Bug#887384: [bug #53021] Ability to provide password per-instance

2018-01-30 Thread NoëlKöthe
URL:
  

 Summary: Ability to provide password per-instance
 Project: GNU Wget
Submitted by: nok
Submitted on: Tue 30 Jan 2018 07:28:37 PM CET
Category: Feature Request
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: None
Operating System: GNU/Linux
 Reproducibility: None
   Fixed Release: None
 Planned Release: None
  Regression: None
   Work Required: None
  Patch Included: None

___

Details:

Hello,

a feature request from a Debian user:
https://bugs.debian.org/887384

As far as I can tell, Wget only provides the following methods to
provide a HTTP password:

  1. as part of the URL
  2. with --http-password / --password
  3. using ~/.netrc
  4. using --use-askpass
  5. using --ask-password

The problem is that 1 & 2 expose the password in the process table, while
~/.netrc is a centralised resource that may not be editable by a script. 4 & 5
are interactive, and while I could provide an ad-hoc askpass script, this is a
gross hack.

It'd be awesome if Wget could provide one or more of the following methods to
provide the password:

  1. read it from $WGET_PASSWORD
  2. read it from a specific file
  3. read it from a netrc-style file that is not ~/.netrc
  4. let --use-askpass specify parameters to the script/binary to invoke

Ftr, my current hack involves creating an executable temporary file with
content like this:

  #!/bin/sh
  echo username:password

and then invoking wget like so:

  wget -c --use-askpass=tempfile …

and that works, but it's a hack that I think could be rendered
obsolete by Wget functionality. Lftp and cURL both provide ways to either read
from the environment, or to override the netrc filename.
Lftp furthermore can be scripted itself, which solves the problem
in its own way.

Thank you.




___

Reply to this item at:

  

___
  Message sent via/by Savannah
  http://savannah.gnu.org/



Bug#888691: [bug #53020] wget -b produces empty wget-log file

2018-01-30 Thread NoëlKöthe
URL:
  

 Summary: wget -b produces empty wget-log file
 Project: GNU Wget
Submitted by: nok
Submitted on: Tue 30 Jan 2018 07:21:26 PM CET
Category: User Interface
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: trunk
Operating System: GNU/Linux
 Reproducibility: Every Time
   Fixed Release: None
 Planned Release: None
  Regression: Yes
   Work Required: None
  Patch Included: No

___

Details:

Hello,

with wget 1.19.3 and 1.19.4 I can reproduce the following problem:

$ LC_ALL=C wget -b debian.org
Continuing in background, pid 19726.
Output will be written to 'wget-log'.
$ cat wget-log 
$

With -b no logging is written anymore.

https://bugs.debian.org/888691




___

Reply to this item at:

  

___
  Message sent via/by Savannah
  http://savannah.gnu.org/



Bug#813158: [bug #52349] Seg fault with wget -O - smxi.org/sm/sm-versions

2017-11-06 Thread NoëlKöthe
Follow-up Comment #1, bug #52349 (project wget):

It 1.19.2 but the bugtracker lists 1.19.1 as latest version.

___

Reply to this item at:

  

___
  Message sent via/by Savannah
  http://savannah.gnu.org/



Bug#813158: [bug #52349] Seg fault with wget -O - smxi.org/sm/sm-versions

2017-11-06 Thread NoëlKöthe
URL:
  

 Summary: Seg fault with wget -O - smxi.org/sm/sm-versions
 Project: GNU Wget
Submitted by: nok
Submitted on: Mon 06 Nov 2017 09:10:32 AM CET
Category: Crash/Freeze/Infloop
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: 1.19.1
Operating System: GNU/Linux
 Reproducibility: Every Time
   Fixed Release: None
 Planned Release: None
  Regression: Yes
   Work Required: None
  Patch Included: None

___

Details:

Hello,

a forwarded bug report from https://bugs.debian.org/813158 (2. report) which I
can reproduce:

--8<--
A full discussion is at http://techpatterns.com/forums/about2621.html

Running the sgfxi script after installing wget 1.19.2-1 produces the following
segfault:

# wget -O - smxi.org/sm/sm-versions
--2017-11-04 14:23:41--  http://smxi.org/sm/sm-versions
Resolving smxi.org (smxi.org)... 216.92.31.53
Connecting to smxi.org (smxi.org)|216.92.31.53|:80... connected.
HTTP request sent, awaiting response... 301 Moved Permanently
Location: https://smxi.org/sm/sm-versions [following]
--2017-11-04 14:23:41--  https://smxi.org/sm/sm-versions
Connecting to smxi.org (smxi.org)|216.92.31.53|:443... connected.
HTTP request sent, awaiting response... 200 OK
Segmentation fault

4 people are reporting the exact same error. I'm not getting
this segfault with 1.19.1-4 
--8<--

Thank you.




___

Reply to this item at:

  

___
  Message sent via/by Savannah
  http://savannah.gnu.org/



Bug#874590: [bug #51181] Unexpected "Redirecting output to 'wget-log'."

2017-09-17 Thread NoëlKöthe
Follow-up Comment #1, bug #51181 (project wget):

an additional comment from a Debian user:

--8<--
This has hit many and is already reported in several distributions, but not in
Debian yet.

Since 1.19, when run in the background, even with --quiet, wget creates a log
file wget-log in the current directory, which is normally empty.
If wget-log exists, it creates wget-log.1, and so on.

The workaround is to use -o /dev/null, but this changed behaviour breaks
existing scripts and is undocumented.
--8<--
https://bugs.debian.org/874590

___

Reply to this item at:

  

___
  Message sent via/by Savannah
  http://savannah.gnu.org/



Bug#870813: [bug #51666] Please hash the hostname in ~/.wget-hsts files

2017-08-05 Thread NoëlKöthe
URL:
  

 Summary: Please hash the hostname in ~/.wget-hsts files
 Project: GNU Wget
Submitted by: nok
Submitted on: Sat 05 Aug 2017 04:14:03 PM CEST
Category: Feature Request
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: trunk
Operating System: GNU/Linux
 Reproducibility: Every Time
   Fixed Release: None
 Planned Release: None
  Regression: No
   Work Required: None
  Patch Included: No

___

Details:

Hello,

a feature request from a Debian user:

--8<--
Hi,

I recently discovered the .wget-hsts file in my home directory which is used
to persist state for HSTS:

  https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security

It contains lines such as:

  # HSTS 1.0 Known Hosts database for GNU Wget.
  # Edit at your own risk.
  #  
  github.com0   1   1450887745  31536000
  ftp-master.debian.org 0   0   1472482586  15552000
  diffoscope.org0   0   1449765396  15768000
  reproducible-builds.org   0   0   1471542629  15552000
  www.dropbox.com  0   1   1458394011  15552000
  reproducible.debian.net   0   0   1448074844  15552000
  […]

I can't help but think of ~/.ssh/known_hosts which moved to hashing the
hostname for various security/privacy concerns. Shouldn't wget make the
parallel change?
--8<--
https://bugs.debian.org/870813

Thank you.




