Re: Pb avec entrée de menu

2003-08-21 Thread Christian Perrier
Quoting Josselin Mouette ([EMAIL PROTECTED]):

 Par contre je me permets d'émettre des doutes quant à l'utilisation de
 /usr/bin/www-browser. Si c'est un navigateur texte, vu que tu ne
 requiers pas de terminal, ça ne marchera pas. Utiliser x-www-browser
 serait peut-être plus approprié, mais c'est une dépendance un peu lourde
 si le logiciel doit être installé sur un serveur.

Bin si, ça marche. Si je ne mets pas l'argument, ça marche très
bien.. :-)

Le pb n'est pas le programme mais le fait que je ne puisse pas passer 
d'argument

Or certaines entrées de menus utilisent bien des arguments

Je sèche un peu... :-()




Re: lancement d'un daemon lors d'un upgrade

2003-08-21 Thread Christian Perrier
Quoting Raphael Hertzog ([EMAIL PROTECTED]):

 Et tu n'es pas le seul. C'est pour cela qu'on a inventé invoke-rc.d,
 cf sa page de manuel.

Si je la comprends bien, invoke-rc.d regarde dans quel runlevel on
est et n'exécute l'action start que si le lancement du processus est
prévu dans ce runlevel là

Par contre la page de manuel n'est pas bien claire sur le critère
utilisé pour vérifier qu'un processus se lance ou pas. invoke-rc.d se
contente-t-il de vérifier l'existence de /etc/rcX.d/Snntoto ou bien
vérifie-t-il aussi que celui-ci est un lien sur /etc/init.d/toto ?

Pour ma part, mes petits bricolages perso ont fait au fil du temps que
pour les processus que je ne veux PAS démarrer, le laisse le
/etc/rcX.d/Snntoto mais le fais pointer sur /etc/init.d/nop, un script
vide à moi.

Il faut que je me pense sur invoke-rc.dà mon avis mes noperies
ne servent plus à rien.. :-)




Re: cles de non DD dans debian: Tout seul sur devel :)

2003-08-21 Thread Christian Perrier
Quoting Martin Quinson ([EMAIL PROTECTED]):
 Hello,
 
 J'ai fini par craquer entre deux seances de recheche bibliographique comme
 je les aime, j'ai fait un ptit mail sur devel pour demander pourquoi on
 pourrait pas avoir les cles des non DD sur les serveurs debian. 
 
 Et je me sens un peu tout seul, la. Vous avez rien a dire et je suis le seul
 a avoir cette lubie ?

Bin je pense qu'il va falloir que tu contres l'argument simple : why
not use the public key servers ?

Pour l'instant, je n'ai pas trouvé de contre-argument
passionnant.. :-)

Je sais bien que, pour toi, ce n'est qu'une étape dans une meilleure
reconnaissance du statut de contributeur, mais il va falloir trouver
autre chose que les clés GPG, j'en ai peur





Re: .*_hppa.changes ACCEPTED, sans mon intervention ?

2003-08-21 Thread Sven Luther
On Thu, Aug 21, 2003 at 08:28:58AM +0200, Ludovic Rousseau wrote:
 Bonjour,
 
 Je viens de recevoir :
 
   From [EMAIL PROTECTED] Thu Aug 21 07:52:15 2003
   Return-path: [EMAIL PROTECTED]
   [...]
   Received: (qmail 6583 invoked from network); 20 Aug 2003 22:53:02 -
   Received: from auric.debian.org (206.246.226.45)
 by mrelay4-1.free.fr with SMTP; 20 Aug 2003 22:53:02 -
   Received: from katie by auric.debian.org with local (Exim 3.35 1 (Debian))
   id 19pbjM-0001hW-00; Wed, 20 Aug 2003 18:47:04 -0400
   From: Debian Installer [EMAIL PROTECTED]
   To: Ludovic Rousseau [EMAIL PROTECTED]
   X-Katie: $Revision: 1.35 $
   Precedence: bulk
   Subject: pilot-link_0.11.8-3_hppa.changes ACCEPTED
   Message-Id: [EMAIL PROTECTED]
   Sender: Archive Administrator [EMAIL PROTECTED]
   Date: Wed, 20 Aug 2003 18:47:04 -0400
   Lines: 19
   
   
   Accepted:
   libpda-pilot-perl_0.11.8-3_hppa.deb
 to pool/main/p/pilot-link/libpda-pilot-perl_0.11.8-3_hppa.deb
   libpisock++0_0.11.8-3_hppa.deb
 to pool/main/p/pilot-link/libpisock++0_0.11.8-3_hppa.deb
   libpisock-dev_0.11.8-3_hppa.deb
 to pool/main/p/pilot-link/libpisock-dev_0.11.8-3_hppa.deb
   libpisock8_0.11.8-3_hppa.deb
 to pool/main/p/pilot-link/libpisock8_0.11.8-3_hppa.deb
   libpisync0_0.11.8-3_hppa.deb
 to pool/main/p/pilot-link/libpisync0_0.11.8-3_hppa.deb
   pilot-link_0.11.8-3_hppa.deb
 to pool/main/p/pilot-link/pilot-link_0.11.8-3_hppa.deb
   python-pisock_0.11.8-3_hppa.deb
 to pool/main/p/pilot-link/python-pisock_0.11.8-3_hppa.deb
   
   
   Thank you for your contribution to Debian.
 
 C'est quoi ? Je ne fais des upload que pour i386.
 
 C'est un autobuilder qui cause ? C'est étrange puisque le paquet a été
 recompilé pour hppa le 14 août à 20:34 [1] et le mail date du 20 août.

Tu remarquera que l'upload des autobuildersse fait de maniere manuelle,
eventuellement un certain temps apres le build reel. C'est surement ce
qui c'est passe ici. Je sais pas pourquoi tu a recu le mail
cependant.

Amicalement,

Sven Luther




Re: Pb avec entrée de menu

2003-08-21 Thread Christian Perrier
Quoting Eric Heintzmann ([EMAIL PROTECTED]):

 Soyons precis :
 
 command=/bin/sh -c \/usr/bin/www-browser http://localhost:2317\;

Ce qui est précisément ce que j'ai fait et :

Argument invalide : « /usr/bin/www-browser http://localhost:2317 »

Irritant, non ?





Re: .*_hppa.changes ACCEPTED, sans mon intervention ?

2003-08-21 Thread Raphael Hertzog
Le Thu, Aug 21, 2003 at 08:36:23AM +0200, Sven Luther écrivait:
  C'est quoi ? Je ne fais des upload que pour i386.

Un upload d'une compilation pour hppa (il n'y a pas de sources
mentionnées dans l'upload).

  C'est un autobuilder qui cause ? C'est étrange puisque le paquet a été
  recompilé pour hppa le 14 août à 20:34 [1] et le mail date du 20 août.

La compilation est automatique mais la signature ne l'est pas puisqu'il
faut la passphrase ... donc les recomils s'accumulent et à un moment, le
porteur uploade tout en même temps.

 eventuellement un certain temps apres le build reel. C'est surement ce
 qui c'est passe ici. Je sais pas pourquoi tu a recu le mail
 cependant.

Parce qu'il a sûrement mal utilisé dpkg-buildpackage ou debsign.
L'option -e et -m sont similaires mais selon que l'on utilise l'une ou
l'autre on change le champ Maintainer dans le .changes ou pas. Et
donc le mail va à l'adresse de l'uploader ou du vrai mainteneur.

A+
-- 
Raphaël Hertzog -+- http://www.ouaza.com
Formation Linux et logiciel libre : http://www.logidee.com
Earn money with free software: http://www.geniustrader.org




Re: Signature de cle en Alsace (was: Re: Bug#198987: Is something planned for this bug?)

2003-08-21 Thread Sven Luther
On Tue, Aug 19, 2003 at 04:41:38PM +0200, Christian Perrier wrote:
 Quoting Philipp Kern ([EMAIL PROTECTED]):
  On Tue, 2003-08-19 at 15:33, Christian Perrier wrote:
  {snip}
  
  At least I'm not added as looking for keysigning.
  If that helps.
  I guess somebody listed from Haut Rhin would be the nearest to me.
 
 Cyrille Chépélov [EMAIL PROTECTED] is listed in Haut-Rhin
 
 
 I'm pretty sure there are other french developers in Strasbourg. 
 
 Let's ask french DD's.Les gars, quelqu'un pourrait signer la clé
 de Philipp Kern dont j'ai sponsorisé le travail sur mydns
 (précédemment géré par Igor Genibel puis repris par un mainteneur
 plutôt fantôme maintenant) ?

Ok, c'est bon je viens de signer sa cle. 

Amicalement,

Sven Luther




Re: Pb avec entrée de menu

2003-08-21 Thread Eric Heintzmann
Christian Perrier wrote:
 Quoting Eric Heintzmann ([EMAIL PROTECTED]):


Soyons precis :

command=/bin/sh -c \/usr/bin/www-browser http://localhost:2317\;


 Ce qui est précisément ce que j'ai fait et :

 Argument invalide : « /usr/bin/www-browser http://localhost:2317 »

 Irritant, non ?



Etrange, chez moi ce genre de commande passe tres bien dans le menus 
sous WindowMaker.
Avec quel menu as tu essayé ( GNOME,KDE, WindowMaker ... ?)




Re: Debian Birthday in Netcraft

2003-08-21 Thread Christian Perrier
Quoting Christian Surchi ([EMAIL PROTECTED]):
 From Netcraft newsletter and web site:
 
 Debian Linux distribution 10 years old today
 
 http://news.netcraft.com/archives/2003/08/16/debian_linux_distribution_10_years_old_today.html
 
 I'm not so sure about the value of their Debian geographical
 distribution, maybe... :-)

Wow.According to this chart, about a third of hosts running Debian
are in France.. :-)

For sure, several major web hosting and Internet Access Providers run
Debian hosts for their key servers herebut I  think this graph is
somewhat wrong anyway..

I like having a significant following in the former Iron Curtain
countries. So the two major former Iron Curtain countries seem to
be France and Germany.. :-)




Re: Debian Birthday in Netcraft

2003-08-21 Thread Gunnar Wolf
Christian Perrier dijo [Thu, Aug 21, 2003 at 01:36:02PM +0200]:
 Wow.According to this chart, about a third of hosts running Debian
 are in France.. :-)
 
 For sure, several major web hosting and Internet Access Providers run
 Debian hosts for their key servers herebut I  think this graph is
 somewhat wrong anyway..
 
 I like having a significant following in the former Iron Curtain
 countries. So the two major former Iron Curtain countries seem to
 be France and Germany.. :-)

Isn't Netcraft CCCP-based? If so, I think it is right - The 'former Iron
Curtain' countries (if I understand correctly, meaning 'the countries
that were behind te Iron Curtain' include Germany(west), France, USA,
UK and the Netherlands :-)

-- 
Gunnar Wolf - [EMAIL PROTECTED] - (+52-55)5630-9700 ext. 1366
PGP key 1024D/8BB527AF 2001-10-23
Fingerprint: 0C79 D2D1 2C4E 9CE4 5973  F800 D80E F35A 8BB5 27AF




stack protection

2003-08-21 Thread Russell Coker
Who is interested in stack protection?

I think it would be good to have some experiments of stack protected packages 
for Debian.  Probably the best way to do this would be to start with 
ssh-stack and sysklogd-stack being uploaded to experimental.  I don't have 
time to do this, but I would like to help test it.

Also is there any interest in uploading a kernel-image package with the grsec 
PaX support built in?

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page




Simplicity Pattern Co. AutoReply

2003-08-21 Thread Simplicity_AutoReply
Hello,

Thank you for contacting Simplicity Pattern Co.

This Auto-Reply message is being sent to you as a convenience to let you
know that we have received your email message.  We will attempt to reply to
your email as quickly as possible. 

EXTREMELY IMPORTANT WARNING:  We DO NOT send out any spam mail or mass email
mailings.  If you have received spam email from SimpliCity please
understand that this is not from us.  We regret the inconvenience and are
attempting to find a solution to this problem.

Please note that our Consumer Relations Department Summer hours are Monday
through Thursday 7:30 am to 4:45pm, and Friday 7:30 am to 12:00 pm.  Our
current waiting period for a reply is approximately 3-5 days.

DO NOT REPLY to this message or send email to the address in the FROM field
of this email.  This email is generated by an email address that is NOT
monitored.

