all
Version: 1:1.6.3-3
Distribution: unstable
Urgency: high
Maintainer: Debian Qt/KDE Maintainers [EMAIL PROTECTED]
Changed-By: Ana Beatriz Guerrero Lopez [EMAIL PROTECTED]
Description: 
 karbon - a vector graphics application for the KDE Office Suite
 kchart - a chart drawing program for the KDE Office Suite
 kexi   - integrated database environment for the KDE Office Suite
 kformula   - a formula editor for the KDE Office Suite
 kivio  - a flowcharting program for the KDE Office Suite
 kivio-data - data files for Kivio flowcharting program
 koffice- KDE Office Suite
 koffice-data - common shared data for the KDE Office Suite
 koffice-dbg - debugging symbols for koffice
 koffice-dev - common libraries for KOffice (development files)
 koffice-doc - developer documentation for the KDE Office Suite
 koffice-doc-html - KDE Office Suite documentation in HTML format
 koffice-libs - common libraries and binaries for the KDE Office Suite
 koshell- the KDE Office Suite workspace
 kplato - an integrated project management and planning tool
 kpresenter - a presentation program for the KDE Office Suite
 kpresenter-data - data files for KPresenter presentation program
 krita  - a pixel-based image manipulation program for the KDE Office Suite
 krita-data - data files for Krita painting program
 kspread- a spreadsheet for the KDE Office Suite
 kthesaurus - thesaurus for the KDE Office Suite
 kugar  - a business report maker for the KDE Office Suite
 kword  - a word processor for the KDE Office Suite
 kword-data - data files for KWord word processor
Closes: 443673 444014
Changes: 
 koffice (1:1.6.3-3) unstable; urgency=high
 .
   * Patch for stack-based buffer overflow in the StreamPredictor::getNextLine
 function in xpd that might allow remote attackers to execute arbitrary code
 via a crafted PDF file. CVE-2007-504. (Closes: #444014)
   * Update section in Debian menu files.
   * Install kexi example /usr/share/apps/kexi/examples/Simple_Database.kexi
   * Install libkrita*.{la,so} files to allow build external plugins.
 (Closes: #443673)
   * Add not-installed.list file to keep track of not installed files.
   * Add a missing dependency on kcontrol to kformula, in order to provide the
 fonts kioslave. Thanks to Eike Hein for reporting.
Files: 
 0ef5567567fef064d038714344c06493 1448 kde optional koffice_1.6.3-3.dsc
 76e8cd407454ea3c64b56ebddce32d8d 1230471 kde optional koffice_1.6.3-3.diff.gz
 eef90f444ecd64f353b6f3113f10d123 17174 kde optional koffice_1.6.3-3_all.deb
 193dfc9181c35b7b58e2c3a06c6d08b6 100913348 doc optional 
koffice-doc_1.6.3-3_all.deb
 027eca2df4ed1e8d167588f23bb1a9a6 537050 doc optional 
koffice-doc-html_1.6.3-3_all.deb
 23ca002df06e7b72734b0bda30c6f837 689492 graphics optional 
kivio-data_1.6.3-3_all.deb
 62407d2c1aa52bd999b4879341abf081 1912310 kde optional 
kpresenter-data_1.6.3-3_all.deb
 c80e46ca19b6f9fdc8c29ebe7e32398f 28325580 kde optional 
krita-data_1.6.3-3_all.deb
 8cb26cfdc85840280dc759294d192137 1818474 kde optional 
kword-data_1.6.3-3_all.deb
 d91ea5fa77295c7bd6cc653d8dcfa763 745000 libs optional 
koffice-data_1.6.3-3_all.deb
 732788d8e0f2ca50a220aa4cae6d3bad 1072692 graphics optional 
karbon_1.6.3-3_amd64.deb
 e751b65b6e3d45cafdc35fe3a299c999 1375734 kde optional kchart_1.6.3-3_amd64.deb
 1c2c850ef364841d1a44fc9eef9a4958 3737244 kde optional kexi_1.6.3-3_amd64.deb
 1b315ca83d0440f007a3fc21867f5282 1035596 kde optional 
kformula_1.6.3-3_amd64.deb
 6337545e9601ec46df9d22b59b84dc4f 619712 graphics optional 
kivio_1.6.3-3_amd64.deb
 ffc5e6edb58c37b52251e988846e8ed9 189858 kde optional koshell_1.6.3-3_amd64.deb
 c258df4c208fc1ab918de9cdf2b2c167 957600 kde optional kplato_1.6.3-3_amd64.deb
 5e526024bff749b354a6285e2f01736d 1353140 kde optional 
kpresenter_1.6.3-3_amd64.deb
 119ccb061b91ca0e19f8ace81eb96ef4 3435812 kde optional krita_1.6.3-3_amd64.deb
 243ad082a6c5566b45161b465af297ac 2743054 kde optional kspread_1.6.3-3_amd64.deb
 c104c148a3b3d789c623eb7598f93ddb 460458 kde optional kugar_1.6.3-3_amd64.deb
 6008cb241bff5929de964cda4a142534 2890142 kde optional kword_1.6.3-3_amd64.deb
 84eff79f369cf9c2163cf013e2ae21e9 322322 kde optional 
kthesaurus_1.6.3-3_amd64.deb
 53c1b14c20eec6c9ed98639652469399 2740498 libs optional 
koffice-libs_1.6.3-3_amd64.deb
 03879598c3a81f69980c9cad1a03f07b 432810 libdevel optional 
koffice-dev_1.6.3-3_amd64.deb
 8bb9e1786b8f86c9252ddaa4a378dea5 109371948 libdevel extra 
koffice-dbg_1.6.3-3_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Signed by Ana Guerrero


Accepted qt-x11-free 3:3.3.7-9 (source all amd64)

2007-09-27 Thread Sune Vuorela
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 26 Sep 2007 21:42:24 +0200
Source: qt-x11-free
Binary: libqt3-i18n qt3-apps-dev libqt3-mt-sqlite qt-x11-free-dbg qt3-assistant 
qt3-examples qt3-doc libqt3-headers libqt3-mt-mysql libqt3-mt libqt3-mt-odbc 
libqt3-compat-headers qt3-dev-tools-embedded qt3-dev-tools libqt3-mt-ibase 
qt3-designer qt3-linguist qt3-qtconfig qt3-dev-tools-compat libqt3-mt-dev 
libqt3-mt-psql
Architecture: source amd64 all
Version: 3:3.3.7-9
Distribution: unstable
Urgency: low
Maintainer: Debian Qt/KDE Maintainers [EMAIL PROTECTED]
Changed-By: Sune Vuorela [EMAIL PROTECTED]
Description: 
 libqt3-compat-headers - Qt 1.x and 2.x compatibility includes
 libqt3-headers - Qt3 header files
 libqt3-i18n - i18n files for Qt3 library
 libqt3-mt  - Qt GUI Library (Threaded runtime version), Version 3
 libqt3-mt-dev - Qt development files (Threaded)
 libqt3-mt-ibase - InterBase/FireBird database driver for Qt3 (Threaded)
 libqt3-mt-mysql - MySQL database driver for Qt3 (Threaded)
 libqt3-mt-odbc - ODBC database driver for Qt3 (Threaded)
 libqt3-mt-psql - PostgreSQL database driver for Qt3 (Threaded)
 libqt3-mt-sqlite - SQLite database driver for Qt3 (Threaded)
 qt-x11-free-dbg - debugging symbols for qt-x11-free binaries
 qt3-apps-dev - Qt3 Developer applications development files
 qt3-assistant - The Qt3 assistant application
 qt3-designer - Qt3 Designer
 qt3-dev-tools - Qt3 development tools
 qt3-dev-tools-compat - Conversion utilities for Qt3 development
 qt3-dev-tools-embedded - Tools to develop embedded Qt applications
 qt3-doc- Qt3 API documentation
 qt3-examples - Examples for Qt3
 qt3-linguist - The Qt3 Linguist
 qt3-qtconfig - The Qt3 Configuration Application
Changes: 
 qt-x11-free (3:3.3.7-9) unstable; urgency=low
 .
   * Trust dpkg-architecture better than uname -m for the build key. Make
 mappings to not break current binary compability. Add patch 72 for that.
 Thanks to Bastian Blank for often changing uname -m on his buildds to
 discover this bug.
Files: 
 40f788aff93b6e2be297030d509da070 1780 libs optional qt-x11-free_3.3.7-9.dsc
 64acdbe49ed5f352ba50d8b813ff11b6 238085 libs optional 
qt-x11-free_3.3.7-9.diff.gz
 18c53318124009684fca850f20412f3b 130810 libs optional 
libqt3-i18n_3.3.7-9_all.deb
 7db53edc2c5a694a3d2870f265835d28 5612618 doc extra qt3-doc_3.3.7-9_all.deb
 ed3eb9b894165ce0d90939b95f7ea024 1587674 doc extra qt3-examples_3.3.7-9_all.deb
 fd1b76fe278667b4b92d31077ec660ea 3648894 libs optional 
libqt3-mt_3.3.7-9_amd64.deb
 4bacb8f2e813cbae6b3347c2bf8bdb88 52562 libs optional 
libqt3-mt-mysql_3.3.7-9_amd64.deb
 5e47c4e66ef68d07efe26869dbdcbce7 76626 libs optional 
libqt3-mt-odbc_3.3.7-9_amd64.deb
 7794e31c789fd0f3233cfbf4b2fd0bdc 58298 libs optional 
libqt3-mt-psql_3.3.7-9_amd64.deb
 81213f122c773fc6a2dd3fdc7bbc53fe 59420 libs optional 
libqt3-mt-ibase_3.3.7-9_amd64.deb
 cd49eb7d941a8da49e5978fc63a4bce2 220984 libs optional 
libqt3-mt-sqlite_3.3.7-9_amd64.deb
 fc25ceaa7a0a425399f415ffacbefdc1 47678 libdevel optional 
libqt3-mt-dev_3.3.7-9_amd64.deb
 8657deffe3b710330c22db48b1548832 364626 devel optional 
libqt3-headers_3.3.7-9_amd64.deb
 e6685333ecbdb9493e05ce25439058ab 77308 devel optional 
libqt3-compat-headers_3.3.7-9_amd64.deb
 9483d6698759267ff88092a1a88a75ac 1312530 devel optional 
qt3-dev-tools_3.3.7-9_amd64.deb
 d04aa506103519491dd146feb241863f 4237152 devel optional 
qt3-designer_3.3.7-9_amd64.deb
 8c7acfa41e320e3df6c034fb609e1528 2725196 devel optional 
qt3-apps-dev_3.3.7-9_amd64.deb
 aa2340bd5270172944840ab33a693812 365660 devel optional 
qt3-linguist_3.3.7-9_amd64.deb
 1a26d2f2f81807ada4c9247df75f9065 261084 x11 optional 
qt3-assistant_3.3.7-9_amd64.deb
 a6fe9bd639abd50ec3f0b3c6dcd5fb62 106694 x11 optional 
qt3-qtconfig_3.3.7-9_amd64.deb
 30ae5bc121071e002fb497c5035009e7 298962 devel optional 
qt3-dev-tools-embedded_3.3.7-9_amd64.deb
 9a3468309839084a10bbe1687f48c563 75448 devel optional 
qt3-dev-tools-compat_3.3.7-9_amd64.deb
 b16e7974efc0756b4ba41b0e09b4bd6a 64862546 libdevel extra 
qt-x11-free-dbg_3.3.7-9_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Signed by Ana Guerrero

iD8DBQFG+3Fxn3j4POjENGERAhP8AJ9NP9pwlncVk+gZbS6CJkzMhK+7HgCdFlry
cnhZmIMp3/UEIA8a5eLcO2g=
=y/L6
-END PGP SIGNATURE-