___

Reply to this item at:

  

___
  Message sent via/by Savannah
  http://savannah.gnu.org/



Bug#849961: [bug #50577] URL in wget.texi changed

2017-03-18 Thread NoëlKöthe
URL:
  

 Summary: URL in wget.texi changed
 Project: GNU Wget
Submitted by: nok
Submitted on: Sat 18 Mar 2017 04:35:43 PM CET
Category: Documentation
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: trunk
Operating System: GNU/Linux
 Reproducibility: Every Time
   Fixed Release: None
 Planned Release: None
  Regression: No
   Work Required: None
  Patch Included: Yes

___

Details:

Hello,

a Debian user pointed to a 404 URL in the documentation with the correct one:

diff --git a/doc/wget.texi b/doc/wget.texi
index 755f882c..8645b257 100644
--- a/doc/wget.texi
+++ b/doc/wget.texi
@@ -4285,7 +4285,7 @@ this:
 @end example
 
 This is explained in some detail at
-@url{http://www.robotstxt.org/wc/meta-user.html}.  Wget supports this
+@url{http://www.robotstxt.org/meta.html}.  Wget supports this
 method of robot exclusion in addition to the usual @file{/robots.txt}
 exclusion.


If you want to fix more URLs from this webpage:

$ rgrep robotstxt.org *
...
NEWS:.
src/res.c:   is still available at
.
src/res.c:   .
src/res.c:   , section 3.2.2. 
*/

removing the wc/ in these URLs should result in correct ones.

Thanks and regards

Noël




___

Reply to this item at:

  

___
  Message sent via/by Savannah
  http://savannah.gnu.org/



Bug#797057: [bug #46061] wget https://contributors.debian.org fails with "No data received."

2015-09-27 Thread NoëlKöthe
URL:
  

 Summary: wget https://contributors.debian.org fails with "No
data received."
 Project: GNU Wget
Submitted by: nok
Submitted on: So 27 Sep 2015 18:13:54 CEST
Category: Protocol Issue
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: 1.16.3
Operating System: GNU/Linux
 Reproducibility: Every Time
   Fixed Release: None
 Planned Release: None
  Regression: None
   Work Required: None
  Patch Included: No

___

Details:

Hello,

a forwarded bug from https://bugs.debian.org/797057

"We currently added "SSLVerifyClient optional" to the server configuration to
support authentication with client certificates, but client certificates are
not required to connect. The relevant apache configuration is here:

 
https://wiki.debian.org/DebianSingleSignOn#Documentation_for_web_application_owners-1

curl can access the site."

$ LC_ALL=C wget -d https://contributors.debian.org
DEBUG output created by Wget 1.16.3 on linux-gnu.

URI encoding = 'ANSI_X3.4-1968'
converted 'https://contributors.debian.org' (ANSI_X3.4-1968) ->
'https://contributors.debian.org' (UTF-8)
--2015-09-27 18:08:27--  https://contributors.debian.org/
Certificates loaded: 180
Resolving contributors.debian.org (contributors.debian.org)...
2607:f8f0:610:4000:216:36ff:fe40:3861, 206.12.19.123
Caching contributors.debian.org => 2607:f8f0:610:4000:216:36ff:fe40:3861
206.12.19.123
Connecting to contributors.debian.org
(contributors.debian.org)|2607:f8f0:610:4000:216:36ff:fe40:3861|:443...
connected.
Created socket 4.
Releasing 0x55f91c3876f0 (new refcount 1).

---request begin---
GET / HTTP/1.1
User-Agent: Wget/1.16.3 (linux-gnu)
Accept: */*
Accept-Encoding: identity
Host: contributors.debian.org
Connection: Keep-Alive

---request end---
HTTP request sent, awaiting response... No data received.
Retrying.

--2015-09-27 18:08:29--  (try: 2)  https://contributors.debian.org/
Found contributors.debian.org in host_name_addresses_map (0x55f91c3876f0)
Connecting to contributors.debian.org
(contributors.debian.org)|2607:f8f0:610:4000:216:36ff:fe40:3861|:443...
connected.
Created socket 4.
Releasing 0x55f91c3876f0 (new refcount 1).

---request begin---
GET / HTTP/1.1
User-Agent: Wget/1.16.3 (linux-gnu)
Accept: */*
Accept-Encoding: identity
Host: contributors.debian.org
Connection: Keep-Alive

---request end---
HTTP request sent, awaiting response... No data received.
Retrying.

^C
$  openssl s_client -connect contributors.debian.org:443
CONNECTED(0003)
depth=3 C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN =
AddTrust External CA Root
verify return:1
depth=2 C = US, ST = New Jersey, L = Jersey City, O = The USERTRUST Network,
CN = USERTrust RSA Certification Authority
verify return:1
depth=1 C = FR, ST = Paris, L = Paris, O = Gandi, CN = Gandi Standard SSL CA
2
verify return:1
depth=0 OU = Domain Control Validated, OU = Gandi Standard SSL, CN =
contributors.debian.org
verify return:1
---
Certificate chain
 0 s:/OU=Domain Control Validated/OU=Gandi Standard
SSL/CN=contributors.debian.org
   i:/C=FR/ST=Paris/L=Paris/O=Gandi/CN=Gandi Standard SSL CA 2
 1 s:/C=FR/ST=Paris/L=Paris/O=Gandi/CN=Gandi Standard SSL CA 2
   i:/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust
RSA Certification Authority
 2 s:/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust
RSA Certification Authority
   i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External
CA Root
---
Server certificate
-BEGIN CERTIFICATE-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Bug#633703: [bug #45800] --convert-links messages could be clearer

2015-08-20 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?45800

 Summary: --convert-links messages could be clearer
 Project: GNU Wget
Submitted by: nok
Submitted on: Do 20 Aug 2015 16:17:09 CEST
Category: Feature Request
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: None
Operating System: None
 Reproducibility: None
   Fixed Release: None
 Planned Release: None
  Regression: No
   Work Required: None
  Patch Included: None

___

Details:

Hello,

a minor wishlist to the wget output:

--8--
Apparently

  wget --convert-links

causes

  Converting index.html... 18-70
  Converted 1 files in 0.002 seconds.

messages.

However they should mention 'converting links' or 'wget: doing
--convert-links operation', else one can't figure out what of the many other
possible conversions it might be talking about.
--8--
https://bugs.debian.org/633703

It was reported to the bug-wget mailinglist but without answer.
https://lists.gnu.org/archive/html/bug-wget/2011-07/msg00011.html

thx  regards

Noël




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?45800

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/



Bug#281201: [bug #45790] wget prints it's progress even when background

2015-08-18 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?45790

 Summary: wget prints it's progress even when background
 Project: GNU Wget
Submitted by: nok
Submitted on: Di 18 Aug 2015 11:03:31 CEST
Category: User Interface
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: None
Operating System: None
 Reproducibility: None
   Fixed Release: None
 Planned Release: None
  Regression: None
   Work Required: None
  Patch Included: None

___

Details:

Hello,

an old forgotten bug report:

--8--
When wget is suspended in command line and then
send into background (eg using bash bg command), it continues
to print it's progress messages. This leads to either stopping
wget or to garbling terminal with wget messages (depending
on the TOSTOP terminal setting).
--8--
My suggestion is to stop printing verbose progress messages
when the job is resumed in background. It could be checked
by (successful) getpgrp() not equal to (successful) tcgetprp(1)
in SIGCONT signal handler.
 And something like this is used in some console applications,
for example, in lftp.
--8--
https://bugs.debian.org/281201

As an example:

