Re: Secret changes for binNMUs

2005-11-26 Thread Andreas Metzler
Henrique de Moraes Holschuh [EMAIL PROTECTED] wrote:
[...]
 Meanwhile, I am using this: unversioned depends and two conflicts: (
 {Upstream-Version}), (= {Upstream-Version}.1).

Depends: foo (={Upstream-Version}), foo ( {Upstream-Version}.1)

instead should also work without the need for a cumbersome conflict.
 cu andreas
PS: I've spent no thought whether {Upstream-Version}.1 is really
correct, it depends a lot on the versioning upstream chooses.
-- 
The 'Galactic Cleaning' policy undertaken by Emperor Zhark is a personal
vision of the emperor's, and its inclusion in this work does not constitute
tacit approval by the author or the publisher for any such projects,
howsoever undertaken.(c) Jasper Ffforde


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: dpkg-sig support wanted?

2005-11-26 Thread George Danchev
On Saturday 26 November 2005 01:13, Anthony Towns wrote:
 On Fri, Nov 25, 2005 at 07:59:40PM +0100, Florian Weimer wrote:
  * Anthony Towns:
   (I'm amazed the security crisis we're having is about deb sigs
   *again*, when we're still relying on md5sum which has a public exploit
   available now...)
 
  These exploits are irrelevant as far as the Debian archive is
  concerned.  (And that's not because hardly any sarge user verifies the
  MD5 hashes, by the way. 8-)

 Uh. You're seriously putting your reputation on that claim?

 And md5 hashes have been verified since either slink or potato depending
 on when you started using apt; possibly earlier if dselect methods used
 them like they should have. debootstrap certainly verified them for
 woody. And heck, they've been used in .changes since day 0.

  Moving away from MD5 is certainly not a bad idea, but it's not clear
  whether the alternatives are any better.  Sure, everyone recommends
  SHA-256 at this stage, but nobody can give a rationale.

 MD5 is broken; SHA-1 is where MD5 was a couple of years ago, SHA256 (or
 higher) are significantly harder to break in practice, and there's
 nothing better yet.

Even using weak hash sum algorythms you can easily make the hash collider life 
tremendously difficult by simply having more than one (ok two should be 
enough) hash sums generated with _different_ (weak?) algorythms on the same 
entity. Searching for parallel meaningful collisions is despairing job. For 
example the Release file stores two hash sums for the same entities.

-- 
pub 4096R/0E4BD0AB 2003-03-18 people.fccf.net/danchev/key pgp.mit.edu
fingerprint 1AE7 7C66 0A26 5BFF DF22 5D55 1C57 0C89 0E4B D0AB 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: dpkg-sig support wanted?

2005-11-26 Thread Florian Weimer
* Anthony Towns:

 On Fri, Nov 25, 2005 at 07:59:40PM +0100, Florian Weimer wrote:
 * Anthony Towns:
  (I'm amazed the security crisis we're having is about deb sigs
  *again*, when we're still relying on md5sum which has a public exploit
  available now...)
 These exploits are irrelevant as far as the Debian archive is
 concerned.  (And that's not because hardly any sarge user verifies the
 MD5 hashes, by the way. 8-)

(I meant that the signature on a hash of those hashes is not
verified.)

 Uh. You're seriously putting your reputation on that claim?

Yes.  To attack the Debian archive, you need to carry out a preimage
attack.  Nothing in that direction has been published so far.

For the exploits we have seen so far to work, the malicious party
needs upload access to the archive and has to plant a specially
crafted package there, for which they have created an evil twin
package.  (Same for attacking one of the text files listing hashes.)
Looks a bit far-fatched to me.

 Moving away from MD5 is certainly not a bad idea, but it's not clear
 whether the alternatives are any better.  Sure, everyone recommends
 SHA-256 at this stage, but nobody can give a rationale.

 MD5 is broken; SHA-1 is where MD5 was a couple of years ago, SHA256 (or
 higher) are significantly harder to break in practice,

So?  If SHA256 is so much better, why is that nobody can prove it, or
at least can provide some evidence which supports that claim?  The
numbers are bigger is the main argument at this point, which is
awfully similar to the usual snake-oil arguments (although there is a
slight difference, of course).

On the other hand, the cost of adding another hash function is not
that high for Debian, compared to other deployments.  Adding SHA256
and RSHA a few months (hopefully, years) later doesn't really hurt
that much, I guess.

 and there's nothing better yet.

In terms of security, there are some better hash functions.  But those
are academic designs, most of them based on big integer arithmetic
instead of bit fiddling.  Currently, nobody seems to be willing to pay
the price that comes with them.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Bug#340428: octave2.9 - lists mailing list as uploader in changelog

2005-11-26 Thread Rafael Laboissiere
* Bastian Blank [EMAIL PROTECTED] [2005-11-26 00:43]:

 On Fri, Nov 25, 2005 at 09:01:24AM +0100, Rafael Laboissiere wrote:
  * Bastian Blank [EMAIL PROTECTED] [2005-11-24 23:45]:
   | Maintainer: Debian/IA64 Build Daemon [EMAIL PROTECTED]
   | Changed-By: Debian Octave Group [EMAIL PROTECTED]
  
  Could you please explain to me why having Changed-By as a mailing list in
  this case (a binary NMU done by an autobuilder) is problematic?  You may
  have good reasons for thinking Changed-By should list a real person, but
  I fail to understand it.
 
 Please explain we the meaning of person.

By person I mean an entity with two legs, two arms, a trunk, and,
normally, a thinking head, a member of the homo sapiens species. Given
the stage of evolutionary progress of these entities, they should have no
problem understanding the paragraph I wrote above.

[Bastian, take it easy, it is just a joke :-)]

-- 
Rafael


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: dpkg-sig support wanted?

2005-11-26 Thread Florian Weimer
* Thiemo Seufer:

 A: Why do you lock your car up[1]?
 
 B: Because it looks like having it locked is better then not having it
 locked.
 
 A: Sorry, but that's a snake oil rationale. Anybody can pick the lock
 and break in. Anybody can smash a window and break in. etc.

 Wrong, it makes break-ins harder. OTOH we don't put stickers with
 this car is locked on our cars.

Uhm, we do.  There are those blinking LEDs which serve exactly that
purpose.  And yes, those electronic locks have been broken; the only
thing that protects them is that it's a crime to tell anyone how they
work.

At this stage, car locks (especially those of the electronic kind)
serve only to show intent.  You can't claim that you erroneously drove
away in someone else's car.  Besides that, they don't really help.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Secret changes for binNMUs

2005-11-26 Thread Henrique de Moraes Holschuh
On Sat, 26 Nov 2005, Andreas Metzler wrote:
 Henrique de Moraes Holschuh [EMAIL PROTECTED] wrote:
 [...]
  Meanwhile, I am using this: unversioned depends and two conflicts: (
  {Upstream-Version}), (= {Upstream-Version}.1).
 
 Depends: foo (={Upstream-Version}), foo ( {Upstream-Version}.1)
 
 instead should also work without the need for a cumbersome conflict.

Yes. It is just a matter of which one you like better. You could also have
one depends and one conflicts instead of two conflicts or two depends.

-- 
  One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie. -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: dpkg-sig support wanted?

2005-11-26 Thread Marc Haber
On Fri, 25 Nov 2005 12:50:41 -0800, Thomas Bushnell BSG
[EMAIL PROTECTED] wrote:
Goswin von Brederlow [EMAIL PROTECTED] writes:
 The archive signing key gives absolutely no integrity ensurance on the
 deb package. The only thing it insures is that the file was not
 altered _after_ leaving ftp.de.debian.org for the mirrors and/or
 user. In no way does it prevent altering the deb on ftp-master.

Isn't that a useful assurance?  Perhaps I trust the maintenance of
ftp-master, but not the maintenance of Joe Random Mirror.

So the natural reaction would be having _both_ signatures so that the
individual user can choose whom to trust.

Greetings
Marc

-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834



Re: Remove

2005-11-26 Thread Henning Makholm
Scripsit Benjamin Seidenberg [EMAIL PROTECTED]

 Suggestion: Why don't all the readers of debian-devel put something
 like this on their blogs:

Good idea (but probably not Debian-specific blogs). One should not
probably not copy this exact text; I imagine Google will think higher
of the links they have _different_ contexts.

Now we're at it, also add the link

  http://wwws.sheetmusicplus.com/sheetmusic/detail/WB.GS2001.html

for du*l*ng b*nj*s (remember to spell du*l*ng with a single l, which
is the spelling that has been misdirected to d-l).

-- 
Henning Makholm   The Board views the endemic use of PowerPoint
   briefing slides instead of technical papers as an
 illustration of the problematic methods of technical communicaion at NASA.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: dpkg-sig support wanted?

2005-11-26 Thread Henning Makholm
Scripsit Peter Samuelson [EMAIL PROTECTED]

 You may laugh if you wish, but I think it's annoying to have to move to
 a hash function whose hexadecimal representation takes 64 bytes, which
 doesn't leave much room on an 80-column line to describe what the hash
 is hashing.  Maybe by the time coreutils ships a sha256sum program, the
 world will have settled upon BASE64, which requires only 43 bytes.

Why wait for the world to settle? Would there be anything wrong with
writing a sha256sum program that outputs base64 right now?