Accepted:
libqt3-compat-headers_3.3.7-9_amd64.deb
  to pool/main/q/qt-x11-free/libqt3-compat-headers_3.3.7-9_amd64.deb
libqt3-headers_3.3.7-9_amd64.deb
  to pool/main/q/qt-x11-free/libqt3-headers_3.3.7-9_amd64.deb
libqt3-i18n_3.3.7-9_all.deb
  to pool/main/q/qt-x11-free/libqt3-i18n_3.3.7-9_all.deb
libqt3-mt-dev_3.3.7-9_amd64.deb
  to pool/main/q/qt-x11-free/libqt3-mt-dev_3.3.7-9_amd64.deb
libqt3-mt-ibase_3.3.7-9_amd64.deb
  to pool/main/q/qt-x11-free/libqt3-mt-ibase_3.3.7-9_amd64.deb
libqt3-mt-mysql_3.3.7-9_amd64.deb
  to pool/main/q/qt-x11-free/libqt3-mt-mysql_3.3.7-9_amd64.deb
libqt3-mt-odbc_3.3.7-9_amd64.deb
  to pool/main/q/qt-x11-free/libqt3-mt-odbc_3.3.7-9_amd64.deb

Accepted libpreludedb 0.9.13-2 (source amd64)

2007-09-27 Thread Pierre Chifflier
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 10:49:16 +0200
Source: libpreludedb
Binary: libpreludedb-perl libpreludedb-dev libpreludedb0 python-preludedb
Architecture: source amd64
Version: 0.9.13-2
Distribution: unstable
Urgency: low
Maintainer: Mickael Profeta [EMAIL PROTECTED]
Changed-By: Pierre Chifflier [EMAIL PROTECTED]
Description: 
 libpreludedb-dev - Hybrid Intrusion Detection System [ Development files ]
 libpreludedb-perl - Hybrid Intrusion Detection System [ Base library ]
 libpreludedb0 - Hybrid Intrusion Detection System [ Base library ]
 python-preludedb - Hybrid Intrusion Detection System [ Base library ]
Changes: 
 libpreludedb (0.9.13-2) unstable; urgency=low
 .
   * Backport patch r9907 from upstream:
 revent MySQL session from timing out after 8 hours of inactivity.
Files: 
 97948fc1b204b4596a7ff1997806c04b 863 libs extra libpreludedb_0.9.13-2.dsc
 87c25348aea0ae7d34668915c30d523d 3681 libs extra libpreludedb_0.9.13-2.diff.gz
 a22f0d8a6573cc2fcd627085ae018c63 23538 libdevel extra 
libpreludedb-dev_0.9.13-2_amd64.deb
 4e21f3a178e8099089b7d71c1c47c873 145730 libs extra 
libpreludedb0_0.9.13-2_amd64.deb
 c969d1dc546bb124cb5ec591d20b5cc5 68368 perl extra 
libpreludedb-perl_0.9.13-2_amd64.deb
 09129821e471e4329d0de4f0217213b3 83692 python extra 
python-preludedb_0.9.13-2_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG+32RtwVrWo1fQMsRAvyoAJ46kox50tBOq+rCXJp8GLsaPT+WCgCeIG4T
Xr+wpvyYIs9+acR5/k5xyVg=
=z2JD
-END PGP SIGNATURE-


Accepted:
libpreludedb-dev_0.9.13-2_amd64.deb
  to pool/main/libp/libpreludedb/libpreludedb-dev_0.9.13-2_amd64.deb
libpreludedb-perl_0.9.13-2_amd64.deb
  to pool/main/libp/libpreludedb/libpreludedb-perl_0.9.13-2_amd64.deb
libpreludedb0_0.9.13-2_amd64.deb
  to pool/main/libp/libpreludedb/libpreludedb0_0.9.13-2_amd64.deb
libpreludedb_0.9.13-2.diff.gz
  to pool/main/libp/libpreludedb/libpreludedb_0.9.13-2.diff.gz
libpreludedb_0.9.13-2.dsc
  to pool/main/libp/libpreludedb/libpreludedb_0.9.13-2.dsc
python-preludedb_0.9.13-2_amd64.deb
  to pool/main/libp/libpreludedb/python-preludedb_0.9.13-2_amd64.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted poppler 0.5.4-6.2 (source i386)

2007-09-27 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 26 Sep 2007 18:40:41 +0200
Source: poppler
Binary: libpoppler-glib-dev poppler-utils libpoppler-qt4-dev libpoppler-qt1 
libpoppler1 libpoppler-glib1 libpoppler-qt4-1 libpoppler-dev libpoppler-qt-dev
Architecture: source i386
Version: 0.5.4-6.2
Distribution: unstable
Urgency: high
Maintainer: Ondřej Surý [EMAIL PROTECTED]
Changed-By: Nico Golde [EMAIL PROTECTED]
Description: 
 libpoppler-dev - PDF rendering library -- development files
 libpoppler-glib-dev - PDF rendering library -- development files (GLib 
interface)
 libpoppler-glib1 - PDF rendering library (GLib-based shared library)
 libpoppler-qt-dev - PDF rendering library -- development files (Qt 3 interface)
 libpoppler-qt1 - PDF rendering library (Qt 3 based shared library)
 libpoppler-qt4-1 - PDF rendering library (Qt 4 based shared library)
 libpoppler-qt4-dev - PDF rendering library -- development files (Qt 4 
interface)
 libpoppler1 - PDF rendering library
 poppler-utils - PDF utilitites (based on libpoppler)
Closes: 443903
Changes: 
 poppler (0.5.4-6.2) unstable; urgency=high
 .
   * Non-maintainer upload by testing security team.
   * Renamed CVE-2007-3387.patch to CVE-2007-3387_2007-5049.patch
 and fix a buffer overflow in StreamPredictor::getNextLine
 as well (CVE-2007-5049) (Closes: #443903).
Files: 
 ade318cd6a21327d721ae30ea58b7a30 1087 devel optional poppler_0.5.4-6.2.dsc
 301d37d5d5a30968cbd51de327ff5588 10163 devel optional poppler_0.5.4-6.2.diff.gz
 9ac76631df863e0e511f1eb439e46721 576632 libs optional 
libpoppler1_0.5.4-6.2_i386.deb
 b29b33f4a2f5b6b3f7f027a67f1e568f 763730 libdevel optional 
libpoppler-dev_0.5.4-6.2_i386.deb
 5114f43c63cd3977ad2e55d5d6817dc8 72074 libs optional 
libpoppler-glib1_0.5.4-6.2_i386.deb
 ab693e35b20ce8a273ddeb546da11f15 100232 libdevel optional 
libpoppler-glib-dev_0.5.4-6.2_i386.deb
 a530ee70b5be94ec8c8752d2565abd29 60358 libs optional 
libpoppler-qt1_0.5.4-6.2_i386.deb
 3d527a1a50373fc0908f23fb8d5b914c 64492 libdevel optional 
libpoppler-qt-dev_0.5.4-6.2_i386.deb
 fac1ef7a51b5bf1c7f2d37025c1c3bd9 152994 libs optional 
libpoppler-qt4-1_0.5.4-6.2_i386.deb
 2d26149c0eaa62249bc7fa316a4f0ea3 174450 libdevel optional 
libpoppler-qt4-dev_0.5.4-6.2_i386.deb
 a238ded2b3b452a47b30d72455741567 101184 utils optional 
poppler-utils_0.5.4-6.2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG+37PHYflSXNkfP8RAtpLAJ9ziln/xaUd6SoTMKgWBlasn4dy6gCgoOqR
az3uuaJpW4qVvEq7Pp9aJqU=
=H4eA
-END PGP SIGNATURE-


Accepted:
libpoppler-dev_0.5.4-6.2_i386.deb
  to pool/main/p/poppler/libpoppler-dev_0.5.4-6.2_i386.deb
libpoppler-glib-dev_0.5.4-6.2_i386.deb
  to pool/main/p/poppler/libpoppler-glib-dev_0.5.4-6.2_i386.deb
libpoppler-glib1_0.5.4-6.2_i386.deb
  to pool/main/p/poppler/libpoppler-glib1_0.5.4-6.2_i386.deb
libpoppler-qt-dev_0.5.4-6.2_i386.deb
  to pool/main/p/poppler/libpoppler-qt-dev_0.5.4-6.2_i386.deb
libpoppler-qt1_0.5.4-6.2_i386.deb
  to pool/main/p/poppler/libpoppler-qt1_0.5.4-6.2_i386.deb
libpoppler-qt4-1_0.5.4-6.2_i386.deb
  to pool/main/p/poppler/libpoppler-qt4-1_0.5.4-6.2_i386.deb
libpoppler-qt4-dev_0.5.4-6.2_i386.deb
  to pool/main/p/poppler/libpoppler-qt4-dev_0.5.4-6.2_i386.deb
libpoppler1_0.5.4-6.2_i386.deb
  to pool/main/p/poppler/libpoppler1_0.5.4-6.2_i386.deb
poppler-utils_0.5.4-6.2_i386.deb
  to pool/main/p/poppler/poppler-utils_0.5.4-6.2_i386.deb
poppler_0.5.4-6.2.diff.gz
  to pool/main/p/poppler/poppler_0.5.4-6.2.diff.gz
poppler_0.5.4-6.2.dsc
  to pool/main/p/poppler/poppler_0.5.4-6.2.dsc


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted xpdf 3.02-1.2 (source i386 all)

2007-09-27 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 12:05:46 +0200
Source: xpdf
Binary: xpdf-utils xpdf xpdf-reader xpdf-common
Architecture: source i386 all
Version: 3.02-1.2
Distribution: unstable
Urgency: high
Maintainer: Hamish Moffatt [EMAIL PROTECTED]
Changed-By: Nico Golde [EMAIL PROTECTED]
Description: 
 xpdf   - Portable Document Format (PDF) suite
 xpdf-common - Portable Document Format (PDF) suite -- common files
 xpdf-reader - Portable Document Format (PDF) suite -- viewer for X11
 xpdf-utils - Portable Document Format (PDF) suite -- utilities
Closes: 443906
Changes: 
 xpdf (3.02-1.2) unstable; urgency=high
 .
   * Non-maintainer upload by testing security team.
   * Removed post-3.5.7-kdegraphics-CVE-2007-3387.diff.dpatch and
 created fix-CVE-2007-3387_CVE-2007-5049.dpatch to have a fix
 for CVE-2007-3387 and a buffer overflow in GetNextLine()
 (CVE-2007-5049) since they are related (Closes: #443906).
Files: 
 50c13160501a01e8555609e16d001858 872 text optional xpdf_3.02-1.2.dsc
 45b886c40fd8ab8ea3be692623eab692 33071 text optional xpdf_3.02-1.2.diff.gz
 89a860e937c9a9da201310ddb2443d47 1264 text optional xpdf_3.02-1.2_all.deb
 51f888e60024b3cd39017abb1d806858 65176 text optional 
xpdf-common_3.02-1.2_all.deb
 0a34f94517da8ceb7a8c43972339d413 862770 text optional 
xpdf-reader_3.02-1.2_i386.deb
 fd10215b671d194f813fd0aced787dcf 1584826 text optional 
xpdf-utils_3.02-1.2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG+4ivHYflSXNkfP8RAhGZAJ9FbAn791zEIomWADbeJBenkD+WzQCeN4ir
3CuL2Etdm9AnAjHIeFfJq3w=
=VTfb
-END PGP SIGNATURE-


Accepted:
xpdf-common_3.02-1.2_all.deb
  to pool/main/x/xpdf/xpdf-common_3.02-1.2_all.deb
xpdf-reader_3.02-1.2_i386.deb
  to pool/main/x/xpdf/xpdf-reader_3.02-1.2_i386.deb
xpdf-utils_3.02-1.2_i386.deb
  to pool/main/x/xpdf/xpdf-utils_3.02-1.2_i386.deb
xpdf_3.02-1.2.diff.gz
  to pool/main/x/xpdf/xpdf_3.02-1.2.diff.gz
xpdf_3.02-1.2.dsc
  to pool/main/x/xpdf/xpdf_3.02-1.2.dsc
xpdf_3.02-1.2_all.deb
  to pool/main/x/xpdf/xpdf_3.02-1.2_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted bzr 0.91-2 (source i386)