# wget
http://cdimage.debian.org/debian-cd/current/multi-arch/iso-cd/debian-8.1.0-amd64-i386-netinst.iso
Press ctrl+z
[1]+  Stopped  wget
http://cdimage.debian.org/debian-cd/current/multi-arch/iso-cd/debian-8.1.0-amd64-i386-netinst.iso
nk@pro:/tmp/test$ bg
garbling the terminal but commands work as expected

Regards

Noël




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?45790

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/



Bug#660932: [bug #45791] Double quote in (some) wget's international output for downloaded filename

2015-08-18 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?45791

 Summary: Double quote in (some) wget's international output
for downloaded filename
 Project: GNU Wget
Submitted by: nok
Submitted on: Di 18 Aug 2015 12:00:06 CEST
Category: Localization
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: None
Operating System: None
 Reproducibility: None
   Fixed Release: None
 Planned Release: None
  Regression: None
   Work Required: None
  Patch Included: None

___

Details:

Hello,

some translators (de and ru known) add additional quotes which results in
double quotes like this:

...
2015-08-18 11:54:02 (459 KB/s) - »»index.html«« gespeichert [14710/14710]

This is known since some time and Tim already informed the translators but
without success.:(

https://bugs.debian.org/660932

thx.

Regards

Noël




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?45791

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/



Bug#712155: [bug #45789] wget: -O does not work as described wrt timestamps

2015-08-18 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?45789

 Summary: wget: -O does not work as described wrt timestamps
 Project: GNU Wget
Submitted by: nok
Submitted on: Di 18 Aug 2015 10:44:34 CEST
Category: Documentation
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: None
Operating System: None
 Reproducibility: None
   Fixed Release: None
 Planned Release: None
  Regression: None
   Work Required: None
  Patch Included: None

___

Details:

Hello,

a forwarded and with 1.16.3 reproducible bug report:

--8--
wget's manpage says:

   -O file
   --output-document=file
 ...
   Use of -O is not intended to mean simply use the name file
instead of the one in the URL; rather, it is
   analogous to shell redirection: wget -O file http://foo is
intended to work like wget -O - http://foo 
   file; file will be truncated immediately, and all downloaded
content will be written there.

   For this reason, -N (for timestamp-checking) is not supported in
combination with -O: since file is always
   newly created, it will always have a very new timestamp. A warning
will be issued if this combination is
   used.

but:

 $ date
 Do 13. Jun 17:12:06 CEST 2013
 $ wget http://www.debian.org
 ...
 $ wget -O test1 http://www.debian.org
 ...
 $ wget -O - http://www.debian.org  test2
 ...
 $ ls -l index.html test1 test2
 -rw-r--r-- 1 user group 14649 Jun 11 21:58 index.html
 -rw-r--r-- 1 user group 14649 Jun 11 21:58 test1
 -rw-r--r-- 1 user group 14649 Jun 13 17:12 test2

So the documentation is completely wrong here: '-O file' has the same
timestamp of the last change of the web
page as the naked wget and behaves clearly different from '-O -  file' here.
--8--

https://bugs.debian.org/712155

Additional there is a comment on this from former maintainer Micah in this
report but I want to be sure and verifiy if you think if is or is not
something which might be corrected.

thx




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?45789

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/



Bug#744170: [bug #45792] wget: Read error in TLS connection with openssl s_server -www server

2015-08-18 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?45792

 Summary: wget: Read error in TLS connection with openssl
s_server -www server
 Project: GNU Wget
Submitted by: nok
Submitted on: Di 18 Aug 2015 13:19:01 CEST
Category: Protocol Issue
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: 1.16.3
Operating System: None
 Reproducibility: None
   Fixed Release: None
 Planned Release: None
  Regression: None
   Work Required: None
  Patch Included: None

___

Details:

Hello,

--8--
What I set up a test server with:

  openssl s_server -CAfile ... -key ... -cert ... -www

and try wget with it, I get errors:

--2015-08-18 12:29:07--  https://www.vinc17.net:4433/
Resolving www.vinc17.net (www.vinc17.net)... 92.243.22.117,
2001:4b98:dc0:45:216:3eff:fe9b:eb2f
Connecting to www.vinc17.net (www.vinc17.net)|92.243.22.117|:4433...
connected.
HTTP request sent, awaiting response... 200 ok
Length: unspecified [text/html]
Saving to: ‘index.html’

index.html  [ =  ]   5.26K  --.-KB/s   in 0s


2015-08-18 12:29:07 (204 MB/s) - Read error at byte 5386 (The TLS connection
was non-properly terminated.).Retrying.

--2015-08-18 12:29:08--  (try: 2)  https://www.vinc17.net:4433/
Connecting to www.vinc17.net (www.vinc17.net)|92.243.22.117|:4433...
connected.
HTTP request sent, awaiting response... 200 ok
Length: unspecified [text/html]
Saving to: ‘index.html’

index.html  [ =  ]   5.26K  --.-KB/s   in 0s


2015-08-18 12:29:08 (1.21 GB/s) - Read error at byte 5386 (The TLS connection
was non-properly terminated.).Retrying.
...
--8--
https://bugs.debian.org/744170

thxregards

Noël




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?45792

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/



Bug#733039: [bug #45777] possibility to enable NORMAL:%COMPAT GNUTLS priority strings

2015-08-17 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?45777

 Summary: possibility to enable NORMAL:%COMPAT GNUTLS priority
strings
 Project: GNU Wget
Submitted by: nok
Submitted on: Mo 17 Aug 2015 11:13:12 CEST
Category: Feature Request
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: None
Operating System: None
 Reproducibility: None
   Fixed Release: None
 Planned Release: None
  Regression: None
   Work Required: None
  Patch Included: None

___

Details:

Hello,

a user requested some years ago the possibility to set the gnutls priority
strings http://gnutls.org/manual/html_node/Priority-Strings.html in wget. Tim
extended the option --secure-protocol=
https://lists.gnu.org/archive/html/bug-wget/2013-08/msg00075.html but it is
not possible to set all described strings.
We could later write a wrapper to map GnuTLS priority syntax to OpenSSL API
calls. https://lists.gnu.org/archive/html/bug-wget/2013-08/msg00053.html

Please add the possibilty to set the GNUTLS priority strings.

https://bugs.debian.org/733039

Thanks you.

Regards

Noël




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?45777

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/



Bug#387745: [bug #45778] wget and unicode

2015-08-17 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?45778

 Summary: wget and unicode
 Project: GNU Wget
Submitted by: nok
Submitted on: Mo 17 Aug 2015 14:35:06 CEST
Category: Code Architecture
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: None
Operating System: None
 Reproducibility: None
   Fixed Release: None
 Planned Release: None
  Regression: None
   Work Required: None
  Patch Included: None

___

Details:

Hello,

--8--
$ echo $f
%E9%A6%96%E9%A1%B5
$ wget -nv http://zh.wikipedia.org/wiki/$f 21|qprint -e
2015-08-17 14:33:17 URL:https://zh.wikipedia.org/wiki/%E9%A6%96%E9%A1%=
B5 [36245] - =E9=A6%96=E9=A1=B5 [1]
nk@pro:/tmp/test$ ls -l|qprint -e
insgesamt 36
-rw-r--r-- 1 nk nk 36245 Aug  7 09:36 =E9=A6%96=E9=A1=B5

Note the %96 where the 3rd byte should be.
--8--
https://bugs.debian.org/387745




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?45778

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/



Bug#496583: [bug #45776] ClamAV integration?