-- 
Henning Makholm Lad min høne være.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: dpkg-sig support wanted?

2005-11-26 Thread Florian Weimer
* Henning Makholm:

 Scripsit Peter Samuelson [EMAIL PROTECTED]

 You may laugh if you wish, but I think it's annoying to have to move to
 a hash function whose hexadecimal representation takes 64 bytes, which
 doesn't leave much room on an 80-column line to describe what the hash
 is hashing.  Maybe by the time coreutils ships a sha256sum program, the
 world will have settled upon BASE64, which requires only 43 bytes.

 Why wait for the world to settle? Would there be anything wrong with
 writing a sha256sum program that outputs base64 right now?

I wouldn't use real base64, though, because it would mean that you can
use its hashed output as a file name.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: dpkg-sig support wanted?

2005-11-26 Thread Steinar H. Gunderson
On Sat, Nov 26, 2005 at 10:59:57AM +0100, Florian Weimer wrote:
 So?  If SHA256 is so much better, why is that nobody can prove it, or
 at least can provide some evidence which supports that claim?  The
 numbers are bigger is the main argument at this point, which is
 awfully similar to the usual snake-oil arguments (although there is a
 slight difference, of course).

In the world of cryptography, _proving_ security is rather difficult. All you
can say is well, nobody have made any real progress towards this yet, and
then estimate approximately how much work has actually been done with regard
to breaking it.

 In terms of security, there are some better hash functions.  But those
 are academic designs, most of them based on big integer arithmetic
 instead of bit fiddling.  Currently, nobody seems to be willing to pay
 the price that comes with them.

Well, the number theory-based hashes are interesting, but they haven't been
around for a very long time (and aren't widely used yet), so nobody really
knows how well they will fare in the long run. The other part of the price is
of course speed.

/* Steinar */
-- 
Homepage: http://www.sesse.net/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Bug#340428: octave2.9 - lists mailing list as uploader in changelog

2005-11-26 Thread Roberto C. Sanchez
On Sat, Nov 26, 2005 at 10:53:16AM +0100, Rafael Laboissiere wrote:
 * Bastian Blank [EMAIL PROTECTED] [2005-11-26 00:43]:
 
  On Fri, Nov 25, 2005 at 09:01:24AM +0100, Rafael Laboissiere wrote:
   * Bastian Blank [EMAIL PROTECTED] [2005-11-24 23:45]:
| Maintainer: Debian/IA64 Build Daemon [EMAIL PROTECTED]
| Changed-By: Debian Octave Group [EMAIL PROTECTED]
   
   Could you please explain to me why having Changed-By as a mailing list in
   this case (a binary NMU done by an autobuilder) is problematic?  You may
   have good reasons for thinking Changed-By should list a real person, but
   I fail to understand it.
  
  Please explain we the meaning of person.
 
 By person I mean an entity with two legs, two arms, a trunk, and,
 normally, a thinking head, a member of the homo sapiens species. Given
 the stage of evolutionary progress of these entities, they should have no
 problem understanding the paragraph I wrote above.
 
 [Bastian, take it easy, it is just a joke :-)]
 

Since in most (every?) country, a corporation or business entity is
considered a legal person, he may very well have been referring to
something like that.

-Roberto

-- 
Roberto C. Sanchez
http://familiasanchez.net/~roberto


pgp99WEFVZfo7.pgp
Description: PGP signature


master mail problems -- help needed

2005-11-26 Thread Florian Weimer
From time to time, master seems to bounce mail routed to mail.enyo.de
with the following error message:

  [EMAIL PROTECTED]
retry time not reached for any host after a long failure period

Is anybody experiencing a similar problem?

I tried to debug it myself, using the information I could access on
master, but I couldn't gather enough evidence to present to the
postmasters so far.  IIRC, when there are no prolonged connectivity
problems, the error message is characteristic of a broken Exim retry
configuration (no retry section at all, or something like that), but
master's configuration seems to be fine in this regard.

The host mail.enyo.de had some intermittent connectivity problems
during the past few weeks (downtimes of about one hour every couple of
days, nothing which should cause Exim to run past its configured retry
limit).  But this has been fixed, and the sporadic bounces continued.
The other problem is a certain sluggishness when one of those botnets
attempts to send spam to hundreds of message IDs, but these attacks
last a couple of minutes only, and master should be able to cope with
that.

This problem has gained some unexpected urgency because I was kicked
off the PTS due to these bounces (I think so, I haven't been shown one
of the PTS bounces).  On the other hand, it rules out my .procmailrc
on master as an error source (because PTS mail gets sent to
[EMAIL PROTECTED] directly).


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: dpkg-sig support wanted?

2005-11-26 Thread Florian Weimer
* Steinar H. Gunderson:

 On Sat, Nov 26, 2005 at 10:59:57AM +0100, Florian Weimer wrote:
 So?  If SHA256 is so much better, why is that nobody can prove it, or
 at least can provide some evidence which supports that claim?  The
 numbers are bigger is the main argument at this point, which is
 awfully similar to the usual snake-oil arguments (although there is a
 slight difference, of course).

 In the world of cryptography, _proving_ security is rather difficult.

That's why I wrote some evidence.  Things like nobody managed so
far to extend attacks A, B, C beyond k rounds are pretty weak.

 All you can say is well, nobody have made any real progress towards
 this yet, and then estimate approximately how much work has
 actually been done with regard to breaking it.

There are cryptosystems where attacks (in some well-defined sense, of
course) are provably equivalent to some other problem which is
believed to be hard (factoring, RSA).

However, there are also cryptosystems which were shown to have such
properties, but where the proof was wrong.  General OAEP was such a
case, IIRC.

 In terms of security, there are some better hash functions.  But those
 are academic designs, most of them based on big integer arithmetic
 instead of bit fiddling.  Currently, nobody seems to be willing to pay
 the price that comes with them.

 Well, the number theory-based hashes are interesting, but they
 haven't been around for a very long time (and aren't widely used
 yet), so nobody really knows how well they will fare in the long
 run.

Some of these systems have provable security properties, which might
increase confidence despite their lack of age.

 The other part of the price is of course speed.

Yes, this is the primary problem, it seems.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: dpkg-sig support wanted?

2005-11-26 Thread Henning Makholm
Scripsit Florian Weimer [EMAIL PROTECTED]
 * Henning Makholm:

 Why wait for the world to settle? Would there be anything wrong with
 writing a sha256sum program that outputs base64 right now?

 I wouldn't use real base64, though, because it would mean that you can
 use its hashed output as a file name.

Good point. One might replace / with _ and omit the final =.
Having a + in the hash should be safe in most contexts.

-- 
Henning Makholm   We will discuss your youth another time.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Secret changes for binNMUs

2005-11-26 Thread Adeodato Simó
* Henrique de Moraes Holschuh [Sat, 26 Nov 2005 08:42:41 -0200]:

 Yes. It is just a matter of which one you like better. You could also have
 one depends and one conflicts instead of two conflicts or two depends.

  Versioned conflicts are said to increase apt's trouble to upgrade from
  one stable release to the next one. I have never heard the same
  comment applied to Depends: ( V) relationshipts.

-- 
Adeodato Simó dato at net.com.org.es
Debian Developer  adeodato at debian.org
 
Y sobre todo, tienes mucho de gilipollas.
-- B.C.S. addressing P.G.i.Q in b8g


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Secret changes for binNMUs

2005-11-26 Thread Andreas Metzler
Henrique de Moraes Holschuh [EMAIL PROTECTED] wrote:
 On Sat, 26 Nov 2005, Andreas Metzler wrote:
 Henrique de Moraes Holschuh [EMAIL PROTECTED] wrote:
 [...]
 Meanwhile, I am using this: unversioned depends and two conflicts: (
 {Upstream-Version}), (= {Upstream-Version}.1).

 Depends: foo (={Upstream-Version}), foo ( {Upstream-Version}.1)

 instead should also work without the need for a cumbersome conflict.

 Yes. It is just a matter of which one you like better.
[...]

Afaiui the different possibilties are not equivalent, because
conflicts need to be satisfied before installation, depends only at
configuration (after unpacking, ...).

Quoting policy:
| A Conflicts entry should almost never have an earlier than version
| clause.  This would prevent dpkg from upgrading or installing the
| package which declared such a conflict until the upgrade or removal of
| the conflicted-with package had been completed.
 cu andreas
-- 
The 'Galactic Cleaning' policy undertaken by Emperor Zhark is a personal
vision of the emperor's, and its inclusion in this work does not constitute
tacit approval by the author or the publisher for any such projects,
howsoever undertaken.(c) Jasper Ffforde


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Mailing list vs. real person name in debian/changelog entries

2005-11-26 Thread Rafael Laboissiere
I am moving from debian-devel to debian-policy a discussion that started in
this bug report:

http://bugs.debian.org/340428

and continued in the thread:

   http://lists.debian.org/debian-devel/2005/11/msg01378.html

I hope it is appropriate to post this here in debian-policy.  My
apologies if not.

The issue regards section 4.4 of the Policy.  Some projects being
maintained collectively at Alioth are using the name of a mailing list in
the trailer line of debian/changelog entries.  Although I think it is
legitimate to do so, some people argue that this yields wrong Changed-By
field in the changes file for binary NMU done by autobuilders.  Some even
think that using a mailing list as the maintainer in the changelog entry
is a Policy violation.