2007-09-27 Thread Reinhard Tartler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 12:25:43 +0200
Source: bzr
Binary: bzr
Architecture: source i386
Version: 0.91-2
Distribution: unstable
Urgency: low
Maintainer: Debian Bazaar Maintainers [EMAIL PROTECTED]
Changed-By: Reinhard Tartler [EMAIL PROTECTED]
Description: 
 bzr- Bazaar, the next-generation distributed version control system
Changes: 
 bzr (0.91-2) unstable; urgency=low
 .
   * remove python-celementree and python-paramiko from build-depends.
 rationale:
   - python-celementree is purely an optimisation for python2.4,
 and is already included in python2.5
   - python-paramiko is not used during build at all. However, the
 testsuite currently fails when paramiko is not installed
 (see also #59150 in launchpad.net for details). Since we
 currently don't run the testsuite by default on the buildds,
 it is safe to remove that dependency, at least for now.
Files: 
 d939df464ba092e0265791e11b4f5481 985 devel optional bzr_0.91-2.dsc
 0e04f06c5d44a42d96e748150d061e73 9368 devel optional bzr_0.91-2.diff.gz
 d610acfb6783c7feb72c738564f262d0 2164496 devel optional bzr_0.91-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Debian Powered!

iD8DBQFG+4qsmAg1RJRTSKQRAmsqAJ9ADP7pT5fHbaaAjzftHMB+eTqgQQCfQyYj
czlEj5zKcvtzameBLGBWul8=
=EEZS
-END PGP SIGNATURE-


Accepted:
bzr_0.91-2.diff.gz
  to pool/main/b/bzr/bzr_0.91-2.diff.gz
bzr_0.91-2.dsc
  to pool/main/b/bzr/bzr_0.91-2.dsc
bzr_0.91-2_i386.deb
  to pool/main/b/bzr/bzr_0.91-2_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted sqlalchemy 0.4.0~beta6-1 (source all)

2007-09-27 Thread Piotr Ożarowski
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 12:58:33 +0200
Source: sqlalchemy
Binary: python-sqlalchemy python-sqlalchemy-doc
Architecture: source all
Version: 0.4.0~beta6-1
Distribution: experimental
Urgency: low
Maintainer: Tommi Virtanen [EMAIL PROTECTED]
Changed-By: Piotr Ożarowski [EMAIL PROTECTED]
Description: 
 python-sqlalchemy - SQL toolkit and Object Relational Mapper for Python
 python-sqlalchemy-doc - Documentation for the SQLAlchemy Python library
Changes: 
 sqlalchemy (0.4.0~beta6-1) experimental; urgency=low
 .
   * New upstream release
   * Homepage field added
Files: 
 c2f061e3a71f4d04c239b98731934113 862 python optional 
sqlalchemy_0.4.0~beta6-1.dsc
 a5b1d1345d9b3ddd50fa997d202efac4 1080946 python optional 
sqlalchemy_0.4.0~beta6.orig.tar.gz
 3f3a8f9c44de8e275ee5fa0fea0da880 6344 python optional 
sqlalchemy_0.4.0~beta6-1.diff.gz
 2983b75cbb9079472f75235e20c82d7b 336188 python optional 
python-sqlalchemy_0.4.0~beta6-1_all.deb
 73af4ad1bf45184824ab2f5fe0a4114e 449536 doc optional 
python-sqlalchemy-doc_0.4.0~beta6-1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG+5NiB01zfu119ZkRAlbVAKCpjpIbQYr3RjOuuSJ7TMc0igN19gCePGNk
n++xv+0jtaFFpvzYtXyAd00=
=+gLU
-END PGP SIGNATURE-


Accepted:
python-sqlalchemy-doc_0.4.0~beta6-1_all.deb
  to pool/main/s/sqlalchemy/python-sqlalchemy-doc_0.4.0~beta6-1_all.deb
python-sqlalchemy_0.4.0~beta6-1_all.deb
  to pool/main/s/sqlalchemy/python-sqlalchemy_0.4.0~beta6-1_all.deb
sqlalchemy_0.4.0~beta6-1.diff.gz
  to pool/main/s/sqlalchemy/sqlalchemy_0.4.0~beta6-1.diff.gz
sqlalchemy_0.4.0~beta6-1.dsc
  to pool/main/s/sqlalchemy/sqlalchemy_0.4.0~beta6-1.dsc
sqlalchemy_0.4.0~beta6.orig.tar.gz
  to pool/main/s/sqlalchemy/sqlalchemy_0.4.0~beta6.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted misdn-user 1.1.5-2 (source powerpc)

2007-09-27 Thread Simon Richter
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 14:02:18 +0200
Source: misdn-user
Binary: libisdnnet-dev libmisdn-dev misdn-utils
Architecture: source powerpc
Version: 1.1.5-2
Distribution: experimental
Urgency: low
Maintainer: Simon Richter [EMAIL PROTECTED]
Changed-By: Simon Richter [EMAIL PROTECTED]
Description: 
 libisdnnet-dev - ISDN networking library
 libmisdn-dev - mISDN interface library
 misdn-utils - mISDN userspace utilities
Changes: 
 misdn-user (1.1.5-2) experimental; urgency=low
 .
   * Added missing dependency misdn-dev - linux-headers-misdn
Files: 
 5906fa7f287394bbc8d13959a8afcf5e 666 comm extra misdn-user_1.1.5-2.dsc
 468dcf7a3f5c67d3c234d2105fa586bc 3578 comm extra misdn-user_1.1.5-2.diff.gz
 64b668266f8bce5f4285ef1cb9853f7f 10586 comm extra 
misdn-utils_1.1.5-2_powerpc.deb
 f972e4d3e9413bfdf9b5ab85603dcffc 18206 libdevel extra 
libmisdn-dev_1.1.5-2_powerpc.deb
 c86ed15f51a81e9743449dfd0352b546 64484 libdevel extra 
libisdnnet-dev_1.1.5-2_powerpc.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG+52tGKDMjVcGpLQRAi0zAJ950/ub3tEx0wS9QjZ9Ym3IBVPvJwCg2JwG
6YyyA80+KJh9SJk4sO6u7Jw=
=T9/D
-END PGP SIGNATURE-


Accepted:
libisdnnet-dev_1.1.5-2_powerpc.deb
  to pool/main/m/misdn-user/libisdnnet-dev_1.1.5-2_powerpc.deb
libmisdn-dev_1.1.5-2_powerpc.deb
  to pool/main/m/misdn-user/libmisdn-dev_1.1.5-2_powerpc.deb
misdn-user_1.1.5-2.diff.gz
  to pool/main/m/misdn-user/misdn-user_1.1.5-2.diff.gz
misdn-user_1.1.5-2.dsc
  to pool/main/m/misdn-user/misdn-user_1.1.5-2.dsc
misdn-utils_1.1.5-2_powerpc.deb
  to pool/main/m/misdn-user/misdn-utils_1.1.5-2_powerpc.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted dibbler 0.6.1-1 (source all i386)

2007-09-27 Thread Tomasz Mrugalski
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 26 Sep 2007 22:45:33 +0200
Source: dibbler
Binary: dibbler-doc dibbler-relay dibbler-server dibbler-client
Architecture: source all i386
Version: 0.6.1-1
Distribution: unstable
Urgency: low
Maintainer: Tomasz Mrugalski [EMAIL PROTECTED]
Changed-By: Tomasz Mrugalski [EMAIL PROTECTED]
Description: 
 dibbler-client - portable DHCPv6 client
 dibbler-doc - documentation for Dibbler
 dibbler-relay - portable DHCPv6 relay
 dibbler-server - portable DHCPv6 server
Closes: 417156 444002
Changes: 
 dibbler (0.6.1-1) unstable; urgency=low
 .
   * New upstream release
   * security fix:CVE-2007-5028, CVE-2007-5029,CVE-2007-5028 (closes: #444002)
   * gcc 4.3 compatibility (closes: #417156)
Files: 
 3be34b39dd9cc0573c65b213d7190975 684 admin optional dibbler_0.6.1-1.dsc
 220e68795ab0375cb3bc1f40c47e0bb2 3526327 admin optional 
dibbler_0.6.1.orig.tar.gz
 dbf75fcb48bcb55f33200105a9ec9b35 17134 admin optional dibbler_0.6.1-1.diff.gz
 e6db4587b5c8c8d0826b45ff3ccf1704 364288 admin optional 
dibbler-server_0.6.1-1_i386.deb
 89c4860543079b4a13503309201d6e28 346724 admin optional 
dibbler-client_0.6.1-1_i386.deb
 aab792aaf154c122910a9be0e766026b 110112 admin optional 
dibbler-relay_0.6.1-1_i386.deb
 5c669bdd3bae6debfae4c9bdb35c680a 1168076 doc optional 
dibbler-doc_0.6.1-1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG+6S162zWxYk/rQcRAlUlAJ99qox879ALoCG25V6dAg/cKfkLUgCfe1JV
OHm1kUNsb/M2pewcIllxdyI=
=T029
-END PGP SIGNATURE-


Accepted:
dibbler-client_0.6.1-1_i386.deb
  to pool/main/d/dibbler/dibbler-client_0.6.1-1_i386.deb
dibbler-doc_0.6.1-1_all.deb
  to pool/main/d/dibbler/dibbler-doc_0.6.1-1_all.deb
dibbler-relay_0.6.1-1_i386.deb
  to pool/main/d/dibbler/dibbler-relay_0.6.1-1_i386.deb
dibbler-server_0.6.1-1_i386.deb
  to pool/main/d/dibbler/dibbler-server_0.6.1-1_i386.deb
dibbler_0.6.1-1.diff.gz
  to pool/main/d/dibbler/dibbler_0.6.1-1.diff.gz
dibbler_0.6.1-1.dsc
  to pool/main/d/dibbler/dibbler_0.6.1-1.dsc
dibbler_0.6.1.orig.tar.gz
  to pool/main/d/dibbler/dibbler_0.6.1.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted libpam-mount 0.28-1 (source i386)

2007-09-27 Thread Bastian Kleineidam
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 25 Sep 2007 14:24:49 +0200
Source: libpam-mount
Binary: libpam-mount
Architecture: source i386
Version: 0.28-1
Distribution: unstable
Urgency: low
Maintainer: Bastian Kleineidam [EMAIL PROTECTED]
Changed-By: Bastian Kleineidam [EMAIL PROTECTED]
Description: 
 libpam-mount - PAM module that can mount volumes for a user session
Changes: 
 libpam-mount (0.28-1) unstable; urgency=low
 .
   * New upstream release.
   * Dropped patches:
 + 07_mount_option_space
   uneeded, mount and nfsmount support -o without a space
 + 09_password_prompt
   unneeded, the password prompt is configurable through the config
 + 14_convert_luserconf
   applied upstream
 + 15_pmvarrun_abspath
   unneeded, the bug is fixed via setting PATH manually
 + 16_close_session_no_volumes
   applied upstream
   * Add patch 04_spawn_pipes from upstream SVN:
 Fix file descriptor initialization and out-of-bounds array access.
   * Remove uneeded glib from Build-Depends.
   * Cleanup and updates for README.Debian:
 + put package requirements into separate paragraph
 + updated the examples for the new XML configuration format
   * Add psmisc and fuser packages to the Suggests since the umount.crypt
 uses them.
Files: 
 f3330b57cd5f3d0aa1ba3c8a5a22579d 711 admin extra libpam-mount_0.28-1.dsc
 fcd3adf3e8c768df00f477ff6aa54397 407529 admin extra 
libpam-mount_0.28.orig.tar.gz
 b7091671eb493fc2739a4ccce924f1e1 18390 admin extra libpam-mount_0.28-1.diff.gz
 3e1d2def2042c137a85f50f835c86c4f 82538 admin extra libpam-mount_0.28-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG+8TleBwlBDLsbz4RApI/AJ9xyUxeG3lb71ipOJTZD8FLQnBRIQCgk0hH
jC4mGVbmgopD19xNe7ffUQY=
=Uar9
-END PGP SIGNATURE-


Accepted:
libpam-mount_0.28-1.diff.gz
  to pool/main/libp/libpam-mount/libpam-mount_0.28-1.diff.gz
libpam-mount_0.28-1.dsc
  to pool/main/libp/libpam-mount/libpam-mount_0.28-1.dsc
libpam-mount_0.28-1_i386.deb
  to pool/main/libp/libpam-mount/libpam-mount_0.28-1_i386.deb
libpam-mount_0.28.orig.tar.gz
  to pool/main/libp/libpam-mount/libpam-mount_0.28.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted apt-setup 1:0.29 (source all)