All correspondence must go to:  [EMAIL PROTECTED]

Thank you for being a Simplicity Pattern Co. customer!

Consumer Relations Dept.
Simplicity Pattern Co.
http://www.simplicity.com




Re: Binaryless uploads

2003-08-21 Thread Jaldhar H. Vyas
On Wed, 20 Aug 2003, Manoj Srivastava wrote:

   Since the source goes into Debian main, keeping the sources
  together means that we are distributing non-free material in Debian
  main, which not only violates the social contract, it may well be
  illegal (or have people who distribute debnian CD's indulge in
  illegal activity), depending on how non free the non free bits are.

   This needs be corrected ASAP, and a bug needs be filed on
  ftp.debian.org to have the old sources, containing the non-fee bits,
  be removed from main.


Just to clarify, the current webmin.orig.tar.gz has the source to the
non-free modules but binary packages are not built from them.

-- 
Jaldhar H. Vyas [EMAIL PROTECTED]
La Salle Debain - http://www.braincells.com/debian/




Re: non-DD contributors and the debian keyring

2003-08-21 Thread Peter van Rossum
On Wed, Aug 20, 2003 at 11:29:52PM +0200, Martin Quinson wrote:
 But the point is that without the key, anyone can forge mails which seem to
 come from me, and thus abuse the trust my work gained me in the mind of some
 DDs.
 
 I see this point as necessary even if not sufficient.

Ok, a valid key gives trust that your work is really made by you. But what
this key needs is signatures from trusted people (e.g. from other Debian
developers) and for that it doesn't have to be in Debian's keyring at all.

Just send the people you work with your public key with its signatures
- you don't even have to go via any keyserver at all.

Cheers, Peter
-- 
Peter van Rossum, [EMAIL PROTECTED]   |  Universal law of linearity: for all
Dept. of Mathematics, New Mexico   |   f : R - R and for all x, y in R:
State University, Las Cruces, NM, USA. |f(x + y) = f(x) + f(y)




Re: python 2.2 - python 2.3 transition

2003-08-21 Thread Anthony Towns
On Thu, Aug 21, 2003 at 12:34:12PM +1000, Donovan Baarda wrote:
 On Wed, 2003-08-20 at 15:49, Anthony Towns wrote:
  On Tue, Aug 19, 2003 at 11:44:22PM -0400, Derrick 'dman' Hudson wrote:
   The negative effect for the users is that you can't upgrade python
   while wxgtk-python is installed so you can't try out the
   latest-and-greatest python in the meantime.  This is the issue at
   hand.
  Sure you can:
  $ sudo apt-get install python2.3
  The dependency stuff merely notes that upgrading python without also
  upgrading wxgtk-python may break stuff.
 actually, if the dependencies are right, you cannot upgrade to python
 (2.3) without also upgrading to wxgtk-python (2.3) or de-installing
 wxgtk-python (2.2).

Sure you can. dpkg --force-depends -i python_*.deb will do it for you.

If you want something bad enough, and don't mind breaking things, anything's
possible.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

   ``Is this some kind of psych test?
  Am I getting paid for this?''


pgphsIYHZSBPS.pgp
Description: PGP signature


Your message to Consume-thenet awaits moderator approval

2003-08-21 Thread consume-thenet-bounces
Your mail to 'Consume-thenet' with the subject

Re: Your application

Is being held until the list moderator can review it for approval.

The reason it is being held:

Post by non-member to a members-only list

Either the message will get posted to the list, or you will receive
notification of the moderator's decision.  If you would like to cancel
this posting, please visit the following URL:


http://lists.consume.net/mailman/confirm/consume-thenet/1326fd42b88c751ef5720aed4caa3701f0758946




Your message to Consume-thenet awaits moderator approval

2003-08-21 Thread consume-thenet-bounces
Your mail to 'Consume-thenet' with the subject

Re: That movie

Is being held until the list moderator can review it for approval.

The reason it is being held:

Post by non-member to a members-only list

Either the message will get posted to the list, or you will receive
notification of the moderator's decision.  If you would like to cancel
this posting, please visit the following URL:


http://lists.consume.net/mailman/confirm/consume-thenet/335f39b2d10f305cff9f45f36599cdb9c1a02240




ALERT: You may have sent a Virus

2003-08-21 Thread JARING E-Mail Virus Scanner

Dear debian-devel@lists.debian.org,

JARING E-Mail Virus Scanner has detected virus(es) in your e-mail attachment(s)

Original Date: Aug 21 12:57:10
Original Sender: debian-devel@lists.debian.org
Original To: [EMAIL PROTECTED]
Original Subject: Undeliverable: ALERT: You may have sent a Virus 


Virus info:-

Attachname: h7L4v5mM00470 was infected with [EMAIL PROTECTED], 
and deleted


Thank you,

JARING E-Mail Virus Scanner ( http://www.jaring.my )




Re: stack protection

2003-08-21 Thread Brian May
On Thu, Aug 21, 2003 at 12:57:06PM +1000, Russell Coker wrote:
 Who is interested in stack protection?
 
 I think it would be good to have some experiments of stack protected packages 
 for Debian.  Probably the best way to do this would be to start with 
 ssh-stack and sysklogd-stack being uploaded to experimental.  I don't have 
 time to do this, but I would like to help test it.

What stack protection are you talking about here?

Any references?
-- 
Brian May [EMAIL PROTECTED]




Re: ftp.gnu.org cracked

2003-08-21 Thread Peter Karlsson
Scott James Remnant:
If you read the script,
I did, but I couldn't figure out what was the input.
The only MD5 sums that GNU have provided are for 2.4, 2.4.1 and 2.4.2
Right. I sent them an update mail earlier this week, but I guess they're 
quite busy at the moment...

--
\\//
Peter - http://www.softwolves.pp.se/
 I do not read or respond to mail with HTML attachments.



Re: Bits from the RM

2003-08-21 Thread Bruce Sass
On Wed, 20 Aug 2003, Colin Watson wrote:
 On Wed, Aug 20, 2003 at 11:18:24AM -0600, Bruce Sass wrote:
  On Wed, 20 Aug 2003, cobaco wrote:
   I'd agree if there had been a rewrite of kdelibs or something, but
   kde 3.1 - 3.2 is evolutionary without big changes to what was
   already there.
 
  It does not take a big change to break software...
  e.g., openssh changed a message and the sftp kioslave broke
  http://bugs.kde.org/show_bug.cgi?id=51359

 Not that I disagree with you, but frankly, the sftp kioslave was already
 broken. It should never have been written to depend on 'ssh -v' output.

Ya, and it didn't manifest until a minor release of ssh or a patch
release of KDE came along.  ;-)


- Bruce




Re: stack protection

2003-08-21 Thread Russell Coker
On Thu, 21 Aug 2003 14:56, Brian May wrote:
 On Thu, Aug 21, 2003 at 12:57:06PM +1000, Russell Coker wrote:
  Who is interested in stack protection?
 
  I think it would be good to have some experiments of stack protected
  packages for Debian.  Probably the best way to do this would be to start
  with ssh-stack and sysklogd-stack being uploaded to experimental.  I
  don't have time to do this, but I would like to help test it.

 What stack protection are you talking about here?

 Any references?

Propolice sounds good:
http://www.trl.ibm.com/projects/security/ssp/

From the GCC changelog:
   * Add the stack protector patch, but don't apply it by default. Edit
 debian/rules.patch to apply it (closes: #171699, #189494).

It sounds like we need a propolice enabled GCC.


There are other stack protection mechanisms too, but propolice seems the most 
popular.  Some investigation would need to be done into the relative merits 
of the various options (propolice has much better support apparently which 
will be a major factor).

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page




Re: Proposal: make kernel install easier

2003-08-21 Thread Manoj Srivastava
On Wed, 20 Aug 2003 19:00:54 -0600, Jamin W Collins [EMAIL PROTECTED] said: 

 On Wed, 2003-08-20 at 14:46, Manoj Srivastava wrote:
 On 20 Aug 2003 10:51:54 -0400, Adam C Powell IV said:
 
  Greetings, Installing a new kernel package can be a bit of a
  pain, especially for newbies, what with hand-editing lilo.conf or
  config

 Why on earth are you hand editing the lilo.conf file for every
 kernel image?

 Well, if they move from an installation kernel to a kernel-image
 package, they have to add an entry for an initrd file.  After that,
 if they upgrade to another kernel-image package and want to be able
 to use both the new and the old they need to edit the old entry for
 an initrd too.


If you are going to bounce back and forth between initrd and
 non initrd kernels, you should modify the sample postinst-hook script
 and maintain two sets of symlinks -- one for initrd ekrnels, and one
 for plain ones. Bingo. No need to edit the lilo.conf every time. 


manoj
-- 
pediddel: A car with only one working headlight. Sniglets, Rich Hall
 Friends
Manoj Srivastava   [EMAIL PROTECTED]  http://www.debian.org/%7Esrivasta/
1024R/C7261095 print CB D9 F4 12 68 07 E4 05  CC 2D 27 12 1D F5 E8 6E
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C




Re: Binaryless uploads

2003-08-21 Thread Manoj Srivastava
On Wed, 20 Aug 2003 23:40:18 -0400 (EDT), Jaldhar H Vyas [EMAIL PROTECTED] 
said: 

 On Wed, 20 Aug 2003, Manoj Srivastava wrote:
 Since the source goes into Debian main, keeping the sources
 together means that we are distributing non-free material in Debian
 main, which not only violates the social contract, it may well be
 illegal (or have people who distribute debnian CD's indulge in
 illegal activity), depending on how non free the non free bits are.

 This needs be corrected ASAP, and a bug needs be filed on
 ftp.debian.org to have the old sources, containing the non-fee
 bits, be removed from main.


 Just to clarify, the current webmin.orig.tar.gz has the source to
 the non-free modules but binary packages are not built from them.

I got that. I don't think I care. It is not relevant. If I have:
deb-src http://ftp1.us.debian.org/debian sid main contrib 
 in my souces.list, and I do apt-get webmin-blah; and non free junk
 lands on my machine, the social contract has been violated.

You are aware that source code is part of debian, right? And
 sources in main are part of debian? Ad main should not contain
 non-free stuff, as per the social contract?

manoj
-- 
There may be said to be two classes of people in the world; those who
constantly divide the people of the world into two classes and those
who do not. Robert Benchley
Manoj Srivastava   [EMAIL PROTECTED]  http://www.debian.org/%7Esrivasta/
1024R/C7261095 print CB D9 F4 12 68 07 E4 05  CC 2D 27 12 1D F5 E8 6E
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C




Re: Does anyone use barrendero, or know of an equivalent?

2003-08-21 Thread Christian Perrier
Quoting Steve Langasek ([EMAIL PROTECTED]):
 Hello,
 
 The package barrendero is a candidate for removal from testing.  It has

I had a quick look at the BTS and it seems that the two RC bugs may be
easily fixed (one is a missing Build-Depends on debhelper, the other
an error in debian/rules for which a patch has been provided)

Even the minor bug may be easily fixed.

So, we could maybe consider a NMU (consider this volunteering for
doing the work) ?

I have absolutely no interest in this software but would just feel too
bad that it disappears whilc fixing it is easy.

Well, of course, if it is completely useless, I could revise my judgement.. :-)




Re: Bits from the RM

2003-08-21 Thread Marc Haber
On Wed, 20 Aug 2003 15:16:05 +0200, Josef Spillner
[EMAIL PROTECTED] wrote:
- the KDE release plan might be delayed (as well...)

The sarge release plan _will_ be delayed.

Greetings
Marc

-- 
-- !! No courtesy copies, please !! -
Marc Haber  |Questions are the | Mailadresse im Header
Karlsruhe, Germany  | Beginning of Wisdom  | Fon: *49 721 966 32 15
Nordisch by Nature  | Lt. Worf, TNG Rightful Heir | Fax: *49 721 966 31 29




2003-08-21 Thread




 , , (8652) 995 
850/1/2/3/4


Re: non-DD contributors and the debian keyring

2003-08-21 Thread Andreas Metzler
Martin Quinson [EMAIL PROTECTED] wrote:
[...]
 Of course, I could (and have) uploaded my key on public servers, meaning
 that other Debian member could check than a given mail with my address
 desserve the trust they habitually give me. But those guys would have to 
 configure their email specifically on people like me[*].
[...]