I do not care doing one way or the other, but since we did not reach
consensus in debian-devel, I would like to know the opinion of the Policy
people.

-- 
Rafael


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Bug#340428: octave2.9 - lists mailing list as uploader in changelog

2005-11-26 Thread Adeodato Simó
* Bastian Blank [Thu, 24 Nov 2005 23:45:02 +0100]:

 On Thu, Nov 24, 2005 at 10:48:39PM +0100, Rafael Laboissiere wrote:
  Yes, I have been doing things wrongly in the past, but this is not the
  case anymore.  The Changed-By fields are correct now.  See, for instance,
  my last upload:
  http://lists.debian.org/debian-devel-changes/2005/11/msg01728.html
 [upload of octave2.9_2.9.4-7]

 | Maintainer: Debian/IA64 Build Daemon [EMAIL PROTECTED]
 | Changed-By: Debian Octave Group [EMAIL PROTECTED]

  So a big fuss is made about this practice making buildd uploads have
  an incorrect Changed-By header, when such uploads contain blatant
  incorrect maintainer information themselves (yes, I know why). What
  would you think of a person filing serious bugs because of this?

  Anyway, I'll answer more productively in the new thread.

-- 
Adeodato Simó dato at net.com.org.es
Debian Developer  adeodato at debian.org
 
   Listening to: Mecano - Maquillaje


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Heimdal autotools dramas

2005-11-26 Thread Gabor Gombas
On Sat, Nov 26, 2005 at 11:44:48AM +1100, Brian May wrote:

 The Heimdal configure script correctly detects that glob() is present
 in libc6, but appears to build glob.c anyway, and it also installs
 glob.h.

It tests for the GLOB_QUOTE flag but that is not present in glibc, so it
decides that glibc's glob() function is not good enough. See
cf/broken-glob.m4.

Also, libroken.so contains only the symbol rk_glob(), not glob(). I
haven't checked the actual Debian package, but unless it overwrites
/usr/include/glob.h (which I highly doubt) Heimdal's version of glob()
will not be used outside of Heimdal.

 A similar situation appears to exist with fnmatch, but I haven't
 investigated in detail.

I've just tried a Heimdal-0.7.1 build here and libroken does not have
fnmatch.

 lib/roken/Makefile.am has:
 
 if have_glob_h
 glob_h =
 else
 glob_h = glob.h
 endif
 
 Some how that is being set in lib/roken/Makefile, despite the fact
 have_glob_h is also set (this is confusing me!!!)
 
 I simply cannot see where lib/roken/Makefile.am references
 glob.c. However, lib/roken/Makefile references glob$U.lo and glob$U.o.

Heimdal is using the AC_LIBOBJ machinery.

 I asked upstream Heimdal and got no response.

I did not see your mail on the heimdal-discuss list...

Gabor

-- 
 -
 MTA SZTAKI Computer and Automation Research Institute
Hungarian Academy of Sciences
 -


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: master mail problems -- help needed

2005-11-26 Thread Jeroen van Wolffelaar
On Sat, Nov 26, 2005 at 02:00:48PM +0100, Florian Weimer wrote:
 From time to time, master seems to bounce mail routed to mail.enyo.de
 with the following error message:
 
   [EMAIL PROTECTED]
 retry time not reached for any host after a long failure period
 
 Is anybody experiencing a similar problem?
 
 I tried to debug it myself, using the information I could access on
 master, but I couldn't gather enough evidence to present to the
 postmasters so far.

But other DD's can also only do a limited amount of research, the only
way to really find out is asking a postmaster -- this isn't a
prosecution, so 'evidence' is not needed, I'd say (though, a copy of one
bounce message with full headers would be the minimum I'd expect,
because otherwise debugging is close to impossible).

In general, this failure means that for 4 consecutive days the
a connection attempt that happens roughly every 8 hours fails
(connection refused, a timeout, HELO refused, stuff like that). Are you
sure that this condition can never have happened? I see you only have
one MX, for increased reliability and for cases when for example there's
a routing problem somewhere between master and that one single MX, add a
backup MX.

When an exim mailserver is really bogged down under mail load, attempts
can be made even less often.

 IIRC, when there are no prolonged connectivity
 problems, the error message is characteristic of a broken Exim retry
 configuration (no retry section at all, or something like that), but
 master's configuration seems to be fine in this regard.
 
 The host mail.enyo.de had some intermittent connectivity problems
 during the past few weeks (downtimes of about one hour every couple of
 days, nothing which should cause Exim to run past its configured retry
 limit).  But this has been fixed, and the sporadic bounces continued.
 The other problem is a certain sluggishness when one of those botnets
 attempts to send spam to hundreds of message IDs, but these attacks
 last a couple of minutes only, and master should be able to cope with
 that.

I'd really look into a secondary MX, but if it's indeed only there two
problems at the frequency you say, it shouldn't really be possible that
this is the cause.

 This problem has gained some unexpected urgency because I was kicked
 off the PTS due to these bounces (I think so, I haven't been shown one
 of the PTS bounces).  On the other hand, it rules out my .procmailrc
 on master as an error source (because PTS mail gets sent to
 [EMAIL PROTECTED] directly).

There is no automatic bounce handling for the PTS, that's still on the
TODO...
 
--Jeroen

-- 
Jeroen van Wolffelaar
[EMAIL PROTECTED] (also for Jabber  MSN; ICQ: 33944357)
http://Jeroen.A-Eskwadraat.nl


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: dpkg-sig support wanted?

2005-11-26 Thread Florian Weimer
* Henning Makholm:

 I wouldn't use real base64, though, because it would mean that you can
 use its hashed output as a file name.

 Good point. One might replace / with _ and omit the final =.
 Having a + in the hash should be safe in most contexts.

It should be replaced with -.  Beyond alphanumerics, only ., _,
- are in the POSIX portable filename character set[1], and some
systems do not allow the character + in file names.

[1] 
http://www.opengroup.org/onlinepubs/009695399/basedefs/xbd_chap03.html#tag_03_276


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: master mail problems -- help needed

2005-11-26 Thread Stephen Gran
This one time, at band camp, Florian Weimer said:
 From time to time, master seems to bounce mail routed to mail.enyo.de
 with the following error message:
 
   [EMAIL PROTECTED]
 retry time not reached for any host after a long failure period
 
 Is anybody experiencing a similar problem?
 
 I tried to debug it myself, using the information I could access on
 master, but I couldn't gather enough evidence to present to the
 postmasters so far.  IIRC, when there are no prolonged connectivity
 problems, the error message is characteristic of a broken Exim retry
 configuration (no retry section at all, or something like that), but
 master's configuration seems to be fine in this regard.

You want to try 
/usr/sbin/exim4 -brt deneb.enyo.de 

You'll get an answer back that looks something like
F,2h,15m; G,16h,1h,1.5; F,4d,6h;

This means retry every 15min for the first 2 hours, then go into a 'growth
algorithm' period where you retry starting at 1hour, then multiply by 1.5
until 16 hours have elapsed (so first every hour, then 1.5 hours, then
2.25 hours, etc) then finally every 6 hours until 4 days have elapsed,
then bounce the mail.

Once you know the retry rules, try 
/usr/sbin/exinext [EMAIL PROTECTED]

That will tell you what's recorded in the retry database currently.
It's fairly self explanatory, and you'll get something that looks like:

Transport: gateway1.att.net [204.127.134.23] error 0: SMTP error from remote 
mailer after initial connection: host gateway1.att.net [204.127.134.23]: 450 
busy - please try later
  first failed: 26-Nov-2005 15:35:16
  last tried:   26-Nov-2005 15:35:16
  next try at:  26-Nov-2005 15:50:16
Transport: gateway2.att.net [12.102.240.23] error 0: SMTP error from remote 
mailer after initial connection: host gateway2.att.net [12.102.240.23]: 450 
busy - please try later
  first failed: 25-Nov-2005 04:44:32
  last tried:   26-Nov-2005 15:35:16
  next try at:  26-Nov-2005 21:35:16

I am guessing that you'll find that your host should have been tried
and wasn't.

 The host mail.enyo.de had some intermittent connectivity problems
 during the past few weeks (downtimes of about one hour every couple of
 days, nothing which should cause Exim to run past its configured retry
 limit).  But this has been fixed, and the sporadic bounces continued.
 The other problem is a certain sluggishness when one of those botnets
 attempts to send spam to hundreds of message IDs, but these attacks
 last a couple of minutes only, and master should be able to cope with
 that.

I am guessing here, since I don't really have any way to check, but I
assume that the problem is related to master's large queue.  If exim
encounters a host down state, it records it in the retry database.
The host state will be updated, but only when the queue finally reaches
it after the retry timer expires.  If the queue takes forever to process,
it's possible for host states to last longer than they should.

