Bug#1043415: netdata: Integrated web server displays "File does not exist, or is not accessible: "

2023-08-10 Thread Marc Riedel
Package: netdata
Version: 1.41.0-1
Severity: important
X-Debbugs-Cc: m.riedel@gmail.com

When opening http://localhost:1, only "File does not exist, or is not
accessible: " is displayed. Maybe related to commit "Refreshing allow-
symlinks.patch."

Best regards,

Marc


-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 6.4.0-9.slh.2-aptosid-amd64 (SMP w/12 CPU threads; PREEMPT)
Kernel taint flags: TAINT_USER
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages netdata depends on:
ii  netdata-core  1.41.0-1
ii  netdata-plugins-bash  1.41.0-1
ii  netdata-web   1.41.0-1

Versions of packages netdata recommends:
ii  netdata-plugins-python  1.41.0-1

netdata suggests no packages.

-- no debconf information



Bug#1001248: grub-efi-amd64-bin: Add luks2 module

2023-01-05 Thread Marc Riedel
Hi Vagrant,

this patch will include the luks2 module into the grubx64.efi file, which
gets chainloaded from the signed shimx64.efi.
The grubx64.efi eventually should get signed by the Debian CA and packed
into grub-efi-amd64-signed.

Best regards

Marc


Bug#1001248: grub-efi-amd64-bin: Add luks2 module

2021-12-06 Thread Marc Riedel
Package: grub-efi-amd64-bin
Version: 2.06-2
Severity: important
Tags: patch

Please add luks2 module to build-efi-images and please notice in the changelog,
that only PBKDF2 is currently supported.

Thanks in adavnce

Marc


-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, armehf, armhf

Kernel: Linux 5.15.0-1.slh.1-aptosid-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND
Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages grub-efi-amd64-bin depends on:
ii  grub-common  2.04-20

Versions of packages grub-efi-amd64-bin recommends:
pn  efibootmgr 
pn  grub-efi-amd64-signed  

grub-efi-amd64-bin suggests no packages.

*** /tmp/build-efi-images.patch
--- build-efi-images.orig   2021-12-06 23:47:58.369609691 +0100
+++ build-efi-images2021-12-06 23:48:07.717711282 +0100
@@ -180,6 +180,7 @@
gcry_twofish
gcry_whirlpool
luks
+   luks2
lvm
mdraid09
mdraid1x



Bug#925550: grub-efi-amd64-signed: Cannot verify grubx64.efi.signed against "Debian Secure Boot CA"

2019-03-26 Thread Marc Riedel
Package: grub-efi-amd64-bin
Version: 1+2.02+dfsg1+16
Severity: important
Tags: upstream

I cannot verify grubx64.efi.signed against "Debian Secure Boot CA"
(https://dsa.debian.org/secure-boot-ca).

Steps to reproduce:

sbverify --list /usr/lib/grub/x86_64-efi-signed/grubx64.efi.signed
signature 1
image signature issuers:
 - /CN=Debian Secure Boot CA
image signature certificates:
 - subject: /CN=Debian Secure Boot Signer
   issuer:  /CN=Debian Secure Boot CA

wget -q -O - https://dsa.debian.org/secure-boot-ca | openssl x509 -inform der
-outform  pem -out secure-boot-ca.pem

openssl x509 -in secure-boot-ca.pem -text -noout
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
ed:54:a1:d5:af:87:48:94:8d:9f:89:32:ee:9c:7c:34
Signature Algorithm: sha256WithRSAEncryption
Issuer: CN = Debian Secure Boot CA
Validity
Not Before: Aug 16 18:09:18 2016 GMT
Not After : Aug  9 18:09:18 2046 GMT
Subject: CN = Debian Secure Boot CA
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:9d:95:d4:8b:9b:da:10:ac:2e:ca:82:37:c1:a4:
cb:4a:c3:1b:42:93:c2:7a:29:d3:6e:dd:64:af:80:
af:ea:66:a2:1b:61:9c:83:0c:c5:6b:b9:35:25:ff:
c5:fb:e8:29:43:de:ce:4b:3d:c6:12:4d:b1:ef:26:
43:95:68:cd:04:11:fe:c2:24:9b:de:14:d8:86:51:
e8:38:43:bd:b1:9a:15:e5:08:6b:f8:54:50:8b:b3:
4b:5f:fc:14:e4:35:50:7c:0b:b1:e2:03:84:a8:36:
48:e4:80:e8:ea:9f:fa:bf:c5:18:7b:5e:ce:1c:be:
2c:80:78:49:35:15:c0:21:cf:ef:66:d5:8a:96:08:
2b:66:2f:48:17:b1:e7:ec:82:8f:07:e6:ca:e0:5f:
71:24:39:50:0a:8e:d1:72:28:50:a5:9d:21:f4:e3:
61:ba:09:03:66:c8:df:4e:26:36:0b:15:0f:63:1f:
2b:af:ab:c4:28:a2:56:64:85:8d:a6:55:41:ae:3c:
88:95:dd:d0:6d:d9:29:db:d8:c4:68:b5:fc:f4:57:
89:6b:14:db:e0:ef:ee:40:0d:62:1f:ea:58:d4:a3:
d8:ba:03:a6:97:2e:c5:6b:13:a4:91:77:a6:b5:ad:
23:a7:eb:0a:49:14:46:7c:76:e9:9e:32:b4:89:af:
57:79
Exponent: 65537 (0x10001)
X509v3 extensions:
Authority Information Access:
CA Issuers - URI:https://dsa.debian.org/secure-boot-ca