Most of us won't need to change the configuration of their MUA/gpg,
having a MUA that tries to verify sigs automatically and a gnupg that
automatically fetches GPG-keys from the nearest keyserver is a pretty
standard, vanilla setup.
cu andreas




Your message to suse-s390-announce awaits moderator approval

2003-08-21 Thread suse-s390-announce-bounces
Your mail to 'suse-s390-announce' with the subject

Re: Approved

Is being held until the list moderator can review it for approval.

The reason it is being held:

Post by non-member to a members-only list

Either the message will get posted to the list, or you will receive
notification of the moderator's decision.  If you would like to cancel
this posting, please visit the following URL:


https://mailman.suse.de/mailman/confirm/suse-s390-announce/df2513aface653cee5c29cc90c28618fe2dedd95




Re: Bits from the RM

2003-08-21 Thread Anthony Towns
On Thu, Aug 21, 2003 at 08:56:31AM +0200, Marc Haber wrote:
 On Wed, 20 Aug 2003 15:16:05 +0200, Josef Spillner
 [EMAIL PROTECTED] wrote:
 - the KDE release plan might be delayed (as well...)
 The sarge release plan _will_ be delayed.

Quite confident, are we?

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

   ``Is this some kind of psych test?
  Am I getting paid for this?''




Re: stack protection

2003-08-21 Thread Xavier Roche

On Thu, 21 Aug 2003, Russell Coker wrote:
 Who is interested in stack protection?
 I think it would be good to have some experiments of stack protected packages 
 for Debian.
 Also is there any interest in uploading a kernel-image package with the grsec 
 PaX support built in?

grsec is IMHO a better idea, as it offers a global protection against
various exploit types (execution of code in stack, for example) and
related threats (restriction in /proc is really useful too, ulimit
enforcement, symlink/fifo/chroot restrictions .. )

Note that some options are sometimes incompatible with some packages:
restrictions on kmem ('Deny writing to /dev/kmem, /dev/mem, and
/dev/port') prevent lm_sensors from working properly with my server. But
with reasonnable settings grsecurity is working like a charm.

Ah, when dealing about security, it might be also a good idea to allow
more easily Debian to run with / in read-only. There was a thread in
-devel some time ago (see 'Update re: read-only root filesystem' thread
and http://panopticon.csustan.edu/thood/readonly-root.html)

A read-only / with grsecurity easily offers a good protection (even if not
absolute) [other details could be checked, like non-executable /var, and
so on.. but it depends on the system partitionning]

Major issues for a ro-/ are maybe:
- using devfs for /dev (kernel 2.4 and package devfsd installed)
- using tmpfs for /tmp (kernel 2.4?)
- transforming several /etc files as symlinks and moving them to some
other place (/var/etc ?)

I was wondering if a script-only-package could do that, with a 'Depends:
kernel-xx(2.4), devfsd' and proper install scripts? Might be difficult to
do, but maybe not impossible?
apt-get install read-only-root :)





Re: Binaryless uploads [Was: FTBFS: architecture all packages]

2003-08-21 Thread Brian May
On Wed, Aug 20, 2003 at 10:04:40AM -0400, Jaldhar H. Vyas wrote:
 Ok.  Lets leave aside for a moment the .debs which would go into contrib
 or non-free so would have to be built seperately.  What happens if
 webmin-squid has an RC bug?  As Goswin said, all the webmin-* packages
 will be held back from testing.  What happens if webmin-squid is ok but
 squid itself is not in testing?  (or is removed from testing.  This could
 happen if it has an RC bug at freeze time,)  Again all the webmin packages
 would be affected.  What if webmin-squid has one or two upstream bugfix
 releases in between major webmin versions?  Every other webmin module
 would also have to be rebuilt too even though nothing changed.
 
 What you are suggesting was the way things were done before 0.98 and it
 caused all sorts of annoyance for me and the users.  I'll make any changes
 necessary to be policy-compliant but I'm firm about the multiple-source
 package thing.

Ok, so when you said split each module into a seperate binary package.

What you really meant was:

split each module into a seperate source package.

I gather this is because otherwise webmin would not get into testing
unless each of its binary packages gets into testing, right?

Is this still an issue? 
Having lots of source files makes it less convenient to rebuild
for woody.
I am not going to argue this, now I understand your reason.

Is there any reason why webmin and webmin-core need to be seperate
source packages?

Regardless, it should still be possible to have a working
debian/rules for each source package, this just represents
a limitation in your current build script.

Ideally the build script needs to update debian/rules for each
package, or create a script that is called by debian/rules, or ...

Lots of options are available here.

As for the problem with  the source file containing non-free code,
if you have  prestine source code, this is something that
really needs to get fixed upstream :-(, eg. split into two
files.
-- 
Brian May [EMAIL PROTECTED]




Re: Binaryless uploads [Was: FTBFS: architecture all packages]

2003-08-21 Thread Brian May
On Thu, Aug 21, 2003 at 05:20:42PM +1000, Brian May wrote:
 As for the problem with  the source file containing non-free code,
 if you have  prestine source code, this is something that
 really needs to get fixed upstream :-(, eg. split into two
 files.

Looking at the other messages in the thread, webmin doesn't have
prestine upstream source, so the above isn't relevant.

I wonder now why a special build script is required at all, why not just
treat each module as a totally seperate debian source package?
-- 
Brian May [EMAIL PROTECTED]




Re: Debian Weekly News - August 19th, 2003

2003-08-21 Thread Jérôme Marant
Quoting Peter S Galbraith [EMAIL PROTECTED]:

 Jérôme Marant [EMAIL PROTECTED] wrote:
 
  Quoting Scott James Remnant [EMAIL PROTECTED]:
  
No he wouldn't. FDL is about free documentation. :-)

   Except it isn't :-)
  
  According to you :-)
 
 According to debian-legal consensus.

Is there any? John's message proves that there isn't any yet, IMO.

-- 
Jérôme Marant [EMAIL PROTECTED]




Re: stack protection

2003-08-21 Thread Russell Coker
On Thu, 21 Aug 2003 17:39, Xavier Roche wrote:
 Major issues for a ro-/ are maybe:
 - using devfs for /dev (kernel 2.4 and package devfsd installed)

Devfs is getting less support now, it might not be the best time to start 
depending on it.

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page




Norton AntiVirus failed to scan an attachment in a message you sent.

2003-08-21 Thread 10AntiVirus
Recipient of the attachment:  SEXCHANGE, RADIANT\RII, StellaHsieh()/
Subject of the message:  Re: That movie
No action was taken on the attachment.
  Attachment document_9446.pif was Logged Only for the following reasons:
Scan Engine Failure (0x80004005)




Norton AntiVirus failed to scan an attachment in a message you sent.

2003-08-21 Thread 10AntiVirus
Recipient of the attachment:  SEXCHANGE, First Storage Group\Mailbox Store 
(SEXCHANGE), mailbackup/
Subject of the message:  Re: That movie
No action was taken on the attachment.
  Attachment document_9446.pif was Logged Only for the following reasons:
Scan Engine Failure (0x80004005)




Re: Transition: new PAM config file handling in unstable

2003-08-21 Thread Marcelo E. Magallon
Hi Steve,

 thanks for the work.  A couple of questions for clarity's sake (as
 sysadmin, not packager)

On Wed, Aug 20, 2003 at 10:37:59PM -0500, Steve Langasek wrote:

  - Per-package /etc/pam.d/ configuration files should not include
explicit 'password' blocks.  Instead, services should use the builtin
libpam fallback to /etc/pam.d/other for their password changing
policy.

 Does this mean that other is read even if service exists?  From the
 docs:

There is a special service-name, reserved for defining a default
authentication mechanism. It has the name `OTHER' and may be
specified in either lower or upper case characters. Note, when
there is a module specified for a named service, the `OTHER'
entries are ignored.

 It doesn't mention password specifically, so I don't quite understand
 why password falls back to other while the other module-types need an
 extra include file (or the other way around: why doesn't password have
 an include file, too?)

  - Configuration files should be modified to no longer reference
pam_unix directly.  For auth, account, and session blocks, such
references should be replaced with these lines:
  @include common-auth
  @include common-account
  @include common-session
These @include lines are handled as literal includes by libpam, so
packages that currently use other modules besides pam_unix (or offer
commented-out examples) need only leave those surrounding module lines
intact.

 You mean something like login's use of e.g. pam_motd?  Should pam_time
 be in common-account or in login's own file?  Rationale?

-- 
Marcelo




Re: Bits from the RM

2003-08-21 Thread GOTO Masanori
At Thu, 21 Aug 2003 00:17:27 +1000,
Anthony Towns wrote:
 [1  text/plain; us-ascii (quoted-printable)]
 On Wed, Aug 20, 2003 at 08:49:33AM -0400, Matt Zimmerman wrote:
  On Tue, Aug 19, 2003 at 04:49:25PM +1000, Anthony Towns wrote:
   Also make sure to include some leg room if you depend on packages that
   have a tendency to be buggy (glibc, for example).
  The new glibc has already stalled the progress into testing of a large
  number of packages, and the number of RC bugs still seems to be going up.
  How are we going to manage to produce a release in 6 months the face of this
  obstacle?  The last time there was this sort of breakage, it took many
  months just to get glibc itself it sorted out.
 
 Yup. The difference is that this time we have a Glibc maintenance team
 that's able to work together effectively, has some experience with the
 package, and has a better understanding how important it is to get it
 fixed quickly.

AFAIK, the unresolved difficult bugs are: (1) hppa build (2) dpkg
(setjmp/longjmp) on sparc (3) NIS (will be fixed?)  (4) misterious
apache on ia64 bug.  Note that (3) becomes ok to revert patches, (4)
may be non-glibc bug.  Well, they are still something hard work. :-)

My concern is (1) hppa build.  If we can't get hppa glibc, we may need
to drop it finally...

Regards,
-- gotom




Re: Binaryless uploads [Was: FTBFS: architecture all packages]

2003-08-21 Thread Goswin von Brederlow
Jaldhar H. Vyas [EMAIL PROTECTED] writes:

 On Wed, 20 Aug 2003, Goswin von Brederlow wrote:
 
  Jaldhar H. Vyas [EMAIL PROTECTED] writes:
 
   On Wed, 20 Aug 2003, Goswin von Brederlow wrote:
  
The only problem with that is the current failure to comply to policy,
i.e. build from source as they should.
   
  
   The question remains is simply removing all the extra source from
   webmin-n.orig.tar.gz except that which is necessary to build the webmin
   binary package (i.e not any of the modules which will have their own
   source and binary packages) an aceptable solution to the problem or not?
 
  From what I read in this thread webmin-n.orig.tar.gz also contains
  some non-free sources, right?
 
 
 It has source for all the modules including the non-free ones.  However
 the binary packages for those modules are built from seperate source
 packages not this one.
 
  Then you have no choice but split it up to get the rest into main. And
  when you don't have a pristine upstream orig.tar.gz you can split it
  up as far as you like or need to.
 
 
 The only reason for having the webmin.orig.tar.gz as it is was to provide
 something approximating the upstream tarball. It sounds like I don't need
 to bother about that.

The only way you could is to have the source in non-free and you
certainly don't want that.

MfG
Goswin




Re: Debian Weekly News - August 19th, 2003

2003-08-21 Thread Dagfinn Ilmari Mannsker
Jrme Marant [EMAIL PROTECTED] writes:

 Quoting Peter S Galbraith [EMAIL PROTECTED]:

 Jrme Marant [EMAIL PROTECTED] wrote:
 
 Quoting Scott James Remnant [EMAIL PROTECTED]:
 
 No he wouldn't. FDL is about free documentation. :-)
 
 Except it isn't :-)
 
 According to you :-)
 
 According to debian-legal consensus.

 Is there any? John's message proves that there isn't any yet, IMO.

  consensus 
   n : agreement of the majority in sentiment or belief
   [syn: {general agreement}]

  unanimity
   n : everyone being of one mind


A world of difference.

-- 
ilmari




Re: Proposal: make kernel install easier

2003-08-21 Thread Goswin von Brederlow
Adam C Powell IV [EMAIL PROTECTED] writes:

 On Wed, 2003-08-20 at 15:02, Goswin von Brederlow wrote:
 Adam C Powell IV [EMAIL PROTECTED] writes:
 
  Greetings,
  
  Installing a new kernel package can be a bit of a pain, especially for
  newbies, what with hand-editing lilo.conf or config files for other
  bootloaders, from grub to yaboot/quik, aboot, palo, you name it.  Yes,
  the kernel-image postinst runs lilo, but lilo.conf is invariably out of
  date, so this is relatively useless except for upgrades.
  
