On 01/27/2016 06:47 AM, Christian Beer wrote:
I tested with a current Jessie and Stretch installation and it turns out
that openssl 1.0.2 verifies the "Thawte Primary Root CA" correctly
because it is in the certificate store. With openssl 1.0.1 this
verification fails because it looks for the
On 01/24/2016 09:49 AM, gregor herrmann wrote:
On Sun, 24 Jan 2016 12:32:39 +0100, Rosario Maddox wrote:
Yesterday I did: sudo apt-get upgrade, and I have this now:
Can't send SMS: 500 Can't connect to api.twilio.com:443 (certificate
verify failed) at /usr/share/perl5/SMS/Send.pm line 270.
Control: tags -1 + pending
http://anonscm.debian.org/cgit/collab-maint/ca-certificates.git/commit/?id=24b5bdcb3a3ede1d9664958b55cd480fc43e97b3
--
Kind regards,
Michael
On 12/28/2015 03:53 PM, Michael Shuler wrote:
`openssl s_client -CApath /etc/ssl/certs -connect
wrapdb.mesonbuild.com:443` shows the cert for wrapdb.mesonbuild.com,
issued by CN=Let's Encrypt Authority X1, but no intermediate, which is
cross-signed by DST Root CA X3 and should validate properly
On 12/28/2015 01:54 PM, Jussi Pakkanen wrote:
Currently trying to connect to a server that has letsencrypt enabled
will fail. For example this command:
wget https://wrapdb.mesonbuild.com
will error out saying that the certificate is not trusted because it has
no known issuer. The connection
On 12/14/2015 06:22 PM, Andrew Ayer wrote:
> I'm curious why the 2.6 update wasn't included with the 20151204
> release.
Thanks.
Thijs and/or Raphael. Please, hold until some additional changes can be
committed to include 2.6.
NSS released 2.6 while working on 2.5, essentially, Andrew.
--
Control: tags -1 + pending
Committed to master for next upload. Thanks, Daniel!
--
Kind regards,
Michael
On 12/14/2015 06:18 PM, Andrew Ayer wrote:
> Hi Michael,
>
> Have you given any more thought to a redesign of ca-certificates that
> separates the email certificates from the TLS certificates? I suspect
Yep - got a patch? :-)
> that the vast majority of packages that depend on ca-certificates
On 12/14/2015 07:45 PM, Andrew Ayer wrote:
> On Mon, 14 Dec 2015 18:45:40 -0600
> Michael Shuler <mich...@pbandjelly.org> wrote:
>
>>> As always, let me know if you could use any help. I'm going to
>>> start looking through the reverse depends for ca-cert
Control: tags -1 + pending
I'm preparing uploads for stable/oldstable proposed-updates, so
Wheezy/Jessie will get the current Mozilla CA bundle v2.5, which
includes the referenced QuoVadis certs.
http://anonscm.debian.org/cgit/collab-maint/ca-certificates.git/log/?h=debian-wheezy
--
Kind
On 12/05/2015 04:25 PM, Philipp Kern wrote:
>> Could I perhaps convince you to file this (kind of) request as a pu bug?
>> They are much easier for us to track than mails to the mailing list.
>> I appreciate that you might have been sending this mail to avoid the
>> pu-bug. Unfortunately, we
Control: tags -1 + pending
On 11/25/2015 03:15 PM, Josh Triplett wrote:
> Related to this bug, nss removed this CA today:
Thanks for the update. I've removed the SPI CA in git, and I'm prepping
an upload to unstable.
On 11/25/2015 03:18 PM, Andrew Ayer wrote:
> Hi Stable Release Managers,
>
> We're currently discussing in #806239 how to keep the
> ca-certificates package more up-to-date in (old)stable. Since
> ca-certificates is a data package that needs timely updating (when CAs
> are removed due to lapsed
On 11/25/2015 03:13 PM, Andrew Ayer wrote:
>> The April release contained the 2.4 bundle from Mozilla. CA bundle 2.5
>> was recently released in NSS and an upload to unstable is being
>> prepped.
