Bug#285197: aptitude: Provide way to manually run apt-listchanges for pkg

2014-02-20 Thread Marc Sherman
I have no objections to closing this issue. - Marc -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#285197: aptitude: Provide way to manually run apt-listchanges for pkg

2014-02-20 Thread Marc Sherman
It's been a while... Your thought is the only reason that makes sense, though. I'm sorry I didn't provide a clearer rationale in the original bug. - Marc > On Feb 20, 2014, at 3:14 PM, "Manuel A. Fernandez Montecelo" > wrote: > > 2014-02-20 20:08

Bug#474239: spamassassin: spamd logcheck file doesn't work with shortcircuit enabled

2008-04-04 Thread Marc Sherman
Package: spamassassin Version: 3.2.4-1~bpo40+1 Severity: normal Tags: patch If shortcircuit is enabled, the log message emitted on each scan includes the shortcircuit state at the end. The logcheck db needs to include that as an optional string in the regex: ^\w{3} [ :0-9]{11} [._[:alnum:]-]+ (sp

Bug#448893: Ping?

2008-02-14 Thread Marc Sherman
Have any decisions been made about how this will be handled? Etch-and-a-half is fast approaching, and the new ivtv drivers in mainline 2.6.24 is the main reason I'm interested in that upgrade in the first place. One possible alternative that I haven't seen mentioned yet would be to ignore the prob

Bug#460891: k9copy is missing depends on libhal-storage1

2008-01-19 Thread Marc Sherman
Martin Michlmayr wrote: * Marc Sherman <[EMAIL PROTECTED]> [2008-01-15 09:43]: Package: k9copy Version: 1.1.1-3-0.0 This package doesn't seem to be in Debian. What does dpkg -p k9copy | grep Maintainer: say? It's from Christian's multimedia repository. Most of his

Bug#460891: kdelibs as well

2008-01-15 Thread Marc Sherman
It's also missing a dep on kdelibs. - Marc -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#460891: k9copy is missing depends on libhal-storage1

2008-01-15 Thread Marc Sherman
Package: k9copy Version: 1.1.1-3-0.0 Severity: serious Justification: Policy 3.5 k9copy is missing a depends on libhal-storage1: k9copy: error while loading shared libraries: libhal-storage.so.1: cannot open shared object file: No such file or directory -- System Information: Debian Release: 4

Bug#448893: [Pkg-mythtv-maintainers] Bug#448893: ivtv-utils will need to be upgraded in stable for "etch-and-a-half"

2007-11-04 Thread Marc Sherman
dann frazier wrote: For modules, my immediate thought is to find the first option below that works: 1) Does the existing version work with 2.6.23 as-is? 2) Can support for 2.6.23 be easily added to the existing version in such a way that you can demonstrate low-risk of regressions for

Bug#448893: [Pkg-mythtv-maintainers] Bug#448893: ivtv-utils will need to be upgraded in stable for "etch-and-a-half"

2007-11-02 Thread Marc Sherman
Ian Campbell wrote: What do I actually need to do? Prepare and upload a 1.0.3-1etch1 built against etch? I'm not 100% sure. You should probably sync up with Dann Frazier; he seems to be running the show. - Marc -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe"

Bug#448893: ivtv-utils will need to be upgraded in stable for "etch-and-a-half"

2007-11-01 Thread Marc Sherman
Package: ivtv-utils Version: 0.8.2-2 Severity: important It looks like the kernel team is going to be upgrading stable to 2.6.23 for "etch-and-a-half": http://lists.debian.org/debian-release/2007/10/msg00252.html The new 1.0.x ivtv-utils package will be needed in stable for compatibility with the

Bug#435279: Closing

2007-08-24 Thread Marc Sherman
John Goerzen wrote: Hi Marc, I unfortunately do not have time to do this. I recognize that it would be a utility, but I don't have the time or the need for it here. Could you please reopen the wishlist and tag it help so that other users who might be able to do this could grab it? Thanks,