  So why not (optionally) automate the process a bit?  Use a directory
  e.g. /usr/lib/bootloaders/ to put scripts for managing the .conf files
  and running the bootloaders.
 
 I believe lilo and grub already have that.
 
 From /boot/grub/menu.lst
 
 ### BEGIN AUTOMAGIC KERNELS LIST
 ## lines between the AUTOMAGIC KERNELS LIST markers will be modified
 ## by the debian update-grub script except for the default optons below
 
 There is also a mechanism in dpkg to install hooks now which is
 hopefully already used to run update-grub.
 
 Cool, did not know.  I guess a hooks mechanism would be required for
 unmodified kernel-image packages...
 
 My proposed system would add user control of menu entry names/labels,
 and finer-grained control of boot options (without editing the .conf
 files), but these don't seem worth the overhead of such a system.
 
 Is this documented somewhere, or should I just look at the latest lilo
 and grub packages to see how to adapt this to other bootloaders?  It
 would be nice if this were somewhat uniform (at least to the user)
 across loaders and architectures.

Never look at the source, just seen the comments in the config.

MfG
Goswin




Re: non-DD contributors and the debian keyring

2003-08-21 Thread Christian Perrier
Quoting Martin Quinson ([EMAIL PROTECTED]):

 Of course, the signature is not sufficient to get the needed trust. But I'm
 coordinator of the french translation team since a few years, so my skills
 should be trustable, I guess.
 
 But the point is that without the key, anyone can forge mails which seem to
 come from me, and thus abuse the trust my work gained me in the mind of some
 DDs.
 
 I see this point as necessary even if not sufficient.

Sure, this certainly is a good point. This leads this discussion
elsewhere : the main point is again not the problem of GPG keysbut
probably the status of contributors who are not DD's...(translators,
documentation writers, web maintainers)

A recent thread in debian-devel-french occurred when Patrice K.* 's
application was dropped because he does not maintain any package

As far as I can remember, this topic is periodically raised here or
therewe're maybe always beating the same dead horse.but it
seems that the horse is not suite dead.. :-)





Re: Does anyone use barrendero, or know of an equivalent?

2003-08-21 Thread Sam Hocevar
On Wed, Aug 20, 2003, Steve Langasek wrote:

 But descriptions can be deceiving.  Does anyone use this package who
 could comment on its reliability?  Does the lack of other bugs indicate
 that the software is mature and stable, or unused?

   I am trying barrendero but don't trust it enough yet for production
use. I had worked on an NMU that fixes all bugs and makes the package a
bit more polished, I just reviewed it and uploaded it here:

 http://zoy.org/~sam/debian/barrendero_1.0-1.1.diff.gz

   I haven't contacted the maintainer yet because I was working on other
bugs, but if he is MIA as you seem to be suggesting, I'll probably
upload that NMU to DELAYED quite soon.

 Does anyone know of another package that provides similar functionality?

   mail-expire is very close to it.

Cheers,
-- 
Sam.




Re: what about ip's

2003-08-21 Thread Ulrich Eckhardt
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Wednesday 20 August 2003 16:06, David Smith wrote:
 X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
 Content-Type: text/html;
[ dsmith_sig1.GIF]

people here tend to regard stuff like your mail as spam already ...

Uli
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/RIbvwVdGSYi8Mq8RAkhUAJ0RhX2bE53lUc0x0kmYeA/NbJXmoACffuJw
uiZRroGpURImW107NgWFAuE=
=z8SS
-END PGP SIGNATURE-




Automated reply

2003-08-21 Thread McCall
This is an automated response to your e-mail.

Your e-mail has been received 
by the McCall Pattern Company:
Butterick, 
McCall's and Vogue Patterns.

E-mail is answered in the order it is received. Due to the high volume of 
e-mail we receive, there may be a delay in our response. Please be patient and 
e-mail only once as multiple messages will slow down the answering process.



For the fastest service, please read the following information, and call* the 
number that pertains to your specific inquiry:
*Monday through Friday 8:45 AM to 4:45 PM Eastern Time

To purchase current or discontinued patterns, or check the status of patterns 
ordered through the magazine: (800) 255-2762 ext. 488

To check status of a Web site order: (800)255-2762 ext. 397

To Purchase current catalogs: (800) 255-2762 ext. 473

For Magazine subscriptions or change of address: (800) 255-2762 ext. 459

For Education Kits and Orders (Teachers Only): (800) 622-2557

To Purchase the Hookless Attachment System*: (800) 255-2762 ext. 397
*Qwik-Tach(tm) Tapes and Flex-On(tm) Loops


To speak to a sewing expert concerning a construction problem with one of our 
pattern: (800) 782-0323. Please have the following information ready when you 
call:
?The pattern number and the brand name (example: McCall's 1234).
?The view you are making.
?The size you are making.
?If your questions concerns fit, please have bust, waist and hip measurements 
available.










Re: non-DD contributors and the debian keyring

2003-08-21 Thread Goswin von Brederlow
Andreas Metzler [EMAIL PROTECTED] writes:

 Martin Quinson [EMAIL PROTECTED] wrote:
 [...]
  Of course, I could (and have) uploaded my key on public servers, meaning
  that other Debian member could check than a given mail with my address
  desserve the trust they habitually give me. But those guys would have to 
  configure their email specifically on people like me[*].
 [...]
 
 Most of us won't need to change the configuration of their MUA/gpg,
 having a MUA that tries to verify sigs automatically and a gnupg that
 automatically fetches GPG-keys from the nearest keyserver is a pretty
 standard, vanilla setup.
 cu andreas

And even if the fetching fails one would just ask the sender for his
key once and add that to the keyring (if its properly signed by some
trustworthy soul).

MfG
Goswin




Re: stack protection

2003-08-21 Thread Stefan Gybas
Russell Coker wrote:
It sounds like we need a propolice enabled GCC.
I have talked to Matthias Klose, one of the GCC maintainers, about this. 
He included the patch so he could built ProPolice-enables packages of 
gcc and g++ but he's currently too busy with other things. He might 
accept a patch that builds these packages but we really need to hurry if 
we want these compilers released with sarge. Maybe some of the Adamantix 
developers will help?

However, ProPolice has not been ported to all architectures yet, see 
http://www.research.ibm.com/trl/projects/security/ssp/statuschart.html 
for details.

There are other stack protection mechanisms too, but propolice seems the most 
popular.  Some investigation would need to be done into the relative merits 
of the various options (propolice has much better support apparently which 
will be a major factor).
I think ProPolice is the best choice, first because Adamantix has tested 
it for quite some time. Second, ProPolice offers the best protection 
according to 
http://www.research.ibm.com/trl/projects/security/ssp/node4.html#SECTION00045000 
and finally it even offers the best performance 
(http://www.research.ibm.com/trl/projects/security/ssp/node5.html).

IMHO innovations in Debian have been rare in the past 2 years (compared 
to other major distributions), so maybe this is a chance for Debian...

Stefan



Re: FTBFS: architecture all packages

2003-08-21 Thread Goswin von Brederlow
Adam Heath [EMAIL PROTECTED] writes:

 On Wed, 20 Aug 2003, Matthias Urlichs wrote:
 
  Why not? Just block binary uploads completely, and let everything get
  built by the buildds. I certainly plan to do that with my own uploads.
  (I've already set up my own buildds).
 
  I'd go one step farther and schedule a low-priority rebuild of everything
  that build-depends on a package which gets updated.
 
 How about this:
 
 * Maintainer does normal build, doing -all and -arch debs.  Maintainer
   uploads.
 * dak verifies upload as normal.
 * dak adds new source to unstable, but not the debs.
 * buildds then proceed to build new source.  one buildd is choosen to build
   the -all debs.

Nearly perfect.

The archive scripts might have problems with sources without debs.

I also suggest building the -all debs by multiple buildds (all but one
with low priority if you fear overworked buildds) and throw away
maybe-successfull builds automatically (by all but the primary buildd).

Doogie already said he wants to implement a smart comparator for deb
in dpkg 2.0 which would then be used to compare that different builds
of the binary-all even give the same result.


I also like the idea of rebuilding packages with newer versions of
their build-depends (or tool-chain) when a buildd is idle. That too
would require a more automatic handling of maybe-successfull builds
that won't be uploaded.

MfG
Goswin




Re: Bits from the RM

2003-08-21 Thread Marc Haber
On Thu, 21 Aug 2003 17:22:38 +1000, Anthony Towns
aj@azure.humbug.org.au wrote:
On Thu, Aug 21, 2003 at 08:56:31AM +0200, Marc Haber wrote:
 On Wed, 20 Aug 2003 15:16:05 +0200, Josef Spillner
 [EMAIL PROTECTED] wrote:
 - the KDE release plan might be delayed (as well...)
 The sarge release plan _will_ be delayed.

Quite confident, are we?

I am only realistic. When in history did a non-trivial software
product meet its release schedule?

I am surely hoping for the best, but I seriously do expect sarge to be
released in early 2004. Which is a pretty good track record if we
actually reach that.

Greetings
Marc

-- 
-- !! No courtesy copies, please !! -
Marc Haber  |Questions are the | Mailadresse im Header
Karlsruhe, Germany  | Beginning of Wisdom  | Fon: *49 721 966 32 15
Nordisch by Nature  | Lt. Worf, TNG Rightful Heir | Fax: *49 721 966 31 29




Re: stack protection

2003-08-21 Thread Goswin von Brederlow
Xavier Roche [EMAIL PROTECTED] writes:

 On Thu, 21 Aug 2003, Russell Coker wrote:
 Major issues for a ro-/ are maybe:
 - using devfs for /dev (kernel 2.4 and package devfsd installed)

Alternatively you can copy /dev to a ramdisk.
And please don't use devfsd. That somewhat cancles out half of the
merits of devfs.

You also might want to look at udev since that looks like its replaing
devfs in the future.

 - using tmpfs for /tmp (kernel 2.4?)

Or your own /tmp partition as any good admin would have made. :)

 - transforming several /etc files as symlinks and moving them to some
 other place (/var/etc ?)

Thats pending some year old patches on util-linux (for mount,
/etc/mtab) unless you want to link to /proc/mounts. Anything else is
already patched for this or has no reason to stay in /etc.

 I was wondering if a script-only-package could do that, with a 'Depends:
 kernel-xx(2.4), devfsd' and proper install scripts? Might be difficult to
 do, but maybe not impossible?
 apt-get install read-only-root :)

Didn't someone package something up that will divert and link some
files already?

MfG
Goswin




Re: Debian Weekly News - August 19th, 2003

2003-08-21 Thread Jérôme Marant
Quoting Jamin W. Collins [EMAIL PROTECTED]:

 This has been covered to death already.  There are a sufficient number
 of respondents that see it as non-free.  The RM's recent post indicates
 that possibly the FSF has even come around to the idea that their
 license is less than Free.  Can we please move along now?

Just don't read the thread.

-- 
Jérôme Marant




Re: python 2.2 - python 2.3 transition

2003-08-21 Thread David Weinehall
On Thu, Aug 21, 2003 at 01:37:10PM +1000, Anthony Towns wrote:
 On Thu, Aug 21, 2003 at 12:34:12PM +1000, Donovan Baarda wrote:
  On Wed, 2003-08-20 at 15:49, Anthony Towns wrote:
   On Tue, Aug 19, 2003 at 11:44:22PM -0400, Derrick 'dman' Hudson wrote:
The negative effect for the users is that you can't upgrade python
while wxgtk-python is installed so you can't try out the
latest-and-greatest python in the meantime.  This is the issue at
hand.
   Sure you can:
 $ sudo apt-get install python2.3
   The dependency stuff merely notes that upgrading python without also
   upgrading wxgtk-python may break stuff.
  actually, if the dependencies are right, you cannot upgrade to python
  (2.3) without also upgrading to wxgtk-python (2.3) or de-installing
  wxgtk-python (2.2).
 
 Sure you can. dpkg --force-depends -i python_*.deb will do it for you.
 
 If you want something bad enough, and don't mind breaking things, anything's
 possible.

