On Tue, Oct 15, 2024 at 03:12:30PM -0700, Mike Kupfer wrote:
> wrote:
>
> > > Richard Owlett wrote:
> > >
> > > > Wandering a chain of links starting at https://wiki.mate-desktop.org/
> > > > leads me to _suspect_ the configuration information I seek is in
> > > > /home/richard/.config/dconf/use
wrote:
> > Richard Owlett wrote:
> >
> > > Wandering a chain of links starting at https://wiki.mate-desktop.org/
> > > leads me to _suspect_ the configuration information I seek is in
> > > /home/richard/.config/dconf/user .
[...]
> Besides, it might be a bad idea to change the file while the de
On Tue, Oct 15, 2024 at 10:06:42AM -0700, Mike Kupfer wrote:
> Richard Owlett wrote:
>
> > Wandering a chain of links starting at https://wiki.mate-desktop.org/
> > leads me to _suspect_ the configuration information I seek is in
> > /home/richard/.config/dconf/user .
>
> You can dump the setting
Richard Owlett wrote:
> Wandering a chain of links starting at https://wiki.mate-desktop.org/
> leads me to _suspect_ the configuration information I seek is in
> /home/richard/.config/dconf/user .
You can dump the settings that are in dconf with
gsettings list-recursively
and redirecting the
On 10/15/2024 05:25 AM, Richard Owlett wrote:
On 10/14/2024 06:43 AM, Dan Purgert wrote:
On Oct 13, 2024, Richard Owlett wrote:
On 10/13/2024 04:57 AM, Andrew M.A. Cater wrote:
On Sat, Oct 12, 2024 at 08:27:55AM -0500, Richard Owlett wrote:
It has been my habit since days of Squeeze to install
Hi,
I noticed the below issue today.
I think it only affects certain configuration of dual booting so not
too many people should be affected.
Does anyone know of people who have been affected?
https://www.theverge.com/2024/8/21/24225108/microsoft-security-update-windows-linux-dual-boot
ines...
> >
> > > do it manually, not with update-alternatives
> > Why so? Could I not feed the script path to update-alternatives install?
>
> Well, if it works, then I guess it's OK.
>
Exactly. And if you want it less "hackish", build a deb where t
On Thu, Aug 22, 2024 at 14:33:22 +0300, Dmitrii Odintcov wrote:
> Hi Greg,
>
>
> This has occurred to me, but seemed like a bit of a hack and less
> convenient to transfer to other machines...
>
> > do it manually, not with update-alternatives
> Why so? Could I
Hi Greg,
This has occurred to me, but seemed like a bit of a hack and less
convenient to transfer to other machines...
> do it manually, not with update-alternatives
Why so? Could I not feed the script path to update-alternatives install?
Thanks
On Thu, 22 Aug 2024 at 14:02, Greg Woole
the file is saved (like `crontab -e` does, for
> example)
>
> I cannot do `update-alternatives --install /usr/bin/editor editor
> "$(which codium) --wait --reuse-window" 0` because the "alternative
> path doesn't exist".
>
> Suggestions?
Write a wr
Let's say I want to install VS Code / Codium as an alternative for
`/usr/bin/editor`, but I want it to always run with `--wait
--reuse-window` so that other software can rely on the editor
returning after the file is saved (like `crontab -e` does, for
example)
I cannot do `update-alterna
> >
> > > > Aug 2 07:05:20 named[76759]: transfer of '/IN'
> > > > from #53: Transfer status: too many records
> > > >
> > > > There are about 1,400 records in that domain which has never posed a
> > > > problem in the p
x27;
> > > > from #53: Transfer status: too many records
> > > >
> > > > There are about 1,400 records in that domain which has never posed a
> > > > problem in the past.
> > > >
> > > > We have tried force transfers
On 02/08/2024 11:35, Roberto C. Sánchez wrote:
That new upstream version (9.20.0) is in sid/trixie. Buster has this:
You're right, I've been once more confused by the lack of any logical
sequence between Debian release codenames.
--
We are the people our parents warned us about.
Eduardo M K
00 records in that domain which has never posed a
> > > problem in the past.
> > >
> > > We have tried force transfers, purging journal files and nothing seems to
> > > work.