2015-08-17 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?45776

 Summary: ClamAV integration?
 Project: GNU Wget
Submitted by: nok
Submitted on: Mo 17 Aug 2015 10:28:07 CEST
Category: Feature Request
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: None
Operating System: None
 Reproducibility: None
   Fixed Release: None
 Planned Release: None
  Regression: None
   Work Required: None
  Patch Included: No

___

Details:

Hello,

this is an older feature request with a comment from a former maintainer which
might result in wonfix, but maybe I'm wrong:

--8--
From: Micah Cowan micah@...
...
Nigel Horne wrote:
 Please add an option to pass the file through ClamAV. If the file is
infected it isn't saved.

That's not very general, and isn't a particularly useful feature anyway, since
one can very easily run the files through ClamAV _after_ they've been saved.
Scanning-and-then-saving implies it would have to be saved to a temporary file
_anyway_, or else handled entirely in memory (which is generally
unreasonable).

Wget upstream development _is_ planning to eventually support more generic
process-filtered/plugin mechanisms for handling such things as link-parsing,
content-filtering, and probably filestore management (such as saving to a
tarball or multipart/related archive). That last feature would make a suitable
general hook for plugging in a ClamAV scanner, perhaps, which could simply
decline to save the files it doesn't like. Still have the same problem,
though, of needing to save to a temporary file or else hold it in memory.
--8--
https://bugs.debian.org/496583

thx for your feedback.




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?45776

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/



Bug#32353: [bug #45689] wget: opens a new connection for each ftp document

2015-08-04 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?45689

 Summary: wget: opens a new connection for each ftp document
 Project: GNU Wget
Submitted by: nok
Submitted on: Di 04 Aug 2015 14:18:38 CEST
Category: Feature Request
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: trunk
Operating System: GNU/Linux
 Reproducibility: Every Time
   Fixed Release: None
 Planned Release: None
  Regression: None
   Work Required: None
  Patch Included: None

___

Details:

Hello,

reporting an old bug/report from the mailing list:

if I use 'wget ftp://site.com/file1.txt ftp://site.com/file2.txt', wget will
no reuse the ftp connection, but will open one for each document downloaded
from the same site...

https://www.mail-archive.com/wget%40sunsite.dk/msg03316.html
https://bugs.debian.org/32353

thx and regards

Noël




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?45689

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#731110: [bug #40819] wget does not send Accept-Encoding and fails to handle Content-Encoding

2015-08-04 Thread NoëlKöthe
Follow-up Comment #1, bug #40819 (project wget):

just for completness:

commit 176c2b17fc9fd5e5e9db654e599fbfd2ae313bef
Author: Tim Rühsen tim.rueh...@gmx.de
Date:   Tue Nov 11 16:01:58 2014 +0100

Add 'Accept-Encoding: identity' to request header

Fixes bug #40819
Reported-by: Noël Köthe n...@debian.org


___

Reply to this item at:

  http://savannah.gnu.org/bugs/?40819

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#790523: [bug #45443] http_proxy variable should also work for capitalized HTTP_PROXY

2015-06-30 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?45443

 Summary: http_proxy variable should also work for capitalized
HTTP_PROXY
 Project: GNU Wget
Submitted by: nok
Submitted on: Di 30 Jun 2015 11:09:43 CEST
Category: User Interface
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: 1.16.3
Operating System: GNU/Linux
 Reproducibility: Every Time
   Fixed Release: None
 Planned Release: None
  Regression: None
   Work Required: None
  Patch Included: No

___

Details:

Hello,

using the lowercase environment proxy variables works as documented:

# http_proxy=http://doesnotexist wget gnu.org
--2015-06-30 10:58:36--  http://gnu.org/
Resolving doesnotexist (doesnotexist)... failed: Name or service not known.
wget: unable to resolve host address 'doesnotexist'

but using it with capitalized variables they are ignored:

# HTTP_PROXY=http://doesnotexist wget gnu.org
--2015-06-30 11:07:42--  http://gnu.org/
Resolving gnu.org (gnu.org)... 208.118.235.148
Connecting to gnu.org (gnu.org)|208.118.235.148|:80... connected.
HTTP request sent, awaiting response... 301 Moved Permanently
Location: http://www.gnu.org/ [following]
--2015-06-30 11:07:42--  http://www.gnu.org/
Resolving www.gnu.org (www.gnu.org)... 208.118.235.148, 2001:4830:134:3::a
Reusing existing connection to gnu.org:80.
HTTP request sent, awaiting response... 200 OK
Length: unspecified [text/html]
Saving to: 'index.html'

index.html  [  =]  23.12K  63.1KB/s   in 0.4s  


2015-06-30 11:07:43 (63.1 KB/s) - 'index.html' saved [23677]

Variables are often written capitalized and they should not be ignored by
wget.

Thank you.

https://bugs.debian.org/790523




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?45443

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#784348: [bug #45037] wget -O foo ftp://ftp.funet.fi/pub/Linux/mirrors/debian/README deletes README symlink

2015-05-06 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?45037

 Summary: wget -O foo
ftp://ftp.funet.fi/pub/Linux/mirrors/debian/README deletes README symlink
 Project: GNU Wget
Submitted by: nok
Submitted on: Mi 06 Mai 2015 15:36:34 CEST
Category: Program Logic
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: 1.16.3
Operating System: GNU/Linux
 Reproducibility: Every Time
   Fixed Release: None
 Planned Release: None
  Regression: None
   Work Required: None
  Patch Included: No

___

Details:

Hello,

a forwarded bug report which is reproducible:

https://bugs.debian.org/784348

--8--
joey@darkstar:~/tmp/yln -s /etc/passwd README
joey@darkstar:~/tmp/yls
README@
joey@darkstar:~/tmp/ywget -O foo
ftp://ftp.funet.fi/pub/Linux/mirrors/debian/README
--2015-05-05 13:17:22--  ftp://ftp.funet.fi/pub/Linux/mirrors/debian/README
   = ‘foo’
Resolving ftp.funet.fi (ftp.funet.fi)... 193.166.3.2, 2001:708:10:9::20:2
Connecting to ftp.funet.fi (ftp.funet.fi)|193.166.3.2|:21... connected.
Logging in as anonymous ... Logged in!
== SYST ... done.== PWD ... done.
== TYPE I ... done.  == CWD (1) /pub/Linux/mirrors/debian ... done.
== SIZE README ... 1495
== PASV ... done.== RETR README ... done.
Length: 1495 (1.5K) (unauthoritative)

README  100%[=]   1.46K  5.45KB/s   in 0.3s  


2015-05-05 13:17:28 (5.45 KB/s) - ‘foo’ saved [1495]

joey@darkstar:~/tmp/yls
foo

Doesn't happen if README is a file rather than a symlink, doesn't happen when
using http. The ftp downloader apparently has a bug..
--8--






___

Reply to this item at:

  http://savannah.gnu.org/bugs/?45037

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#779519: [bug #44403] wget --quiet isn't quiet anymore

2015-03-01 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?44403

 Summary: wget --quiet isn't quiet anymore
 Project: GNU Wget
Submitted by: nok
Submitted on: So 01 Mär 2015 21:45:51 CET
Category: Program Logic
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: trunk
Operating System: GNU/Linux
 Reproducibility: Every Time
   Fixed Release: None
 Planned Release: None
  Regression: Yes
   Work Required: None
  Patch Included: No

___

Details:

Hello,

$ wget -V
GNU Wget 1.16.2 built on linux-gnu.