Good luck, and hope that helps,
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Re: master mail problems -- help needed

2005-11-26 Thread Florian Weimer
* Stephen Gran:

 Once you know the retry rules, try 
 /usr/sbin/exinext [EMAIL PROTECTED]

 That will tell you what's recorded in the retry database currently.

exinext ist not SUID, and I haven't got sufficient permission on
master to access the retry database:

[pid 29063] open(/var/spool/exim4/db/retry.lockfile, O_RDONLY|O_LARGEFILE) = 
-1 EACCES (Permission denied)

It would be interesting to see if the output contains an  record,
though.  The information for the A record should have been cleared
because I've successfully received mail since the last bounce.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: master mail problems -- help needed

2005-11-26 Thread Florian Weimer
* Jeroen van Wolffelaar:

 I tried to debug it myself, using the information I could access on
 master, but I couldn't gather enough evidence to present to the
 postmasters so far.

 But other DD's can also only do a limited amount of research, the only
 way to really find out is asking a postmaster -- this isn't a
 prosecution, so 'evidence' is not needed, I'd say (though, a copy of one
 bounce message with full headers would be the minimum I'd expect,
 because otherwise debugging is close to impossible).

The trouble is that I lack a recent bounce message because I thought
the problem was on my side (my .procmailrc script).  The PTS
unsubscription told me that I was wrong.

 In general, this failure means that for 4 consecutive days the
 a connection attempt that happens roughly every 8 hours fails
 (connection refused, a timeout, HELO refused, stuff like that). Are you
 sure that this condition can never have happened?

Yes, some mail went through smoothly during about the same time.  This
should clear the hint in Exim's retry database.

 I see you only have one MX, for increased reliability and for cases
 when for example there's a routing problem somewhere between master
 and that one single MX, add a backup MX.

Hmm, speaking of MXes, mail delivery over IPv6 seems to be enabled on
master:

  router = dnslookup, transport = remote_smtp
  host mail.enyo.de [2001:14b0:202:1::a7] MX=10
  host mail.enyo.de [212.9.189.167]   MX=10

But master does not seem to have IPv6 connectivity.  Maybe this is
causing the problems, but this would also mean that Exim itself is
buggy.

It probably makes sense to disable IPv6 support in Exim on master,
independently of my current problem.  I'm going to suggest this to
postmaster@ once I figured out a good way to implement this.

 When an exim mailserver is really bogged down under mail load, attempts
 can be made even less often.

As far as I know, the mail server still responds with the RFC limits,
which are also obeyed by Exim.

 I'd really look into a secondary MX,

Or more powerful hardware on the primary MX, or more efficient
software, I know.

 but if it's indeed only there two problems at the frequency you say,
 it shouldn't really be possible that this is the cause.

Exactly my line of thought.

 This problem has gained some unexpected urgency because I was kicked
 off the PTS due to these bounces (I think so, I haven't been shown one
 of the PTS bounces).  On the other hand, it rules out my .procmailrc
 on master as an error source (because PTS mail gets sent to
 [EMAIL PROTECTED] directly).

 There is no automatic bounce handling for the PTS, that's still on the
 TODO...

The removal wasn't automatic.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: master mail problems -- help needed

2005-11-26 Thread Stephen Gran
This one time, at band camp, Florian Weimer said:
 * Stephen Gran:
 
  Once you know the retry rules, try 
  /usr/sbin/exinext [EMAIL PROTECTED]
 
  That will tell you what's recorded in the retry database currently.
 
 exinext ist not SUID, and I haven't got sufficient permission on
 master to access the retry database:
 
 [pid 29063] open(/var/spool/exim4/db/retry.lockfile, O_RDONLY|O_LARGEFILE) 
 = -1 EACCES (Permission denied)
 
 It would be interesting to see if the output contains an  record,
 though.  The information for the A record should have been cleared
 because I've successfully received mail since the last bounce.

Sorry, I thought that you had access enough to check those things.  Then
you are just going to have to contact a postmaster and ask them to run
it for you and see what's going on.

If you are in group adm, you can use exigrep to find out status of
messages (it produces quite a bit of output, though)

/usr/sbin/exigrep [EMAIL PROTECTED] /var/log/exim4/mainlog*

Will tell you about _all_ the logged tries for all messages to you -
that might be an unacceptable load and an unaceptable amount to wade
through, however.  It does at least sort output by message, and makes it
easier it easier to visualize than a plain grep.

Good luck,
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Re: master mail problems -- help needed

2005-11-26 Thread Stephen Gran
This one time, at band camp, Florian Weimer said:
 Hmm, speaking of MXes, mail delivery over IPv6 seems to be enabled on
 master:
 
   router = dnslookup, transport = remote_smtp
   host mail.enyo.de [2001:14b0:202:1::a7] MX=10
   host mail.enyo.de [212.9.189.167]   MX=10
 
 But master does not seem to have IPv6 connectivity.  Maybe this is
 causing the problems, but this would also mean that Exim itself is
 buggy.
 
 It probably makes sense to disable IPv6 support in Exim on master,
 independently of my current problem.  I'm going to suggest this to
 postmaster@ once I figured out a good way to implement this.

I doubt that's the problem.  This is from my logs:

2005-08-10 13:33:46 1E2uSY-0005KV-1Q = [EMAIL PROTECTED] H=lobefin.net 
(www.lobefin.net) [216.158.52.108] U=Debian-exim P=asmtp 
X=TLS-1.0:RSA_AES_128_CBC_SHA:16 A=plain_server:steve S=2386 [EMAIL PROTECTED]
2005-08-10 13:33:46 1E2uSY-0005KV-1Q IPv6 socket creation failed: Address 
family not supported by protocol
2005-08-10 13:33:46 1E2uSY-0005KV-1Q mail.enyo.de [2001:14b0:202:1::a7]: 
Address family not supported by protocol
2005-08-10 13:33:47 1E2uSY-0005KV-1Q = [EMAIL PROTECTED] R=dnslookup 
T=remote_smtp H=bugs.debian.org [140.211.166.43] QT=1s DT=1s
2005-08-10 13:33:49 1E2uSY-0005KV-1Q = [EMAIL PROTECTED] R=dnslookup 
T=remote_smtp H=mail.enyo.de [212.9.189.167] QT=3s DT=3s
2005-08-10 13:33:49 1E2uSY-0005KV-1Q Completed

I have IPv6 support in kernel and exim, but no IPv6 connectivity, so it
falls back to IPv4 without any noticable delay.
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Re: master mail problems -- help needed

2005-11-26 Thread Florian Weimer
* Stephen Gran:
 It probably makes sense to disable IPv6 support in Exim on master,
 independently of my current problem.  I'm going to suggest this to
 postmaster@ once I figured out a good way to implement this.

 I doubt that's the problem.  This is from my logs:

 2005-08-10 13:33:46 1E2uSY-0005KV-1Q = [EMAIL PROTECTED] H=lobefin.net 
 (www.lobefin.net) [216.158.52.108] U=Debian-exim P=asmtp 
 X=TLS-1.0:RSA_AES_128_CBC_SHA:16 A=plain_server:steve S=2386 [EMAIL PROTECTED]
 2005-08-10 13:33:46 1E2uSY-0005KV-1Q IPv6 socket creation failed: Address 
 family not supported by protocol
 2005-08-10 13:33:46 1E2uSY-0005KV-1Q mail.enyo.de [2001:14b0:202:1::a7]: 
 Address family not supported by protocol
 2005-08-10 13:33:47 1E2uSY-0005KV-1Q = [EMAIL PROTECTED] R=dnslookup 
 T=remote_smtp H=bugs.debian.org [140.211.166.43] QT=1s DT=1s
 2005-08-10 13:33:49 1E2uSY-0005KV-1Q = [EMAIL PROTECTED] R=dnslookup 
 T=remote_smtp H=mail.enyo.de [212.9.189.167] QT=3s DT=3s
 2005-08-10 13:33:49 1E2uSY-0005KV-1Q Completed

 I have IPv6 support in kernel and exim, 

Are you sure?  IPv6 socket creation failed: Address family not
supported by protocol suggests something else.

 but no IPv6 connectivity,

master has even got an IPv6 routing table and the kernel assumes it
can reach IPv6 hosts with site-local addresses (fe80::/64):

[EMAIL PROTECTED]:~$ ip -f inet6 route list
fe80::/64 dev eth0  metric 256  mtu 1500 advmss 1440
fe80::/64 dev eth1  metric 256  mtu 1500 advmss 1440
ff00::/8 dev eth0  metric 256  mtu 1500 advmss 1440
ff00::/8 dev eth1  metric 256  mtu 1500 advmss 1440
default dev eth0  proto kernel  metric 256  mtu 1500 advmss 1440
default dev eth1  proto kernel  metric 256  mtu 1500 advmss 1440
unreachable default dev lo  proto none  metric -1  error -101
[EMAIL PROTECTED]:~$ ip route get 2001:14b0:202:1::a7
2001:14b0:202:1::a7 via 2001:14b0:202:1::a7 dev eth0  src 
fe80::230:6eff:fe05:b968  metric 0 
cache  mtu 1500 advmss 1440
[EMAIL PROTECTED]:~$ 

 so it falls back to IPv4 without any noticable delay.

Try telnet mail.enyo.de 25 on master and your host for a comparison.
master does suffer from a delay when the v6 address is tried, and Exim
does something similar (try v6 first, then v4).