I was incorrect about the NSS release relative time being as recent as I
recalled. See below.
> I'm
Control: tags -1 + pending
On 11/25/2015 11:28 AM, Andrew Ayer wrote:
> ca-certificates hasn't been updated since April 2015. Since then, 14
> CAs have been removed from the NSS root store[1, 2]. ca-certificates in
> stable hasn't been updated since October 2014. Since then, 6 additional
> CAs
Control: tags -1 + pending
On 11/22/2015 12:28 PM, Richard Ipsum wrote:
> The attached patch is based on the patch provided by Andrew Wilcox,
> I've verified that this patched version of certdata2pem.py produces
> the same certificate filenames when run with python2 and python3 and
> also when
On 11/22/2015 12:28 PM, Richard Ipsum wrote:
The attached patch is based on the patch provided by Andrew Wilcox,
I've verified that this patched version of certdata2pem.py produces
the same certificate filenames when run with python2 and python3 and
also when run with python2 without this patch.
Control: tags -1 - pending
On 10/22/2015 04:29 PM, Michael Shuler wrote:
Committed to git and test build works fine for me with sid cowbuilder. I
have not gone through attempting to set up a python3-only system to test
build, so hopefully, it "just works". :)
I take it back, this d
This needs work. Sorry for the delay in fully testing this patch out.
After reverting the commit of this patch and rebuilding, I'm seeing the
expected result:
mshuler@mana:~/git$ ls -l ca-certificates_2015*.deb
-rw-r--r-- 1 mshuler mshuler 207866 May 28 11:14
ca-certificates_20150426_all.deb
Control: tags -1 + pending
Committed to git and test build works fine for me with sid cowbuilder. I
have not gone through attempting to set up a python3-only system to test
build, so hopefully, it "just works". :)
Control: reassign 795244 ca-certificates-java 20140324
On 08/12/2015 03:35 AM, Christian Hammers wrote:
One of my Java applications does not recognize a CA certificate from
/usr/local/share/ca-certificates/ as valid so I tried the following
program in the hope it would somehow update the Java
On 07/21/2015 09:05 AM, Cédric Dufour - Idiap Research Institute wrote:
We do have the wheezy-updates repository enabled:
# rgrep wheezy-updates /etc/apt/sources.list*
/etc/apt/sources.list.d/debian.list:deb
http://daily-updated-local-mirror/debian.wheezy/ wheezy-updates main contrib
non-free
On 07/21/2015 04:22 AM, Cédric Dufour - Idiap Research Institute wrote:
Jessie package does install cleanly.
Thanks for the confirmation.
The only problem I see with this approach is that I have to monitor
Jessie security updates closely and make sure to import any updated
package in our
On 07/20/2015 09:57 AM, Cédric Dufour - Idiap Research Institute wrote:
In Debian/Wheezy (oldstable), QuoVadis three G3 Root CAs -
https://www.quovadisglobal.ch/Repository/DownloadRootsAndCRL.aspx -
are missing from the 'ca-certificates' package (while they are
present in Debian/Jessie).
Would
On 07/17/2015 10:44 PM, Andrew Wilcox wrote:
Is there anything else that I need to do to get this patch merged, or is
there any ETA? This is one of the last packages I use that require
Python 2 to build so I'm highly motivated. I'll be happy to do any
further testing, if necessary.
I just
This is great - thanks, Andrew!
--
Kind regards,
Michael
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Control: tags -1 + pending
On 05/29/2015 12:05 AM, Christoph Anton Mitterer wrote:
As already explicitly stated in the original report, this fix should not
only be applied for new installations but also for existing ones.
I added ca-certificates package upgrade handling of setting ownership
so that users see a green
lock, even when talking to misconfigured servers.