X509v3 Authority Key Identifier:
keyid:6C:CE:CE:7E:4C:6C:0D:1F:61:49:F3:DD:27:DF:CC:5C:BB:41:9E:A1

Netscape Cert Type: critical
SSL Client, SSL Server, S/MIME, Object Signing, SSL CA, S/MIME
CA, Object Signing CA
X509v3 Extended Key Usage:
Code Signing
X509v3 Key Usage: critical
Digital Signature, Certificate Sign, CRL Sign
X509v3 Basic Constraints: critical
CA:TRUE
X509v3 Subject Key Identifier:
6C:CE:CE:7E:4C:6C:0D:1F:61:49:F3:DD:27:DF:CC:5C:BB:41:9E:A1
Signature Algorithm: sha256WithRSAEncryption
 77:96:3e:47:c9:ce:09:cf:8b:89:ce:59:ed:26:0e:26:0b:b9:
 ad:a9:2b:bd:a1:eb:88:79:02:ff:31:de:fe:f5:6a:07:ef:61:
 13:11:70:1e:bf:9c:4e:66:6c:e1:62:12:97:01:57:65:47:dd:
 4a:c6:f7:f4:de:a8:f1:13:62:cc:83:57:ac:3c:a6:91:15:af:
 55:26:72:69:2e:14:cd:dd:4d:b3:d1:60:24:2d:32:4f:19:6c:
 11:5e:f2:a3:f2:a1:5f:62:0f:30:ae:ad:f1:48:66:64:7d:36:
 44:0d:06:34:3d:2e:af:8e:9d:c3:ad:c2:91:d8:37:e0:ee:7a:
 5f:82:3b:67:8e:00:8a:c4:a4:df:35:16:c2:72:2b:4c:51:d7:
 93:93:9e:ba:08:0d:59:97:f2:e2:29:a0:44:4d:ea:ee:f8:3e:
 02:60:ca:15:cf:4e:9a:25:91:84:3f:b7:5a:c7:ee:bc:6b:80:
 a3:d9:fd:b2:6d:7a:1e:63:14:eb:ef:f1:b0:40:25:d5:e8:0e:
 81:eb:6b:f7:cb:ff:e5:21:00:22:2c:2e:9a:35:60:12:4b:5b:
 5f:38:46:84:0c:06:9c:cf:72:93:62:18:ee:5c:98:d6:b3:7d:
 06:25:39:95:df:4e:60:76:b0:06:7b:08:b0:6e:e3:64:9f:21:
 56:ad:39:0f

sbverify --cert secure-boot-ca.pem /usr/lib/grub/x86_64-efi-
signed/grubx64.efi.signed
Signature verification failed

Can you please point me to the right certificate?

Best Regards

Marc Riedel



-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 5.0.0-2.slh.1-aptosid-amd64 (SMP w/12 CPU cores; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_USER, TAINT_OOT_MODULE
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE= 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages grub-efi-amd64-signed depends on:
ii  grub-common  2.02+dfsg1-16

Versions of packages grub-efi-amd64-signed recommends:
ii  shim-signed  1.28+nmu3+0.9+1474479173.6c180c6-1

grub-efi-amd64-signed sugg

Bug#729056: cups: Remote printing doesn't work - prnt/hpcups/HPCupsFilter.cpp 542

2013-11-08 Thread Marc Riedel
Package: cups
Version: 1.6.4-1
Severity: important
Tags: patch

Hi there,

I ran into trouble printing over network with a HP printer.
Therefor I searched the web and found this bugreport
https://bugzilla.redhat.com/show_bug.cgi?id=1010580.
It addresses the exact problem.
After applying the include two patches to the master branch
git://anonscm.debian.org/pkg-cups/cups.git the error is gone.
Please consider to include those patches and push a new upstream release.