+digest +https +ipv6 +iri +large-file +nls +ntlm +opie +psl +ssl/gnutls 
...
$ wget --quiet gnu.org
index.html  [  = ]  21,63K  99,6KB/s   in 0,2s  

$ 

With 1.16 --quiet was really quiet.

Forwarded from https://bugs.debian.org/779519




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?44403

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#736427: [bug #41331] spurious errors if some files in the cert directory are not certificates

2014-01-24 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?41331

 Summary: spurious errors if some files in the cert directory
are not certificates
 Project: GNU Wget
Submitted by: nok
Submitted on: Fr 24 Jan 2014 11:43:10 CET
Category: User Interface
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: trunk
Operating System: GNU/Linux
 Reproducibility: Every Time
   Fixed Release: None
 Planned Release: None
  Regression: Yes
   Work Required: None
  Patch Included: No

___

Details:

Hello,

a forwarded Debian bug (wget version 1.15; the release option in the savannah
bug tracker only lists until 1.13.4):

--8--
In my .wgetrc file, I use:

ca_directory = ~/wd/config/cacert

With wget 1.15, I get the following errors when downloading a https URL:

ERROR: Failed to open cert /home/vlefevre/wd/config/cacert/c_rehash: (-207).
ERROR: Failed to open cert /home/vlefevre/wd/config/cacert/vfy: (0).

The reason is that c_rehash and vfy are not certificates. wget is the
only program to complain, and it didn't before version 1.15.
--8--
https://bugs.debian.org/736427

Regards

Noël




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?41331

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#709637: [bug #41002] Credentials in URL not supported

2013-12-26 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?41002

 Summary: Credentials in URL not supported
 Project: GNU Wget
Submitted by: nok
Submitted on: Do 26 Dez 2013 12:29:17 CET
Category: Program Logic
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: trunk
Operating System: GNU/Linux
 Reproducibility: None
   Fixed Release: None
 Planned Release: None
  Regression: None
   Work Required: None
  Patch Included: None

___

Details:

Hello,

a forwarded bug from the Debian bugtracker: http://bugs.debian.org/709637:

--8--
Dear Maintainer,

after the upgrade to wheezy wget (basic http) auth doesn't work like
e.g. in version 1.12 anymore.

In former version the username and password could be given in the URL:
$ wget http://user:pass@host...

Doing so with the new version of wget gives an errror.
Using the commandline options '--user' and '--password' works:
$ wget --user=user --password=pass http://host...

...
 Could you send us the output of --debug?

I just found out the problem appears to be dependent on the server:


1.) Boa server  --user/--password = OK (wget__bad_server__ok.log)

$ wget -d -O /dev/null --user=*user* --password=*password* \
... 'http://xxx.xxx.xxx.xxx:80/protected'


2.) Boa server  user:passwd@host = FAIL (wget__bad_server__fail.log)

$ wget -d -O /dev/null \
... 'http://*user*:*password*@xxx.xxx.xxx.xxx:80/protected'


3.) Apache server  user:passwd@host = OK (wget__good_server__ok.log)

$ wget -d -O /dev/null \
... 'https://*user*:*password*@yyy.yyy.yyy.yyy/protected'


In 1 and 2 both the client and the server are the same. In 3 the client 
machine is the same again but the server is on another machine and an 
other implementation.


Thank you, Hannes




___

File Attachments:


---
Date: Do 26 Dez 2013 12:29:17 CET  Name: wget__bad_server__fail.log  Size: 3kB
  By: nok
logfiles
http://savannah.gnu.org/bugs/download.php?file_id=30095
---
Date: Do 26 Dez 2013 12:29:17 CET  Name: wget__good_server__ok.log  Size: 3kB 
 By: nok
logfiles
http://savannah.gnu.org/bugs/download.php?file_id=30096
---
Date: Do 26 Dez 2013 12:29:17 CET  Name: wget__bad_server__ok.log  Size: 2kB  
By: nok
logfiles
http://savannah.gnu.org/bugs/download.php?file_id=30097

___

Reply to this item at:

  http://savannah.gnu.org/bugs/?41002

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#701032: [bug #41003] wget tries to reuse connection despite http/1.0 and no connection: keep-alive

2013-12-26 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?41003

 Summary: wget tries to reuse connection despite http/1.0 and
no connection: keep-alive
 Project: GNU Wget
Submitted by: nok
Submitted on: Do 26 Dez 2013 12:41:40 CET
Category: Protocol Issue
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: trunk
Operating System: GNU/Linux
 Reproducibility: None
   Fixed Release: None
 Planned Release: None
  Regression: None
   Work Required: None
  Patch Included: None

___

Details:

Hello,

a forwarded Debian bug report from http://bugs.debian.org/701032

--8--
   * What led up to the situation?
   
   i built a simple webserver with pythons BaseHTTPServer, which 
   requires a basic http auth. the server answers in http 1.0 and 
   sends no Connection: keep-alive header.
   
   Now i tried to test it with wget, which sent at first (even though 
   i gave it user and password) no auth-string, probably to test which 
   auth-scheme is used.
   
   the server sent a 401 with the WWW-Authenticate: Basic header, and NOW
   
   wget tried to reuse the connection, which is already closed, and 
   should not have been reused, because there was no Content-length 
   header, there was no Keep-alive header AND it was http 1.0, but it 
   did, and the request failed. even though the server didn't do 
   anything wrong.
   
   * What outcome did you expect instead?
   
   i expected one connection per request which would have worked. i 
   didn't expect to read 'reusing existing connection' if there was 
   known to be no keep-alive
--8--

I requested a --debug output but didn't get an answer.

Thank you.




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?41003

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#731110: [bug #40819] wget does not send Accept-Encoding and fails to handle Content-Encoding

2013-12-05 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?40819

 Summary: wget does not send Accept-Encoding and fails to
handle Content-Encoding
 Project: GNU Wget
Submitted by: nok
Submitted on: Do 05 Dez 2013 22:28:45 CET
Category: Protocol Issue
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: trunk
Operating System: GNU/Linux
 Reproducibility: None
   Fixed Release: None
 Planned Release: None
  Regression: None
   Work Required: None
  Patch Included: No

___

Details:

Hello,

a forwarded bug from a Debian user: http://bugs.debian.org/731110

--8--
I observed that wget downloads wrong content from a squid cache. Both tools
operate within the bounds of RFC2616, but the resulting combination is wrong.
Consider the following interaction:

A http client that supports Accept-Encoding and Content-Encoding
downloads an object via a squid3 proxy. An encoding that is not the identity
encoding is chosen and the response is considered cacheable by squid3. At a
later time wget is instructed to retrieve the same object via the same proxy.
Unlike the other client wget does not send an Accept-Encoding header. The
squid3 proxy exercises an assumption explicitly granted by RFC2616 14.3:

| If no Accept-Encoding field is present in a request, the server MAY
| assume that the client will accept any content coding.

It thus sends back the cached object including the Content-Encoding header,
but wget does not handle the header and stores the object in compressed form.

Note that RFC2616 goes on to say:

| In this case, if identity is one of the available content-codings,
| then the server SHOULD use the identity content-coding, unless it has
| additional information that a different content-coding is meaningful to
| the client.