> > >
> > > We rolled back the update to one performed earlier in the
s, purging journal files and nothing seems to
> > work.
> >
> > We rolled back the update to one performed earlier in the month and now
> > everything is working.
> >
> > Anybody have any idea what is going on with this latest update?
>
> I think this
On Fri, Aug 02, 2024 at 10:55:55AM -0300, Eduardo M KALINOWSKI wrote:
> On 02/08/2024 10:44, Roberto C. Sánchez wrote:
> > On Fri, Aug 02, 2024 at 10:15:38AM -0300, Eduardo M KALINOWSKI wrote:
> > > Maybe related to https://kb.isc.org/docs/rrset-limits-in-zones ?
> > >
> > > See also
> > > https:/
3: Transfer status: too many records
>
> There are about 1,400 records in that domain which has never posed a problem
> in the past.
>
> We have tried force transfers, purging journal files and nothing seems to
> work.
>
> We rolled back the update to one performed earlier in the
On 02/08/2024 10:44, Roberto C. Sánchez wrote:
On Fri, Aug 02, 2024 at 10:15:38AM -0300, Eduardo M KALINOWSKI wrote:
Maybe related to https://kb.isc.org/docs/rrset-limits-in-zones ?
See also
https://lists.debian.org/debian-security-announce/2024/msg00145.html (even
if it does not directly apply
urging journal files and nothing seems
> > to work.
> >
> > We rolled back the update to one performed earlier in the month and now
> > everything is working.
> >
> > Anybody have any idea what is going on with this latest update?
>
> Maybe related to https:
Aug 2 07:05:20 named[76759]: transfer of '/IN'
> from #53: Transfer status: too many records
>
> There are about 1,400 records in that domain which has never posed a
> problem in the past.
>
> We have tried force transfers, purging journal files and nothing seems
&
are about 1,400 records in that domain which has never posed a
problem in the past.
We have tried force transfers, purging journal files and nothing seems
to work.
We rolled back the update to one performed earlier in the month and now
everything is working.
Anybody have any idea what i
which has never posed a problem in
the past.
We have tried force transfers, purging journal files and nothing seems to work.
We rolled back the update to one performed earlier in the month and now
everything is working.
Anybody have any idea what is going on with this latest update?
Thanks,
Brian
On 23/7/24 23:22, Keith Bainbridge wrote:
Another is to fetch the epoch time value (%s) and then use that value
in all future calls. With GNU date:
now=$(date +%s)
julian=$(date -d "@$now" +%j)
dom=$(date -d "@$now" +%d)
Good evening All - especially Greg
This process has work
On Wed, Jul 24, 2024 at 21:08:29 +1000, Keith Bainbridge wrote:
> So when I opened my xterm this morning, I saw:
> keith@lenv0
>
> Tue 23Jul2024@19:19:30 205.2024 AEST
> :~ $>
>
> You have new mail in /var/spool/mail/keith
>
>
> Pressed enter, and the day# updated:
>
> keith@lenv0
>
>
On 23/7/24 23:22, Keith Bainbridge wrote:
On 23 July 2024 9:42:27 pm AEST, Greg Wooledge wrote:
On Tue, Jul 23, 2024 at 18:02:53 +1000, Keith Bainbridge wrote:
From the tab I had used earlier, ran source .bashrc
then
:/tmp/205.2024 $>mkcd /tmp/day$DOYR.$YEAR
So you're setting
On Tue 23 Jul 2024 at 15:00:12 (-0400), Greg Wooledge wrote:
> On Tue, Jul 23, 2024 at 13:38:48 -0500, David Wright wrote:
> > On Tue 23 Jul 2024 at 09:31:36 (-0400), Greg Wooledge wrote:
> > > On Tue, Jul 23, 2024 at 23:22:52 +1000, Keith Bainbridge wrote:
> > > > The day# in my command prompt inc
On Tue, Jul 23, 2024 at 13:38:48 -0500, David Wright wrote:
> On Tue 23 Jul 2024 at 09:31:36 (-0400), Greg Wooledge wrote:
> > On Tue, Jul 23, 2024 at 23:22:52 +1000, Keith Bainbridge wrote:
> > > The day# in my command prompt increments when I start in the morning.