Bug#435279: bacula: Please consider uploading to backports.org

2007-07-30 Thread Marc Sherman
Package: bacula Version: 2.0.3-4 Severity: wishlist Would it be possible to have the current version of bacula added to backports.org for etch users? I've posted a couple of requests to the backports-users list, but no-one's responded. Perhaps you could maintain it there? Thanks, - Marc -- Syst

Bug#296789: cron-apt: FILTERCTRLM="true" and {TARGET}=upgrade conflict

2007-07-30 Thread Marc Sherman
Ola Lundqvist wrote: When FILTERCTRLM is gone, this bug can be closed. Sounds good. I didn't find the bug report that introduced FILTERCTRLM in the first place, so I cannot comment whether the issue raised therein is really fixed now. See #287126 for the reason behind it. I'm not using cr

Bug#288763: cron-apt: Run apt-listchanges on updated packages

2007-07-28 Thread Marc Sherman
Marc Haber wrote: On Wed, Jan 05, 2005 at 09:55:40AM -0500, Marc Sherman wrote: I think it would be great if cron-apt would run apt-listchanges on updated packages after downloading them. What do you think? I agree. I can't really think of how to best implement that, though. If you

Bug#420747: Decision?

2007-05-29 Thread Marc Sherman
Have you decided if you want to do this? The thread[0] on [EMAIL PROTECTED] seemed mostly for the idea, and there was subsequently another thread on the same list about the related package dkim-milter[1] that seemed to agree with that assessment. [0] http://lists.debian.org/debian-volatile/200

Bug#425014: mime-support: Mime type for atom should be application/atom+xml, not application/atom

2007-05-18 Thread Marc Sherman
Package: mime-support Version: 3.39-1 Severity: normal The mime type for atom appears to be incorrect. According to the spec, it should be application/atom+xml, but it's currently application/atom in mime.types. - Marc -- System Information: Debian Release: 4.0 APT prefers stable APT policy

Bug#422884: logcheck: Cron logs message with "/usr/bin/crontab", not just "crontab"

2007-05-08 Thread Marc Sherman
Package: logcheck Version: 1.2.54 Severity: normal Tags: patch Cron is logging messages like: May 8 03:58:48 pyloric /usr/bin/crontab[387]: (root) LIST (nobody) but the logcheck pattern isn't expecting "/usr/bin/". - Marc -- System Information: Debian Release: 4.0 APT prefers stable APT

Bug#394097: To silence the error message

2007-04-27 Thread Marc Sherman
Filipe Lautert <[EMAIL PROTECTED]> wrote: > Following this thread I could get auth_pam to work, but for each > action that I take it prints the following in my apache error.log: > > [Fri Mar 09 08:43:07 2007] [error] Internal error: pcfg_openfile() > called with NULL filename > [Fri Mar 09 08:43:

Bug#420747: libmail-dkim-perl: Please consider uploading newer version to volatile

2007-04-24 Thread Marc Sherman
Package: libmail-dkim-perl Version: 0.19-3 Severity: wishlist *** Please type your report below this line *** Once a newer version of libmail-dkim-perl is in testing, please consider also uploading that version to volatile. The version in stable doesn't implement the current draft spec, particu

Bug#357696: Consider patching for etch r1 and/or volatile?

2007-04-23 Thread Marc Sherman
Hi. Would you consider patching this bug for etch r1 and/or volatile? This bug creates an incompatibility with Debian's default MTA, and the false positives it leads to could be considered a form of data loss. The patch to fix this bug in upstream svn is one line of code (plus three lines of comme

Bug#402316: closed by Neil McGovern <[EMAIL PROTECTED]> (Bug#402316: fixed in hinfo 1.02-3.1)

2007-01-27 Thread Marc Sherman
Debian Bug Tracking System wrote: This is an automatic notification regarding your Bug report #402316: blars.org is down; hinfo-update fails miserably as a result, which was filed against the hinfo package. It has been closed by Neil McGovern <[EMAIL PROTECTED]>. Their explanation is attached b

Bug#402316: 402316 is serious

2006-12-12 Thread Marc Sherman
severity 402316 serious thanks I killed the process after a minute, so I didn't see that it kept going as long as Rene Wunderlich says. If that's true, then this is an RC bug, IMO, as it can DOS the machine. - Marc -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe".