--
Kind regards,
Michael Shuler
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
On 05/26/2015 08:44 AM, Christoph Anton Mitterer wrote:
If e.g. the Mozilla bundle would be split out to ca-mozilla or something
like that, users that have no interest in these certs could choose not
to install that package and save some space.
Probably something like 99.N% of use cases by
Thank you for the details.
On 04/30/2015 02:41 AM, Daniel Lutz wrote:
The hooks in /etc/ca-certificates/update.d are called to re-add/
update/replace certificates in $CERTSDIR, but not for those in
$LOCALCERTSDIR. Is this intended behaviour?
It seems that this has just never come up, so it
On 04/28/2015 07:26 AM, Daniel Lutz wrote:
If update-ca-certificates is called with the --fresh option,
it doesn't correctly re-add certificates in
/usr/local/share/ca-certificates. These are ignored.
They are not ignored. If they exist, they are trusted. Period.
Although
Control: tags -1 + pending
Thanks! I committed this change to the git repo for the english man
page, so it will get updated on the next upload to unstable. I'll dig
through the po files to see if I can find any other instances of this
typo and commit those.
On 04/12/2015 09:39 PM, Simon Deziel wrote:
Just so that you know, the NSS version that includes this CA was
released in December 2014.
Yep, thanks - I'm aware. This bug will be closed when the new
ca-certificates package is uploaded.
--
Michael
--
To UNSUBSCRIBE, email to
On 02/01/2015 05:05 PM, Michael Biebl wrote:
Digging a bit deeper, I found that https://softwareupdate.vmware.com/
uses the GTE_CyberTrust_Global_Root.crt certificate, and apparently that
certificate was disabled, as dpkg-reconfigure ca-certificates showed.
After re-enabling that CA the problem
On 01/22/2015 09:45 AM, Carlos Alberto Lopez Perez wrote:
So Why iceweasel, chromium or wget accept this certificate as valid?
Do you have any idea?
Unfortunately, I haven't had the time to investigate the various
software you have listed, nor do I see much personal time to do so in
the
Control: tags -1 + pending
On 10/06/2014 05:23 PM, Michael Shuler wrote:
Do I understand this chain correctly to be the new root:
CN=USERTrust RSA Certification Authority
which is currently open for inclusion into Mozilla?
mozilla.org:
Status: ASSIGNED - https://bugzilla.mozilla.org
Will do as as soon as possible. Thanks, Michael.
Control: tags -1 + pending
http://anonscm.debian.org/cgit/collab-maint/ca-certificates.git/commit/?id=a1a33ae5e155d2be5b17912ea060953f5cba9845
--
Kind regards,
Michael
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact
Control: tags -1 - moreinfo
Thanks for the extra info!
On 10/07/2014 10:02 AM, Christoph Anton Mitterer wrote:
Well I have many disabled certs... could that be a difference?
And what's your default debconf mode for ca-certificates? ask/yes/no?
Mine is ask.
I use the package defaults, for
On 09/28/2014 05:24 AM, Emerick 'mz' Mounoury wrote:
Yes, because we integrated in our own-made ca-certificates package
installed on our SSL/X509 reverse proxy the cross-signed certificate
(usertrust) between our intermediate (gandi ssl ca 2) and the root ca
(addtrust).
Do I understand this
Control: tags -1 + moreinfo unreproducible
Hello,
I tested upgrades on about 8 boxes with no issues, before requesting an
upload. Here's a test I just ran on a box that I had not upgraded, yet:
(master)mshuler@hana:~$ dpkg -l ca-certificates
Desired=Unknown/Install/Remove/Purge/Hold
|
http://anonscm.debian.org/cgit/collab-maint/ca-certificates.git
I made a request, yesterday, to my sponsors for an upload.