> > > Maybe I need to press ent
On Tue 23 Jul 2024 at 09:31:36 (-0400), Greg Wooledge wrote:
> On Tue, Jul 23, 2024 at 23:22:52 +1000, Keith Bainbridge wrote:
> > The day# in my command prompt increments when I start in the morning. Maybe
> > I need to press enter.
>
> That makes it sound like you're setting the YEAR et al. var
On Tue, Jul 23, 2024 at 23:22:52 +1000, Keith Bainbridge wrote:
> The day# in my command prompt increments when I start in the morning. Maybe I
> need to press enter.
That makes it sound like you're setting the YEAR et al. variables in the
PROMPT_COMMAND variable.
If that's the case, it's *less*
On 23 July 2024 9:42:27 pm AEST, Greg Wooledge wrote:
>On Tue, Jul 23, 2024 at 18:02:53 +1000, Keith Bainbridge wrote:
>> From the tab I had used earlier, ran source .bashrc
>>
>> then
>> :/tmp/205.2024 $>mkcd /tmp/day$DOYR.$YEAR
>
>So you're setting those variables one time inside you
On Tue, Jul 23, 2024 at 18:02:53 +1000, Keith Bainbridge wrote:
> From the tab I had used earlier, ran source .bashrc
>
> then
> :/tmp/205.2024 $>mkcd /tmp/day$DOYR.$YEAR
So you're setting those variables one time inside your .bashrc file?
This is quite bad. What happens when you have a
On Tue, Jul 23, 2024 at 17:02:08 +1000, Keith Bainbridge wrote:
> mkcd ()
> {
> mkdir -p $1
> cd $1
> }
You're missing quotes. Two sets. You probably also want && between
the two commands, to check for the success of the mkdir before attempting
a cd.
> in the form :~ $> mkcd
> /mn
Addendum 2
adding the full path to .bashrc failed
So I tried opening a new xterm tab and ran
Tue 23Jul2024@17:07:43 205.2024 AEST
:~ $> mkcd /tmp/$DOYR.$YEAR
and landed in /tmp/205.2024 $>
Looking good
From the tab I had used earlier, ran source .bashrc
then
:/tmp/205.2024 $>
Addendum
So I tried opening a new xterm tab and ran
Tue 23Jul2024@17:07:43 205.2024 AEST
:~ $> mkcd /tmp/$DOYR.$YEAR
and landed in /tmp/205.2024 $>
Looking good
From the tab I had used earlier, ran source .bashrc
then
:/tmp/205.2024 $>mkcd /tmp/day$DOYR.$YEAR
and landed in
Good afternoon All
For reference, today is Tue 23Jul2024@15:41:47 205.2024 AEST
This is part of my command prompt, generated by
PS1='\n \u@\h \n\n $(date +"%a %d%b%Y@%H:%M:%S %j.%Y %Z") \n :\w $> '
My calculation is that today is day 205
When I run this function
mkcd ()
{
mkdir -p
On Mon, Jul 22, 2024 at 04:06:55PM CEST, Michael Kjörling
said:
> On 22 Jul 2024 05:47 +0800, from cor...@free.fr:
> > I have been running an old debian 11 for many days.
> > is it safe to run 'apt upgrade' and 'apt update' periodically?
> > for exampl
On Sun 21 Jul 2024 at 22:01:58 (-0600), Charles Curley wrote:
> On Sun, 21 Jul 2024 18:43:28 -0500
> David Wright wrote:
>
> > I run the following from root's crontab:
> >
> > apt-get -qq -o Acquire::http::Proxy="http://192.168.1.14:3142/";
> >
On 22 Jul 2024 05:47 +0800, from cor...@free.fr:
> I have been running an old debian 11 for many days.
> is it safe to run 'apt upgrade' and 'apt update' periodically?
> for example put them into crontab.
`apt update` (and `apt-get update`) will only update the pac
On Mon, 22 Jul 2024 05:47:58 +0800
cor...@free.fr wrote:
> I have been running an old debian 11 for many days.
> is it safe to run 'apt upgrade' and 'apt update' periodically?
> for example put them into crontab.