2007-09-27 Thread Jérémy Bobbio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 18:18:15 +0200
Source: apt-setup
Binary: apt-mirror-setup apt-cdrom-setup apt-setup-udeb
Architecture: source all
Version: 1:0.29
Distribution: unstable
Urgency: low
Maintainer: Debian Install System Team [EMAIL PROTECTED]
Changed-By: Jérémy Bobbio [EMAIL PROTECTED]
Description: 
 apt-cdrom-setup - set up a CD in sources.list (udeb)
 apt-mirror-setup - set up a mirror in sources.list (udeb)
 apt-setup-udeb - Configure apt (udeb)
Closes: 402645
Changes: 
 apt-setup (1:0.29) unstable; urgency=low
 .
   [ Frans Pop ]
   * Add back detection if user selected to not configure the network. That
 check is unrelated to the loop discussed in #442891. Closes: #402645.
   * Allow to continue without selecting a mirror when choose-mirror exits
 non-zero. This allows a user to back out of mirror selection in the case
 of a netinst install without a network being available while still
 avoiding the use a mirror question for all netinst based installs.
 .
   [ Updated translations ]
   * Bulgarian (bg.po) by Damyan Ivanov
   * Swedish (sv.po) by Daniel Nylander
   * Thai (th.po) by Theppitak Karoonboonyanan
   * Simplified Chinese (zh_CN.po) by Ming Hua
Files: 
 ce478f9f643e40d45a36aa323d02d332 677 debian-installer extra apt-setup_0.29.dsc
 8b11683e95d5a2a68839c34d099098aa 142957 debian-installer extra 
apt-setup_0.29.tar.gz
 3d19aa9ce40b80d8c74851cfc60ea9ca 22768 debian-installer standard 
apt-setup-udeb_0.29_all.udeb
 72882055d7bf59b40c002b23671c537f 59072 debian-installer extra 
apt-mirror-setup_0.29_all.udeb
 1b9c6e23b5edc8f9cd0fb77fce914683 8004 debian-installer extra 
apt-cdrom-setup_0.29_all.udeb
Package-Type: udeb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG+9js2PUjs9fQ72URAlWHAKCR7Gr6Nl8smpt9+fxErsvT65B3yQCgyMTv
8KRDqGnKMPEsra9lhO9iQx8=
=Q3XH
-END PGP SIGNATURE-


Accepted:
apt-cdrom-setup_0.29_all.udeb
  to pool/main/a/apt-setup/apt-cdrom-setup_0.29_all.udeb
apt-mirror-setup_0.29_all.udeb
  to pool/main/a/apt-setup/apt-mirror-setup_0.29_all.udeb
apt-setup-udeb_0.29_all.udeb
  to pool/main/a/apt-setup/apt-setup-udeb_0.29_all.udeb
apt-setup_0.29.dsc
  to pool/main/a/apt-setup/apt-setup_0.29.dsc
apt-setup_0.29.tar.gz
  to pool/main/a/apt-setup/apt-setup_0.29.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted mountfloppy 0.13 (source all)

2007-09-27 Thread Jérémy Bobbio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 18:28:58 +0200
Source: mountfloppy
Binary: mountfloppy
Architecture: source all
Version: 0.13
Distribution: unstable
Urgency: low
Maintainer: Debian Install System Team [EMAIL PROTECTED]
Changed-By: Jérémy Bobbio [EMAIL PROTECTED]
Description: 
 mountfloppy - Mounts a floppy (udeb)
Changes: 
 mountfloppy (0.13) unstable; urgency=low
 .
   [ Jérémy Bobbio ]
   * Cleanup devfs-style device names.
 .
   [ Updated translations ]
   * Bengali (bn.po) by Jamil Ahmed
   * Danish (da.po) by Claus Hindsgaul
   * Spanish (es.po) by Javier Fernández-Sanguino Peña
   * Italian (it.po) by Stefano Canepa
   * Panjabi (pa.po) by A S Alam
   * Portuguese (pt.po) by Miguel Figueiredo
   * Romanian (ro.po) by Eddy Petrișor
   * Vietnamese (vi.po) by Clytie Siddall
Files: 
 bdd486a961c1217de91ecfd61cc8334e 662 debian-installer optional 
mountfloppy_0.13.dsc
 c40a95b1cf0addc35699614e6ce33e18 28149 debian-installer optional 
mountfloppy_0.13.tar.gz
 87a5e37f29ca83e2add88edbeea692df 11452 debian-installer optional 
mountfloppy_0.13_all.udeb
Package-Type: udeb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG+9qs2PUjs9fQ72URAtvXAJ96uzFAr3XlrKGw63xPge6OK98enwCdGAGo
XIFOSnyLqgCK65z/XIC3GIg=
=GZnQ
-END PGP SIGNATURE-


Accepted:
mountfloppy_0.13.dsc
  to pool/main/m/mountfloppy/mountfloppy_0.13.dsc
mountfloppy_0.13.tar.gz
  to pool/main/m/mountfloppy/mountfloppy_0.13.tar.gz
mountfloppy_0.13_all.udeb
  to pool/main/m/mountfloppy/mountfloppy_0.13_all.udeb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted lowmem 1.27 (source all amd64)

2007-09-27 Thread Jérémy Bobbio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 18:37:50 +0200
Source: lowmem
Binary: lowmemcheck lowmem
Architecture: source amd64 all
Version: 1.27
Distribution: unstable
Urgency: low
Maintainer: Debian Install System Team [EMAIL PROTECTED]
Changed-By: Jérémy Bobbio [EMAIL PROTECTED]
Description: 
 lowmem - free memory for lowmem install (udeb)
 lowmemcheck - detect low-memory systems and enter lowmem mode (udeb)
Changes: 
 lowmem (1.27) unstable; urgency=low
 .
   [ Frans Pop ]
   * Allow user to override the lowmem level by specifying a parameter
 lowmem at the boot prompt. Only a level higher than the default is
 observed.
 .
   [ Joey Hess ]
   * Change i386 lowmem to below 48 mb. Needs new cdebconf with template
 trimming code. (The cutoff point for lowmem level 2 does not change.)
Files: 
 ec97acdd6cdb0596444f074e51057871 679 debian-installer optional lowmem_1.27.dsc
 24079f8ee337014e6ba669d7dedc7a9d 10101 debian-installer optional 
lowmem_1.27.tar.gz
 1ba9ca2e32f6c4916ae7385ba4c86810 1356 debian-installer optional 
lowmem_1.27_all.udeb
 12564d2008c29c288d5882892dce9154 5138 debian-installer optional 
lowmemcheck_1.27_amd64.udeb
Package-Type: udeb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG+91h2PUjs9fQ72URAhhsAKC1XPF6MCUHUkFKCKEknD3QyOGpcgCdGm6F
1fwxh10FP9tyaVTxJJcLXi4=
=kOSS
-END PGP SIGNATURE-


Accepted:
lowmem_1.27.dsc
  to pool/main/l/lowmem/lowmem_1.27.dsc
lowmem_1.27.tar.gz
  to pool/main/l/lowmem/lowmem_1.27.tar.gz
lowmem_1.27_all.udeb
  to pool/main/l/lowmem/lowmem_1.27_all.udeb
lowmemcheck_1.27_amd64.udeb
  to pool/main/l/lowmem/lowmemcheck_1.27_amd64.udeb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted floppy-retriever 1.16 (source all)

2007-09-27 Thread Jérémy Bobbio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 18:31:36 +0200
Source: floppy-retriever
Binary: floppy-retriever load-floppy
Architecture: source all
Version: 1.16
Distribution: unstable
Urgency: low
Maintainer: Debian Install System Team [EMAIL PROTECTED]
Changed-By: Jérémy Bobbio [EMAIL PROTECTED]
Description: 
 floppy-retriever - Fetches modules from a floppy (udeb)
 load-floppy - Load installer components from a floppy (udeb)
Changes: 
 floppy-retriever (1.16) unstable; urgency=low
 .
   [ Jérémy Bobbio ]
   * Clean up devfs-style device names in load-floppy.postinst.
 .
   [ Updated translations ]
   * Bengali (bn.po) by Jamil Ahmed
   * Catalan (ca.po) by Jordi Mallach
   * Danish (da.po) by Claus Hindsgaul
   * Italian (it.po) by Stefano Canepa
   * Romanian (ro.po) by Eddy Petrișor
   * Vietnamese (vi.po) by Clytie Siddall
Files: 
 831120c4cceeaf210b9a964b522678c2 760 debian-installer optional 
floppy-retriever_1.16.dsc
 89107942a948c871f51bdf362b315a9b 56729 debian-installer optional 
floppy-retriever_1.16.tar.gz
 4395f5464f3ee1925462de3b07c5c634 11852 debian-installer optional 
floppy-retriever_1.16_all.udeb
 83ba69b2e4285e7001e08087968df3ac 29984 debian-installer extra 
load-floppy_1.16_all.udeb
Package-Type: udeb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG+9sw2PUjs9fQ72URAmukAJ97qKIv8fYFU7U2bB46nmJk0aSj4wCgsfOJ
T8fc/d8DRc8sEJPtU06BMT0=
=Lc0S
-END PGP SIGNATURE-


Accepted:
floppy-retriever_1.16.dsc
  to pool/main/f/floppy-retriever/floppy-retriever_1.16.dsc
floppy-retriever_1.16.tar.gz
  to pool/main/f/floppy-retriever/floppy-retriever_1.16.tar.gz
floppy-retriever_1.16_all.udeb
  to pool/main/f/floppy-retriever/floppy-retriever_1.16_all.udeb
load-floppy_1.16_all.udeb
  to pool/main/f/floppy-retriever/load-floppy_1.16_all.udeb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted os-prober 1.22 (source amd64)

2007-09-27 Thread Jérémy Bobbio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 18:43:50 +0200
Source: os-prober
Binary: os-prober os-prober-udeb
Architecture: source amd64
Version: 1.22
Distribution: unstable
Urgency: low
Maintainer: Debian Install System Team [EMAIL PROTECTED]
Changed-By: Jérémy Bobbio [EMAIL PROTECTED]
Description: 
 os-prober  - utility to detect other OSes on a set of drives
 os-prober-udeb - utility to detect other OSes on a set of drives (udeb)
Changes: 
 os-prober (1.22) unstable; urgency=low
 .
   [ Joey Hess ]
   * Call dh_md5sums.
 .
   [ Jérémy Bobbio ]
   * Remove references to devfs-style device names in documentation and
 comments.
 .
   [ Colin Watson ]
   * Accept fuseblk as well as fuse in the Microsoft probe.
   * Make sure to select only the first mountpoint for a given device (in
 case of bind mounts).
   * Treat the lpia architecture (used in the Ubuntu mobile project) as x86,
 since it is.
Files: 
 c5de9109249eb5e70b85c818f2af2d81 697 debian-installer optional 
os-prober_1.22.dsc
 53b8a5434f783fcf8740c7db7fe9b77d 17166 debian-installer optional 
os-prober_1.22.tar.gz
 887130fed0a94ebd50692e2808872269 8808 debian-installer optional 
os-prober-udeb_1.22_amd64.udeb
 51d962e1d318f4376937acc99186b621 15878 utils extra os-prober_1.22_amd64.deb
Package-Type: udeb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG+95S2PUjs9fQ72URApaWAKCVbZ7S9dFJ3m7x2AGj5VMm0yhJ5ACfStQn
7Q7ZkOsR58Ana3eUgWQeB9U=
=U061
-END PGP SIGNATURE-


Accepted:
os-prober-udeb_1.22_amd64.udeb
  to pool/main/o/os-prober/os-prober-udeb_1.22_amd64.udeb
os-prober_1.22.dsc
  to pool/main/o/os-prober/os-prober_1.22.dsc
os-prober_1.22.tar.gz
  to pool/main/o/os-prober/os-prober_1.22.tar.gz
os-prober_1.22_amd64.deb
  to pool/main/o/os-prober/os-prober_1.22_amd64.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted xserver-xorg-video-avivo 0.0.999+git20070927-1 (source i386)