Please, don't turn Debian into Red Hat ;-)


Regards: David Weinehall
-- 
 /) David Weinehall [EMAIL PROTECTED] /) Northern lights wander  (\
//  Maintainer of the v2.0 kernel   //  Dance across the winter sky //
\)  http://www.acc.umu.se/~tao/(/   Full colour fire   (/




Re: Bits from the RM

2003-08-21 Thread Sebastian Ley
* GOTO Masanori wrote:

 AFAIK, the unresolved difficult bugs are: (1) hppa build (2) dpkg
 (setjmp/longjmp) on sparc (3) NIS (will be fixed?)  (4) misterious
 apache on ia64 bug.  Note that (3) becomes ok to revert patches, (4)
 may be non-glibc bug.  Well, they are still something hard work. :-)

(5) Breakage of all d-i boot images created in an environment with new
libc. Seems to be related to libc6-pic and mklibs, bug will be filed
against libc6-pic.

Sebastian

-- 
PGP-Key: http://www.mmweg.rwth-aachen.de/~sebastian.ley/public.key
Fingerprint: A46A 753F AEDC 2C01 BE6E  F6DB 97E0 3309 9FD6 E3E6




Re: stack protection

2003-08-21 Thread Miles Bader
Russell Coker [EMAIL PROTECTED] writes:
 Devfs is getting less support now, it might not be the best time to start 
 depending on it.

Indeed, it's looking likely that GregKH's `udev' will replace devfs
sometime in the future.

[It was amusing to see Christoph Hellwig's recent patch on the lkml
changing devfs from `EXPERIMENTAL' directly to `OBSOLETE' (and he has a
fairly good record of getting devfs patches accepted by Linus).  :-/ ]

-Miles
-- 
Is it true that nothing can be known?  If so how do we know this?  -Woody Allen




Re: Debian Weekly News - August 19th, 2003

2003-08-21 Thread Jérôme Marant
Quoting Dagfinn Ilmari Mannsåker [EMAIL PROTECTED]:


   consensus 
n : agreement of the majority in sentiment or belief
[syn: {general agreement}]
 
   unanimity
n : everyone being of one mind
 
 
 A world of difference.

No, no, no! You don't get it. There may be a majority among the
debian-legal zealots, but we need a consensus among Debian as a
whole (which means voting of course).

We musn't let the bigots decide for us! ;-)

-- 
Jérôme Marant




Bug#206537: ITP: horde-sam -- Spamassassin module for Horde

2003-08-21 Thread Norbert Tretkowski
Package: wnpp
Version: N/A; reported 2003-08-21
Severity: wishlist

* Package name: horde-sam
  Version : 0.0.1
  Upstream Author : The Horde Team [EMAIL PROTECTED]
* URL : http://cvs.horde.org/cvs.php/sam/
* License : GPL
  Description : Spamassassin module for Horde


-- System Information
Debian Release: 3.0
Architecture: i386
Kernel: Linux rollcage 2.4.22-pre6 #3 Sat Jul 26 21:53:42 CEST 2003 i686
Locale: LANG=POSIX, LC_CTYPE=de_DE





Bug#206536: ITP: phpdocumentor -- php auto documentor

2003-08-21 Thread Juan Manuel Garca Molina
Package: wnpp
Version: unavailable; reported 2003-08-21
Severity: wishlist

* Package name: phpdocumentor
  Version : 1.2.2
  Upstream Author : Joshua Eichorn [EMAIL PROTECTED]
* URL : http://www.phpdocumentor.org/
* License : PHP
  Description : php auto documentor

 phpDocumentor is a JavaDoc-like automatic documentation generator for PHP
 written in PHP. It is a very versatile tool for documenting PHP.

-- System Information:
Debian Release: testing/unstable
Architecture: i386
Kernel: Linux azuaga 2.4.21-ck3 #6 vie ago 1 18:24:01 CEST 2003 i686
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (ignored: LC_ALL set to [EMAIL 
PROTECTED])





Debian Birthday in Netcraft

2003-08-21 Thread Christian Surchi
From Netcraft newsletter and web site:

Debian Linux distribution 10 years old today

http://news.netcraft.com/archives/2003/08/16/debian_linux_distribution_10_years_old_today.html

I'm not so sure about the value of their Debian geographical
distribution, maybe... :-)

bye
Christian


-- 
Christian Surchi [EMAIL PROTECTED]


signature.asc
Description: Questa parte del messaggio =?ISO-8859-1?Q?=E8?= firmata


Bug#206536: correcting URL

2003-08-21 Thread Juan Manuel Garca Molina
Package: wnpp
Version: unavailable; reported 2003-08-21
Followup-For: Bug #206536

As Thomas said, the right URL is http://www.phpdoc.org, not
http://www.phpdocumentor.org.


Thank you very much, Thomas.


Regards.

-- System Information:
Debian Release: testing/unstable
Architecture: i386
Kernel: Linux azuaga 2.4.21-ck3 #6 vie ago 1 18:24:01 CEST 2003 i686
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (ignored: LC_ALL set to [EMAIL 
PROTECTED])





Re: Debian Birthday in Netcraft

2003-08-21 Thread Christian Perrier
Quoting Christian Surchi ([EMAIL PROTECTED]):
 From Netcraft newsletter and web site:
 
 Debian Linux distribution 10 years old today
 
 http://news.netcraft.com/archives/2003/08/16/debian_linux_distribution_10_years_old_today.html
 
 I'm not so sure about the value of their Debian geographical
 distribution, maybe... :-)

Wow.According to this chart, about a third of hosts running Debian
are in France.. :-)

For sure, several major web hosting and Internet Access Providers run
Debian hosts for their key servers herebut I  think this graph is
somewhat wrong anyway..

I like having a significant following in the former Iron Curtain
countries. So the two major former Iron Curtain countries seem to
be France and Germany.. :-)




Re: Debian Birthday in Netcraft

2003-08-21 Thread Javier Fernández-Sanguino Peña
On Thu, Aug 21, 2003 at 11:59:30AM +0200, Christian Surchi wrote:
 From Netcraft newsletter and web site:
 
 Debian Linux distribution 10 years old today
 
 http://news.netcraft.com/archives/2003/08/16/debian_linux_distribution_10_years_old_today.html
 
 I'm not so sure about the value of their Debian geographical
 distribution, maybe... :-)
 

I'm not even sure how they derive that information, Debian's Apache might
provide it in the banner information (Since when? BTW, has this always been
the case?) but many other web servers in Debian won't. This might not be
completely relevant however (since the web server market is dominated by
two products at the moment).

But, of course, you (can?) always lie with statistics [1]

Regards

Javi

[1]
There are three kinds of lies: lies, damned lies and statistics.
Attributed to: Benjamin Disraeli (1804-1881)
For laughs,  read
http://www4.gvsu.edu/robbinsd/courses/pa611/readings/felbinger.PDF
or
http://www.statistics.com/content/lying/teresi.html
(fresh from Google but reordered since I find the first one best)

 


pgp4g8gSTJAeh.pgp
Description: PGP signature


Re: stack protection

2003-08-21 Thread Alexander Reelsen
Hi

On Thu, Aug 21, 2003 at 02:56:34PM +1000, Brian May wrote:
 On Thu, Aug 21, 2003 at 12:57:06PM +1000, Russell Coker wrote:
  Who is interested in stack protection?
x86 only? Pro police is the most platform independent iirc.

  I think it would be good to have some experiments of stack protected 
  packages 
  for Debian.  Probably the best way to do this would be to start with 
  ssh-stack and sysklogd-stack being uploaded to experimental.  I don't have 
  time to do this, but I would like to help test it.
 What stack protection are you talking about here?
If you need further reference the easiest way would be to check the
bugtraq flamew^Wdiscussion archives right now, as there is quite a big
thread with people who have programmed/used ProPolice, Stackguard, PaX and
W^X (the stuff OpenBSD uses at the moment). If you filter out the 90% rant
and the my-big-dick-software-is-best-at-protecting-your-stack noise, you
will find some useful things about stack protection, and the features of
each solution...

 Any references?
damn. why didn't I write the above here...


MfG/Regards, Alexander

-- 
Alexander Reelsen   http://tretmine.org
[EMAIL PROTECTED]




Re: stack protection

2003-08-21 Thread Russell Coker
On Thu, 21 Aug 2003 19:13, Stefan Gybas wrote:
 However, ProPolice has not been ported to all architectures yet, see
 http://www.research.ibm.com/trl/projects/security/ssp/statuschart.html
 for details.

Not being ported to all architectures is not a problem IMHO.

Such stack protection should not be relied on, it's just there to make 
automated attacks much more difficult.  As i386 is the target for almost all 
of the automated attacks merely supporting i386 will do most of the good that 
such a tool can do.

As for Adamantix people helping out, they haven't even posted to this mailing 
list yet, so I have no great expectations for them to help in future.

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page




Bug#206544: ITP: nicotine -- feature complete client for the SoulSeek filesharing network

2003-08-21 Thread Josselin Mouette
Package: wnpp
Version: unavailable; reported 2003-08-21
Severity: wishlist

* Package name: nicotine
  Version : 1.0.1
  Upstream Author : Hyriand [EMAIL PROTECTED]
* URL : http://nicotine.thegraveyard.org/
* License : GPL
  Description : feature complete client for the SoulSeek filesharing network

Quoting upstream website:
Nicotine is a SoulSeek client written in Python, based on the 
PySoulSeek project by Alexander Kanavin. It features, among other 
things, a completely rewritten graphical user interface which uses 
PyGTK-2 toolkit and a less strict user request policy.

Features:
Nicotine is a feature complete client for the SoulSeek filesharing 
network. You can use it to upload, download, search and chat. You can 
keep a buddy list and basically everything else a SoulSeek client is 
supposed to do. If you are familliar with PySoulSeek, you'll probably 
notice a striking resemblance in appearance. 

(I'll hack a better long description.)

As nicotine is meant to completely supersede pyslsk, I will probably
upload a dummy transitional pyslsk package installing nicotine and 
compatibility symlinks.
-- 
 .''`.   Josselin Mouette/\./\
: :' :   [EMAIL PROTECTED]
`. `'[EMAIL PROTECTED]
  `-  Debian GNU/Linux -- The power of freedom




Re: Debian Birthday in Netcraft

2003-08-21 Thread Adrian von Bidder
On Thursday 21 August 2003 13:36, Christian Perrier wrote:

 I like having a significant following in the former Iron Curtain
 countries. So the two major former Iron Curtain countries seem to
 be France and Germany.. :-)

Well, part of Germany was on the far side of the Iron Curtain regardless of 
which side you are on.

HTH
-- vbi

-- 
featured link: http://www.pool.ntp.org


pgpBkU57BueYG.pgp
Description: signature


Re: FTBFS: architecture all packages

2003-08-21 Thread Tollef Fog Heen
* Goswin von Brederlow 

| There is also another reason, not mentioned before, for source only
| uploads. It takes way less bandwith to upload a diff.gz+dsc file than
| to upload a big binary package.

Bandwidth has costs for buildds as well.

-- 
Tollef Fog Heen,''`.
UNIX is user friendly, it's just picky about who its friends are  : :' :
  `. `' 
`-  




Re: Bits from the RM

2003-08-21 Thread Anthony Towns
On Thu, Aug 21, 2003 at 05:52:32PM +0900, GOTO Masanori wrote:
 AFAIK, the unresolved difficult bugs are: (1) hppa build (2) dpkg
 (setjmp/longjmp) on sparc (3) NIS (will be fixed?)  (4) misterious
 apache on ia64 bug.  

Is there a bug# for (2)? If not, could someone forward the appropriate
mails to the BTS for tracking, please?

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

   ``Is this some kind of psych test?
  Am I getting paid for this?''




RE: Bits from the RM

2003-08-21 Thread Julian Mehnle
cobaco [EMAIL PROTECTED] wrote:
 On 2003-08-20 15:33, John Goerzen wrote:
  tne pain of breaking desktops is no less when
  you consider how many more desktops we're talking about here.
 
 that's assuming that all those desktops crash at the same time no?

No, it's assuming that all those desktops crash with the same average frequency 
(probability) per duration.