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: master mail problems -- help needed

2005-11-26 Thread Stephen Gran
This one time, at band camp, Florian Weimer said:
 * Stephen Gran:

  I have IPv6 support in kernel and exim, 
 
 Are you sure?  IPv6 socket creation failed: Address family not
 supported by protocol suggests something else.
 
  but no IPv6 connectivity,
 
 master has even got an IPv6 routing table and the kernel assumes it
 can reach IPv6 hosts with site-local addresses (fe80::/64):
 
 [EMAIL PROTECTED]:~$ ip -f inet6 route list
 fe80::/64 dev eth0  metric 256  mtu 1500 advmss 1440
 fe80::/64 dev eth1  metric 256  mtu 1500 advmss 1440
 ff00::/8 dev eth0  metric 256  mtu 1500 advmss 1440
 ff00::/8 dev eth1  metric 256  mtu 1500 advmss 1440
 default dev eth0  proto kernel  metric 256  mtu 1500 advmss 1440
 default dev eth1  proto kernel  metric 256  mtu 1500 advmss 1440
 unreachable default dev lo  proto none  metric -1  error -101
 [EMAIL PROTECTED]:~$ ip route get 2001:14b0:202:1::a7
 2001:14b0:202:1::a7 via 2001:14b0:202:1::a7 dev eth0  src 
 fe80::230:6eff:fe05:b968  metric 0 
 cache  mtu 1500 advmss 1440

[EMAIL PROTECTED]:~$ ip -f inet6 route list
fe80::/64 dev eth0  metric 256  mtu 1500 advmss 1440 hoplimit 64
ff00::/8 dev eth0  metric 256  mtu 1500 advmss 1440 hoplimit 1
default dev eth0  proto kernel  metric 256  mtu 1500 advmss 1440 hoplimit 64
unreachable default dev lo  proto none  metric -1  error -101 hoplimit 255
[EMAIL PROTECTED]:~$ ip route get 2001:14b0:202:1::a7
2001:14b0:202:1::a7 via 2001:14b0:202:1::a7 dev eth0  src 
fe80::20d:93ff:fe77:4a6e  metric 0
cache  mtu 1500 advmss 1440 hoplimit 64

  so it falls back to IPv4 without any noticable delay.
 
 Try telnet mail.enyo.de 25 on master and your host for a comparison.
 master does suffer from a delay when the v6 address is tried, and Exim
 does something similar (try v6 first, then v4).

[EMAIL PROTECTED]:~$ telnet mail.enyo.de 25
Trying 2001:14b0:202:1::a7...
Trying 212.9.189.167...
Connected to mail.enyo.de.
Escape character is '^]'.
220 mail.enyo.de ESMTP

[EMAIL PROTECTED]:~$ telnet mail.enyo.de 25
Trying 2001:14b0:202:1::a7...
Trying 212.9.189.167...
Connected to mail.enyo.de.
Escape character is '^]'.
220 mail.enyo.de ESMTP

No noticable time difference between the two, either.  So, I don't 
think this is the real problem.  I may be wrong, of course :)
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Re: Secret changes for binNMUs

2005-11-26 Thread Simon Richter
Hi,

Henrique de Moraes Holschuh schrieb:

 We really need another substvar with different semantics.

http://lists.debian.org/debian-devel/2002/09/msg01251.html

   Simon


signature.asc
Description: OpenPGP digital signature


Re: possible freetype transition; improved library handling needed for all C/C++ packages

2005-11-26 Thread Kurt Roeckx
On Thu, Nov 24, 2005 at 02:43:14PM +0100, Peter Eisentraut wrote:
 Steve Langasek wrote:
  * Use Debian's libtool.
 
 kmldonkey links with the following libraries: -lkdeui -lkio.  As shipped,
 libtool expands that to every library under the sun.  The new libtool
 indeed reduces this to /usr/lib/libkdeui.so /usr/lib/libkio.so and a few
 system libraries/objects, which is then greeted by ld with hundreds of
 error messages of the kind:
 
 /usr/share/qt3/include/qstring.h:847: undefined reference to 
 `QString::shared_null'
 /usr/share/qt3/include/qstring.h:848: undefined reference to 
 `QStringData::deleteSelf()'

kmldonkey seems to have alot (26?) includes of qstring.h, so to
me this doesn't looks like a bug in libtool but rather in your
package not linking to all the libraries it should be.  It just
used to work, which is not an excuse for not having a build
dependency on it or linking to it.

 Both libkdeui and libkio reference (as shown by ldd) libqt-mt (which
 I suppose is where these symbols should be).

So you probably should add a build dependency to libqt3-mt-dev,
and add a -lqt-mt

 The error messages in the rekall build are of the sort
 
 .../rekall-2.2.3-2/db/mysql/kb_mysql.cpp:595: undefined reference to 
 `i18n(char const*)'

Which is defined in /usr/include/kde/klocale.h, so that would be
part of kdelibs, and seems you need to link to -lkdecore for
that, which you don't seem to link atleast for that.

(Also see libs/common/kb_classes.h:408)

 Have other maintainers of Qt/KDE-related packages
 perhaps experienced this?

I'm not sure many people have actually tried to get things right,
since it just works.  I hope more people actually look at their
packages, and maybe ask for help if they can't figure it out
themself.


Kurt


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Heimdal autotools dramas

2005-11-26 Thread Brian May
 Gabor == Gabor Gombas [EMAIL PROTECTED] writes:

Gabor It tests for the GLOB_QUOTE flag but that is not present in
Gabor glibc, so it decides that glibc's glob() function is not
Gabor good enough. See cf/broken-glob.m4.

Arhh... This brings back memories.

Now I just need to remember if GLOB_QUOTE is actually required or not.

Gabor Also, libroken.so contains only the symbol rk_glob(), not
Gabor glob(). I haven't checked the actual Debian package, but
Gabor unless it overwrites /usr/include/glob.h (which I highly
Gabor doubt) Heimdal's version of glob() will not be used outside
Gabor of Heimdal.

I suspect you are probably looking at an older version of the Debian
package, which renamed the function in order to eliminate this type of
problem. (I thought the new name was roken_glob() though).

Unfortunately, this patch didn't apply cleanly to Heimdal 0.7.1 (I
haven't investigated in detail why), and I was hoping it wouldn't be
required. I might be mistaken.

Gabor I've just tried a Heimdal-0.7.1 build here and libroken
Gabor does not have fnmatch.

Just the header file then, which I delete in debian/rules.

Gabor Heimdal is using the AC_LIBOBJ machinery.

Not familiar with this. Maybe thats why I was confused.

 I asked upstream Heimdal and got no response.

Gabor I did not see your mail on the heimdal-discuss list...

I sent the message to heimdal-bugs.

Maybe heimdal-discuss would be more appropriate?

Unfortunately, my laptop computer is throwing one of its I will not
power on unless you remove my power source and batteries for several
days tantrum, so I can't double check right now. Hmmm. Really need to
fix this.
-- 
Brian May [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: dpkg-sig support wanted?

2005-11-26 Thread Florian Weimer
* Adeodato Simó:

 * Florian Weimer [Thu, 24 Nov 2005 18:28:04 +0100]:

 Hi,

 AFAIK, binary NMus aren't announced on debian-devel-changes.

   Binary-only uploads are announced in the appropriate
   debian-devel-$ARCH-changes list.

According to

http://murphy.debian.org/lists/debian-devel-i386-changes/details.html

these lists are dead.  Or am I missing something?



Re: Bug#340606: ITP: libsub-name-perl -- Assigns a new name to referenced sub

2005-11-26 Thread Krzysztof Krzyzaniak

Henning Makholm wrote:

Scripsit Krzysztof Krzyzaniak (eloy) [EMAIL PROTECTED]


This module has only one function, which is also exported by default:
subname NAME, CODEREF
Assigns a new name to referenced sub.
The name is only used for informative routines (caller, Carp, etc).



Is this really useful enough to be worth the Packages.gz file space?


It's demanded by libclass-c3-perl, which is needed to run new upstream 
libdbix-class-perl [1] (DBIx::Class).


[1] http://lists.rawmode.org/pipermail/dbix-class/2005-November/000306.html

  eloy
--
[EMAIL PROTECTED]

   jak to dobrze, że są oceany - bez nich byłoby jeszcze smutniej


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Secret changes for binNMUs

2005-11-26 Thread Roger Leigh
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Michael Banck [EMAIL PROTECTED] writes:

 On Thu, Nov 24, 2005 at 11:02:36AM +, Roger Leigh wrote:
 Goswin von Brederlow [EMAIL PROTECTED] writes:
 
If you NEED to do a manual binNMU it is probably best to use sbuild
(the cvs, not deb)
 
 Which sbuild CVS repo?  

 It is a SVN repo now, the one used by the buildd infrastructure.

Thanks, I'm going through the changes now.

 BTW, are there any good reasons why the autobuilders don't use the
 packaged version anywat?  The differences are minimal.

 Last time I looked the changes seemed to be pretty big, but merging is
 of course a mid-term goal.

I started merging the changes tonight, and I'll try to get through
some more tomorrow.  Some of the changes appear to be dysfunctional,
so I'm testing as I go along.

  
http://cvs.alioth.debian.org/cgi-bin/cvsweb.cgi/sbuild/sbuild?cvsroot=buildd-tools

Once the current SVN changes are merged, I'll reindent the source to
match the 4 col SVN intentation, re-diff it and manually merge any
outstanding changes.  Once we are done, I'll see if we can push back
the changes we've made to make it more user-friendly.  Is there a
mailing list for upstream to send patches to?