So arguably squid3 is violating a SHOULD clause and should be fixed.

A simple mechanism to resolve the situation is to make wget send an empty
Accept-Encoding header by default or setting its value to identity.

Helmut
--8--

Thank you.




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?40819

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#730662: [bug #40746] wget: fails to parse time from 'Last-Modified: Wed, 27 Nov 2013 07:06:38 UTC'

2013-11-29 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?40746

 Summary: wget: fails to parse time from 'Last-Modified: Wed,
27 Nov 2013 07:06:38 UTC'
 Project: GNU Wget
Submitted by: nok
Submitted on: Fr 29 Nov 2013 09:59:00 CET
Category: Protocol Issue
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: trunk
Operating System: GNU/Linux
 Reproducibility: Every Time
   Fixed Release: None
 Planned Release: None
  Regression: None
   Work Required: None
  Patch Included: Yes

___

Details:

Hello,

a forwarded Debian bug report from http://bugs.debian.org/730662

--8--
wget does not parse Last-Modified timestamps in the UTC timezone,
resulting in error output
  Last-modified header invalid -- time-stamp ignored.
and assigning all downloaded files the current timestamp - which is a loss of
metadata.
The problem occurs in versions 1.13.4-3, 1.14-5, 1.14.96.38327-2.

These timestamps with a UTC instead of GMT timezone seem to be generated by a
(transparent) proxy that identifies itself with this header:
  Via: 1.1 x.x.xx:80 (Cisco-IronPort-WSA/7.7.0-608)

The patch is trivial, in src/http.c in check_end() the following clause needs
to be added:

  || (p[0] == 'U'  p[1] == 'T'  p[2] == 'C')

(tested against the version in experimental)


Andreas
--8--

Thanks for your work.

Regards

Noël




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?40746

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#564656: [bug #33826] doc: reference to Mozilla's cookie file is out of date

2013-11-08 Thread NoëlKöthe
Follow-up Comment #3, bug #33826 (project wget):

Hello,

maybe the following change will make it clear for a user and is acceptable for
inclusion:

--- wget.texi.orig  2013-11-08 10:27:43.0 +0100
+++ wget.texi   2013-11-08 10:28:18.0 +0100
@@ -1295,12 +1295,19 @@
 @item Netscape 4.x.
 The cookies are in @file{~/.netscape/cookies.txt}.
 
-@item Mozilla and Netscape 6.x.
+@item Mozilla  4.x and Netscape 6.x.
 Mozilla's cookie file is also named @file{cookies.txt}, located
 somewhere under @file{~/.mozilla}, in the directory of your profile.
 The full path usually ends up looking somewhat like
 @file{~/.mozilla/default/@var{some-weird-string}/cookies.txt}.
 
+@item Mozilla  4.x.
+Mozilla's cookie file is named @file{cookies.sqlite}, located
+somewhere under @file{~/.mozilla}, in the directory of your profile.
+The full path usually ends up looking somewhat like
+@file{~/.mozilla/default/@var{some-weird-string}/cookies.txt}.
+The SQLite file is not useable with the @samp{--load-cookies} option.
+
 @item Internet Explorer.
 You can produce a cookie file Wget can use by using the File menu,
 Import and Export, Export Cookies.  This has been tested with Internet


(file #29569)
___

Additional Item Attachment:

File name: wget-doc-cookie_description.patch Size:1 KB


___

Reply to this item at:

  http://savannah.gnu.org/bugs/?33826

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#510587: [bug #27075] Typo in interactive output s/eta/ETA/g

2013-11-08 Thread NoëlKöthe
Follow-up Comment #3, bug #27075 (project wget):

the ETA string is marked for translation and is eta in english and only the
german translators use ETA.

___

Reply to this item at:

  http://savannah.gnu.org/bugs/?27075

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#642051: [bug #34642] wget --secure-protocol=SSLv3 fails with GnuTLS: GnuTLS internal error.

2013-11-08 Thread NoëlKöthe
Follow-up Comment #1, bug #34642 (project wget):

I tested the problem with wget 1.14 with libgnutls28 and it is fixed.

You can close this bug report

___

Reply to this item at:

  http://savannah.gnu.org/bugs/?34642

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#642051: [bug #34642] wget --secure-protocol=SSLv3 fails with GnuTLS: GnuTLS internal error.

2013-11-08 Thread NoëlKöthe
Follow-up Comment #2, bug #34642 (project wget):

sorry. It is fixed with the 1.15 alpha.

Here are the both tests (SSLv3+TLSv1):

1.14-4 Debian testing/unstable:
$ LC_ALL=C wget --debug --secure-protocol=SSLv3
https://encrypted.google.comSetting --secure-protocol (secureprotocol) to
SSLv3
DEBUG output created by Wget 1.14 on linux-gnu.

URI encoding = 'ANSI_X3.4-1968'
--2013-11-08 14:19:37--  https://encrypted.google.com/
Resolving encrypted.google.com (encrypted.google.com)... 173.194.112.165,
173.194.112.166, 173.194.112.167, ...
Caching encrypted.google.com = 173.194.112.165 173.194.112.166
173.194.112.167 173.194.112.168 173.194.112.169 173.194.112.174
173.194.112.160 173.194.112.161 173.194.112.162 173.194.112.163
173.194.112.164 2a00:1450:4001:805::1005
Connecting to encrypted.google.com
(encrypted.google.com)|173.194.112.165|:443... connected.
Created socket 5.
Releasing 0x01603fc0 (new refcount 1).
GnuTLS: No or insufficient priorities were set.
Closed fd 5
Unable to establish SSL connection.

$ LC_ALL=C wget --debug --secure-protocol=TLSv1
https://encrypted.google.comSetting --secure-protocol (secureprotocol) to
TLSv1
DEBUG output created by Wget 1.14 on linux-gnu.

URI encoding = 'ANSI_X3.4-1968'
--2013-11-08 14:21:08--  https://encrypted.google.com/
Resolving encrypted.google.com (encrypted.google.com)... 173.194.112.163,
173.194.112.164, 173.194.112.165, ...
Caching encrypted.google.com = 173.194.112.163 173.194.112.164
173.194.112.165 173.194.112.166 173.194.112.167 173.194.112.168
173.194.112.169 173.194.112.174 173.194.112.160 173.194.112.161
173.194.112.162 2a00:1450:4001:805::1005
Connecting to encrypted.google.com
(encrypted.google.com)|173.194.112.163|:443... connected.
Created socket 5.
Releasing 0x03215fa0 (new refcount 1).