Consider one s = 1 company server serving c = 1000 clients (used by one user 
each).  Let's assume any one instance of a server software (e.g. Apache) 
crashes with a probability p_crash = 1% at any given time (i.e. it's down 1% of 
the time assuming a zero recovery time), and any one instance of a client 
software (e.g. Mozilla) does the same.  Now the expected number of users 
u_affected who can't use the company's intranet at any given time is...

...due to server failures:

  s * p_crash * u_aff,s = 1 * 0.01 * 1000 = 10

...due to client failures:

  c * p_crash * u_aff,c = 1000 * 0.01 * 1 = 10

(Of course, these sets of users do overlap, but that's not relevant here.)

So, assuming an equal crashing probability (AKA stability) of server and client 
software, the pain of breaking desktops is no less than the pain of breaking 
servers.  qed.





Re: Debian Birthday in Netcraft

2003-08-21 Thread Martin List-Petersen
Citat Christian Perrier [EMAIL PROTECTED]:

 Quoting Christian Surchi ([EMAIL PROTECTED]):
  From Netcraft newsletter and web site:
  
  Debian Linux distribution 10 years old today
  
 

http://news.netcraft.com/archives/2003/08/16/debian_linux_distribution_10_years_old_today.html
  
  I'm not so sure about the value of their Debian geographical
  distribution, maybe... :-)
 
 Wow.According to this chart, about a third of hosts running Debian
 are in France.. :-)

I know that one of the major search site portals (and one of their major sites
is in France) uses Debian Woody.

Regards,
Martin List-Petersen
martin at list-petersen dot se
--
BOFH excuse #260:

We're upgrading /dev/null




Re: stack protection

2003-08-21 Thread Julien TINNES
 Who is interested in stack protection?

I am.

I think it would be good to have some experiments of stack protected packages 
for Debian.  Probably the best way to do this would be to start with 
ssh-stack and sysklogd-stack being uploaded to experimental.  I don't have 
time to do this, but I would like to help test it.

I think it would be good too, but I would rather speak about 'security 
enhanced packages' in general. Nowadays, we are able to achieve way better 
things than just stack protection (see end of message).

Also is there any interest in uploading a kernel-image package with the grsec 
PaX support built in?

Do you mean a grsec kernel with some security options (such as PaX) enabled by 
default? Yes, it would be a good thing, and it's even necessary to have 
kernel based stuff to achieve good protection. gsecurity is a good choice 
because it includes PaX and adds some nice tricks (chroot() hardening, /proc 
restritions..) and a full ACL system.

Here's (basically) what PaX can provide:

- A non-executable pages semantic for alpha, i386, parisc, ppc, sparc, 
sparc64, which means the ability to build readable/writeable but non 
executable pages on those architectures which is achieved by some nice tricks 
on i386 (because there is no hardware support).

- Use of this new semantic in the kernel (this is called MPROTECT feature), 
this will ensure that memory is writable (x)or executable but not both. This 
is achieved as a modification to mmap() and mprotect() interface, and as a 
result, you cannot create non executable anonymous mapping, and file mapping 
are NEVER executable/writable at the same time. (This means that you have a 
non executable stack, non executable heap and much more).

- Address space layout randomization: (to prevent return-to-libc attacks), 
this tries to randomize the base adresses of stack, heap, mmaped libraries. 
This require no userland modification.
But it does more, it will even randomize the main ELF executable (like .text 
section) and this is where 'security hardened' packages could be usefull. 
Because this randomization, to be done the proper way (without any 
performance impact) needs relocation information which is not available in 
most ELF files (which are ET_EXEC), but is in ET_DYN ELF files. Without this 
relocation, PaX can do a kind of 'emulation' (called RANDEXEC) which has a 
performance impact.

Those ET_DYN ELF executables can (rather) easily be produced using a propolice 
gcc with some modified specfiles. This hardened gcc is already available for 
gentoo (thanks to pappy/solar).

Debian could have a hardened gcc package, and have some binary packages (such 
as sshd) compiled with it.

Compatibility: first, not all architectures are supported by PaX' NOEXEC. 
Second there are a few applications relying on the fact that the heap is 
executable (X, java..), PaX features can be disabled 'per executable', but 
not (for now) 'disabled by default and enabled 'per executable'.
The 'security hardened' packages are no use for NOEXEC anyway (which does'nt 
need anything userspace), so this could be let disabled by default in the 
secure kernel, and we could enable ASLR only in PaX.
Anyway, imho, this kernel stuff should be treated separately, but grsecurity 
is a good choice for a secure kernel, because it's ACL are needed to prevent 
some attacks for which PaX cannot do anything.

For the 'security hardened' binary packages: building ET_DYN executables will 
improve security if PaX ASLR is enabled in kernel, but it will work just like 
a good old ET_EXEC if it is not.
So I think it would be a good idea to build ET_DYN executable in 'security 
enhanced' packages.
So, a security enhanced package, built using propolice + beeing ET_DYN will 
have all the features of propolice, and, if PaX ASLR is loaded in kernel, it 
will achieve another good protection layer.


Julien





Bug#206576: ITP: livejournal -- The code that runs livejournal

2003-08-21 Thread Jay Bonci
Package: wnpp
Version: unavailable; reported 2003-08-19
Severity: wishlist

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

* Package name: livejournal
  Version : 2003042200
  Upstream Author : Brad Fitzpatrick [EMAIL PROTECTED]
* URL : http://www.livejournal.com/code
* License : LGPL (possibly others, clarifying)
  Description : The code that runs livejournal

Livejournal is the collection of scripts and templating technologies used to 
set up your own livejournal-like site.

Note: The license isn't exactly specified everywhere, and I'm getting 
confirmation from brad on the rest of the individual items



- -- System Information:
Debian Release: testing/unstable
Architecture: i386
Kernel: Linux starlite 2.4.19-686 #1 Mon Nov 18 23:59:03 EST 2002 i686
Locale: LANG=C, LC_CTYPE=C

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/RObbZNh5D+C4st4RAtirAJ4v8z4wW3UYXzy4rdAuUQYszPcDtgCcCDXu
YLjSMcM3P3U3iFhh5DfmDr0=
=pYyR
-END PGP SIGNATURE-




Re: stack protection

2003-08-21 Thread rintek
Russell Coker wrote:
On Thu, 21 Aug 2003 19:13, Stefan Gybas wrote:
However, ProPolice has not been ported to all architectures yet, see
http://www.research.ibm.com/trl/projects/security/ssp/statuschart.html
for details.

Not being ported to all architectures is not a problem IMHO.
Such stack protection should not be relied on, it's just there to make 
automated attacks much more difficult.  As i386 is the target for almost all 
of the automated attacks merely supporting i386 will do most of the good that 
such a tool can do.

As for Adamantix people helping out, they haven't even posted to this mailing 
list yet, so I have no great expectations for them to help in future.

Please have a look at your email
groetjes,
Age Huisman



Latest gcc-3.3 and kernel compilation

2003-08-21 Thread Marc Singer
Are we expecting the latest unstalble gcc compiler to correctly
compiler the kernel?  

  gcc --version 
 gcc (GCC) 3.3.2 20030812 (Debian prerelease)

I'm getting a new error when I compile the kernel.  In the structure
below, it doesn't like the declaration for slot_tablen complaining
that

  ide-cd.h:440: error: long, short, signed or unsigned used invalidly for 
`slot_tablelen'


It looks like it doesn't like the obviously invalid use of short in
the declaration.  How does this affect our wish to move to the new
compiler?


struct atapi_mechstat_header {
#if defined(__BIG_ENDIAN_BITFIELD)
__u8 fault : 1;
__u8 changer_state : 2;
__u8 curslot   : 5;
#elif defined(__LITTLE_ENDIAN_BITFIELD)
__u8 curslot   : 5;
__u8 changer_state : 2;
__u8 fault : 1;
#else
#error Please fix asm/byteorder.h
#endif

#if defined(__BIG_ENDIAN_BITFIELD)
__u8 mech_state: 3;
__u8 door_open : 1;
__u8 reserved1 : 4;
#elif defined(__LITTLE_ENDIAN_BITFIELD)
__u8 reserved1 : 4;
__u8 door_open : 1;
__u8 mech_state: 3;
#else
#error Please fix asm/byteorder.h
#endif

byte curlba[3];
byte nslots;
__u8 short slot_tablelen;
};




Re: Transition: new PAM config file handling in unstable

2003-08-21 Thread Joey Hess
Steve Langasek wrote:
 - It will now be possible to choose md5 vs. crypt passwords at install
   time without violating policy.  (Currently, a number of conffiles are
   being modified by maintainer scripts in order to enable md5
   passwords.)  Actually making this process policy-compliant will
   require changes to a number of other packages prior to release.

It's great to finally have this. Have you considered doing something to
ease upgrades of systems whose admins chose to enable md5 passwords via
passwd's debconf questions?

[EMAIL PROTECTED]:/home/joeydebconf-show passwd |grep md5 
* passwd/md5: true

If that is set then it would probably be a good idea if services
continued to support md5 after the transition. I'm not a pam expert, but
maybe /etc/pam.d/other would be changed to include md5 in this case?

-- 
see shy jo


pgpqMRnbiFZMH.pgp
Description: PGP signature


Re: Latest gcc-3.3 and kernel compilation

2003-08-21 Thread Paul . Hampson
On Thu, Aug 21, 2003 at 09:37:40AM -0700, Marc Singer wrote:
   gcc --version 
  gcc (GCC) 3.3.2 20030812 (Debian prerelease)

 I'm getting a new error when I compile the kernel.  In the structure
 below, it doesn't like the declaration for slot_tablen complaining
 that

   ide-cd.h:440: error: long, short, signed or unsigned used invalidly for 
 `slot_tablelen'

What version of the kernel? gcc 3.3 is known to not work with
kernels less than 2.4.21, I think... Have a look in the gcc 3.3
or kernel-package docs. (I don't remember where I read that.)

--
Paul TBBle Hampson
[EMAIL PROTECTED]




Re: Latest gcc-3.3 and kernel compilation

2003-08-21 Thread Ben Collins
   __u8 short slot_tablelen;

Isn't it just a plain error? Either it's a char, or it's a short. It
can't be both, right?

-- 
Debian - http://www.debian.org/
Linux 1394 - http://www.linux1394.org/
Subversion - http://subversion.tigris.org/
WatchGuard - http://www.watchguard.com/




Re: stack protection

2003-08-21 Thread Wouter Verhelst
Op do 21-08-2003, om 09:49 schreef Russell Coker:
 On Thu, 21 Aug 2003 17:39, Xavier Roche wrote:
  Major issues for a ro-/ are maybe:
  - using devfs for /dev (kernel 2.4 and package devfsd installed)
 
 Devfs is getting less support now, it might not be the best time to start 
 depending on it.

Let's turn that into 'it might be a good time to stop depending on it'.
Debian-installer heavily depends on devfs...

-- 
Wouter Verhelst
Debian GNU/Linux -- http://www.debian.org
Nederlandstalige Linux-documentatie -- http://nl.linux.org
An expert can usually spot the difference between a fake charge and a
full one, but there are plenty of dead experts. 
  -- National Geographic Channel, in a documentary about large African beasts.



signature.asc
Description: Dit berichtdeel is digitaal ondertekend


Re: Bits from the RM

2003-08-21 Thread Joel Baker
On Thu, Aug 21, 2003 at 11:39:35AM +0200, Marc Haber wrote:
 
 I am only realistic. When in history did a non-trivial software
 product meet its release schedule?
 
 I am surely hoping for the best, but I seriously do expect sarge to be
 released in early 2004. Which is a pretty good track record if we
 actually reach that.

Well, FreeBSD hits their 6-month release targets more often than they miss
them (yes, they do miss them sometimes, generally not by very far). True,
they've had practice at it; I don't expect the first attempt to be pretty.
I do expect that we could manage to match them, if it becomes a consistant
release goal to set a date and then hit it. :)

Even 'early 2004' is, frankly, not nearly enough time to ensure something
as large as KDE goes from 'stable' upstream release (assuming *they* make
a Dec 8th release) to 'bugs shaken out, stable enough to not need to turn
around and do an r1 release a few weeks later because it blows up on user
machines', for values of 'early 2004' that I would find most likely (to
wit, right *after* the holidays, since slipping too much would put us into
releasing during them; though the Debian Christmas Release would be mildly
entertaining :)
-- 
Joel Baker [EMAIL PROTECTED],''`.
Debian GNU NetBSD/i386 porter: :' :
 `. `'
   `-


pgpE56YX0Cv4q.pgp
Description: PGP signature


Re: stack protection

2003-08-21 Thread Brian May
On Thu, Aug 21, 2003 at 07:16:46PM +0900, Miles Bader wrote:
 Russell Coker [EMAIL PROTECTED] writes:
  Devfs is getting less support now, it might not be the best time to start 
  depending on it.
 