Michael
On Sun, Sep 28, 2014 at 6:31 AM, Kurt Roeckx k...@roeckx.be wrote:
Package: ca-certificates
Version: 20140325
Severity: wishlist
Hi,
Could you please update
and one root certificate from SPI - if
there is something missing from the Mozilla certificate bundle, then
this request would need to go to Mozilla.
Michael
On Sun, Sep 28, 2014 at 5:24 AM, Emerick 'mz' Mounoury
emer...@gandi.net wrote:
On 09/28/2014 02:09 AM, Michael Shuler wrote:
On 09/25/2014
On 09/25/2014 04:14 AM, Emerick 'mz' Mounoury wrote:
On 09/24/2014 09:25 PM, Michael Shuler wrote:
Do you have a test SSL site URL on your system to see the full trust
chain? There are 4 AddTrust root CAs in ca-certificates, so I'd like
to see the trust path to better understand your problem
On 09/20/2014 11:53 AM, Adam D. Barratt wrote:
On Mon, 2014-08-25 at 21:36 -0500, Michael Shuler wrote:
On 08/24/2014 02:12 PM, Adam D. Barratt wrote:
Does the upgrade issue you mentioned in
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=743259#22 also apply
to this upload?
No, Wheezy
Do you have a test SSL site URL on your system to see the full trust
chain? There are 4 AddTrust root CAs in ca-certificates, so I'd like to
see the trust path to better understand your problem. Thanks!
--
Kind regards,
Michael
--
To UNSUBSCRIBE, email to
On 08/24/2014 02:12 PM, Adam D. Barratt wrote:
On 2014-03-31 1:25, Michael Shuler wrote:
I would like to upload ca-certificates to stable to include one important
patch to fix duplicate CKA_LABEL certificates, and bring the Mozilla CA
bundle up to date. The stable debdiff is attached.
Does
On 07/19/2014 06:45 AM, Adam D. Barratt wrote:
On Thu, 2014-07-10 at 19:30 +0100, Adam D. Barratt wrote:
On Mon, 2014-03-31 at 22:10 -0500, Michael Shuler wrote:
I would like to upload ca-certificates to oldstable to bring the Mozilla
CA bundle up to date, include one important patch to fix
Control: forwarded -1 https://bugzilla.mozilla.org/show_bug.cgi?id=994033
On 04/09/2014 08:07 AM, Klemens Baum wrote:
Following the OpenSSL CVE-2014-0160 Heartbleed vulnerability [1,2],
any certificate that was used with an vulnerable version of OpenSSL (I
read somewhere 1/3 of the web) should
Control: severity -1 normal
Control: tags -1 + moreinfo
On 04/04/2014 05:17 PM, Weilu Jia wrote:
GTE_CyberTrust_Global_Root is missing from the package and is causing
ssl certificate verification to fail.
Certificate verification fails because file is missing:
optix2000@rumia
On 04/02/2014 12:27 AM, Filipus Klutiero wrote:
I rarely see multiple NEWS entries from packages which I never directly
interact with. ca-certificates is one package I never had to install,
remove, upgrade, downgrade, fix, or even learn about, yet it has 17
entries in 10 years. In fact,
Thanks for the suggestions, Filipus - I appreciate your time :)
--
Michael
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
be a fantastic indicator that
the project is viable and trustworthy by their own standards. I would
enjoy reading about this and consider our options. If CAcert is
included in the Mozilla certdata.txt, it will be included in Debian
ASAP, as this is our current inclusion policy.
--
Warm regards,
Michael
I unarchived and reopened #687693, then merged #741561-#687693. That
didn't seem to do what I thought. Apologies if I goofed that up, as it
seems #741561 no longer appears on the open bugs page for the package. I
had thought they would both appear as open bugs. If someone has the
proper merge
On 04/01/2014 04:52 PM, Kurt Roeckx wrote:
It seems that you revered the removal of some certificates.
However they did not get installed again. It seems they were
excluded in /etc/ca-certificates.conf for some reason, and
so not added again.