Regards,
Roger

- -- 
Roger Leigh
Printing on GNU/Linux?  http://gimp-print.sourceforge.net/
Debian GNU/Linuxhttp://www.debian.org/
GPG Public Key: 0x25BFB848.  Please sign and encrypt your mail.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.8+ http://mailcrypt.sourceforge.net/

iD8DBQFDiP9yVcFcaSW/uEgRAlSXAJ9bUT/uehFKNIoyAo4Ymdo3GXYpMwCghfym
sqnm3uGVMnZ302nkmJiaUlQ=
=Uw5X
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: dpkg-sig support wanted?

2005-11-26 Thread Henning Makholm
Scripsit Florian Weimer [EMAIL PROTECTED]
 * Henning Makholm:

 I wouldn't use real base64, though, because it would mean that you can
 use its hashed output as a file name.

 Good point. One might replace / with _ and omit the final =.
 Having a + in the hash should be safe in most contexts.

 It should be replaced with -.  Beyond alphanumerics, only ., _,
 - are in the POSIX portable filename character set[1], and some
 systems do not allow the character + in file names.

However there are already plenty of files with + in their names
involved in Debian (e.g. /usr/lib/libstdc++.so.6).

Having every 64th hash-based filename start with - or . would lead
to failure modes for shell scripts (mistaking the filename for a
command line option, resp. missing it in globs) that are just
infrequent enough that they might not be observed before a
quick-and-dirty script is deployed.

I think the conclusion is that no simple substitution is at the same
time Posix friendly and friendly towards quick-and-dirty scripting.

(Yes: substitute /+ with _-, and then move the last character of the
base64 encoding to the front. Due to zero padding it must come from
the set [AEIMQUYcgkosw048].)

-- 
Henning Makholm You want to know where my brain is,
spetsnaz girl? Do you? Look behind you.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: dpkg-sig support wanted?

2005-11-26 Thread Peter Samuelson

[George Danchev]
 Even using weak hash sum algorythms you can easily make the hash
 collider life tremendously difficult by simply having more than one
 (ok two should be enough) hash sums generated with _different_
 (weak?) algorythms on the same entity.

What you have just defined is a new hash algorithm of M+N bits.  Why
not instead use an existing hash algorithm with M+N bits?  If nothing
else, the attack is likely to be less parallelizable.


signature.asc
Description: Digital signature


Re: Bug#340624: ITP: sendcard -- web-based virtual greeting card (e-card) software

2005-11-26 Thread Peter Samuelson

[Wesley J. Landaker]
 As described by the upstream website (the rest of this is a quote):
 
 What is sendcard?
 Sendcard is a multi-database (It currently supports 9 different
 databases!) e-card or virtual postcard program written in PHP. Suitable
 for large or small sites, it is very easy to setup, and comes with an
 installation wizard. What could be easier?

Please, for the love of cod, drop three sentences: the one with the
exclamation point and both of the ones with question marks.

   * Support for 9 databases 
   * MySQL
 * PostgreSQL
 * Interbase
 * MS SQL
 * mSQL
 * OCi8
 * ODBC
 * Oracle
 * Sybase
 * Easily Extensible using built-in plugin architecture
 * Unlimited support
 * IT'S FREE!

OK, we don't need the 9 databases on 10 lines, one line would be
enough.  And for that matter there's probably no need to list the
database engines we do not supply with Debian.  (Not that ODBC is a
database engine anyway.)

It's also probably a bad idea to imply that the Debian Project wishes
to guarantee unlimited support.  And our users already know our
software is free.


signature.asc
Description: Digital signature


Re: Bug#340631: ITP: culmus-fancy -- Type1 Fancy Hebrew Fonts for X11

2005-11-26 Thread Peter Samuelson

[Lior Kaplan]
 * Package name: culmus-fancy
   Description : Type1 Fancy Hebrew Fonts for X11

I understand that the 'culmus' package already exists, and other
packages like 'lmodern' don't follow any particular name convention
either, but could you consider naming this thing t1-culmus-fancy or
something?  We don't really have a package name convention for fonts,
but xfonts-*, t1-* and ttf-* are the closest thing we have.


signature.asc
Description: Digital signature


Re: dpkg-sig support wanted?

2005-11-26 Thread Anthony Towns
On Fri, Nov 25, 2005 at 11:08:32PM -0600, Peter Samuelson wrote:
 You may laugh if you wish, but I think it's annoying to have to move to
 a hash function whose hexadecimal representation takes 64 bytes, which
 doesn't leave much room on an 80-column line to describe what the hash
 is hashing.  Maybe by the time coreutils ships a sha256sum program, the
 world will have settled upon BASE64, which requires only 43 bytes.

Why should we wait for the rest of the world to settle on a standard?

Cheers,
aj


signature.asc
Description: Digital signature


Bug#340934: lintian check for unneeded/transitive shlibs dependencies

2005-11-26 Thread Henning Makholm
Package: lintian
Severity: wishlist
Tags: patch

Steve Langasek wrote in
http://lists.debian.org/debian-devel-announce/2005/11/msg00016.html:

 I would encourage you to read the presentation in question, but I will
 also summarize here: due to accidents of history, the convention when
 linking an executable or shared library is to tell ld to recursively add
 references to *all* libraries in the dependency tree below it.  This is
 wrong for modern GNU/Linux systems when using dynamic linking, because
 the dynamic linker recurses the dependency tree on its own; and
 following this convention means that executables get not the needed one
 reference to the library, but two or more.  Where things *really* go
 wrong is when the library goes through an soname change.  If two
 different versions of the library are specified in the ELF header, then
 either users can't install the package, or they can install it and then
 it segfaults.  In either case, this situation causes a lot more work for
 maintainers, autobuilders, and the release team (trying to get packages
 into testing) than it should.
[...]
 Moreover, this is a problem that happens over and over again, every time
 there's a library transition.  It's not hard to look around and see that
 over the course of a release cycle, we spend a lot of time managing
 library transitions -- time that could be better spent on enhancements
 that actually matter to our users.  Pruning our package dependencies is
 (ideally) a one-time fix for each package, with long-term time savings
 for each maintainer (and for the release team!).  Think how nice it will
 be to have only a third as many dependencies, and only have to rebuild
 your package for a third as many transitions!

I have written a Lintian check which attempts to flag instances of
this problem. It looks for ELF objects that flag shared libraries in
the default search path as NEEDED without actually importing symbols
that the library exports.

The check is a bit unorthodox in that it needs to have the referenced
libraries present on the host system (where lintian is run) and runs
objdump over them to figure out which symbols they export.  Linkage to
libraries that cannot be found at lintian time will be silently
accepted as not superfluous.

Testing and comments solicited. To test, install
http://henning.makholm.net/debian/lintian_1.23.13makholm_all.deb,
or just drop the two attached files in /usr/share/lintian/checks/.

-- 
Henning Makholm   ... not one has been remembered from the time
 when the author studied freshman physics. Quite the
contrary: he merely remembers that such and such is true, and to
  explain it he invents a demonstration at the moment it is needed.
# libneeded -- lintian check script

# Copyright (C) 2005 Henning Makholm
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program.  If not, you can find it on the World Wide
# Web at http://www.gnu.org/copyleft/gpl.html, or write to the Free
# Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston,
# MA 02110-1301, USA.

package Lintian::libneeded;
use strict;
use Tags;
use Util;

# NOTE that this check depends on the linked-to libaries actually
# being present on the system where lintian runs.
# The check will _succeed_ silently if the necessary information
# is not present.

sub run {

my $pkg = shift;
my $type = shift;

my %WELLKNOWN ;
# Do not bother to check for spurious linkings to libc packages;
# they are ubiquitous anyway. Get the current list from their
# shlibs files.
# Other libraries to be ignored can be added to the foreach
# list.
foreach my $p ( map(m/(libc[0-9.]+)\.shlibs/ ? $1 : (),
glob /var/lib/dpkg/info/libc*.shlibs) ) {
open(SHLIBS,/var/lib/dpkg/info/$p.shlibs) or next ;
while( SHLIBS ) {
next unless m/^(\S+) (\d+) / ;
$WELLKNOWN{$1.so.$2} = 1 ;
}
}

sub checkit ($\%\%) {
my ($file,$libs,$syms) = @_ ;
my @unneeded ;
  libloop:
for my $lib ( keys %$libs ) {
open(LIB,-|,objdump -T $$libs{$lib})
or fail (cannot run objdump for $lib) ;
while(LIB) {
next if /^0+\s/ or /\s\*UND\*\s/ ;
if( m/\s(\S+)\s*$/  exists $$syms{$1} ) {
close LIB ;
next libloop ;
}
}
close LIB ;
push @unneeded, $lib ;
}
tag unneeded-explicit-linking, $file, @unneeded
if @unneeded ;

Re: dpkg-sig support wanted?

2005-11-26 Thread Anthony Towns
On Sat, Nov 26, 2005 at 10:59:57AM +0100, Florian Weimer wrote:
 For the exploits we have seen so far to work, the malicious party
 needs upload access to the archive and has to plant a specially
 crafted package there, for which they have created an evil twin
 package.  (Same for attacking one of the text files listing hashes.)
 Looks a bit far-fatched to me.