Bug#402316: blars.org is down; hinfo-update fails miserably as a result

2006-12-09 Thread Marc Sherman
Package: hinfo Severity: important blars.org has gone down, and is now redirecting to a godaddy search engine page. This has two effects: 1) The blars.org rbl now blacklists the entire internet 2) hinfo-update downloads a huge spew of random search engine results in /var/lib/hinfo, breaking the

Bug#303780: 303780 is a policy violation

2006-09-28 Thread Marc Sherman
severity 303780 serious thanks This bug violates at least policy 10.7.2, as the files in modified in /var/lib/hinfo/ are being used as configuration files, and should be located in /etc. I'm sure there's another policy reference that's more on point about the program must not modify non-conf

Bug#389925: hinfo is unmaintained and buggy -- it should be removed from etch

2006-09-28 Thread Marc Sherman
Package: hinfo Version: 1.02-2 Severity: serious Justification: Policy 3.3 In my opinion, hinfo is currently nowhere near being able to ship. It ships out of the box with a number of significant bugs that have been reported in some cases for over a year and a half, without any maintainer action

Bug#353998: 6.2.2 is released

2006-06-16 Thread Marc Sherman
The new version has been released since April 25. - Marc -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#372737: hinfo: blackholes.intersil.net has gone down

2006-06-11 Thread Marc Sherman
Package: hinfo Version: 1.02-2 Severity: normal blackholes.intersil.net has gone down; all dns requests now redirect to a netsol parking page. -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (900, 'testing'), (300, 'unstable') Architecture: i386 (i686)

Bug#306208: reopen 306208

2006-05-21 Thread Marc Sherman
reopen 306208 tags 306208 + moreinfo unreproducible thanks This is one more bug that I believe you closed incorrectly. The correct procedure for a bug you cannot reproduce is to tag the bug moreinfo and unreproducible, and ask the submitter if they can still reproduce it with the latest version. I

Bug#366352: hinfo: ybl.megacity.org is shut down, blacklisting entire internet

2006-05-07 Thread Marc Sherman
Package: hinfo Version: 1.02-2 Severity: normal >From the maintainer of ybl.megacity.org: Derek J. Balling wrote: > > $ dig +short ybl.megacity.org ns > localhost.megacity.org. > $ dig +short ybl.megacity.org txt > "This zone is no longer in use and now returns bogons to convince you > to sto

Bug#307768: exim4: check_local_user should reject system users?

2006-04-11 Thread Marc Sherman
Andreas Metzler wrote: > > Hello, > I am currently strongly tending to close this bug as > - unsolvable > - cost/benefit. Solving is probably going to intoduce severe problems > for some people while only only fixing a wishlist request otherwise. Yup, I've been following the debian-devel discus

Bug#353998: slimserver: Consider packaging 6.2.2 nightlies

2006-02-28 Thread Marc Sherman
Simon Kelley wrote: > > This would be nice to do, but it's a little time-consuming for my > available free time just now. If there hasn't been a release closer to > the next Debian stable release, I'll bump the version. Just to clarify, I wasn't proposing that you upload a new package every day;

Bug#353999: slimserver: Slimserver should conflict/replace slimp3

2006-02-22 Thread Marc Sherman
Package: slimserver Severity: normal The slimp3 package is a very old version of slimserver. Your package should conflict with it, and replace it. You might also want to replace the exisitng slimp3 package with a transitional package to move people over to slimserver. -- System Information: De