Is this between 20140223 - 20140325? Yes, Mozilla
/RootDistributionLicense.php
https://bugs.debian.org/718434
https://bugs.debian.org/741561
--
Kind regards,
Michael Shuler
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Control: notfound -1 20140325
Control: tag -1 unreproducible
You probably need to follow the positivessl installation documentation
[0] and include the intermediate CA certificate file(s) in your web
server configuration. The various Comodo root CA certificates are
already in ca-certificates.
Thanks for the patch, Laurent.
--
Michael
On 03/14/2014 04:40 AM, Klaus Ethgen wrote:
Am Fr den 14. Mär 2014 um 0:41 schrieb Michael Shuler:
On 03/13/2014 05:18 PM, Klaus Ethgen wrote:
The severity is critical as it breaks several unrelated packages
Please, be specific about the stated several packages.
- - mutt: Asking to prove
Thanks for including your thoughts.
On 03/14/2014 01:25 PM, Wolfgang Walter wrote:
And why valicert's certificates have been removed though they are still in
iceweasel?
Valicert as well as several other 1024-bit CA certificates were removed
from Mozilla.
On 03/13/2014 05:18 PM, Klaus Ethgen wrote:
The severity is critical as it breaks several unrelated packages
Please, be specific about the stated several packages.
--
Kind regards,
Michael
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe.
This has all sorts of problems.
1) incomplete source and debian packaging (symlinked to nowhere)
2) native package (version 1.0.1 and debian/ dir should be separate from
upstream source)
--
Kind regards,
Michael
mshuler@mana:~/tmp/build$ dget -xu
On 12/30/2013 08:16 AM, Santiago Garcia Mantinan wrote:
After adding ca-certificates-java I found that a locally installed ca
(/usr/local/share/ca-certificates/whatever.crt) was not being added to the
java keystore,
-- .crt
The only way I got it added to the java certs was by removing all
On 12/30/2013 09:10 AM, Michael Shuler wrote:
On 12/30/2013 08:16 AM, Santiago Garcia Mantinan wrote:
After adding ca-certificates-java I found that a locally installed ca
(/usr/local/share/ca-certificates/whatever.crt) was not being added to
the
java keystore,
-- .crt
The only way I got
On 12/16/2013 04:37 PM, Christoph Lechleitner wrote:
Why is the ca-certificates package not in the list of security relevant
packages?
The Debian Security team does place some importance on keeping
ca-certificates updated, as can be seen in various uploads over the
years, however, as per
On 12/16/2013 06:27 PM, Christoph Lechleitner wrote:
Regarding our business model: Using Debian on those customer systems
was not our choice, it was the customer's. But we recommended it
Debian is a great choice :)
My comment was about the decision to remain on oldstable for such a long
I just wanted to include a reply on this bug that I have been reading
the responses as they have been posted. I appreciate the feedback and
I'm still pretty torn, to be honest.
#1 - Debian does not distribute CAcert's web site code, so while the
question about its quality is technically
I just wanted to include a reply on this bug that I have been reading
the responses as they have been posted. I appreciate the feedback and
I'm still pretty torn, to be honest.
#1 - Debian does not distribute CAcert's web site code, so while the
question about its quality is technically
On 12/06/2013 06:21 PM, Daniel Kahn Gillmor wrote:
can we ship CAs marked as disabled by default?
I think this would prove to be a rather severe disservice to Debian
users, making all SSL connections fail for all software that is or
depends on one of the reverse dependencies of
On 12/06/2013 08:18 PM, Daniel Kahn Gillmor wrote:
On 12/06/2013 08:11 PM, Michael Shuler wrote:
On 12/06/2013 06:21 PM, Daniel Kahn Gillmor wrote:
can we ship CAs marked as disabled by default?
I think this would prove to be a rather severe disservice to Debian
users, making all SSL
Hi,
Your package is built as a native Debian package, version 1.0.1 (doesn't
contain a Debian build version, i.e.: 1.0.1-1). This is the first thing
to work on.