Not really. Joining Debian isn't particularly difficult, and it might
not even be out of the question to find someone who'll sponsor an upload
without rebuilding the .deb. I think it's safe to imagine that there are
developers right now who've done some shady things in the past; is it
that far fetched to imagine it's worth protecting against developers
who try to abuse their priveleges?

The way we do that has to be mostly after the fact, of course: someone
uploads a bad package, people find out it's bad, we trace it back to
whoever uploaded it, then we kick them out of the project.

But that only works if the bad package is actually discovered. If the
.deb's distributed across hundreds of mirrors and to thousands of users,
it's reasonably likely that it will be discovered; but if it's possible
to target the attack against an individual user, and leave the rest of
the Debian universe untouched, you've got a much better chance of
not getting caught. Hence: distribute an iced .deb in the archive, that
does no harm ever and thus needn't arouse any suspicion; and sneak a
fire .deb that has the exploit activated onto the mirror of your target.

Looks a bit far-fetched comes under the famous last words heading
for security analysis.

Worse, the existance of a practical md5(A+B+C)=md5(A+D+C) attack means
that it's not out of the question that there're md5(A+B)=md5(C+D)
attacks in the hands of particularly well resourced groups (which is
worse, since the version uploaded to the archive could then be entirely
innocent looking). Personally, I don't have any interest in making the
NSA's job any easier, or that of other signals intelligence groups.

  Moving away from MD5 is certainly not a bad idea, but it's not clear
  whether the alternatives are any better.  Sure, everyone recommends
  SHA-256 at this stage, but nobody can give a rationale.
  MD5 is broken; SHA-1 is where MD5 was a couple of years ago, SHA256 (or
  higher) are significantly harder to break in practice,
 So?  If SHA256 is so much better, why is that nobody can prove it, or
 at least can provide some evidence which supports that claim?  The
 numbers are bigger is the main argument at this point, which is
 awfully similar to the usual snake-oil arguments (although there is a
 slight difference, of course).

SHA256 is better than SHA1 in the same way 2048 bit RSA keys are better
than 512 bit RSA keys. MD5 is broken, and isn't extensible. SHA1 is
fragile, but not broken, and is extensible. Do you have other
suggestions?

  and there's nothing better yet.
 In terms of security, there are some better hash functions.  

My understanding was that there aren't other hash functions that've had
remotely similar levels of cryptographic analysis to md5 and sha. IIRC,
the elliptic curve cryptography stuff was supposed to be similarly neat,
until people started analysing it seriously, at which point it broke.

Cheers,
aj


signature.asc
Description: Digital signature


Re: dpkg-sig support wanted?

2005-11-26 Thread Peter Samuelson

  [Florian Weimer]
  It should be replaced with -.  Beyond alphanumerics, only .,
  _, - are in the POSIX portable filename character set[1], and
  some systems do not allow the character + in file names.

[Henning Makholm]
 However there are already plenty of files with + in their names
 involved in Debian (e.g. /usr/lib/libstdc++.so.6).

Well, if we're trying to drive a standard representation, there will be
people outside Debian who will care about POSIX filename characters.

 Having every 64th hash-based filename start with - or . would
 lead to failure modes for shell scripts

True.

 (Yes: substitute /+ with _-, and then move the last character of the
 base64 encoding to the front. Due to zero padding it must come from
 the set [AEIMQUYcgkosw048].)

Or: substitute /+ with _- and then add a short prefix like s- to
denote the hash type, in case other 256-bit hashes become popular.  I
guess we didn't really have that problem with 128-bit and 160-bit
checksums, but we could've.

  sha256sum () {
local f;
if [ $# = 0 ]; then
  openssl dgst -sha256 -binary | base64-encode |
  sed 'y|/+|_-|;  s|^|s-|;  s|=|\t-|'
else for f; do
  echo s-$(openssl dgst -sha256 -binary $f | base64-encode |
sed 'y|/+|_-|;  s|=|\t|')$f
done; fi
  }

(Implementation of -c left as an exercise, etc.)


signature.asc
Description: Digital signature


Accepted digikamimageplugins 0.8.0-1-1 (source i386)

2005-11-26 Thread Debian KDE Extras Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 23 Nov 2005 01:26:27 +0100
Source: digikamimageplugins
Binary: digikamimageplugins
Architecture: source i386
Version: 0.8.0-1-1
Distribution: unstable
Urgency: low
Maintainer: Debian KDE Extras Team [EMAIL PROTECTED]
Changed-By: Debian KDE Extras Team [EMAIL PROTECTED]
Description: 
 digikamimageplugins - image editor plugins for digikam and showfoto
Changes: 
 digikamimageplugins (0.8.0-1-1) unstable; urgency=low
 .
   [ Mark Purcell ]
   * New Upstream Release
 .
   [ Achim Bohnet ]
   * description: mention that showfoto uses the plugins now too
Files: 
 7254e203b17e216ab37b04ba795f93aa 906 graphics optional 
digikamimageplugins_0.8.0-1-1.dsc
 3cd135813b5e24b0bc3df58e8c0943d8 3379801 graphics optional 
digikamimageplugins_0.8.0-1.orig.tar.gz
 ac3a296512a7261fa76b33e5cab0264b 12571 graphics optional 
digikamimageplugins_0.8.0-1-1.diff.gz
 058e9f81482d4b42cdfceb132ebb2ee9 3491566 graphics optional 
digikamimageplugins_0.8.0-1-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiA3PoCzanz0IthIRAjFNAJ44DJKP1gOXxMlB5Gapi2FEKenPBQCfcjNq
/tx4prKjMjMSvEcBQKCm1sU=
=H+at
-END PGP SIGNATURE-


Accepted:
digikamimageplugins_0.8.0-1-1.diff.gz
  to pool/main/d/digikamimageplugins/digikamimageplugins_0.8.0-1-1.diff.gz
digikamimageplugins_0.8.0-1-1.dsc
  to pool/main/d/digikamimageplugins/digikamimageplugins_0.8.0-1-1.dsc
digikamimageplugins_0.8.0-1-1_i386.deb
  to pool/main/d/digikamimageplugins/digikamimageplugins_0.8.0-1-1_i386.deb
digikamimageplugins_0.8.0-1.orig.tar.gz
  to pool/main/d/digikamimageplugins/digikamimageplugins_0.8.0-1.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted libapache2-mod-fcgid 1.07-1 (source i386)

2005-11-26 Thread Tatsuki Sugiura
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 21 Nov 2005 05:55:39 +0900
Source: libapache2-mod-fcgid
Binary: libapache2-mod-fcgid
Architecture: source i386
Version: 1.07-1
Distribution: unstable
Urgency: low
Maintainer: Taku YASUI [EMAIL PROTECTED]
Changed-By: Tatsuki Sugiura [EMAIL PROTECTED]
Description: 
 libapache2-mod-fcgid - an alternative module compat with mod_fastcgi
Closes: 334011 339604
Changes: 
 libapache2-mod-fcgid (1.07-1) unstable; urgency=low
 .
   * New upstream release (Closes: #339604)
   * Unnecessary dependency has been removed. Those provied from
 apache2-common. (Closes: #334011)
Files: 
 f6fe7d4208122c96c6d5fe468ce5d7ea 689 web optional 
libapache2-mod-fcgid_1.07-1.dsc
 ae74bcb009b044739dc22757581b09f3 48521 web optional 
libapache2-mod-fcgid_1.07.orig.tar.gz
 57fc4efd261efc2b1deb807683297fb2 5791 web optional 
libapache2-mod-fcgid_1.07-1.diff.gz
 b1d06114044af0e669c5452c73898527 32356 web optional 
libapache2-mod-fcgid_1.07-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiBjQFwU5DuZsm7ARApUCAKDdLOWIDTPRr6pwH1vInjNJidvWhQCeJOK8
F74Mr5todN0s5I/l8Xi4nek=
=JuCz
-END PGP SIGNATURE-


Accepted:
libapache2-mod-fcgid_1.07-1.diff.gz
  to pool/main/liba/libapache2-mod-fcgid/libapache2-mod-fcgid_1.07-1.diff.gz
libapache2-mod-fcgid_1.07-1.dsc
  to pool/main/liba/libapache2-mod-fcgid/libapache2-mod-fcgid_1.07-1.dsc
libapache2-mod-fcgid_1.07-1_i386.deb
  to pool/main/liba/libapache2-mod-fcgid/libapache2-mod-fcgid_1.07-1_i386.deb
libapache2-mod-fcgid_1.07.orig.tar.gz
  to pool/main/liba/libapache2-mod-fcgid/libapache2-mod-fcgid_1.07.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted lvm2 2.02.00-1 (source i386)