Bug#353998: slimserver: Consider packaging 6.2.2 nightlies

2006-02-22 Thread Marc Sherman
Package: slimserver Severity: wishlist Please consider packaging the 6.2.2 nightly builds. The general process for slimserver releases seems to be that the "stable" nightly build branch (currently 6.2.2) doesn't get released for a long time, so a lot of those bug fixes will take a long while to g

Bug#283105: acknowledged by developer (Bug#283105: fixed in slimserver 6.2.1-1)

2006-01-31 Thread Marc Sherman
Debian Bug Tracking System wrote: > > Source: slimserver > Source-Version: 6.2.1-1 > > We believe that the bug you reported is fixed in the latest version of > slimserver, which is due to be installed in the Debian FTP archive: Cool! How are you solving the DFSG problems with the firmware and g

Bug#314646: apticron: Report on packages being kept back

2005-06-17 Thread Marc Sherman
Package: apticron Version: 1.1.12 Severity: wishlist It would be helpful if apticron would also report on packages which apt-get dist-upgrade reports as being kept back. For example, in today's testing update, base-config somehow ended up in testing despite a conflict with testing's version of t

Bug#309514: Commas?

2005-05-25 Thread Marc Sherman
If the OP quoted his config accurately, I'm betting it's the commas that are breaking things. Exim uses : (without spaces) for list separation. - Marc -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#308318: hinfo: relaywatcher.n13mbl.com has gone bad

2005-05-09 Thread Marc Sherman
Package: hinfo Version: 1.02-2 Severity: normal relaywatcher.n13mbl.com has gone bad. They're resolving all domains and IPs to 216.122.145.102 with a wildcard, and the website forwards to a bogus search engine. - Marc -- System Information: Debian Release: 3.1 APT prefers testing APT polic

Bug#307768: exim4: check_local_user should reject system users?

2005-05-07 Thread Marc Sherman
Marc Haber wrote: But the real-* business has been in the exim packages for a _very_ long time (this is even part of exim3 on woody) and probably nobody knows any more why we include this. Does upstream recommend this in its default config, or is this a Debianism? The use of real-* comes straight o

Bug#307768: exim4: check_local_user should reject system users?

2005-05-07 Thread Marc Sherman
Marc Haber wrote: I think that the current behavior is fine for the default configuration in sarge. Oh, yeah, of course, I don't think this needs to change for Sarge. For post-sarge, I am open to arguments, but am not yet convinced. Ok, that's fine. But if you agreed with my goal, what do you thin

Bug#307768: exim4: check_local_user should reject system users?

2005-05-07 Thread Marc Sherman
Marc Sherman wrote: Yeah, I thought of that, but I'm having trouble figuring out where to put it. It needs to go before the first use of check_lcoal_user, but after 400_exim4-config_system_aliases, so that system users (such as root) aliased to normal users continue to work. Ho

Bug#307768: exim4: check_local_user should reject system users?

2005-05-05 Thread Marc Sherman
Marc Haber wrote: To me, this looks like an issue which could be solved in a dedicated router which will fail e-mail addressed to system users. However, there might be packages that need their user to be able to receive mail. Yeah, I thought of that, but I'm having trouble figuring out where to pu

Bug#307768: exim4: check_local_user should reject system users?

2005-05-05 Thread Marc Sherman
Package: exim4 Version: 4.50-4 Severity: wishlist It seems to me that the check_local_user router option should fail for system users. Some packages that create system users already put them in /etc/aliases pointing to root, but there are a number of system users on my machine that are not curre

Bug#306815: [Logcheck-devel] Bug#306815: logcheck: New rule for spamd: silence log message for 306496

2005-05-03 Thread Marc Sherman
Jamie L. Penman-Smithson wrote: Whether it gets fixed before sarge or not, we're not going to start including rules for messages caused by transient problems in packages, sorry. You can either configure your favourite syslog variant to not log those messages, or you can add a regexp for it to a loc