2007-09-27 Thread Brice Goglin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 20:37:23 +0200
Source: xserver-xorg-video-avivo
Binary: xserver-xorg-video-avivo
Architecture: source i386
Version: 0.0.999+git20070927-1
Distribution: experimental
Urgency: low
Maintainer: Debian X Strike Force [EMAIL PROTECTED]
Changed-By: Brice Goglin [EMAIL PROTECTED]
Description: 
 xserver-xorg-video-avivo - X.Org X server -- Avivo display driver
Closes: 444263
Changes: 
 xserver-xorg-video-avivo (0.0.999+git20070927-1) experimental; urgency=low
 .
   * New upstream snapshot.
   * Build against Xserver 1.4, closes: #444263.
Files: 
 e1f182ed88a8e7493248b56cfca04626 971 x11 extra 
xserver-xorg-video-avivo_0.0.999+git20070927-1.dsc
 1a9e1d2c795d3e34390925a6cde6a726 88334 x11 extra 
xserver-xorg-video-avivo_0.0.999+git20070927.orig.tar.gz
 85f4d3c2594106f834dbc5d7ed774428 325758 x11 extra 
xserver-xorg-video-avivo_0.0.999+git20070927-1.diff.gz
 7fb206d761e999cf271ece6c371dbe3a 48820 x11 extra 
xserver-xorg-video-avivo_0.0.999+git20070927-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG+/rfRh88F8PcWfoRAo02AJ9i6i7zwJ5v9cVgnewUGrD3Dz/3ZwCgxadL
eXMNjfv2VLfLF+mjzzoDWbo=
=aJhA
-END PGP SIGNATURE-


Accepted:
xserver-xorg-video-avivo_0.0.999+git20070927-1.diff.gz
  to 
pool/main/x/xserver-xorg-video-avivo/xserver-xorg-video-avivo_0.0.999+git20070927-1.diff.gz
xserver-xorg-video-avivo_0.0.999+git20070927-1.dsc
  to 
pool/main/x/xserver-xorg-video-avivo/xserver-xorg-video-avivo_0.0.999+git20070927-1.dsc
xserver-xorg-video-avivo_0.0.999+git20070927-1_i386.deb
  to 
pool/main/x/xserver-xorg-video-avivo/xserver-xorg-video-avivo_0.0.999+git20070927-1_i386.deb
xserver-xorg-video-avivo_0.0.999+git20070927.orig.tar.gz
  to 
pool/main/x/xserver-xorg-video-avivo/xserver-xorg-video-avivo_0.0.999+git20070927.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted quotatool 1.4.10-1 (source amd64)

2007-09-27 Thread Bas Zoetekouw
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 21:01:51 +0200
Source: quotatool
Binary: quotatool
Architecture: source amd64
Version: 1.4.10-1
Distribution: unstable
Urgency: low
Maintainer: Bas Zoetekouw [EMAIL PROTECTED]
Changed-By: Bas Zoetekouw [EMAIL PROTECTED]
Description: 
 quotatool  - tool to edit disk quotas from the command line
Closes: 402900
Changes: 
 quotatool (1.4.10-1) unstable; urgency=low
 .
   * New upstream release
 - Fix for building on 64-bit systems
 - Bugfix off-by-one-error in parsing loop devices (thanks Bas Zoetekouw)
   [obsoletes 10_loop_fix.patch]
 - Bugfix commandline parsing with option -t
   (closes: #402900)
 - Updated manpage and usage info
   * Edited the long description a little bit.
Files: 
 469223d028a541f0aed59f96fde1575a 580 admin extra quotatool_1.4.10-1.dsc
 d0eb99718a0dbc02189993d8667ef9b1 113822 admin extra 
quotatool_1.4.10.orig.tar.gz
 7f0d3ca881d50e9bc531e7fa18135c76 3671 admin extra quotatool_1.4.10-1.diff.gz
 5c148d2e920e905684fe616d4a8c20a7 18446 admin extra quotatool_1.4.10-1_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/AC+K67kHwZE+rcRAhIiAKCJbGv8SlVqPvow/zLL4ZmjiBtpywCg5Heh
vTyr2o0Em0cPx92DRqC4f9s=
=N+J+
-END PGP SIGNATURE-


Accepted:
quotatool_1.4.10-1.diff.gz
  to pool/main/q/quotatool/quotatool_1.4.10-1.diff.gz
quotatool_1.4.10-1.dsc
  to pool/main/q/quotatool/quotatool_1.4.10-1.dsc
quotatool_1.4.10-1_amd64.deb
  to pool/main/q/quotatool/quotatool_1.4.10-1_amd64.deb
quotatool_1.4.10.orig.tar.gz
  to pool/main/q/quotatool/quotatool_1.4.10.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted evolution-python 0.0.3-1 (source i386)

2007-09-27 Thread Thomas Viehmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 24 Sep 2007 20:59:34 +0200
Source: evolution-python
Binary: python-evolution
Architecture: source i386
Version: 0.0.3-1
Distribution: unstable
Urgency: low
Maintainer: Debian Python Modules Team [EMAIL PROTECTED]
Changed-By: Thomas Viehmann [EMAIL PROTECTED]
Description: 
 python-evolution - python bindings for libebook and libecal
Closes: 434267
Changes: 
 evolution-python (0.0.3-1) unstable; urgency=low
 .
   * New upstream release
   * Upload to unstable for the benefit of conduit. (Closes: #434267)
Files: 
 e5cc23f4975d68cb83c62241dd07b953 1070 python optional 
evolution-python_0.0.3-1.dsc
 0ef1afcc79ae9f190ed2260eb1b1fcdd 349850 python optional 
evolution-python_0.0.3.orig.tar.gz
 e0233e25495f25f19198da29313ea4b3 3293 python optional 
evolution-python_0.0.3-1.diff.gz
 2ae8680bf5c5fed48f55dd48ce813468 36452 python optional 
python-evolution_0.0.3-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: GnuPG key at http://thomas.viehmann.net/

iD8DBQFG+/7driZpaaIa1PkRAtwBAJ96KC74n3KZSyCWxP0TYDlDpcF1igCguooA
uMev7zKGuzQO6TnXsNVPX8M=
=4Oh+
-END PGP SIGNATURE-


Accepted:
evolution-python_0.0.3-1.diff.gz
  to pool/main/e/evolution-python/evolution-python_0.0.3-1.diff.gz
evolution-python_0.0.3-1.dsc
  to pool/main/e/evolution-python/evolution-python_0.0.3-1.dsc
evolution-python_0.0.3.orig.tar.gz
  to pool/main/e/evolution-python/evolution-python_0.0.3.orig.tar.gz
python-evolution_0.0.3-1_i386.deb
  to pool/main/e/evolution-python/python-evolution_0.0.3-1_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted thinkfinger 0.3-2 (source all amd64)

2007-09-27 Thread Luca Capello
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 15 Sep 2007 14:44:23 +0200
Source: thinkfinger
Binary: libthinkfinger0 libthinkfinger-doc thinkfinger-tools libpam-thinkfinger 
libthinkfinger-dev
Architecture: source amd64 all
Version: 0.3-2
Distribution: experimental
Urgency: low
Maintainer: FingerForce Team [EMAIL PROTECTED]
Changed-By: Luca Capello [EMAIL PROTECTED]
Description: 
 libpam-thinkfinger - PAM module for the STMicroelectronics fingerprint reader
 libthinkfinger-dev - development files for libthinkfinger
 libthinkfinger-doc - documentation for libthinkfinger
 libthinkfinger0 - library for the STMicroelectronics fingerprint reader
 thinkfinger-tools - utilities for the STMicroelectronics fingerprint reader
Changes: 
 thinkfinger (0.3-2) experimental; urgency=low
 .
   * New release built with PAM-0.99.7.1.
Files: 
 c423d40e4a96788c57b120dcd5f2218a 865 libs optional thinkfinger_0.3-2.dsc
 c53ae28dfad843f0435b314e10aeaa26 3771 libs optional thinkfinger_0.3-2.diff.gz
 00a13dbdafa76a748f4be8665e6a6420 15612 libs optional 
libthinkfinger0_0.3-2_amd64.deb
 7f43d92041edbbc6c58383877244a2f1 17592 devel optional 
libthinkfinger-dev_0.3-2_amd64.deb
 e5ca257313b5e6997b6882a9b3836937 16184 admin extra 
libpam-thinkfinger_0.3-2_amd64.deb
 ad65d277b99da3012296cc2341331336 15948 admin extra 
thinkfinger-tools_0.3-2_amd64.deb
 f4c3f0594fbd3213982b1d4c59c15a92 75060 doc extra 
libthinkfinger-doc_0.3-2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/AJQNTNQylgICMQRAsVAAKCAVSTwOdB7C5tHmw90xBcb0+YwyQCeJ9cK
DZLfB5HucZBFQ4hlAVO7mx4=
=Gk0k
-END PGP SIGNATURE-


Accepted:
libpam-thinkfinger_0.3-2_amd64.deb
  to pool/main/t/thinkfinger/libpam-thinkfinger_0.3-2_amd64.deb
libthinkfinger-dev_0.3-2_amd64.deb
  to pool/main/t/thinkfinger/libthinkfinger-dev_0.3-2_amd64.deb
libthinkfinger-doc_0.3-2_all.deb
  to pool/main/t/thinkfinger/libthinkfinger-doc_0.3-2_all.deb
libthinkfinger0_0.3-2_amd64.deb
  to pool/main/t/thinkfinger/libthinkfinger0_0.3-2_amd64.deb
thinkfinger-tools_0.3-2_amd64.deb
  to pool/main/t/thinkfinger/thinkfinger-tools_0.3-2_amd64.deb
thinkfinger_0.3-2.diff.gz
  to pool/main/t/thinkfinger/thinkfinger_0.3-2.diff.gz
thinkfinger_0.3-2.dsc
  to pool/main/t/thinkfinger/thinkfinger_0.3-2.dsc


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted gp2c 0.0.5pl5-1 (source amd64)

2007-09-27 Thread Bill Allombert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 21:07:38 +0200
Source: gp2c
Binary: pari-gp2c
Architecture: source amd64
Version: 0.0.5pl5-1
Distribution: unstable
Urgency: low
Maintainer: Bill Allombert [EMAIL PROTECTED]
Changed-By: Bill Allombert [EMAIL PROTECTED]
Description: 
 pari-gp2c  - PARI/GP GP to C compiler
Changes: 
 gp2c (0.0.5pl5-1) unstable; urgency=low
 .
   * New upstream release
Files: 
 5ed9e56ec83b524e1f6422caf80fceea 612 math optional gp2c_0.0.5pl5-1.dsc
 1130b75a791745498e86c965c34ec1d9 293520 math optional gp2c_0.0.5pl5.orig.tar.gz
 a6a91c843751feffc4252d3611e7c1f3 2762 math optional gp2c_0.0.5pl5-1.diff.gz
 71fe90ee4b537a70fae2c35c764b9ec7 145866 math optional 
pari-gp2c_0.0.5pl5-1_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/Aw4eDPs8bVESBURAuTiAJ4/jiDixcN8N6m05cTPiSAQgvMzaQCdGB8d
EINOAhmkFQhA/p/QlB/smWU=
=x4Pd
-END PGP SIGNATURE-


Accepted:
gp2c_0.0.5pl5-1.diff.gz
  to pool/main/g/gp2c/gp2c_0.0.5pl5-1.diff.gz
gp2c_0.0.5pl5-1.dsc
  to pool/main/g/gp2c/gp2c_0.0.5pl5-1.dsc
gp2c_0.0.5pl5.orig.tar.gz
  to pool/main/g/gp2c/gp2c_0.0.5pl5.orig.tar.gz
pari-gp2c_0.0.5pl5-1_amd64.deb
  to pool/main/g/gp2c/pari-gp2c_0.0.5pl5-1_amd64.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted camlp5 5.00-1 (source i386)

2007-09-27 Thread Stefano Zacchiroli
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 22:13:32 +0200
Source: camlp5
Binary: camlp5
Architecture: source i386
Version: 5.00-1
Distribution: experimental
Urgency: low
Maintainer: Debian OCaml Maintainers [EMAIL PROTECTED]
Changed-By: Stefano Zacchiroli [EMAIL PROTECTED]
Description: 
 camlp5 - Pre Processor Pretty Printer for OCaml - classical version
Changes: 
 camlp5 (5.00-1) experimental; urgency=low
 .
   * new upstream release
   * add Homepage field to debian/control
   * remove patch install_destdir (no longer needed since now upstream Makefile
 support vanilla DESTDIR passing)
Files: 
 3ed47b57041740be7f8aa47d58c09e71 871 devel extra camlp5_5.00-1.dsc
 70986d6a7b54f4d35e7cc6b16731b8fd 586867 devel extra camlp5_5.00.orig.tar.gz
 0a39b469831c2e385cf4154d86292951 4941 devel extra camlp5_5.00-1.diff.gz
 08e64e68afdc59b2125a28adc14a3d27 1904844 devel extra camlp5_5.00-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/A+B1cqbBPLEI7wRAnLUAJ4nIIanQKcqoCV64L6ZTxHkau5lSACgoevd
qUgnF/ZbAipzq3vTspoP4M4=
=u7KW
-END PGP SIGNATURE-