I suggest you do the next update manually. Then you
On Sun, 21 Jul 2024 18:43:28 -0500
David Wright wrote:
> I run the following from root's crontab:
>
> apt-get -qq -o Acquire::http::Proxy="http://192.168.1.14:3142/";
> update && apt-get -qq -d -o
> Acquire::http::Proxy="http://192.168.1.14:31
Hi,
On Mon, Jul 22, 2024 at 05:47:58AM +0800, cor...@free.fr wrote:
> is it safe to run 'apt upgrade' and 'apt update' periodically?
> for example put them into crontab.
I prefer to use apticron to download updates daily and tell me about
them, and then for me to
On Mon 22 Jul 2024 at 05:47:58 (+0800), cor...@free.fr wrote:
> I have been running an old debian 11 for many days.
> is it safe to run 'apt upgrade' and 'apt update' periodically?
> for example put them into crontab.
I run the following from root's crontab:
a
, for a stable release to receive a
security update which breaks backward compatibility. In such cases,
there should be a NEWS file excerpt, which is shown to you by apt or
apt-get, which explains the changes. You'll want to be aware of any
such changes, which would not be the case with a fully
On 22/7/24 07:34, Bret Busby wrote:
On 22/7/24 05:47, cor...@free.fr wrote:
Hi list,
I have been running an old debian 11 for many days.
is it safe to run 'apt upgrade' and 'apt update' periodically?
for example put them into crontab.
I ask this question because I
On 22/7/24 05:47, cor...@free.fr wrote:
Hi list,
I have been running an old debian 11 for many days.
is it safe to run 'apt upgrade' and 'apt update' periodically?
for example put them into crontab.
I ask this question because I am worried that some software updates may
On 7/21/24 17:47, cor...@free.fr wrote:
Hi list,
I have been running an old debian 11 for many days.
is it safe to run 'apt upgrade' and 'apt update' periodically?
for example put them into crontab.
I wouldn't have the upgrade run automatically, because maybe there
Hi list,
I have been running an old debian 11 for many days.
is it safe to run 'apt upgrade' and 'apt update' periodically?
for example put them into crontab.
I ask this question because I am worried that some software updates may
conflict with each other after running in
On Wed, 17 Jul 2024 13:55:55 +0200
Daniel Schröter wrote:
Hello Daniel,
>thanks for this information. Sounds more then similar ;-)
:-)
Thought so.
I implemented the fix here, and can confirm hplip is up and running
again.
Good luck.
--
Regards _ "Valid sig separator is {dash}{das
Hello Brad,
thanks for this information. Sounds more then similar ;-)
I'm going to close my bug report
Bye
On Tue, 16 Jul 2024 11:01:30 +0200
Daniel Schröter wrote:
Hello Daniel,
>
>I opened a bug report but didn't get an answer.
>https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076210
>
>Someone has a workaround?
See;
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1075760
Which is very simil
Hello,
someone else has the problem with hp-check since last update?
$ hp-check
/usr/bin/hp-check:630: SyntaxWarning: invalid escape sequence '\s'
lsusb_pat =
re.compile("""^Bus\s([0-9a-fA-F]{3,3})\sDevice\s([0-9a-fA-F]{3,3}):\sID\s([0-9a-fA-F]{4,4}):([0-9a-fA-F]{4,
On 5/31/24 10:04, Evgeny Kapun wrote:
After I upgraded my system, my integrated sound card (Intel HDA) stopped
working properly. The sound plays, but it is severely distorted.
If I boot the same system with an older kernel, it works. Currently, I am
using kernel 6.6.13+bpo-amd64, because newer v
After I upgraded my system, my integrated sound card (Intel HDA) stopped
working properly. The sound plays, but it is severely distorted.
If I boot the same system with an older kernel, it works. Currently, I
am using kernel 6.6.13+bpo-amd64, because newer versions that I tried
don't work (in
On Fri, May 24, 2024 at 08:14:16AM -0400, Stephen P. Molnar wrote:
> E: Release file for
> http://debian.uchicago.edu/debian/dists/bookworm-updates/InRelease is
> expired (invalid since 1d 15h 6min 44s). Updates for this repository will
> not be applied.
Slightly worrisome.
> deb http://debian.uc
During a routine update I got the error:
E: Release file for
http://debian.uchicago.edu/debian/dists/bookworm-updates/InRelease is
expired (invalid since 1d 15h 6min 44s). Updates for this repository
will not be applied.