Bug#307189: Logcheck: add log for signal: reopening log file

2005-05-01 Thread Marc Sherman
Stephen Gran wrote: I also don't use syslog with clam, so I miss a lot of the stuff you report :) No problem. You're probably the most responsive maintainer of all the packages I've got installed, so I really can't complain. :) Yes, you'll get the usual 'newer version available, blah, blah' mess

Bug#307189: Logcheck: add log for signal: reopening log file

2005-05-01 Thread Marc Sherman
Package: clamav-freshclam Version: 0.84-2 Severity: normal In 302254 you said the "Signal 1: re-opening log file" message was going away, but it's still here, just without the "Signal 1" part. So here's a modification of the logcheck line to catch it: ^\w{3} [ :0-9]{11} [._[:alnum:]-]+ freshcla

Bug#307062: clamav-freshclam: Logcheck change: signal number no longer reported

2005-04-30 Thread Marc Sherman
Package: clamav-freshclam Version: 0.84-1 Severity: normal Tags: patch Freshclam changed the way it logs the wakeup signal: --- clamav-freshclam2005-04-30 08:17:39.901241971 -0400 +++ clamav-freshclam.bak2005-04-30 08:17:21.341194368 -0400 @@ -1,5 +1,5 @@ ^\w{3} [ :0-9]{11} [._[:aln

Bug#306988: clamav: New upstream available: 0.84

2005-04-29 Thread Marc Sherman
Stephen Gran wrote: If you want to stay absolutely current, rather than wait for something to make it to testing, I suggest using the debs at http://people.debian.org/~sgran I put debs there ususally within a few hours of uploading to unstable for both sarge and woody. Thanks. I checked unstable

Bug#306988: clamav: New upstream available: 0.84

2005-04-29 Thread Marc Sherman
Package: clamav Version: 0.83-5 Severity: wishlist Freshclam is helpfully logging this message, every hour on the hour: Apr 29 16:16:10 pyloric freshclam[22640]: WARNING: Your ClamAV installation is OUTDATED - please update immediately! Apr 29 16:16:10 pyloric freshclam[22640]: WARNING: Local ver

Bug#306815: [Logcheck-devel] Bug#306815: logcheck: New rule for spamd: silence log message for 306496

2005-04-28 Thread Marc Sherman
Jamie L. Penman-Smithson wrote: Since there is an open bug about this filed against spamassassin, I'm not sure this should be included with logcheck. This is a temporary issue which will [hopefully] be fixed in the next release of SA, in the meantime this belongs in a local-foo file.. This bug has

Bug#306815: logcheck: New rule for spamd: silence log message for 306496

2005-04-28 Thread Marc Sherman
Package: logcheck Version: 1.2.37 Severity: normal Please add this rule to /etc/logcheck/ignore.d.server/spamd: ^\w{3} [ :0-9]{11} [._[:alnum:]-]+ spamd\[[0-9]+\]: Parsing of undecoded UTF-8 will give garbage when decoding entities at /usr/share/perl5/Mail/SpamAssassin/HTML\.pm line 182, line [0

Bug#304174: exim4: Patch for 296492 introduced remotely exploitable infinite loop (DOS)

2005-04-11 Thread Marc Sherman
Package: exim4 Version: 4.50-5 Severity: grave Tags: security sid patch Justification: remote exploitable DOS The patch for 296492, which is currently in sid's 4.50-5, introduced an infinite loop which could be triggered by a remote site with (intentionally?) misconfigured DNS. It is discussed in

Bug#302253: One more new log message

2005-04-09 Thread Marc Sherman
I've added one more new log message to the clamav-daemon logcheck file: ^\w{3} [ :0-9]{11} [._[:alnum:]-]+ clamd\[[0-9]+\]: SelfCheck: Database modification detected\. Forcing reload\.$ This message occurs rather frequently. My guess is that it's caused by a race condition where clamav-freshcla