Accepted:
camlp5_5.00-1.diff.gz
  to pool/main/c/camlp5/camlp5_5.00-1.diff.gz
camlp5_5.00-1.dsc
  to pool/main/c/camlp5/camlp5_5.00-1.dsc
camlp5_5.00-1_i386.deb
  to pool/main/c/camlp5/camlp5_5.00-1_i386.deb
camlp5_5.00.orig.tar.gz
  to pool/main/c/camlp5/camlp5_5.00.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted aufs 0+20070924-1.1 (ia64 source all)

2007-09-27 Thread dann frazier
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 13:39:49 -0600
Source: aufs
Binary: linux-patch-aufs aufs-source aufs-tools
Architecture: source ia64 all
Version: 0+20070924-1.1
Distribution: unstable
Urgency: low
Maintainer: Julian Andres Klode [EMAIL PROTECTED]
Changed-By: dann frazier [EMAIL PROTECTED]
Description: 
 aufs-source - Source for the aufs driver
 aufs-tools - Tools to manage aufs filesystems
 linux-patch-aufs - Kernel patches for aufs
Changes: 
 aufs (0+20070924-1.1) unstable; urgency=low
 .
   * Non-maintainer upload.
   * Fix namespace collision that resulted in a FTBFS on ia64
Files: 
 0fe4293eda8efac113e41627fc32292f 648 misc optional aufs_0+20070924-1.1.dsc
 c8815a906b3a2dcf0be17d2ebe6ad907 6931 misc optional aufs_0+20070924-1.1.diff.gz
 416505782c13bb842f55481acd71f522 107512 misc optional 
aufs-source_0+20070924-1.1_all.deb
 e5223643f297d2b87607912677492f89 24826 misc optional 
linux-patch-aufs_0+20070924-1.1_all.deb
 53d6dc82f5addae6298df711f202421d 88564 misc optional 
aufs-tools_0+20070924-1.1_ia64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/AonhuANDBmkLRkRAuYXAJ4lC6Mu3kao/gfolaxt9sOfczf3dwCgjWU6
1fJgb5hOY+AsvCljOPzOPns=
=H1IB
-END PGP SIGNATURE-


Accepted:
aufs-source_0+20070924-1.1_all.deb
  to pool/main/a/aufs/aufs-source_0+20070924-1.1_all.deb
aufs-tools_0+20070924-1.1_ia64.deb
  to pool/main/a/aufs/aufs-tools_0+20070924-1.1_ia64.deb
aufs_0+20070924-1.1.diff.gz
  to pool/main/a/aufs/aufs_0+20070924-1.1.diff.gz
aufs_0+20070924-1.1.dsc
  to pool/main/a/aufs/aufs_0+20070924-1.1.dsc
linux-patch-aufs_0+20070924-1.1_all.deb
  to pool/main/a/aufs/linux-patch-aufs_0+20070924-1.1_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted tcpdump 3.9.8-1 (source amd64)

2007-09-27 Thread Romain Francoise
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 22:41:53 +0200
Source: tcpdump
Binary: tcpdump
Architecture: source amd64
Version: 3.9.8-1
Distribution: unstable
Urgency: low
Maintainer: Romain Francoise [EMAIL PROTECTED]
Changed-By: Romain Francoise [EMAIL PROTECTED]
Description: 
 tcpdump- A powerful tool for network monitoring and data acquisition
Changes: 
 tcpdump (3.9.8-1) unstable; urgency=low
 .
   * New upstream release.
Files: 
 670f1a78283b0549aa44ebc3d31c0e8b 672 net optional tcpdump_3.9.8-1.dsc
 c491a78c52fe73f1f7271aa5d8c6ab2e 938054 net optional tcpdump_3.9.8.orig.tar.gz
 f39401f38abd3577357a97a6e0907343 10639 net optional tcpdump_3.9.8-1.diff.gz
 798ad4dc3328c642ae35f0cdbf24dcd8 320628 net optional tcpdump_3.9.8-1_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/BdnogN2vsA8Vt8RAhcgAKCxaPBSM6EHNhKbiODILcxiBOI6twCfcFCc
/Qu8mJDOXuy5nlHDOhsdmxE=
=Kqhk
-END PGP SIGNATURE-


Accepted:
tcpdump_3.9.8-1.diff.gz
  to pool/main/t/tcpdump/tcpdump_3.9.8-1.diff.gz
tcpdump_3.9.8-1.dsc
  to pool/main/t/tcpdump/tcpdump_3.9.8-1.dsc
tcpdump_3.9.8-1_amd64.deb
  to pool/main/t/tcpdump/tcpdump_3.9.8-1_amd64.deb
tcpdump_3.9.8.orig.tar.gz
  to pool/main/t/tcpdump/tcpdump_3.9.8.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted slgsl 0.7.0-2 (source i386)

2007-09-27 Thread Rafael Laboissiere
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 23:45:23 +0200
Source: slgsl
Binary: slang-gsl
Architecture: source i386
Version: 0.7.0-2
Distribution: unstable
Urgency: low
Maintainer: Debian JED Group [EMAIL PROTECTED]
Changed-By: Rafael Laboissiere [EMAIL PROTECTED]
Description: 
 slang-gsl  - GNU Scientific Library binding for S-Lang
Closes: 444316
Changes: 
 slgsl (0.7.0-2) unstable; urgency=low
 .
   * debian/patches/use-fPIC.patch: Added patch for compiling files with
 -fPIC (closes: #444316)
Files: 
 5719098a91a11542f7487b50c2a5ca1c 855 interpreters optional slgsl_0.7.0-2.dsc
 cc3152fea18dad4a51593d8c3bc7756c 2947 interpreters optional 
slgsl_0.7.0-2.diff.gz
 bc58444069b2dc22179051841a6674a0 56502 interpreters optional 
slang-gsl_0.7.0-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/CTCk3oga0pdcv4RAvPMAJ9PJW77GCJbmUlib7PRuONL9dqqYgCeNgSE
9KeJcU6jls9TiW5tIFawIOg=
=ZZBv
-END PGP SIGNATURE-


Accepted:
slang-gsl_0.7.0-2_i386.deb
  to pool/main/s/slgsl/slang-gsl_0.7.0-2_i386.deb
slgsl_0.7.0-2.diff.gz
  to pool/main/s/slgsl/slgsl_0.7.0-2.diff.gz
slgsl_0.7.0-2.dsc
  to pool/main/s/slgsl/slgsl_0.7.0-2.dsc


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted bouml 2.31.3-2 (source all amd64)

2007-09-27 Thread Thomas Girard
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 22:06:53 +0200
Source: bouml
Binary: bouml bouml-plugouts-src
Architecture: source amd64 all
Version: 2.31.3-2
Distribution: unstable
Urgency: low
Maintainer: Thomas Girard [EMAIL PROTECTED]
Changed-By: Thomas Girard [EMAIL PROTECTED]
Description: 
 bouml  - UML2 tool box to specify and generate code
 bouml-plugouts-src - UML2 tool box to specify and generate code (plugouts 
sources)
Closes: 444302
Changes: 
 bouml (2.31.3-2) unstable; urgency=low
 .
   * Link against libgcc1 from sid, not experimental. Closes: #444302.
Files: 
 456baa95911e7b424f9712869dccb964 655 devel optional bouml_2.31.3-2.dsc
 d82b44f849a27aa11d0d234340d77acc 5833 devel optional bouml_2.31.3-2.diff.gz
 9fa0b9f8eca4b6e1abde69e9fb113217 1876158 devel optional 
bouml-plugouts-src_2.31.3-2_all.deb
 b8ba86e09a6d08010f8e9c13592c166f 4019064 devel optional 
bouml_2.31.3-2_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/CZkz2LXlDjmjg4RAmVPAJ929tolpPfEuG45YMnjPzrOLyrIKwCfaiMS
EJDuS7l/HEvyi9jQ9vVUzE8=
=KT1y
-END PGP SIGNATURE-


Accepted:
bouml-plugouts-src_2.31.3-2_all.deb
  to pool/main/b/bouml/bouml-plugouts-src_2.31.3-2_all.deb
bouml_2.31.3-2.diff.gz
  to pool/main/b/bouml/bouml_2.31.3-2.diff.gz
bouml_2.31.3-2.dsc
  to pool/main/b/bouml/bouml_2.31.3-2.dsc
bouml_2.31.3-2_amd64.deb
  to pool/main/b/bouml/bouml_2.31.3-2_amd64.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted libmail-dkim-perl 0.28-2 (source all)

2007-09-27 Thread Magnus Holmgren
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 22:21:31 +0200
Source: libmail-dkim-perl
Binary: libmail-dkim-perl
Architecture: source all
Version: 0.28-2
Distribution: unstable
Urgency: low
Maintainer: Magnus Holmgren [EMAIL PROTECTED]
Changed-By: Magnus Holmgren [EMAIL PROTECTED]
Description: 
 libmail-dkim-perl - cryptographically identify the sender of email - perl 
library
Changes: 
 libmail-dkim-perl (0.28-2) unstable; urgency=low
 .
   * Skip 'make realclean' if Makefile does not exist, and do not ignore
 errors.
   * Modernise debian/control: wrap dependency fields, add XS-Vcs-* fields,
 and make Homepage a real field.
Files: 
 be7d1b3a6bc70c354a37ae63787d2d7e 918 perl optional libmail-dkim-perl_0.28-2.dsc
 bbaf0511f556a9cacc6ffa28dd8eb5ae 3085 perl optional 
libmail-dkim-perl_0.28-2.diff.gz
 1bb3cf8da338c97818558aebe8e0a6ac 84576 perl optional 
libmail-dkim-perl_0.28-2_all.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/C8+30WoBV0H6VwRAqoAAKCvVhnoj3jR5gbr+8rmFHUt7EOXbACguFXP
KSMbiN6KXhuJp1GOOIbn9jY=
=/Hen
-END PGP SIGNATURE-


Accepted:
libmail-dkim-perl_0.28-2.diff.gz
  to pool/main/libm/libmail-dkim-perl/libmail-dkim-perl_0.28-2.diff.gz
libmail-dkim-perl_0.28-2.dsc
  to pool/main/libm/libmail-dkim-perl/libmail-dkim-perl_0.28-2.dsc
libmail-dkim-perl_0.28-2_all.deb
  to pool/main/libm/libmail-dkim-perl/libmail-dkim-perl_0.28-2_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted sun-java5 1.5.0-13-1 (ia64 source all amd64 i386)