---request begin---
GET / HTTP/1.1
User-Agent: Wget/1.14 (linux-gnu)
Accept: */*
Host: encrypted.google.com
Connection: Keep-Alive

---request end---
HTTP request sent, awaiting response... 
---response begin---
HTTP/1.1 200 OK
Date: Fri, 08 Nov 2013 13:21:08 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie:
PREF=ID=b24e56ecb2ecdefd:FF=0:TM=1383916868:LM=1383916868:S=JwSHoFlTL8eDDBxC;
expires=Sun, 08-Nov-2015 13:21:08 GMT; path=/; domain=.google.com
Set-Cookie:
NID=67=nrWl0Px9C82sKTzkb40qagwXauVS8EMjNO2olgb7mC0d1H8-KjoYx8Q869oMuIDJAXotNdOmtI9yWk2vgnFVV1P35KmPMHlkrpJyxvl88Es2_OlPS88O0C3TioZALRtz;
expires=Sat, 10-May-2014 13:21:08 GMT; path=/; domain=.google.com; HttpOnly
P3P: CP=This is not a P3P policy! See
http://www.google.com/support/accounts/bin/answer.py?hl=enanswer=151657 for
more info.
Server: gws
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Alternate-Protocol: 443:quic
Transfer-Encoding: chunked

---response end---
200 OK
cdm: 1 2 3 4 5 6 7 8
Stored cookie google.com -1 (ANY) / permanent insecure [expiry 2015-11-08
14:21:08] PREF
ID=b24e56ecb2ecdefd:FF=0:TM=1383916868:LM=1383916868:S=JwSHoFlTL8eDDBxC
cdm: 1 2 3 4 5 6 7 8
Stored cookie google.com -1 (ANY) / permanent insecure [expiry 2014-05-10
15:21:08] NID
67=nrWl0Px9C82sKTzkb40qagwXauVS8EMjNO2olgb7mC0d1H8-KjoYx8Q869oMuIDJAXotNdOmtI9yWk2vgnFVV1P35KmPMHlkrpJyxvl88Es2_OlPS88O0C3TioZALRtz
Registered socket 5 for persistent reuse.
URI content encoding = 'ISO-8859-1'
Length: unspecified [text/html]
Saving to: 'index.html'

[ =  ] 18,267  --.-K/s   in
0.01s   

2013-11-08 14:21:08 (1.16 MB/s) - 'index.html' saved [18267]


and with 1.15 alpha (in Debian experimental):

$ LC_ALL=C wget --debug --secure-protocol=SSLv3
https://encrypted.google.comSetting --secure-protocol (secureprotocol) to
SSLv3
DEBUG output created by Wget 1.14.96-38327 on linux-gnu.

URI encoding = 'ANSI_X3.4-1968'
--2013-11-08 14:22:07--  https://encrypted.google.com/
Certificates loaded: 166
Resolving encrypted.google.com (encrypted.google.com)... 173.194.112.160,
173.194.112.161, 173.194.112.162, ...
Caching encrypted.google.com = 173.194.112.160 173.194.112.161
173.194.112.162 173.194.112.163 173.194.112.164 173.194.112.165
173.194.112.166 173.194.112.167 173.194.112.168 173.194.112.169
173.194.112.174 2a00:1450:4001:805::1005
Connecting to encrypted.google.com
(encrypted.google.com)|173.194.112.160|:443... connected.
Created socket 5.
Releasing 0x011d03f0 (new refcount 1).

---request begin---
GET / HTTP/1.1
User-Agent: Wget/1.14.96-38327 (linux-gnu)
Accept: */*
Host: encrypted.google.com
Connection: Keep-Alive

---request end---
HTTP request sent, awaiting response... 
---response begin---
HTTP/1.1 200 OK
Date: Fri, 08 Nov 2013 13:22:07 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie:
PREF=ID=8488821683f21123:FF=0:TM=1383916927:LM=1383916927:S=EoRepPFYw2ruFAmH;
expires=Sun, 08-Nov-2015 13:22:07 GMT; path=/; domain=.google.com
Set-Cookie:

Bug#699337: [bug #39780] Wget omits Host header for CONNECT (RFC 2616)

2013-08-13 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?39780

 Summary: Wget omits Host header for CONNECT (RFC 2616)
 Project: GNU Wget
Submitted by: nok
Submitted on: Di 13 Aug 2013 16:09:26 CEST
Category: Protocol Issue
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: trunk
Operating System: GNU/Linux
 Reproducibility: Every Time
   Fixed Release: None
 Planned Release: None
  Regression: None
   Work Required: None
  Patch Included: Yes

___

Details:

Hello,

reported to the Debian bug tracker http://bugs.debian.org/699337 and discussed
on the wget mailinglist
https://lists.gnu.org/archive/html/bug-wget/2013-01/msg00019.html
But the patch from Pavel wasn't applied at that time.

Maybe it could be added.

Inline and attached:

--- a/src/http.c2011-09-07 12:58:01.0 +0200
+++ a/src/http.c2013-01-30 13:32:42.0 +0100
@@ -1847,10 +1847,9 @@
  the regular request below.  */
   proxyauth = NULL;
 }
-  /* Examples in rfc2817 use the Host header in CONNECT
- requests.  I don't see how that gains anything, given
- that the contents of Host would be exactly the same as
- the contents of CONNECT.  */
+  request_set_header (connreq, Host,
+  aprintf (%s:%d, u-host, u-port),
+  rel_value);
 
   write_error = request_send (connreq, sock);
   request_free (connreq);




___

File Attachments:


---
Date: Di 13 Aug 2013 16:09:26 CEST  Name: connect-host-header  Size: 722B  
By: nok
connect-host-header.patch
http://savannah.gnu.org/bugs/download.php?file_id=28833

___

Reply to this item at:

  http://savannah.gnu.org/bugs/?39780

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#697081: [bug #38015] ca_ES.UTF-8 changes option -nv: inaccurate catalan translation

2013-01-04 Thread NoëlKöthe
Follow-up Comment #2, bug #38015 (project wget):

feedback from Jordi (catalan translator):

Alright, this was fixed in the latest submission to the TP. Thanks for the
report!

___

Reply to this item at:

  http://savannah.gnu.org/bugs/?38015

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#697081: [bug #38015] ca_ES.UTF-8 changes option -nv: inaccurate catalan translation

2013-01-02 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?38015

 Summary: ca_ES.UTF-8 changes option -nv: inaccurate catalan
translation
 Project: GNU Wget
Submitted by: nok
Submitted on: Mi 02 Jan 2013 10:59:08 CET
Category: Documentation
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: trunk
Operating System: GNU/Linux
 Reproducibility: Every Time
   Fixed Release: None
 Planned Release: None
  Regression: Yes
   Work Required: None
  Patch Included: Yes

___

Details:

Hello,

a forwarded bug report: http://bugs.debian.org/697081

--8--
Catalan translation for wget incorrectly changes --no-verbose for
--non-verbose on the help page (displayed with --help).

However, due to the way bash-completion reads its long options, this
means that tab-expanding offers the wrong --non-verbose option, which
seems like only annoys me :-)

I was looking into bash-completion until I realized from where it got
wget options, so reporting it here.

Patch for ca.po attached.
--8--

It looks like this:
$ LC_ALL=ca_ES.UTF-8 wget --help|grep \-nv
  -nv, --non-verbose  mode no detallat, però tampoc del tot
silenciós.
$ LC_ALL=C wget --help|grep \-nv
  -nv, --no-verbose  turn off verboseness, without being quiet.


The patch from Eloi Notario is:

--- ca.po~  2012-12-31 21:56:09.232022158 +0100
+++ ca.po   2012-12-31 21:56:19.316071460 +0100
@@ -1160,7 +1160,7 @@
 msgid 
   -nv, --no-verbose  turn off verboseness, without being quiet.\n
 msgstr 
-  -nv, --non-verbose  mode no detallat, però tampoc del tot 
+  -nv, --no-verbose  mode no detallat, però tampoc del tot 
 silenciós.\n
 
 #: src/main.c:462




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?38015

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#697081: [bug #38015] ca_ES.UTF-8 changes option -nv: inaccurate catalan translation

2013-01-02 Thread NoëlKöthe
Follow-up Comment #1, bug #38015 (project wget):

I asked the catalan translators (po/ca.po Last-Translator: and Language-Team:)
for correction.