Builds OK in a sid cowbuilder.
More TODO: :)
mshuler@mana:~/tmp/build$ lintian -I --pedantic fatcat_1.0.1_amd64.changes
I: fatcat
Hi again,
Some other things I noticed:
- no source code Copyright in d/copyright (only lists debian/*)
- is the source code to build the docs/ image files available?
- no d/watch file
- no Homepage: entry in d/control
- no Vcs-*: entries in d/control
--
Kind regards,
Michael
--
To
Hello Michal,
This bug report needs some additional information from you. Please,
read my 9/26/2013 reply [0] and and reply to the bug to see if we can
figure out how we can help solve your problem.
[0] http://bugs.debian.org/724674#10
--
Kind regards,
Michael
--
To UNSUBSCRIBE, email to
OP's email still bounces..
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Control: tags -1 patch
On 10/22/2013 10:39 AM, Vaclav Ovsik wrote:
Is it possible to add sort after find, so the order will be deterministic?
--- /usr/sbin/update-ca-certificates~ 2013-10-22 17:36:21.953351000 +0200
+++ /usr/sbin/update-ca-certificates2013-10-22 17:36:42.685350998
regards,
Michael Shuler
/gentle nudge
signature.asc
Description: OpenPGP digital signature
On 10/02/2013 02:25 PM, Adam D. Barratt wrote:
On Wed, 2013-10-02 at 10:31 -0500, Michael Shuler wrote:
I would enjoy the possibility of getting ifmetric_0.3-2+deb7u1 uploaded
for the 7.2 release and the window is getting smaller. I confirmed my
sponsor's availability for the next few days
actually used?
Could you please restate the actual problem we need to look at?
--
Kind regards,
Michael Shuler
signature.asc
Description: OpenPGP digital signature
Shuler mshu...@pbandjelly.org
Message-ID: 52443b46.1090...@pbandjelly.org
Date: Thu, 26 Sep 2013 08:48:54 -0500
From: Michael Shuler mich...@pbandjelly.org
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130801
Thunderbird/17.0.8
MIME-Version: 1.0
To: Michal Suchanek hramr...@centrum.cz
-pages
--
Kind regards,
Michael Shuler
signature.asc
Description: OpenPGP digital signature
is a one line patch to increase the reply buffer size. Attached is the
proposed stable debdiff.
- --
Kind regards,
Michael Shuler
- -- System Information:
Debian Release: jessie/sid
APT prefers testing
APT policy: (990, 'testing'), (300, 'unstable'), (200, 'experimental')
Architecture: amd64
/2013 04:51 PM, Michael Shuler wrote:
Here's the mentors URL:
http://mentors.debian.net/package/ifmetric
Here's the dget command:
dget -x
http://mentors.debian.net/debian/pool/main/i/ifmetric/ifmetric_0.3-3.dsc
And here are the collab-maint repository URLs (pristine-tar,
git
On 09/20/2013 10:06 AM, Dave Steele wrote:
On Fri, Sep 20, 2013 at 10:19 AM, Paul Tagliamonte paul...@debian.org wrote:
On Fri, Sep 20, 2013 at 10:18:18AM -0400, Dave Steele wrote:
I'm not sure we are clear with terms here. The newbie is the upstream,
and he has chosen to include the debian
Upstream commit ea4324b [0] corrects this and is contained in upstream
tag/release 2013.09.15, so the upload of pianobar_2013.09.15 should fix
this issue.
[0] https://github.com/PromyLOPh/pianobar/commit/ea4324
--
Kind regards,
Michael Shuler
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ
On 09/17/2013 10:01 AM, Luke Faraone wrote:
Is this issue also occurring in wheezy? If so, I could probably update
it also in the stable release.
I track testing, so cannot confirm, but I imagine so. Pianobar is one
of those packages that changes as the target service API changes, making
it
On 09/14/2013 12:15 PM, Thomas R. Koll wrote:
..lots!..