 Indeed, it's looking likely that GregKH's `udev' will replace devfs
 sometime in the future.

Dare I ask the obvious question: what is udev? Why is it better then
devfs?
-- 
Brian May [EMAIL PROTECTED]




Re: Debian Weekly News - August 19th, 2003

2003-08-21 Thread Thomas Hood
 We musn't let the bigots decide for us! ;-)

Sorry, but that insult doesn't put a winksmiley on my face.
Please don't try to start a useless flamewar.  They break
out so easily on their own.  There is no need to discuss
this matter here; it has already been thoroughly discussed
in debian-legal and that is the best place to continue the
discussion if you really can't let the subject drop.

--
Thomas Hood




Re: FTBFS: architecture all packages

2003-08-21 Thread Adam Heath
On 21 Aug 2003, Goswin von Brederlow wrote:

 Doogie already said he wants to implement a smart comparator for deb
 in dpkg 2.0 which would then be used to compare that different builds
 of the binary-all even give the same result.

This means  you give the 2 debs(which probably only differ by debian
revision) to this new tool, and the output will be a differential deb, which
will contain just the changes.

However, this is really a minor feature, that may not even be part of 2.0; it
may wait for a slightly later version.




Re: stack protection

2003-08-21 Thread Russell Coker
On Thu, 21 Aug 2003 22:41, Brian May wrote:
 On Thu, Aug 21, 2003 at 07:16:46PM +0900, Miles Bader wrote:
  Russell Coker [EMAIL PROTECTED] writes:
   Devfs is getting less support now, it might not be the best time to
   start depending on it.
 
  Indeed, it's looking likely that GregKH's `udev' will replace devfs
  sometime in the future.

 Dare I ask the obvious question: what is udev? Why is it better then
 devfs?

A paper on udev was presented at OLS this year, at the URL below you can find 
a copy in PDF format.  Basically it is a way of providing some of the 
features of devfs but based around using hotplug to create device nodes using 
mknod under a regular directory.  So there is no mountable /dev.

http://archive.linuxsymposium.org/ols2003/Proceedings/

As for why it's better than udev.  There have been bugs in devfs in the past 
related to race conditions.  Also devfs requires that the kernel knows about 
all the device nodes, whether this is a bug or an excellent feature is a 
matter of opinion.

I would prefer that devfs was kept as it's worked well for me.  But that it 
seems that things are moving away from it.

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page




Re: Bits from the RM

2003-08-21 Thread Adam Heath
On Thu, 21 Aug 2003, Anthony Towns wrote:

 On Thu, Aug 21, 2003 at 05:52:32PM +0900, GOTO Masanori wrote:
  AFAIK, the unresolved difficult bugs are: (1) hppa build (2) dpkg
  (setjmp/longjmp) on sparc (3) NIS (will be fixed?)  (4) misterious
  apache on ia64 bug.

 Is there a bug# for (2)? If not, could someone forward the appropriate
 mails to the BTS for tracking, please?

I'd be interested too.  Haven't seen anything on -dpkg about it.




Re: Latest gcc-3.3 and kernel compilation

2003-08-21 Thread Marc Singer
On Thu, Aug 21, 2003 at 12:44:11PM -0400, Ben Collins wrote:
  __u8 short slot_tablelen;
 
 Isn't it just a plain error? Either it's a char, or it's a short. It
 can't be both, right?

That's what I think, too.  It looks, too, to be something added in a
patch because the indentation is different.

As Ben pointed out, it looks like I can only compile 2.4.21 with
gcc-3.3.  Working on it.




Re: What doing with an uncooperative maintainer ?

2003-08-21 Thread Thomas Hood
Marcelo E. Magallon [EMAIL PROTECTED] wrote:
 Talk with the maintainer.  Or NMU.  Or make noise on -devel.
 But don't fork packages.

I agree and disagree.  Talking with the maintainer works
sometimes.  Sometimes one is in a position to NMU.  Sometimes
it helps to make noise on debian-devel.  But sometimes there
are fundamental disagreements about how something should be
packaged and then it must be possible for two competing
packages to exist in Debian between which users can make a
choice; otherwise you are giving maintainers the same rights
as software proprietors: _they_ control the code; _you_ can't
change it (while remaining within the Debian framework) even
if you are willing to do the work.  I say you should _not_
give maintainers that kind of power -- the power to stop
others from doing a better job.  That kind of power will
inevitably be abused, and has already been abused.  Every
maintainer should face the threat of competition from someone
else who thinks he or she can do a better job.  That is an
essential freedom in open source development.

There are already many programs in Debian that are packaged
in different flavors.  Most of these are upstream-stable and
upstream-developmental variants.  These variants serve the
needs of different sorts of users.  From reading this thread
it is my impression that gqview falls into this group: the
gqview maintainer has a conservative packaging policy while
his critics want to run the latest version.  Unless one side
gives in, this seems like adequate grounds for a fork.

--
Thomas Hood




Re: [RFC] Debian ruby policy (Re: Fw: Re: Ruby 1.8 transition plan; debian-ruby)

2003-08-21 Thread Dmitry Borodaenko
On Thu, Aug 21, 2003 at 02:53:12AM +0900, Fumitoshi UKAI wrote:
 FU Dmitry Borodaenko [EMAIL PROTECTED]
 FU  libyaml-ruby1.8 (- libyaml-ruby)

I think that since whytheluckystiff is developing Syck/YAML right in the
Ruby CVS, there is little chance for a separation of libyaml-ruby1.8 in
the near future, and I'm quite happy with it being maintained by akira
as part of ruby1.8.

I am inclined to keep libyaml-ruby1.6 (renamed from current libyaml-ruby
as soon as ruby-defaults is out), and make a libyaml-ruby metapackage
that depends on libyaml-ruby1.6 | libyaml-ruby1.8, so that a program
that doesn't care about Ruby version would pull in either 1.6 or 1.8
version, depending on the version of Ruby installed.

-- 
Dmitry Borodaenko




Re: Does anyone use barrendero, or know of an equivalent?

2003-08-21 Thread Steve Langasek
On Thu, Aug 21, 2003 at 10:42:28AM +0200, Sam Hocevar wrote:
 On Wed, Aug 20, 2003, Steve Langasek wrote:

  But descriptions can be deceiving.  Does anyone use this package who
  could comment on its reliability?  Does the lack of other bugs indicate
  that the software is mature and stable, or unused?

I am trying barrendero but don't trust it enough yet for production
 use. I had worked on an NMU that fixes all bugs and makes the package a
 bit more polished, I just reviewed it and uploaded it here:

  http://zoy.org/~sam/debian/barrendero_1.0-1.1.diff.gz

I haven't contacted the maintainer yet because I was working on other
 bugs, but if he is MIA as you seem to be suggesting, I'll probably
 upload that NMU to DELAYED quite soon.

  Does anyone know of another package that provides similar functionality?

mail-expire is very close to it.

Ok, thanks for the info.  Can you estimate when you think you'll NMU?

-- 
Steve Langasek
postmodern programmer


pgp4QAtphkpu7.pgp
Description: PGP signature


Re: Debian Weekly News - August 19th, 2003

2003-08-21 Thread Gunnar Wolf
Jérôme Marant dijo [Thu, Aug 21, 2003 at 12:18:10PM +0200]:
consensus 
 n : agreement of the majority in sentiment or belief
 [syn: {general agreement}]
  
unanimity
 n : everyone being of one mind
  
  
  A world of difference.
 
 No, no, no! You don't get it. There may be a majority among the
 debian-legal zealots, but we need a consensus among Debian as a
 whole (which means voting of course).
 
 We musn't let the bigots decide for us! ;-)

Well... If you really disagree with the 'bigots' on this, please join
debian-legal and join the opposition. I do think that most of us
non-'bigots' will agree with the consensus reached in debian-devel - Me
not joining that list means I don't have all the background (and, yes,
the interest) to debate their decision - and they are mostly people who
most of us hold in quite a nice position.

Now, why am I insisting in quoting the 'bigots'? Because they care.
Because being involved in all those convoluted discussions in our
behalf, in subjects we all care about but don't want to fuss over too
much makes them respectable people in my eyes.

Greetings,

-- 
Gunnar Wolf - [EMAIL PROTECTED] - (+52-55)5630-9700 ext. 1366
PGP key 1024D/8BB527AF 2001-10-23
Fingerprint: 0C79 D2D1 2C4E 9CE4 5973  F800 D80E F35A 8BB5 27AF




Re: non-DD contributors and the debian keyring

2003-08-21 Thread Stephen Frost
* Martin Quinson ([EMAIL PROTECTED]) wrote:
 On Wed, Aug 20, 2003 at 05:03:17PM -0400, Stephen Frost wrote:
  I doubt a poor translation would make it into a released version.
 A lot of poor translation get into stable, mainly by lack of manwork, but
 you are right no offending translation gets into testing. At least in french.

Sorry, I was, as you picked up, meaning 'offending' more than just
'poor'.

 Mmm. If so, I really cannot understand the big deal with IDs when signing
 the key. Knowing my ID is not enough to prove that I won't upload a rootkit,
 and it is not even needed... I must be perticulary dumb.

It's more than just the ID, but the ID is a part of it.  It's all about
trust.  A non-Debian example is the way I run some of my personal
systems.  I won't give out accounts to just anyone but if I've met
someone face-to-face and had a chat with them I'm much more inclined to
give them account if they have a need for one.  If a friend of mine is
willing to vouch for some people he/she has met and knows personally I'm
more willing to give them an account.  The ID comes into play when it's
people who don't actually know each other all that well and don't really
have much other communication.  It's expected that while the person who
actually checks your ID doesn't really know you all that well there are
others who know you through online correspondence but just havn't met
you.

That's my general feeling on it anyway, it's probably different for
other people.  I don't beleive there's an 'official' statement about it
really.

  What is harder for the DD and how could the existing Debian
  infrastructure fix that?  Nothing in what you've said would lead me to
  believe that there's something we can change which would make things
  easier for the DD with regard to 'poor' translations.
 
 The whole story is about easing the technical issue in a trust relationship.

At the moment there are two levels of 'trust'.  There's the level where
you can upload new packages and there's the level where you can submit
patches and whatnot to the BTS.  At least, those are the levels I
perceive Debian having atm.  Other people can have their own trust
relationships if they feel they need them.  I don't think there'd really
be much advantage to putting another level in there.

 Of course, I could (and have) uploaded my key on public servers, meaning
 that other Debian member could check than a given mail with my address
 desserve the trust they habitually give me. But those guys would have to 
 configure their email specifically on people like me[*]. I was wondering if
 could be avoided, that's all.

As others have pointed out most people have their systems configured to
grab keys from public keyservers already anyway.

 A really great improvement of this situation would be to make easily
 available the keys of people in the NM queue, since translators are supposed
 to become debian developer, too.

Ok, if you think it'd be all that great then do it and see if anyone
actually uses it.  I'd be happy to host it on personal servers if you
need someone to host it.  I might even be willing to sponsor a new
Debian package of it if it actually gets popular.

 But, ok, if the majority here says that there would not be sufficient
 benefit wrt the effort, I guess I'll have to deal with it. Easy :)

I doubt it, but hey, if you want to spend your time doing it, go for it.

Stephen


pgpp72ZGiHk8D.pgp
Description: PGP signature


Re: non-DD contributors and the debian keyring

2003-08-21 Thread Stephen Frost
* Martin Quinson ([EMAIL PROTECTED]) wrote:
 Judging from the amount of translation rotting in the BTS, I guess some of
 you guys react the same way, and I want to change this by easing this trust
 relationship, if possible.

Eh.  Personally I tend to doubt it's lack of trust that's causing
translations to rot in the BTS.

Stephen


pgpXrUm9qmN9q.pgp
Description: PGP signature


Re: Debian Birthday in Netcraft

2003-08-21 Thread Gunnar Wolf
Christian Perrier dijo [Thu, Aug 21, 2003 at 01:36:02PM +0200]:
 Wow.According to this chart, about a third of hosts running Debian
 are in France.. :-)
 
 For sure, several major web hosting and Internet Access Providers run
 Debian hosts for their key servers herebut I  think this graph is
 somewhat wrong anyway..
 