2007-09-27 Thread Matthias Klose
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 23:16:10 +0200
Source: sun-java5
Binary: sun-java5-demo sun-java5-fonts sun-java5-bin sun-java5-source 
sun-java5-jdk sun-java5-doc sun-java5-jre ia32-sun-java5-plugin 
ia32-sun-java5-bin sun-java5-plugin
Architecture: all amd64 i386 ia64 source 
Version: 1.5.0-13-1
Distribution: unstable
Urgency: low
Maintainer: Matthias Klose [EMAIL PROTECTED]
Changed-By: Matthias Klose [EMAIL PROTECTED]
Description: 
 ia32-sun-java5-bin - Sun Java(TM) Runtime Environment (JRE) 5.0 (32-bit)
 sun-java5-bin - Sun Java(TM) Runtime Environment (JRE) 5.0 (architecture 
dependen
 sun-java5-demo - Sun Java(TM) Development Kit (JDK) 5.0 demos and examples
 sun-java5-jdk - Sun Java(TM) Development Kit (JDK) 5.0
Changes: 
 sun-java5 (1.5.0-13-1) unstable; urgency=low
 .
   * Upload to unstable.
Files: 
 1e2144f0bde3adda13ef90630bd6aa58 5237594 non-free/devel optional 
sun-java5-demo_1.5.0-13-1_amd64.deb
 26cacbfc1827be8c4c97579949d26cb9 40334 non-free/doc optional 
sun-java5-doc_1.5.0-13-1_all.deb
 329ed04b5a25ff2abac385e2d3184916 16460578 non-free/devel optional 
sun-java5-source_1.5.0-13-1_all.deb
 4de25e9d3079cc786558a9afdd3a9ce3 9872504 non-free/devel optional 
sun-java5-demo_1.5.0-13-1_i386.deb
 5294a943152432dab97408f55e363174 81116 non-free/devel optional 
sun-java5_1.5.0-13-1.diff.gz
 65f76dd622ebc5eb9a78655b1c87db06 1600 non-free/web optional 
sun-java5-plugin_1.5.0-13-1_i386.deb
 7a93f8ddecbc1a51151b4da87304a60c 92128617 non-free/devel optional 
sun-java5_1.5.0-13.orig.tar.gz
 9b3150213bb8b440a7b8307f2f689509 22398646 non-free/libs optional 
ia32-sun-java5-bin_1.5.0-13-1_ia64.deb
 ac8ac88a8fc4f8ba06a629803123255a 1822 non-free/x11 optional 
sun-java5-fonts_1.5.0-13-1_all.deb
 b791300bb5fad9225642e5dd1139cfa4 22398684 non-free/libs optional 
ia32-sun-java5-bin_1.5.0-13-1_amd64.deb
 bb5d6a44502bebf5563760d3d0fd1a42 19868324 non-free/libs optional 
sun-java5-bin_1.5.0-13-1_amd64.deb
 c20edcac49d20ffdfad241ade37cab2b 4883248 non-free/devel optional 
sun-java5-jdk_1.5.0-13-1_amd64.deb
 cfc1e13e62be72990617f533cd3c7a75 5049996 non-free/devel optional 
sun-java5-jdk_1.5.0-13-1_i386.deb
 e90194e3337ed6b710e14bcebea7b2b6 22397794 non-free/libs optional 
sun-java5-bin_1.5.0-13-1_i386.deb
 b3c2f65956ad60988d84e47060e39361 1219 non-free/devel optional 
sun-java5_1.5.0-13-1.dsc
 f69cd57da3490257534c31aa61b2c9d0 7463816 non-free/libs optional 
sun-java5-jre_1.5.0-13-1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/Dt/StlRaw+TLJwRAlpgAJwMQW3QtBbT28NXFDqzPNIej92lSgCgkFuT
OgAPGIWuCMa2GgkXO6R0bdw=
=bkls
-END PGP SIGNATURE-


Accepted:
ia32-sun-java5-bin_1.5.0-13-1_amd64.deb
  to pool/non-free/s/sun-java5/ia32-sun-java5-bin_1.5.0-13-1_amd64.deb
ia32-sun-java5-bin_1.5.0-13-1_ia64.deb
  to pool/non-free/s/sun-java5/ia32-sun-java5-bin_1.5.0-13-1_ia64.deb
sun-java5-bin_1.5.0-13-1_amd64.deb
  to pool/non-free/s/sun-java5/sun-java5-bin_1.5.0-13-1_amd64.deb
sun-java5-bin_1.5.0-13-1_i386.deb
  to pool/non-free/s/sun-java5/sun-java5-bin_1.5.0-13-1_i386.deb
sun-java5-demo_1.5.0-13-1_amd64.deb
  to pool/non-free/s/sun-java5/sun-java5-demo_1.5.0-13-1_amd64.deb
sun-java5-demo_1.5.0-13-1_i386.deb
  to pool/non-free/s/sun-java5/sun-java5-demo_1.5.0-13-1_i386.deb
sun-java5-doc_1.5.0-13-1_all.deb
  to pool/non-free/s/sun-java5/sun-java5-doc_1.5.0-13-1_all.deb
sun-java5-fonts_1.5.0-13-1_all.deb
  to pool/non-free/s/sun-java5/sun-java5-fonts_1.5.0-13-1_all.deb
sun-java5-jdk_1.5.0-13-1_amd64.deb
  to pool/non-free/s/sun-java5/sun-java5-jdk_1.5.0-13-1_amd64.deb
sun-java5-jdk_1.5.0-13-1_i386.deb
  to pool/non-free/s/sun-java5/sun-java5-jdk_1.5.0-13-1_i386.deb
sun-java5-jre_1.5.0-13-1_all.deb
  to pool/non-free/s/sun-java5/sun-java5-jre_1.5.0-13-1_all.deb
sun-java5-plugin_1.5.0-13-1_i386.deb
  to pool/non-free/s/sun-java5/sun-java5-plugin_1.5.0-13-1_i386.deb
sun-java5-source_1.5.0-13-1_all.deb
  to pool/non-free/s/sun-java5/sun-java5-source_1.5.0-13-1_all.deb
sun-java5_1.5.0-13-1.diff.gz
  to pool/non-free/s/sun-java5/sun-java5_1.5.0-13-1.diff.gz
sun-java5_1.5.0-13-1.dsc
  to pool/non-free/s/sun-java5/sun-java5_1.5.0-13-1.dsc
sun-java5_1.5.0-13.orig.tar.gz
  to pool/non-free/s/sun-java5/sun-java5_1.5.0-13.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted ion3 20070927-1 (source all i386)

2007-09-27 Thread Ben Hutchings
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 23:58:23 +0100
Source: ion3
Binary: ion3-doc ion3-dev ion3
Architecture: source all i386
Version: 20070927-1
Distribution: unstable
Urgency: low
Maintainer: Ben Hutchings [EMAIL PROTECTED]
Changed-By: Ben Hutchings [EMAIL PROTECTED]
Description: 
 ion3   - keyboard-friendly window manager with tiled windows
 ion3-dev   - ion3 development files
 ion3-doc   - ion3 documentation
Changes: 
 ion3 (20070927-1) unstable; urgency=low
 .
   * New upstream release
   * Reenabled dh_strip since debugging information is disabled by default
   * Changed menu section to conform to new menu policy
Files: 
 e0d600a3c7ae1bea832648ede352f14c 701 non-free/x11 extra ion3_20070927-1.dsc
 9901954cc34938bcb045b867633ad14a 1317593 non-free/x11 extra 
ion3_20070927.orig.tar.gz
 efde99e1818be4547d8108209a270834 35406 non-free/x11 extra 
ion3_20070927-1.diff.gz
 f7e0ca3e3278acec4b7e3155cb4c1da8 90764 non-free/devel extra 
ion3-dev_20070927-1_all.deb
 8fa17a5cf8ea27ba6daf607b4432a9a2 126514 non-free/doc extra 
ion3-doc_20070927-1_all.deb
 97fdfb3c50c1b2dcce4c74782bec9710 666408 non-free/x11 extra 
ion3_20070927-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/Dqn79ZNCRIGYgcRArvgAKCpKcSWNvLh8/kvj3hK+iKfYbshRgCgtTnR
8yjVnhs41f+qY+kTmP9hg/s=
=F05W
-END PGP SIGNATURE-


Accepted:
ion3-dev_20070927-1_all.deb
  to pool/non-free/i/ion3/ion3-dev_20070927-1_all.deb
ion3-doc_20070927-1_all.deb
  to pool/non-free/i/ion3/ion3-doc_20070927-1_all.deb
ion3_20070927-1.diff.gz
  to pool/non-free/i/ion3/ion3_20070927-1.diff.gz
ion3_20070927-1.dsc
  to pool/non-free/i/ion3/ion3_20070927-1.dsc
ion3_20070927-1_i386.deb
  to pool/non-free/i/ion3/ion3_20070927-1_i386.deb
ion3_20070927.orig.tar.gz
  to pool/non-free/i/ion3/ion3_20070927.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted texmacs 1:1.0.6.11-1 (source i386 all)

2007-09-27 Thread Atsuhito KOHDA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 15:24:19 +0900
Source: texmacs
Binary: texmacs-common texmacs
Architecture: source i386 all
Version: 1:1.0.6.11-1
Distribution: unstable
Urgency: low
Maintainer: Atsuhito KOHDA [EMAIL PROTECTED]
Changed-By: Atsuhito KOHDA [EMAIL PROTECTED]
Description: 
 texmacs- WYSIWYG mathematical text editor using TeX fonts
 texmacs-common - WYSIWYG mathematical text editor using TeX fonts
Changes: 
 texmacs (1:1.0.6.11-1) unstable; urgency=low
 .
   * Whole work was done by Kamaraju Kusumanchi [EMAIL PROTECTED] or [raju].
   * New upstream release
   * texmacs does not build on ia64 since guile-1.8 FTBFS on ia64
 (bug #401400). So reduced the build dependency to guile-1.6-dev on
 ia64. All other architectures still depend upon guile-1.8-dev.
Files: 
 f2e4f612b2b01d72811521a0a3c8869d 917 editors optional texmacs_1.0.6.11-1.dsc
 61cba82f2b3e64914f2a33e479e45c96 4294912 editors optional 
texmacs_1.0.6.11.orig.tar.gz
 1d24fa39f20b50f88ad5f039de9fbf62 27076 editors optional 
texmacs_1.0.6.11-1.diff.gz
 f41a8399315d5c989c2536970277dfcc 3588300 editors optional 
texmacs-common_1.0.6.11-1_all.deb
 1f81d3d9c267970f416d8bc55af110eb 1760246 editors optional 
texmacs_1.0.6.11-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/FPi1IXdL1v6kOwRAjKBAJ9qAmR+ucdi3ARIwKo6rBFvZGWCGgCdEorn
kfxTuIYV0QAQoPG79eQau3I=
=3tFt
-END PGP SIGNATURE-


Accepted:
texmacs-common_1.0.6.11-1_all.deb
  to pool/main/t/texmacs/texmacs-common_1.0.6.11-1_all.deb
texmacs_1.0.6.11-1.diff.gz
  to pool/main/t/texmacs/texmacs_1.0.6.11-1.diff.gz
texmacs_1.0.6.11-1.dsc
  to pool/main/t/texmacs/texmacs_1.0.6.11-1.dsc
texmacs_1.0.6.11-1_i386.deb
  to pool/main/t/texmacs/texmacs_1.0.6.11-1_i386.deb
texmacs_1.0.6.11.orig.tar.gz
  to pool/main/t/texmacs/texmacs_1.0.6.11.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted bplay 0.991-10 (source amd64)

2007-09-27 Thread Carlos Laviola
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 20:51:21 -0300
Source: bplay
Binary: bplay
Architecture: source amd64
Version: 0.991-10
Distribution: unstable
Urgency: low
Maintainer: Carlos Laviola [EMAIL PROTECTED]
Changed-By: Carlos Laviola [EMAIL PROTECTED]
Description: 
 bplay  - Buffered audio file player/recorder
Closes: 307033 327759
Changes: 
 bplay (0.991-10) unstable; urgency=low
 .
   * Install the manpages. (Closes: #327759)
   * debian/copyright: download location is gone, so just removing it for now.
   * bplay.1: fixed minor typo.  (Closes: #307033)
   * debian/control: Standards-Version bumped to 3.7.2.2.
   * debian/compat: created, compatible with debhelper V5.
   * debian/control: Build-Depends on debhelper  5.0.0 now.
   * debian/rules: no longer ignore the result of 'make clean', removes
 binary-indep target, and uses dh_install now.
Files: 
 d0a2657a54de0dc40c5b1671c4854267 560 sound optional bplay_0.991-10.dsc
 0411acc2a5265bae2044cf70b269566d 14639 sound optional bplay_0.991-10.diff.gz
 bed4008b6d1b3c99064240d6c0238e1d 18616 sound optional bplay_0.991-10_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/FUUZAYCJzUW03IRAkOtAJ9xROiIkkCoYsiQ6MX0E2Lnuuq0pwCeOEKe
a9yLpValelIguj1AHQcT0pU=
=Wt2J
-END PGP SIGNATURE-


Accepted:
bplay_0.991-10.diff.gz
  to pool/main/b/bplay/bplay_0.991-10.diff.gz
bplay_0.991-10.dsc
  to pool/main/b/bplay/bplay_0.991-10.dsc
bplay_0.991-10_amd64.deb
  to pool/main/b/bplay/bplay_0.991-10_amd64.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted uisp 20050207-4 (source i386)