I appreciate you adding some good details and your thoughts to this bug
report, Thomas.
--
Kind regards,
Michael Shuler
signature.asc
Description: OpenPGP digital signature
On 09/04/2013 10:38 AM, Raphael Geissert wrote:
On 3 September 2013 08:05, Charles Davis cdavi...@gmail.com wrote:
On behalf of the Wine community, I'd like to request that the USERTrust
Group (now COMODO)'s USERFirst Object Root CA (UTN-USERFirst-Object) be
added to the ca-certificates
/ifmetric.c for s/Recieved/Received/ typo.
* Add debian/upstream_changelog from homepage News section.
* Add patch to fix NETLINK: Packet too small or truncated! error.
Thanks to Benedek László for the patch. Closes: #514197, LP: #896584
--
Kind regards,
Michael Shuler
signature.asc
I meant to include a comment in the original RFS about #661591:
#661591 packages providing ifupdown scripts must have those scripts
fixed if needed
I have not fully tested exit codes, but the ifmetric if-up script should
cleanly exit 0 or 1. Once I have tested it out, I will removed ifmetric
Control: affects 661591 - ifmetric
I checked that the ifmetric if-up script exits 0 on success and 1 on error.
--
Kind regards,
Michael Shuler
signature.asc
Description: OpenPGP digital signature
Control: tags -1 pending
ifmetric now has a collab-maint git repository and some low hanging
fruit committed:
http://anonscm.debian.org/gitweb/?p=collab-maint/ifmetric.git
--
Kind regards,
Michael Shuler
signature.asc
Description: OpenPGP digital signature
reassign 609238 debian-reference
retitle 609238 debian-reference: ifmetric typo
tags 609238 patch
thanks
Attached is a patch to correct the typo.
--
Kind regards,
Michael Shuler
Index: asciidoc/05_network.txt
===
--- asciidoc
package: wnpp
severity: normal
Per an email conversation with the current maintainer, I intend to adopt
ifmetric.
On 09/03/2013 04:47 PM, Chris Hanson wrote:
I would love it if you would take over ifmetric.
--
Kind regards,
Michael Shuler
signature.asc
Description: OpenPGP digital
In addition, I had an email conversation (link to thread is escaping me,
at the moment) about removal due to their license statement [0] that
You are bound by the Root Distribution Licence for any re-distributions
of CAcert's roots. [1].
I was convinced by others that the certificates cannot be
On 07/31/2013 01:55 PM, Michael Shuler wrote:
In addition, I had an email conversation (link to thread is escaping me,
at the moment) about removal due to their license statement [0] that
You are bound by the Root Distribution Licence for any re-distributions
of CAcert's roots. [1
Control: severity -1 normal
On 07/27/2013 08:52 PM, Christoph Anton Mitterer wrote:
Hi.
Hi Christoph - thanks for the bug report. I lowered the severity since I
agree that some improvements can be made, but local certificate handling
does work fine. Biggest hint I have is to use
further escaping is needed after
looking more closely.
--
Kind regards,
Michael Shuler
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
release.
--
Kind regards,
Michael Shuler
signature.asc
Description: OpenPGP digital signature
Using the steps to reproduce, I successfully get audio playback with
chromium_26.0.1410.43-1 without any issues at all.
Kernel: Linux 2.6.32-5-amd64 (SMP w/4 CPU cores)
hmm.. I'm using 3.2.0-4-amd64 (3.2.41-2). Relevant?
--
Kind regards,
Michael
--
To UNSUBSCRIBE, email to
to avoid log data loss, at the cost of
a bit of disk space.
- --
Kind regards,
Michael Shuler
- -- System Information:
Debian Release: 7.0
APT prefers testing
APT policy: (900, 'testing'), (400, 'unstable'), (300, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel
101 - 200 of 313 matches
Mail list logo