 I like having a significant following in the former Iron Curtain
 countries. So the two major former Iron Curtain countries seem to
 be France and Germany.. :-)

Isn't Netcraft CCCP-based? If so, I think it is right - The 'former Iron
Curtain' countries (if I understand correctly, meaning 'the countries
that were behind te Iron Curtain' include Germany(west), France, USA,
UK and the Netherlands :-)

-- 
Gunnar Wolf - [EMAIL PROTECTED] - (+52-55)5630-9700 ext. 1366
PGP key 1024D/8BB527AF 2001-10-23
Fingerprint: 0C79 D2D1 2C4E 9CE4 5973  F800 D80E F35A 8BB5 27AF




Re: stack protection

2003-08-21 Thread Marco d'Itri
On Aug 21, Xavier Roche [EMAIL PROTECTED] wrote:

 - using devfs for /dev (kernel 2.4 and package devfsd installed)
devfs will probably disappear. It's better to look at udev (which I'm
packaging).

 - transforming several /etc files as symlinks and moving them to some
 other place (/var/etc ?)
There have been long threads about this, a ro-root is almost possible
with minimal local changes.

-- 
ciao, |
Marco | [1392 ug4klQcM3go0s]




Re: What doing with an uncooperative maintainer ?

2003-08-21 Thread Marcelo E. Magallon
On Thu, Aug 21, 2003 at 03:05:00PM +0200, Thomas Hood wrote:


  But sometimes there are fundamental disagreements about how something
  should be packaged and then it must be possible for two competing
  packages to exist in Debian

 Says who?

 Debian is not just a collection of packages, it's a tightly integrated
 operating system.  This is a distribution.  What we deem good
 development practices for/of free software doesn't have to apply here.
 As a distribution, we have different goals, we have to make desicions
 that fit into that picture.  Along the years we have created a system
 that ensures that when you install something, it will get integrated
 into the system.  For that we have had long and painful discussions
 regarding best practices and long and painful discussions to make
 stuff work together.  We have (implicitly) agreed on the fact that the
 package maintainer is a person who knows what he's talking about when
 it comes to his packages.  If the package maintainer deems it
 appropiate to upload a snapshot version of a package we have usually
 played along.  If the maintainer thinks the lastest and greatest is not
 really such a good idea, we have played along: see the XFree86
 packages.  Every now and then packages of the most recent version of
 XFree86 pop up, but people usually give up when they gasp the swamp
 they are getting themselves into.

 For the small stuff, like gqview -- which I've not seen even once --
 that proposition might work, but it's setting a bad precedent.  If
 there's a newer bigger better faster upstream version and the
 maintainer won't upload it and won't say why, by all means, flame him
 in public if that's what it takes to get an answer from him.  If it's
 obvious that the maintainer isn't paying attention to the package or
 just doesn't care, make a hostile takeover (and be ready to get
 flamed).

 But don't fork it.

 Forking it means:

* There are two versions of the same thing in the distribution

+ Duplication at the BTS level

+ Duplication in the archive

+ Confusion for the users

* No visible gain, except for those who have to have the CVS
  version from 2 seconds ago

* More work for the future

+ What about upgrades?

+ What if the forked version isn't necessary anymore?

+ What about users of stable, who are stuck with a random CVS
  snapshot for good 24 months.

  otherwise you are giving maintainers the same rights as software
  proprietors: _they_ control the code; _you_ can't change it (while
  remaining within the Debian framework) even if you are willing to do
  the work.

 You don't really beleive that, do you?  I know the control freak mantra
 has become trendy as of late, but that's stretching it a bit too far,
 isn't it?

 I hold that if you do a good work with a alternative yet not in the
 archive version, you can come up here and say I'll take over this
 without the maintainer's blessing and you won't face oppossition.  My
 first package was uploaded like that: hi, I've been maintaining such
 and such for private use for a while, the maintainer doesn't show any
 signs of life, I'm going to take over it.  Yes, gqview's case is a tad
 different, but try to see the big picture.

  I say you should _not_ give maintainers that kind of power -- the
  power to stop others from doing a better job.

 We don't.

  That kind of power will inevitably be abused, and has already been
  abused.  Every maintainer should face the threat of competition from
  someone else who thinks he or she can do a better job.  That is an
  essential freedom in open source development.

 Yes, in software development, but not in a distribution that tries to
 pass around as well integrated and stable.

  There are already many programs in Debian that are packaged in
  different flavors.

 I don't count that many: galeon, xnap, mozilla, irssi, gcc, gforge,
 everybuddy, busybox, lxr...

  These variants serve the needs of different sorts of users.

 From the above list, I can tell you that GCC's case is a good one:
 developers benefit from it, people using certain architectures benefit
 from it, GCC itself benefits from it to some degree.  Mozilla is a good
 case too: their release policy is rather conservative (from my POV) and
 users in general might benefit from snapshot versions.  Everybuddy?  No
 idea.  The CVS version in unstable is, oh... the same one in stable.
 Someone got bored it seems.  See what I mean?  Busybox, I can figure
 the installer people need (to test) this.

  From reading this thread it is my impression that gqview falls into
  this group: the gqview maintainer has a conservative packaging policy
  while his critics want to run the latest version.  Unless one side
  gives in, this seems like adequate grounds for a fork.

 wget.  tar.  configure.  make.

 The system won't explode, beleive me.

 Marcelo




When to call update-alternatives?

2003-08-21 Thread Marcin Owsiany
Well, I know that in postinst and prerm, but when which argument is
passed?

I thought that cd /var/lib/dpkg/info  grep -10 update-alternatives 
*postinst|less -S
would help me, but it did quite the contrary. There is a total mess!
A quick summary of how it is called in different packages:
 - always ($1 is not tested at all),
 - if [ $1  = configure ]
 - if [ $1 != upgrade ]
 - if [ $1  = configure -o $1 = abort-upgrade ]
 - if [ $1  = configure -o $1 = upgrade ]

They can't all be right?

After rereading section 6 of the policy, I think that the right way is
to call it in postinst if [ $1  = configure ], and in postrm,
if [ $1  = remove ]

Is this correct?

regards,

Marcin
-- 
Marcin Owsiany [EMAIL PROTECTED] http://marcin.owsiany.pl/
GnuPG: 1024D/60F41216  FE67 DA2D 0ACA FC5E 3F75  D6F6 3A0D 8AA0 60F4 1216




Re: Debian Weekly News - August 19th, 2003

2003-08-21 Thread Branden Robinson
On Thu, Aug 21, 2003 at 12:18:10PM +0200, Jérôme Marant wrote:
 We musn't let the bigots decide for us! ;-)

Thanks for excusing yourself from the discussion thus.

-- 
G. Branden Robinson| Software engineering: that part of
Debian GNU/Linux   | computer science which is too
[EMAIL PROTECTED] | difficult for the computer
http://people.debian.org/~branden/ | scientist.


pgpPlwwt5ARnc.pgp
Description: PGP signature


Hungarian DDTP on the Xth B'day

2003-08-21 Thread Nicolas Bertolissio
Hi all,

The main goal of this party was to translate Debian package descriptions.
Unfortunately Gluck, where the ddts server is, was down quite a long
time and installing a local server was not so easy as it was the first
time I did this.  The local server was up only a few minutes before Gluck
come back.

Anyway, this experience let me find a bug in the server and so was quite
interresting.


I would like to thanks everyone at Budapest for the good time I spend
there for the Debian 10th birthday last week-end.


Regards


Nicolas Bertolissio
-- 


pgpFYJzwywa09.pgp
Description: PGP signature


Re: Monitoring RC bugs

2003-08-21 Thread Jamin W. Collins
On Thu, Aug 21, 2003 at 08:05:01PM +0100, Colin Watson wrote:
 
 So, all mails sent to bugs with release-critical severities, including
 acknowledgements of control messages, will now be copied to a new
 list: [EMAIL PROTECTED] 

Very nice!

-- 
Jamin W. Collins

To be nobody but yourself when the whole world is trying it's best night
and day to make you everybody else is to fight the hardest battle any
human being will fight. -- E.E. Cummings




Re: stack protection

2003-08-21 Thread Miles Bader
On Thu, Aug 21, 2003 at 10:41:16PM +1000, Brian May wrote:
  Indeed, it's looking likely that GregKH's `udev' will replace devfs
  sometime in the future.
 
 Dare I ask the obvious question: what is udev? Why is it better then
 devfs?

It's mostly in user-space, lighter-weight, and more configurable.  It relies
on a clever use of other existing kernel features (ramfs, hotplug callouts,
sysfs) rather than being a big chunk of special purpose code wired into
kernel space.

Also, the naming policy is entirely in user-space, there are no wacky device
naming conventions in the kernel where they can cause big flamewars.

-Miles
-- 
`Suppose Korea goes to the World Cup final against Japan and wins,' Moon said.
`All the past could be forgiven.'   [NYT]




Re: better make a standard for /etc/*/*_not_to_be_run

2003-08-21 Thread Thomas Hood
I retain hope that this discussion can end in agreement on the
issue raised in #156161.  Toward that end I offer the following
interpretation of what has been said and finally a proposal.

The original question was about how to prevent services from
being started.  Some packages employ a mechanism (a flag file,
or an environment variable set it in an /etc/default/ file)
other than the standard rc mechanism for switching services on
and off.

The brief reply to this was: Don't do that.  The standard mechanism
for enabling and disabling services in runlevels is update-rc.d,
so please use that.  This answer is basically right.  If I run
/etc/init.d/foo start then foo should start.  Period.

We have to accept, however, that people want, in addition to the
rc system, a simple way globally to enable and disable a given
service.  The reason is that if one decides to disable a service
by setting all its rc?.d symlinks to K then he loses the infor-
mation about what those symlinks should be named when the service
is reënabled.  Such a mechanism has been wished for in #67095 and
#123446 among other places.  Perhaps those wishes should be
fulfilled and something should be written to make it easy for the
admin to disable and enable a service without destroying the rc
symlink farm information.  Such a utility would use update-rc.d
to make changes (as required by policy) but would remember how
things were set up before the service was disabled so that that
situation could easily be restored.

Whether and how that wish is granted is not my main concern here.
What I would like to know is whether we can agree to enhance the
rc system by defining what happens when there is neither a start
nor a stop symlink for a service in a given runlevel.

Henrique de Moraes Holschuh and I discussed this point earlier
but we didn't see eye to eye because we were approaching it
with different assumptions about what the right behavior is.
HdMH assumed that all services are supposed to be controlled by
the rc system which requires that there be either an S or a K
symlink for each service in every runlevel directory.  If there
is neither an S nor a K symlink for a service in a particular
directory then this is operator error and the behavior of the
system is undefined.  It follows that it isn't a bug that
invoke-rc.d starts the service.  I was approaching the issue
under the assumption that if there is neither an S nor a K
symlink for a service in a particular runlevel directory then
that means that the rc system should not change the state of
the service but should leave a running service running and a
stopped service stopped.  #156161 was originally rated as a
bug report based on this assumption.

I am now willing to grant that HdMH is right and that
_currently_ the behavior of the rc system is not defined if
there is neither an S nor a K symlink for a service in a given
runlevel directory.  My proposal is that the behavior of the
rc system _be_ defined such that it works the way I assumed it
was supposed to work, i.e., such that if there is neither an S
nor a K symlink for a service in a particular runlevel
directory then that service is to be neither started nor stopped
on entering that runlevel.

The advantage this specification would have is that it would
allow maintainers to install services and initscripts that are
not by default under the control of the rc system but under the
control of the administrator who can run the initscript with
start and stop arguments.  Changing runlevel would neither
start nor stop these services unless the administrator chose to
put the service under the control of the rc system by setting up
symlinks in the runlevel directories.  The absence of S and K
symlinks would mean manual.  I have downgraded #156161 to a
wish for this enhancement.  If a utility was written to make
it more convenient to disable and enable a service, as discussed
above, then one could add a manual state (no symlinks) to
the disabled (all K symlinks) and enabled (not all K symlinks)
states.

Is this a good idea?  If not, I would be interested to know where
the problems lie.

--
Thomas Hood




  1   2   3   >