Bug#303780: hinfo: Autoupdate should not overwrite files shipped in .deb

2005-04-08 Thread Marc Sherman
Package: hinfo Version: 1.02-2 Severity: normal The autoupdate facility in this package overwrites files that are shipped as part of the deb. This causes the following warnings when debsums is run from reportbug: Verifying package integrity... There may be a problem with your installation of hin

Bug#303781: hinfo blacklist database includes spammers.v6net.org, which is dead

2005-04-08 Thread Marc Sherman
Package: hinfo Version: 1.02-2 Severity: normal This is based on a current auto-update, I'm not sure about what's being shipped in the package. More info on the dead site: http://weblogs.asp.net/acampbell/archive/2005/01/25/359810.aspx - Marc -- System Information: Debian Release: 3.1 APT pr

Bug#290927: Please review upstream bug 4055

2005-04-05 Thread Marc Sherman
Kjetil Kjernsmo wrote: Anyway, I reviewed a few more related upstream bugs, and I think yours may be this upstream bug: http://bugzilla.spamassassin.org/show_bug.cgi?id=4055 For you, 192.168.23.5 is IANA reserved block, so those are trusted, and on the outside, 61.52.78.187, which SA trusts by d

Bug#302254: Minor change to logcheck file

2005-04-04 Thread Marc Sherman
I've made a minor change to the logcheck file: The existing file only ignores the signal 14 message; I added signal 1, too, to deal with the weekly logrotate run. Clamav-daemon already ignores that output. ^\w{3} [ :0-9]{11} [._[:alnum:]-]+ freshclam\[[0-9]+\]: Received signal (14, wake up|1,

Bug#302379: [Logcheck-devel] Bug#302379: dh_installlogcheck installs files as root:root 644, not root:logcheck 640

2005-03-31 Thread Marc Sherman
Todd Troxell wrote: The deal with this is that we can't use gid logcheck in dh_installlogcheck because the logcheck user doesn't exist until logcheck gets installed. It is annoying, but I've not come up with a solution to this yet. Ah, good point. I hadn't thought of that. A bit of egg on my face

Bug#302253: Updated logcheck file for clamav-daemon

2005-03-31 Thread Marc Sherman
Stephen Gran wrote: Hmm, I'm using dh_installlogcheck to install them. I would have thought that would set permissions appropriately. I guess a bug report is in order, since this will affect many packages. The patch is simple (one line), so I won't bother with it here. Do you want to file it o

Bug#302379: dh_installlogcheck installs files as root:root 644, not root:logcheck 640

2005-03-31 Thread Marc Sherman
Package: logcheck Version: 1.2.35 Severity: normal I reported a bug on a couple clamav packages (302253, 302254) which noted that in Sarge, logcheck files are supposed to be root:logcheck 640, not root:root 644. The clamav maintainer replied that he's using dh_installlogcheck to install them, so

Bug#302254: clamav-freshclam: New logcheck file

2005-03-30 Thread Marc Sherman
Package: clamav-freshclam Version: 0.83-3 Severity: normal Tags: patch I've attached a new logcheck/ignore.d.server/clamav-freshclam file. I've changed the entire file to conform to Sarge's logcheck standards, so I'm not bothering with an actual patch file. I've added a handful of new logcheck e

Bug#302253: Updated logcheck file for clamav-daemon

2005-03-30 Thread Marc Sherman
Package: clamav-daemon Version: 0.83-3 Severity: normal Tags: patch I've attached a new logcheck/ignore.d.server/clamav-daemon file. I've changed the entire file to conform to Sarge's logcheck standards, so I'm not bothering with an actual patch file. I've added a handful of new logcheck entries.