Cheers

Marc



-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
armehf

Kernel: Linux 3.11-6.slh.1-aptosid-amd64 (SMP w/4 CPU cores; PREEMPT)
Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages cups depends on:
ii  cups-client1.6.4-1
ii  cups-common1.6.4-1
ii  cups-daemon1.6.4-1
ii  cups-filters   1.0.34-3+b1
ii  cups-ppdc  1.6.4-1
ii  cups-server-common 1.6.4-1
ii  debconf [debconf-2.0]  1.5.51
ii  ghostscript9.05~dfsg-8
ii  libavahi-client3   0.6.31-2
ii  libavahi-common3   0.6.31-2
ii  libc-bin   2.17-93
ii  libc6  2.17-93
ii  libcups2   1.6.4-1
ii  libcupscgi11.6.4-1
ii  libcupsimage2  1.6.4-1
ii  libcupsmime1   1.6.4-1
ii  libcupsppdc1   1.6.4-1
ii  libgcc11:4.8.2-1
ii  libstdc++6 4.8.2-1
ii  libusb-1.0-0   2:1.0.17-1+b1
ii  lsb-base   4.1+Debian12
ii  poppler-utils  0.18.4-8
ii  procps 1:3.3.8-2

Versions of packages cups recommends:
ii  avahi-daemon   0.6.31-2
pn  colord 
ii  cups-filters   1.0.34-3+b1
ii  foomatic-filters   4.0.17-1
ii  ghostscript-cups   9.05~dfsg-8
ii  printer-driver-gutenprint  5.2.9-1

Versions of packages cups suggests:
ii  cups-bsd   1.6.4-1
ii  cups-pdf   2.6.1-9
ii  foomatic-db20130912-1
ii  hplip  3.13.9-2
ii  printer-driver-hpcups  3.13.9-2
ii  smbclient  2:4.0.10+dfsg-3
ii  udev   204-5

-- debconf information:
  cupsys/raw-print: true
  cupsys/backend: lpd, socket, usb, snmp, dnssd
diff -up cups-1.6b1/scheduler/job.c.filter-debug cups-1.6b1/scheduler/job.c
--- cups-1.6b1/scheduler/job.c.filter-debug	2012-05-25 16:06:01.0 +0200
+++ cups-1.6b1/scheduler/job.c	2012-05-25 16:07:46.309259511 +0200
@@ -625,10 +625,28 @@ cupsdContinueJob(cupsd_job_t *job)	/* I
 
 if (!filters)
 {
+  mime_filter_t *current;
+
   cupsdLogJob(job, CUPSD_LOG_ERROR,
 		  "Unable to convert file %d to printable format.",
 		  job->current_file);
 
+  cupsdLogJob(job, CUPSD_LOG_ERROR,
+		  "Required: %s/%s -> %s/%s",
+		  job->filetypes[job->current_file]->super,
+		  job->filetypes[job->current_file]->type,
+		  job->printer->filetype->super,
+		  job->printer->filetype->type);
+
+  for (current = (mime_filter_t *)cupsArrayFirst(MimeDatabase->srcs);
+	   current;
+	   current = (mime_filter_t *)cupsArrayNext(MimeDatabase->srcs))
+	  cupsdLogJob(job, CUPSD_LOG_ERROR,
+		  "Available: %s/%s -> %s/%s (%s)",
+		  current->src->super, current->src->type,
+		  current->dst->super, current->dst->type,
+		  current->filter);
+
   abort_message = "Aborting job because it cannot be printed.";
   abort_state   = IPP_JOB_ABORTED;
 
diff -up cups-1.6.4/scheduler/job.c.final-content-type cups-1.6.4/scheduler/job.c
--- cups-1.6.4/scheduler/job.c.final-content-type	2013-09-27 16:58:13.934775402 +0100
+++ cups-1.6.4/scheduler/job.c	2013-09-27 17:00:57.716549576 +0100
@@ -692,12 +692,7 @@ cupsdContinueJob(cupsd_job_t *job)	/* I
 
 if (!job->printer->remote)
 {
-  for (filter = (mime_filter_t *)cupsArrayLast(filters);
-   filter && filter->dst;
-   filter = (mime_filter_t *)cupsArrayPrev(filters))
-if (strcmp(filter->dst->super, "printer") ||
-strcmp(filter->dst->type, job->printer->name))
-  break;
+  filter = (mime_filter_t *)cupsArrayLast(filters);
 
   if (filter && filter->dst)
   {


Bug#560721: spice and its friends uploaded to mentors.debian.org

2010-11-17 Thread Marc Riedel

Hi there,

the packages at mentors are working quite well.
It would be nice to see qemu-spice with kvm support.
I compiled it from git (spice.kvm.v18) and it seems to work.
I don't know why they're stuck at v18?
The next libvirt verison v0.8.6 should also support spice.
Till now you need the master branch and compile it from scratch.
To get libvirt workin with qxl I needed to change "-vga 
[std|cirrus|vmware|xenfb|none]\n" to "-vga 
[std|cirrus|vmware|xenfb|qxl|none]\n" in qemu-options.hx (spice.kvm.v18).


Cheers,
Marc



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org