/etc/apt/sources.lis entries are:
# deb cdrom:[Debian GNU/Linux
On 20/02/2024 14:48, Erwan David wrote:
Le 20/02/2024 à 03:20, Max Nikulin a écrit :
busctl get-property \
org.freedesktop.NetworkManager \
/org/freedesktop/NetworkManager \
org.freedesktop.NetworkManager Metered
It would also require to configure NetworkManager to set this correctly.
E
On 20/02/2024 19:44, Greg Wooledge wrote:
1) This apt-daily.timer stuff is quite complex and difficult to discover
and understand.
I am sorry that I confused enough people by my statements. I believed
that by default this timer runs "apt update" every day while upgrades
are n
Hello,
On Tue, Feb 20, 2024 at 07:44:55AM -0500, Greg Wooledge wrote:
>This thing has no configuration file by default; you have to read the
>comments in the software itself to figure out what it does.
Or, say, the Debian Administrator's Handbook.
https://www.debian.org/doc/manuals/debia
On Tue, Feb 20, 2024 at 07:44:55AM -0500, Greg Wooledge wrote:
[...]
> For me, it's a combination of two things:
>
> 1) This apt-daily.timer stuff is quite complex and difficult to discover
>and understand [...]
I gather this from the thread, yes. I just checked, and the scripts
come with a
day
* apt-daily.service has Description=Daily apt download activities
* apt-daily.service runs "/usr/lib/apt/apt-helper wait-online"
and then "/usr/lib/apt/apt.systemd.daily update"
If the end user doesn't actually read through this 538 line shell
Le 20/02/2024 à 12:46, Andy Smith a écrit :
Hi,
On Tue, Feb 20, 2024 at 08:52:09AM +0100, Erwan David wrote:
I use KDE, and I do not know wether discover does an update by itself. I do
not thind any setting about this
I think it is very likely that KDE has an equivalent to GNOME, which
does
Hi,
On Tue, Feb 20, 2024 at 08:52:09AM +0100, Erwan David wrote:
> I use KDE, and I do not know wether discover does an update by itself. I do
> not thind any setting about this
I think it is very likely that KDE has an equivalent to GNOME, which
does the equivalent of "apt update&quo
Hi,
On Tue, Feb 20, 2024 at 10:17:17AM +0100, Michael wrote:
> i very much dislike the fact that my systems do things i am not aware of.
I think one of the purposes of a Linux distribution is to pull
together a collection of disparate software of their choosing and
make default decisions for thei
On Tuesday, February 20, 2024 5:23:35 AM CET, Greg Wooledge wrote:
I'm not sure how to interpret this combination of things. Do these
default settings mean "the update/upgrade script will run, but it won't
actually do anything"?
kind of...
lines 354-360 (on bookworm) of s
you using?
GNOME will download updates and prompt you to install. To disable this open
"GNOME software",m burger menu, "Update Preferences".
The default behaviour of GNOME Software is to only download upgrades when on an
unmetered connection so if you are using GNOME and this is
Le 20/02/2024 à 03:20, Max Nikulin a écrit :
On 20/02/2024 02:35, Erwan David wrote:
Le 19/02/2024 à 18:00, Max Nikulin a écrit :
systemctl disable --now apt-daily.timer apt-daily-upgrade.timer
Perhaps it is possible to write a script that will respect
connection.metered property set by N
; Why are you shocked by this? Most of it is disabled by default (no
> update / upgrade / unattended-upgrade). You have to set things like
> APT::Periodic::Update-Package-Lists to 1.
>
> It's been there since Debian 9 (stretch) IIRC.
>
> The handbook has stuff about it.
>
Hi,
On Mon, Feb 19, 2024 at 10:21:24PM -0500, Greg Wooledge wrote:
> Does anyone know when these things changed, and why on earth nobody
> knew about it?! Did I miss a section in the release notes or something?
Why are you shocked by this? Most of it is disabled by default (no
update / u
On Tue, Feb 20, 2024 at 09:20:11AM +0700, Max Nikulin wrote:
> > > systemctl disable --now apt-daily.timer apt-daily-upgrade.timer
> To avoid confusion, these timers are from the apt package, not from
> unattended-upgrades. So they are active on most Debian hosts.