Bug#300919: apticron: Command line switches for apt-listchanges

2005-03-24 Thread Marc Sherman
Marc Sherman wrote: My worry there is that listchanges.conf is owned by another package, though it doesn't appear to be a conffile. Does that mean that you're allowed to write to it in your maintainer scripts? I'm not sure. Really, listchanges.conf should be listchanges.d,

Bug#300919: apticron: Command line switches for apt-listchanges

2005-03-22 Thread Marc Sherman
Colm MacCarthaigh wrote: On this front, I've been thinking it would be better to use apt-listchanges --profile option, ie use --profile=apticron and allow end-users to pick the output they desire that way. with defaults somewhat like: [apticron] which=both headers=1 I presum

Bug#300920: apticron: Reportbug suppresses error output of apt-listchanges

2005-03-22 Thread Marc Sherman
Package: apticron Version: 1.1.7 Severity: wishlist We had this discussion in email before this package entered the archive. Since we disagreed at the time, I'm filing this as a wishlist. Currently, the apt-listchanges stderr is redirected to /dev/null. This makes it difficult to debug problems.

Bug#300919: apticron: Command line switches for apt-listchanges

2005-03-22 Thread Marc Sherman
Package: apticron Version: 1.1.7 Severity: normal Congratulations on finally getting this into the archive! :) apt-listchanges should have the following additional command-line switches: --which=both --headers The first is already the default, but it should be specified on the cmd line in case

Bug#290927: Bug#300558: spamassassin: Sarge SA can't parse Received headers from Sarge Exim4

2005-03-21 Thread Marc Sherman
Kjetil Kjernsmo wrote: You can do this by taking a message you see misfires, save it to a file, say test.msg and go spamassassin -D < test.msg on it. You'll get a long debug log. I don't really know what the interesting part of it is, but you could try posting everything up to (but not includin

Bug#300558: spamassassin: Sarge SA can't parse Received headers from Sarge Exim4

2005-03-21 Thread Marc Sherman
Kjetil Kjernsmo wrote: I'm sure that there are a lot of other rules that aren't behaving correctly because of 300558 on Debian, that just don't fail as spectacularly or obviously as ALL_TRUSTED, because of the lack of Received parsing. Yeah, that could well be, good point. For example, I'm quite

Bug#300558: spamassassin: Sarge SA can't parse Received headers from Sarge Exim4

2005-03-21 Thread Marc Sherman
Kjetil Kjernsmo wrote: The patch currently attached to 290927 doesn't fix the parsing problem, it just avoids incorrectly reporting an unparsed Received header as a trusted relay. Hmm, yeah But you agree it is better than nothing...? Yes, the patch is the correct fix for 290927. My point wa

Bug#300558: spamassassin: Sarge SA can't parse Received headers from Sarge Exim4

2005-03-20 Thread Marc Sherman
Package: spamassassin Version: 3.0.2-1 Severity: normal According to the analysis of 290927, and upstream's fix for their bug 3949, the SA currently shipping in Sarge can't parse the Received headers created by Sarge's default MTA, Exim4. The patch currently attached to 290927 doesn't fix the par

Bug#296597: exim4-config: Please add -o (output file) option to update-exim4.conf.template

2005-02-23 Thread Marc Sherman
Package: exim4-config Version: 4.34-10 Severity: wishlist A -o option would be useful on update-exim4.conf.template, to generate a sample "one big config" from the installed conf.d files when dc_use_split_config='false'. This is useful when considering migrating from one-big-file to conf.d -- gen

Bug#240883: [exim] exiwhat should display Exim version number

2005-02-15 Thread Marc Sherman
Philip Hazel wrote: On Sun, 6 Feb 2005, Marc Haber wrote: this is Debian bug #240883, http://bugs.debian.org/240883. Why is this considered a bug? Because Debian uses the Bug Tracking System to track wishlist requests, by setting the bug's severity to "wishlist". You can run a mental s/bug/tic

Bug#290810: The bug didn't work?