___

Reply to this item at:

  http://savannah.gnu.org/bugs/?38015

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#646413: [bug #38004] wget should have a way to fall back to the system installed certificates when using --ca-directory

2012-12-31 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?38004

 Summary: wget should have a way to fall back to the system
installed certificates when using --ca-directory
 Project: GNU Wget
Submitted by: nok
Submitted on: Mo 31 Dez 2012 10:45:46 CET
Category: Feature Request
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: 1.13.4
Operating System: GNU/Linux
 Reproducibility: Every Time
   Fixed Release: None
 Planned Release: None
  Regression: None
   Work Required: None
  Patch Included: No

___

Details:

Hello,

a forwarded bug http://bugs.debian.org/646413

--8--
The system installed certificates directory is not complete, so that
one may need to have additional certificates in one's own directory
and use the --ca-directory (either as a command-line option or via
the .wgetrc file). But if such an option is used, the system installed
certificates are no longer used, as documented in the wget man page,
meaning that wget will start to fail on various sites. For instance:

xvii:~ wget --ca-directory=$HOME/wd/config/cacert https://twitter.com/
--2011-10-24 02:29:31--  https://twitter.com/
Resolving twitter.com (twitter.com)... 199.59.148.10, 199.59.149.198,
199.59.149.230
Connecting to twitter.com (twitter.com)|199.59.148.10|:443... connected.
ERROR: The certificate of `twitter.com' is not trusted.
ERROR: The certificate of `twitter.com' hasn't got a known issuer.
zsh: exit 5 wget --ca-directory=$HOME/wd/config/cacert
https://twitter.com/

xvii:~ wget https://twitter.com/
--2011-10-24 02:34:20--  https://twitter.com/
Resolving twitter.com (twitter.com)... 199.59.148.10, 199.59.149.198,
199.59.149.230
Connecting to twitter.com (twitter.com)|199.59.148.10|:443... connected.
HTTP request sent, awaiting response... 200 OK
[...]

There should be a way to fallback to the system installed certificates
directory. For instance, --ca-directory could contain a list of
directories (like $PATH-like environment variables), and if the
path ends with a :, the default directories are appended.
--8--




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?38004

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#657219: [bug #38005] wget should handle SIGINT to close the connection

2012-12-31 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?38005

 Summary: wget should handle SIGINT to close the connection
 Project: GNU Wget
Submitted by: nok
Submitted on: Mo 31 Dez 2012 10:51:57 CET
Category: Feature Request
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: 1.13.4
Operating System: GNU/Linux
 Reproducibility: None
   Fixed Release: None
 Planned Release: None
  Regression: None
   Work Required: None
  Patch Included: No

___

Details:

Hello,

a forwarded bug report http://bugs.debian.org/657219

--8--
wget should handle SIGINT to close the connection.
interrupting, with CTRL C for example, does not close it.

this causes a big amount of incoming packets wich causes outgoing RST
packets.

there is definately no FIN packet, i confirmed that with wireshark.
--8--

BTW: version 1.14 is missing in the bug report release drop down box.

Thank you.




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?38005

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#687195: [bug #37329] please support news:// and snews://

2012-09-11 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?37329

 Summary: please support news:// and snews://
 Project: GNU Wget
Submitted by: nok
Submitted on: Di 11 Sep 2012 15:58:33 CEST
Category: Feature Request
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: trunk
Operating System: GNU/Linux
 Reproducibility: Every Time
   Fixed Release: None
 Planned Release: None
  Regression: No
   Work Required: None
  Patch Included: No

___

Details:

Hello,

a wishlist request from a wget user:

Wget currenly does not know what to do with news:// and snews:// URLs.

Not many tools do.  Perhaps only lynx can do this at the moment.  But lynx
will only give a rendered version of the retrieved content.  wget should be
able to retrieve the raw article with all headers.
http://bugs.debian.org/687195

The news:// protocol is mentioned in bug #20392 Modular protocol support.

Thank you.

Regards

Noel Köthe




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?37329

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#684189: [bug #37055] Please add DELETE method

2012-08-08 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?37055

 Summary: Please add DELETE method
 Project: GNU Wget
Submitted by: nok
Submitted on: Mi 08 Aug 2012 14:14:39 CEST
Category: User Interface
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: trunk
Operating System: GNU/Linux
 Reproducibility: None
   Fixed Release: None
 Planned Release: None
  Regression: No
   Work Required: None
  Patch Included: No

___

Details:

Hello,

a forwarded feature request from http://bugs.debian.org/684189

--8--
Dear Maintainer,
wget currently provides vast set of options, but sadly 
do not provide DELETE method. This makes wget inferior 
to curl in area of RESTful API scripting.
--8--

Regards
 Noel




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?37055

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#681394: [bug #36843] 1.13.4.59-2b1dd: -O - gives error wget: write error: Inappropriate ioctl for device

2012-07-13 Thread NoëlKöthe
URL:
  http://savannah.gnu.org/bugs/?36843

 Summary: 1.13.4.59-2b1dd: -O - gives error wget: write error:
Inappropriate ioctl for device
 Project: GNU Wget
Submitted by: nok
Submitted on: Fr 13 Jul 2012 18:21:22 CEST
Category: Testing
Severity: 3 - Normal
Priority: 5 - Normal
  Status: None
 Privacy: Public
 Assigned to: None
 Originator Name: 
Originator Email: 
 Open/Closed: Open
 Discussion Lock: Any
 Release: trunk
Operating System: GNU/Linux
 Reproducibility: Every Time
   Fixed Release: None
 Planned Release: None
  Regression: Yes
   Work Required: None
  Patch Included: No

___

Details:

Hello,

with the alpha/beta version 1.13.4.59-2b1dd of the comming wget release the
following error message is always reproducible for me:

$ wget -q -O - http://www.debian.org/ /dev/null
wget: write error: Inappropriate ioctl for device


With 1.13.4 it is not reproducible.

Regards

Noel




___

Reply to this item at:

  http://savannah.gnu.org/bugs/?36843

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/




-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#247985: [bug #27303] Enable users to download bodies from non-200 HTTP responses.

2012-07-09 Thread NoëlKöthe
Follow-up Comment #3, bug #27303 (project wget):

Hello,

this bug report includes a patch but I cannot (or maybe don't know) mark
Patch Included: Yes.

Maybe you/someone cann mark/apply it so it will not be forgotten.

thx.

___

Reply to this item at:

  http://savannah.gnu.org/bugs/?27303

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/




-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#672131: [bug #21714] File name too long

2012-07-09 Thread NoëlKöthe
Follow-up Comment #48, bug #21714 (project wget):

Hello,

just as a reminder. Maybe it just got forgoten. Could the patch be added?

Thank you.

___

Reply to this item at:

  http://savannah.gnu.org/bugs/?21714

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/




-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#564656: [bug #33826] doc: reference to Mozilla's cookie file is out of date

2012-07-06 Thread NoëlKöthe
Follow-up Comment #2, bug #33826 (project wget):

Hello,

so an additional comment for Firefox 4 might be helpful IMHO.

___

Reply to this item at:

  http://savannah.gnu.org/bugs/?33826

___
  Nachricht gesendet von/durch Savannah
  http://savannah.gnu.org/




-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org