Holy crap... when did this h
On 20/02/2024 02:35, Erwan David wrote:
Le 19/02/2024 à 18:00, Max Nikulin a écrit :
systemctl disable --now apt-daily.timer apt-daily-upgrade.timer
Perhaps it is possible to write a script that will respect
connection.metered property set by NetworkManager.
I disable the timers, thanks
prompt you to install. To disable this open
"GNOME software",m burger menu, "Update Preferences".
The default behaviour of GNOME Software is to only download upgrades when on an
unmetered connection so if you are using GNOME and this is what is happening,
then as Max says
Le 19/02/2024 à 18:00, Max Nikulin a écrit :
On 19/02/2024 14:35, Erwan David wrote:
After each boot, the equivalent of apt update is automatically done
in background, through policykit (apt database is locked by
policykitd). So I think there is a timer triggroing this. I'd like to
di
On 19/02/2024 14:35, Erwan David wrote:
After each boot, the equivalent of apt update is automatically done in
background, through policykit (apt database is locked by policykitd). So
I think there is a timer triggroing this. I'd like to disable this when
my laptop is on expensive lin
Erwan David writes:
> Hello,
>
> After each boot, the equivalent of apt update is automatically done in
> background, through policykit (apt database is locked by
> policykitd). So I think there is a timer triggroing this. I'd like to
> disable this when my laptop is o
Hello,
After each boot, the equivalent of apt update is automatically done in
background, through policykit (apt database is locked by policykitd). So
I think there is a timer triggroing this. I'd like to disable this when
my laptop is on expensive link (eg 4G link, or abroad). So I'
; context? Or is that irrelevant?
>
> A relatively simple, js-based web page I meant to say.
Ah. A browser trying to render some thing from "out there". I see.
> >> have searched and found out is that I will have to un/repack initramfs
> >> ..., but I haven'
On 2/16/24, to...@tuxteam.de wrote:
> On Fri, Feb 16, 2024 at 01:44:22PM -0600, Albretch Mueller wrote:
>> I've got a relatively old laptop with an ATI Radeon HD card, which
>> firmware I can't update. Wild pixelations happen even on relatively
>> simple pages no
Hi,
Albretch Mueller wrote:
> > How can you update the initramfs on read-only media?
to...@tuxteam.de wrote:
> You can't. Initramfs resides in the boot medium. To update it,
> you have to write to said medium.
One will have to create a new read-only medium.
In case the ori
On 2024-02-16 at 14:44, Albretch Mueller wrote:
> I've got a relatively old laptop with an ATI Radeon HD card, which
> firmware I can't update. Wild pixelations happen even on relatively
> simple pages not just videos. It seems to be a common problem. What I
> have searched
On Fri, Feb 16, 2024 at 01:44:22PM -0600, Albretch Mueller wrote:
> I've got a relatively old laptop with an ATI Radeon HD card, which
> firmware I can't update. Wild pixelations happen even on relatively
> simple pages not just videos. It seems to be a common problem. What I
I've got a relatively old laptop with an ATI Radeon HD card, which
firmware I can't update. Wild pixelations happen even on relatively
simple pages not just videos. It seems to be a common problem. What I
have searched and found out is that I will have to un/repack initramfs
..., but
On Sat, Feb 10, 2024 at 01:21:55PM +, Schwibinger Michael wrote:
> Yes.
>
>
> I found out
> I do use an old kernel.
>
> Can LINUX update a kernel?
>
Hi Sophie,
Yes, of course. As root/sudo user, apt-get update ; apt-get dist-upgrade
But you still don't giv
Tixy wrote:
> On Thu, 2024-01-18 at 12:06 -0600, John Hasler wrote:
> > Tixy writes:
> > > Where could your machine be getting this IP address from? It's
> > > the same IP address shown in your output when you used the
> > > incorrect address 'ftp.security.debian.org' and for me that
> > > does
The following sources.list which I copied from
wiki.debian.org/SourcesList works perfectly for me
deb http://deb.debian.org/debian/ bookworm main non-free-firmware
contrib non-free
deb-src http://deb.debian.org/debian/ bookworm main non-free-firmware
contrib non-free
deb http://deb.debian.