2005-01-29 Thread Marc Sherman
Strange. exim4doc moved into testing this morning, despite this bug. - Marc -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#291832: Acknowledgement (exim4-config: !verify=reverse_host_lookup logs but does not warn on defer)

2005-01-23 Thread Marc Sherman
Of course, there's a missing { in the ${if... - Marc -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#291832: exim4-config: !verify=reverse_host_lookup logs but does not warn on defer

2005-01-23 Thread Marc Sherman
Package: exim4-config Version: 4.34-10 Severity: wishlist The stock exim4-config includes a (commented out) block that does reverse DNS verification in the ACLs using !verify=reverse_host_lookup. In the case of a defer (ie: a DNS timeout), this logs but does not actually include the warning header

Bug#291558: libapache2-mod-auth-pam: AuthPAM_FailDelay is ignored if passwd succeeds but require user fails

2005-01-21 Thread Marc Sherman
Package: libapache2-mod-auth-pam Version: 1.1.1-4.1 Severity: normal Tags: security If a user does not have access to a location/directory due to a require user directive that excludes them, and their password is correctly given, apache returns an auth failure immediately instead of respecting the

Bug#291395: logcheck-database: Rules dirs are setuid, they should be setgid

2005-01-20 Thread Marc Sherman
Package: logcheck-database Version: 1.2.33 Severity: normal I just installed 1.2.33, and it made my rules dirs setuid, not setgid... - Marc -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (900, 'testing'), (300, 'unstable') Architecture: i386 (i686) Kernel: Linux

Bug#290927: spamassassin: ALL_TRUSTED fires for spam, not for ham

2005-01-17 Thread Marc Sherman
Package: spamassassin Version: 3.0.2-1 Severity: normal The ALL_TRUSTED rule is firing on much of the spam coming in to my server. This has a -3.3 score assigned by default. Here's an example set of headers (including the spamassassin report) for a spam message: Return-path: <[EMAIL PROTECTED]>

Bug#290511: logcheck: syslogd restart in cron.daily/sysklogd causes a log message

2005-01-14 Thread Marc Sherman
Package: logcheck Version: 1.2.32 Severity: wishlist /etc/cron.daily/sysklogd restarts syslogd at the end of the script. This causes a daily log message, currently missed by logcheck: Jan 14 06:55:22 pyloric syslogd 1.4.1#16: restart (remote reception). I'm currently using this regex in ignore.s

Bug#289959: exim4-config: Missing debconf question for LOCAL_DELIVERY

2005-01-12 Thread Marc Sherman
Marc Haber wrote: No, the feature is there for a reason. You can always edit /etc/exim4/update-exim4.conf.conf. What is not there is the debconf-based configuration possibility, but that's only gold plating anyway. I've got to disagree with you pretty strongly on this one. The conf files (partial

Bug#289959: exim4-config: Missing debconf question for LOCAL_DELIVERY

2005-01-12 Thread Marc Sherman
Marc Haber wrote: Sarge's debconf templates have a string freeze, so we cannot add another question without invalidating all translations. The debconf question will be added once 4.43 or later is in unstable, which won't happen before t-p-u and testing-security work. That's what I thought. You sho

Bug#289959: exim4-config: Missing debconf question for LOCAL_DELIVERY

2005-01-11 Thread Marc Sherman
Package: exim4-config Version: 4.34-10 Severity: normal The recent upgrade to 4.34-10 changed the value of the LOCAL_DELIVERY variable to DEBCONFlocaldeliveryDEBCONF. However, that variable doesn't seem to be defined, and debconf never asked me what to set it to. Is the debconf question missing

Bug#289921: sensord: 244037 partially fixed - should be noted in changelog/news

2005-01-11 Thread Marc Sherman
Package: sensord Version: 1:2.9.0-4 Severity: minor The latests upstream release includes part of your patch for 244037, to remove the x10 scaling on the recorded loadavg. This should be noted in the changelog and/or debian.news, so that users know they need to fix their CGI script to report the