2007-09-27 Thread Margarita Manterola
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 22:27:27 -0300
Source: uisp
Binary: uisp
Architecture: source i386
Version: 20050207-4
Distribution: unstable
Urgency: low
Maintainer: Margarita Manterola [EMAIL PROTECTED]
Changed-By: Margarita Manterola [EMAIL PROTECTED]
Description: 
 uisp   - Micro In-System Programmer for Atmel's AVR MCUs
Closes: 417677
Changes: 
 uisp (20050207-4) unstable; urgency=low
 .
   * Changed debian/rules to apply dpatches at configure-time.
   * Fixed the manpage patch accordingly.
   * Added 30_fix_g++_4.3.dpatch fixing the use of parenthesis with the
 shift operator. (Closes: #417677)
   * Cleaned up old 10_const_char.dpatch to new dpatch simpler format.
   * Switched to debhelper compat level 5.
   * Cleaned and updated debian/rules
   * Upgraded to Standards-Version 3.7.2 - No changes needed.
   * Moved Homepage from pseudo-field to real field in debian/control.
Files: 
 abe53513cd5d415c54ed2aadc15d6472 605 electronics extra uisp_20050207-4.dsc
 9018092424f990abf06822fdcdfe6a50 4801 electronics extra uisp_20050207-4.diff.gz
 6faff1293b0510e2ba6ad01c4269ed7a 57362 electronics extra 
uisp_20050207-4_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/FzBlAuUx1tI/64RAquWAJ9M2c+qISgtYoAUo92sa9bF/40vpwCfcdiY
HYwNmBG87XY2xqi+4Tb9p+0=
=wvzf
-END PGP SIGNATURE-


Accepted:
uisp_20050207-4.diff.gz
  to pool/main/u/uisp/uisp_20050207-4.diff.gz
uisp_20050207-4.dsc
  to pool/main/u/uisp/uisp_20050207-4.dsc
uisp_20050207-4_i386.deb
  to pool/main/u/uisp/uisp_20050207-4_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted gnome-python-desktop 2.20.0-1 (source all i386)

2007-09-27 Thread Gustavo Noronha Silva
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 20:40:57 -0300
Source: gnome-python-desktop
Binary: python-gnome2-desktop-doc python-gnome2-desktop 
python-gnome2-desktop-dev
Architecture: source all i386
Version: 2.20.0-1
Distribution: unstable
Urgency: low
Maintainer: Loic Minier [EMAIL PROTECTED]
Changed-By: Gustavo Noronha Silva [EMAIL PROTECTED]
Description: 
 python-gnome2-desktop - Python bindings for the GNOME desktop environment
 python-gnome2-desktop-dev - Python bindings for the GNOME desktop environment
 python-gnome2-desktop-doc - Python bindings for the GNOME desktop environment 
- documentation
Closes: 444268
Changes: 
 gnome-python-desktop (2.20.0-1) unstable; urgency=low
 .
   * New upstream release
   - updated version requirements for various libs, including wnck
 (Closes: #444268)
Files: 
 57a7e7bc124d809f6cc2fe5d8cfb41bb 1603 python optional 
gnome-python-desktop_2.20.0-1.dsc
 857c53a8b7ec6bc12c2a983b853d87d5 644035 python optional 
gnome-python-desktop_2.20.0.orig.tar.gz
 a57eae344e01a37be0bd6c744b993b22 4924 python optional 
gnome-python-desktop_2.20.0-1.diff.gz
 7d2b6a24b351be5278883c09df054c93 291052 python optional 
python-gnome2-desktop_2.20.0-1_i386.deb
 3962ac08426141fc44eb4de47c4733e3 70956 doc optional 
python-gnome2-desktop-doc_2.20.0-1_all.deb
 f7ced322854ce1db1cf416599cbf53d3 43274 python optional 
python-gnome2-desktop-dev_2.20.0-1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/EcRt1anjIgqbEsRAu+VAKCbb82s7quNkMEANLuMzCi6R5KHxgCgzUzX
j6A1o6crvDl71WtBMXVQLXg=
=L1vG
-END PGP SIGNATURE-


Accepted:
gnome-python-desktop_2.20.0-1.diff.gz
  to pool/main/g/gnome-python-desktop/gnome-python-desktop_2.20.0-1.diff.gz
gnome-python-desktop_2.20.0-1.dsc
  to pool/main/g/gnome-python-desktop/gnome-python-desktop_2.20.0-1.dsc
gnome-python-desktop_2.20.0.orig.tar.gz
  to pool/main/g/gnome-python-desktop/gnome-python-desktop_2.20.0.orig.tar.gz
python-gnome2-desktop-dev_2.20.0-1_all.deb
  to pool/main/g/gnome-python-desktop/python-gnome2-desktop-dev_2.20.0-1_all.deb
python-gnome2-desktop-doc_2.20.0-1_all.deb
  to pool/main/g/gnome-python-desktop/python-gnome2-desktop-doc_2.20.0-1_all.deb
python-gnome2-desktop_2.20.0-1_i386.deb
  to pool/main/g/gnome-python-desktop/python-gnome2-desktop_2.20.0-1_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted asterisk 1:1.4.11~dfsg-3 (source all i386)

2007-09-27 Thread Faidon Liambotis
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 28 Sep 2007 05:58:29 +0300
Source: asterisk
Binary: asterisk-sounds-main asterisk-h323 asterisk asterisk-config 
asterisk-dbg asterisk-dev asterisk-doc
Architecture: source all i386
Version: 1:1.4.11~dfsg-3
Distribution: unstable
Urgency: low
Maintainer: Debian VoIP Team [EMAIL PROTECTED]
Changed-By: Faidon Liambotis [EMAIL PROTECTED]
Description: 
 asterisk   - Open Source Private Branch Exchange (PBX)
 asterisk-config - Configuration files for Asterisk
 asterisk-dbg - Debugging symbols for Asterisk
 asterisk-dev - Development files for Asterisk
 asterisk-doc - Source code documentation for Asterisk
 asterisk-h323 - H.323 protocol support for Asterisk
 asterisk-sounds-main - Core Sound files for Asterisk (English)
Closes: 444322
Changes: 
 asterisk (1:1.4.11~dfsg-3) unstable; urgency=low
 .
   * Depend on libsnmp-dev instead of libsnmp10-dev. Fixes FTBFS
 (Closes: #444322)
Files: 
 871204ea7eeacdcd544527aa3690e4b6 1634 comm optional asterisk_1.4.11~dfsg-3.dsc
 53018dbb6401c8a650c06d2acf516f71 161226 comm optional 
asterisk_1.4.11~dfsg-3.diff.gz
 1daafeb57234426529f476c158ca 31338244 doc extra 
asterisk-doc_1.4.11~dfsg-3_all.deb
 f266d2165960b8ac53cc22a815936b9d 308042 devel extra 
asterisk-dev_1.4.11~dfsg-3_all.deb
 34d4112c73031aa4ab6140ad991c0514 1647330 comm optional 
asterisk-sounds-main_1.4.11~dfsg-3_all.deb
 7f4b3fe1079c4f078a9382a31ba00b70 369494 comm optional 
asterisk-config_1.4.11~dfsg-3_all.deb
 e1c4d0368794aae1f5e5e5cc916411b4 2063000 comm optional 
asterisk_1.4.11~dfsg-3_i386.deb
 3c2ed450e8bf77d510f2e88ba4bab2f3 276236 comm optional 
asterisk-h323_1.4.11~dfsg-3_i386.deb
 0b1e4eb4795492c9f77dcb99bb7402e8 12120538 devel extra 
asterisk-dbg_1.4.11~dfsg-3_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/HA+Vty5d8XpUzMRAgP3AJ44iJgAYYVO0H2PMmLdmhcEdC2ajwCfcru/
Mv9+GaYvDmCtmtdCr6HR70s=
=Xvv5
-END PGP SIGNATURE-


Accepted:
asterisk-config_1.4.11~dfsg-3_all.deb
  to pool/main/a/asterisk/asterisk-config_1.4.11~dfsg-3_all.deb
asterisk-dbg_1.4.11~dfsg-3_i386.deb
  to pool/main/a/asterisk/asterisk-dbg_1.4.11~dfsg-3_i386.deb
asterisk-dev_1.4.11~dfsg-3_all.deb
  to pool/main/a/asterisk/asterisk-dev_1.4.11~dfsg-3_all.deb
asterisk-doc_1.4.11~dfsg-3_all.deb
  to pool/main/a/asterisk/asterisk-doc_1.4.11~dfsg-3_all.deb
asterisk-h323_1.4.11~dfsg-3_i386.deb
  to pool/main/a/asterisk/asterisk-h323_1.4.11~dfsg-3_i386.deb
asterisk-sounds-main_1.4.11~dfsg-3_all.deb
  to pool/main/a/asterisk/asterisk-sounds-main_1.4.11~dfsg-3_all.deb
asterisk_1.4.11~dfsg-3.diff.gz
  to pool/main/a/asterisk/asterisk_1.4.11~dfsg-3.diff.gz
asterisk_1.4.11~dfsg-3.dsc
  to pool/main/a/asterisk/asterisk_1.4.11~dfsg-3.dsc
asterisk_1.4.11~dfsg-3_i386.deb
  to pool/main/a/asterisk/asterisk_1.4.11~dfsg-3_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted iceweasel 2.0.0.7-2 (source all amd64)

2007-09-27 Thread Eric Dorland
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 27 Sep 2007 22:26:44 -0400
Source: iceweasel
Binary: iceweasel-dbg iceweasel-gnome-support iceweasel-dom-inspector iceweasel
Architecture: source amd64 all
Version: 2.0.0.7-2
Distribution: unstable
Urgency: low
Maintainer: Eric Dorland [EMAIL PROTECTED]
Changed-By: Eric Dorland [EMAIL PROTECTED]
Description: 
 iceweasel  - lightweight web browser based on Mozilla
 iceweasel-dbg - debugging symbols for iceweasel
 iceweasel-dom-inspector - tool for inspecting the DOM of pages in Iceweasel
 iceweasel-gnome-support - Support for Gnome in Iceweasel
Closes: 444149
Changes: 
 iceweasel (2.0.0.7-2) unstable; urgency=low
 .
   * gfx/src/gtk/gtk2drawing.c: Add patch from bz#389801 for gtk problems
 with gtk 2.12. (Closes: #444149)
Files: 
 8a3cbab68be9f4bb9e43dc5d1db9e059 1197 web optional iceweasel_2.0.0.7-2.dsc
 2d3b1174b500ce0ad1a9058e54465b43 186113 web optional 
iceweasel_2.0.0.7-2.diff.gz
 d7a6d74989dc7879a4010d16e825a666 239656 web optional 
iceweasel-dom-inspector_2.0.0.7-2_all.deb
 6d92c651c57eea7940aaa841285a497c 9229148 web optional 
iceweasel_2.0.0.7-2_amd64.deb
 029bc978c5cdaf6555d97ba0d3155f0b 87572 gnome optional 
iceweasel-gnome-support_2.0.0.7-2_amd64.deb
 75db2a0d21bb47f5ccc12fb19b9b89a1 74524888 devel extra 
iceweasel-dbg_2.0.0.7-2_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/HasYemOzxbZcMYRAq0UAKDMWhba+GzAfM4nWC2NfE1flpkj4gCdH4N/
7NPYPkSl70osue/vK7h+CBU=
=z+T3
-END PGP SIGNATURE-


Accepted:
iceweasel-dbg_2.0.0.7-2_amd64.deb
  to pool/main/i/iceweasel/iceweasel-dbg_2.0.0.7-2_amd64.deb
iceweasel-dom-inspector_2.0.0.7-2_all.deb
  to pool/main/i/iceweasel/iceweasel-dom-inspector_2.0.0.7-2_all.deb
iceweasel-gnome-support_2.0.0.7-2_amd64.deb
  to pool/main/i/iceweasel/iceweasel-gnome-support_2.0.0.7-2_amd64.deb
iceweasel_2.0.0.7-2.diff.gz
  to pool/main/i/iceweasel/iceweasel_2.0.0.7-2.diff.gz
iceweasel_2.0.0.7-2.dsc
  to pool/main/i/iceweasel/iceweasel_2.0.0.7-2.dsc
iceweasel_2.0.0.7-2_amd64.deb
  to pool/main/i/iceweasel/iceweasel_2.0.0.7-2_amd64.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]