On Thu, Jan 18, 2024 at 10:59:48AM -0600, John Hasler wrote:
> Host gives me the same result. However, apt says:
>
> 0% [Connecting to security-debian.org (57.128.81.193)]
security-debian.org and security.debian.org are different names.
On Thu, 2024-01-18 at 18:51 +, Tixy wrote:
> > On Thu, 2024-01-18 at 18:16 +, Tixy wrote:
> > > > On Thu, 2024-01-18 at 12:06 -0600, John Hasler wrote:
> > > > > > Tixy writes:
> > > > > > > > Where could your machine be getting this IP address from? It's
> > > > > > > > the
> > > > > > >
On Thu, 2024-01-18 at 18:16 +, Tixy wrote:
> On Thu, 2024-01-18 at 12:06 -0600, John Hasler wrote:
> > Tixy writes:
> > > Where could your machine be getting this IP address from? It's the
> > > same IP address shown in your output when you used the incorrect
> > > address 'ftp.security.debian
On Thu, 2024-01-18 at 12:06 -0600, John Hasler wrote:
> Tixy writes:
> > Where could your machine be getting this IP address from? It's the
> > same IP address shown in your output when you used the incorrect
> > address 'ftp.security.debian.org' and for me that doesn't resolve to
> > any IP addre
Tixy writes:
> Where could your machine be getting this IP address from? It's the
> same IP address shown in your output when you used the incorrect
> address 'ftp.security.debian.org' and for me that doesn't resolve to
> any IP address.
>From here both security.debian.org and ftp.security.debian
.
> >
> > There are other lines that also work, but you can't just guess randomly
> > until you stumble across one. Read a trusted source, and copy what
> > they tell you to use. Don't put "ftp." in front of things that don't
> > need it.
>
Host gives me the same result. However, apt says:
0% [Connecting to security-debian.org (57.128.81.193)]
and times out.
Using "nameserver 8.8.8.8" changes nothing.
--
John Hasler
j...@sugarbit.com
Elmwood, WI USA
Thomas George wrote:
> I typed the above line exactly. apt-get update searches for
> security.debian.org:80 [57.128.81.193] and times out, no connection
Gene writes:
> And that is not the address I get from here
It's the one I get from here, and it times out. My DNS is working.
-
-get update
The result was bookworm InRelease, bookworm-updates InRelease,
bookworm-secutity Relesse 404 Not Found [IP: 146.75.30.132 80]
Reading package lists Done
bookwoom-security Release does not have a Release file.
How do I fix this?
On 1/17/24 22:54, Todd Zullinger wrote:
Greg Wooledge wrote:
On Wed, Jan 17, 2024 at 08:40:58PM -0500, Thomas George wrote:
deb http://ftp.security-debian.org/debian-security/ bookworm-security main
non-free non-free-firmware
Stop guessing, and *read* what you were told to use.
https://list
On Thu, Jan 18, 2024 at 10:59:34AM -0500, gene heskett wrote:
> And that is not the address I get from here
> ping -c1 security.debian.org
> PING security.debian.org (151.101.2.132) 56(84) bytes of data.
> 64 bytes from 151.101.2.132 (151.101.2.132): icmp_seq=1 ttl=59 time=15.8 ms
>
> Your dns isn
trusted source, and copy what
they tell you to use. Don't put "ftp." in front of things that don't
need it.
I typed the above line exactly. apt-get update searches for
security.debian.org:80 [57.128.81.193] and times out, no connection
.
And that is not the address I get fro
trusted source, and copy what
they tell you to use. Don't put "ftp." in front of things that don't
need it.
I typed the above line exactly. apt-get update searches for
security.debian.org:80 [57.128.81.193] and times out, no connection
But, but it Just Works here.
.
Cheer
tell you to use. Don't put "ftp." in front of things that don't
need it.
I typed the above line exactly. apt-get update searches for
security.debian.org:80 [57.128.81.193] and times out, no connection
debian.org/debian-security/ bookworm-security
main non-free non-free-firmware
None have worked perfectly, apt-get update gives this
root@Phoenix:/etc/apt# apt-get update
Hit:1 http://ftp.debian.org/debian bookworm InRelease
Hit:2 http://ftp.debian.org/debian bookworm-updates InRelease
H
1 - 100 of 2827 matches
Mail list logo