2005-11-26 Thread Bastian Blank
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 10:26:42 +0100
Source: lvm2
Binary: clvm lvm2-udeb lvm2
Architecture: source i386
Version: 2.02.00-1
Distribution: unstable
Urgency: low
Maintainer: Debian LVM Team [EMAIL PROTECTED]
Changed-By: Bastian Blank [EMAIL PROTECTED]
Description: 
 clvm   - Cluster LVM Daemon for lvm2
 lvm2   - The Linux Logical Volume Manager
 lvm2-udeb  - The Linux Logical Volume Manager (udeb)
Changes: 
 lvm2 (2.02.00-1) unstable; urgency=low
 .
   * New upstream version.
Files: 
 41df65de334f575a7edb0e7c162cf879 769 admin optional lvm2_2.02.00-1.dsc
 50047ff975d7ee5492781d7b35f9935d 470597 admin optional lvm2_2.02.00.orig.tar.gz
 36f838e45719496757bf4ceeb63bc578 18166 admin optional lvm2_2.02.00-1.diff.gz
 5d1ebc2d4910e86a8e7f3bf4cd759884 272034 admin optional lvm2_2.02.00-1_i386.deb
 0086f7cf3425ee58c2ec1775df0decb0 166072 debian-installer optional 
lvm2-udeb_2.02.00-1_i386.udeb
 8d32dd8c340dcfa63d48e3f28d5027f0 162114 admin extra clvm_2.02.00-1_i386.deb
Package-Type: udeb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iEYEARECAAYFAkOILXIACgkQLkAIIn9ODhHqrwCfZFh8YgDZdha8I4Hytp3iZ9BB
dk0AnjjmhAgArMbFrvhq/SdpGT3npIha
=IX0m
-END PGP SIGNATURE-


Accepted:
clvm_2.02.00-1_i386.deb
  to pool/main/l/lvm2/clvm_2.02.00-1_i386.deb
lvm2-udeb_2.02.00-1_i386.udeb
  to pool/main/l/lvm2/lvm2-udeb_2.02.00-1_i386.udeb
lvm2_2.02.00-1.diff.gz
  to pool/main/l/lvm2/lvm2_2.02.00-1.diff.gz
lvm2_2.02.00-1.dsc
  to pool/main/l/lvm2/lvm2_2.02.00-1.dsc
lvm2_2.02.00-1_i386.deb
  to pool/main/l/lvm2/lvm2_2.02.00-1_i386.deb
lvm2_2.02.00.orig.tar.gz
  to pool/main/l/lvm2/lvm2_2.02.00.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted mailman 2.1.5-10 (source sparc)

2005-11-26 Thread Lionel Elie Mamane
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160

Format: 1.7
Date: Sat, 26 Nov 2005 10:03:23 +0100
Source: mailman
Binary: mailman
Architecture: source sparc
Version: 2.1.5-10
Distribution: unstable
Urgency: low
Maintainer: Mailman for Debian [EMAIL PROTECTED]
Changed-By: Lionel Elie Mamane [EMAIL PROTECTED]
Description: 
 mailman- Powerful, web-based mailing list manager
Closes: 244700 298842 310451 312673 313800 315358 326024 327732 332018 339582 
339890 340036
Changes: 
 mailman (2.1.5-10) unstable; urgency=low
 .
   * Merge with 2.1.5-8ubuntu2:
 Python 2.4 compatibility patch in bounce handling.
   * Don't fall apart if the filename of an attachment is an invalid UTF-8
 string (closes: #327732)
   * Don't die on overflow in date handling (closes: #326024)
   * Enable error handling in HyperArch (closes: #310451)
   * Ensure list-id is always in brackets in headers (closes: #244700)
   * Admin page: don't assume subscribed emails are pure ASCII
 (closes: #315358)
   * Bump up Standards-Version to 3.6.2
   * Add vietnamese translation (closes: #312673)
   * Apply corrections to german translation (closes: #313800)
   * Adapt to the md5sum in dpkg or coreutils automatically (closes: #340036)
   * More robust parsing of /var/lib/ucf/hashfile:
 - Don't touch files of other packages that happen to have
   our file's full path as subpath.
 - Accept any number of spaces between the hash and the filename there.
   * Work around ucf bug #238730 for postfix-to-mailman.py, too.
   * Fix traceback on Danish version of options page (closes: #339582)
   * Fix the private authentication form to point to the right file
 (closes: #298842)
   * Add Swedish debconf template translation (closes: #339890)
   * Depend on any debconf-2.0 implementation instead of debconf
 specifically (closes: #332018)
   * Copyright file:
 - New FSF address
 - List the other maintainers
   * Depend on adduser, used in preinst
   * Move away from deprecated user.group syntax in chown
   * Ensure package is built with autoconf 2.5x, not autoconf 2.13
Files: 
 5b95f8fb72914b06671e9f6456a4c98f 740 mail optional mailman_2.1.5-10.dsc
 bd18d18647a42bf574838919762a7324 200228 mail optional mailman_2.1.5-10.diff.gz
 8593eb6dd20d33bb913d332d46861d3b 6620074 mail optional 
mailman_2.1.5-10_sparc.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iEYEAREDAAYFAkOIKvQACgkQscRzFz57S3O5qACeM6eQIR43ywNLUdfEfjW6Vigt
qmUAn33W4Yg9cATH7ZSjjHnXObSGdNfk
=oT8O
-END PGP SIGNATURE-


Accepted:
mailman_2.1.5-10.diff.gz
  to pool/main/m/mailman/mailman_2.1.5-10.diff.gz
mailman_2.1.5-10.dsc
  to pool/main/m/mailman/mailman_2.1.5-10.dsc
mailman_2.1.5-10_sparc.deb
  to pool/main/m/mailman/mailman_2.1.5-10_sparc.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted netclient 0.91-2 (source i386)

2005-11-26 Thread Stefano Zacchiroli
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 10 Nov 2005 13:25:01 +0100
Source: netclient
Binary: libnetclient-ocaml-dev
Architecture: source i386
Version: 0.91-2
Distribution: unstable
Urgency: low
Maintainer: Stefano Zacchiroli [EMAIL PROTECTED]
Changed-By: Stefano Zacchiroli [EMAIL PROTECTED]
Description: 
 libnetclient-ocaml-dev - OCaml HTTP/1.1, Telnet, and FTP clients library
Changes: 
 netclient (0.91-2) unstable; urgency=low
 .
   * rebuilt with ocaml 3.09
   * debian/*
 - no longer hard coding of ocaml abi anywhere
Files: 
 337d555617f07a88c00a08347b18e71b 738 devel optional netclient_0.91-2.dsc
 0c574dd3ddb03db72a1ce25e4fa5d7b1 4351 devel optional netclient_0.91-2.diff.gz
 9401aae6f6e3f6880e1fa65642c69bb9 776482 libdevel optional 
libnetclient-ocaml-dev_0.91-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiDQ51cqbBPLEI7wRAmJ0AKDZxoGi2H/C5mW5Amk/ySpb3hh4SQCdEnPf
Wc8FvMZs1A4JWmqjvFoUUVI=
=zwbw
-END PGP SIGNATURE-


Accepted:
libnetclient-ocaml-dev_0.91-2_i386.deb
  to pool/main/n/netclient/libnetclient-ocaml-dev_0.91-2_i386.deb
netclient_0.91-2.diff.gz
  to pool/main/n/netclient/netclient_0.91-2.diff.gz
netclient_0.91-2.dsc
  to pool/main/n/netclient/netclient_0.91-2.dsc


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted camlzip 1.01-16 (source i386)

2005-11-26 Thread Debian OCaml Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 22:25:12 +0100
Source: camlzip
Binary: libzip-ocaml libzip-ocaml-dev
Architecture: source i386
Version: 1.01-16
Distribution: unstable
Urgency: low
Maintainer: Debian OCaml Maintainers debian-ocaml-maint@lists.debian.org
Changed-By: Debian OCaml Maintainers debian-ocaml-maint@lists.debian.org
Description: 
 libzip-ocaml - ocaml compression libraries
 libzip-ocaml-dev - ocaml compression libraries
Changes: 
 camlzip (1.01-16) unstable; urgency=low
 .
   [ Sven Luther ]
 .
   * Rebuilt against ocaml 3.09.0.
 .
   [ Stefano Zacchiroli ]
 .
   * Made svn structure svn-buildpackage friendly
   * debian/control
 - bumped standards version
   * debian/changelog
 - removed dh_make boilerplate
   * Added myself as an Uploader
Files: 
 8fb0495502a6b501696bfe32f109b5cb 746 libdevel optional camlzip_1.01-16.dsc
 b2512c313f81624276230139f5ecc727 4257 libdevel optional camlzip_1.01-16.diff.gz
 d2a451eb0b44ca9baff83c1c4ba31f98 6206 libs optional 
libzip-ocaml_1.01-16_i386.deb
 1a7f6b62b29747e6fe529d38570fc332 76880 libdevel optional 
libzip-ocaml-dev_1.01-16_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiDFn1cqbBPLEI7wRAntHAJ9YNqseMvSd0uKnwIKppFwNZvJHvwCfSgdx
SoMnbi4yCqIOCcoPBhQnkkY=
=yxaH
-END PGP SIGNATURE-


Accepted:
camlzip_1.01-16.diff.gz
  to pool/main/c/camlzip/camlzip_1.01-16.diff.gz
camlzip_1.01-16.dsc
  to pool/main/c/camlzip/camlzip_1.01-16.dsc
libzip-ocaml-dev_1.01-16_i386.deb
  to pool/main/c/camlzip/libzip-ocaml-dev_1.01-16_i386.deb
libzip-ocaml_1.01-16_i386.deb
  to pool/main/c/camlzip/libzip-ocaml_1.01-16_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted ginac 1.3.3-3 (source i386)

2005-11-26 Thread Richard Kreckel
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 25 Nov 2005 23:03:41 +0100
Source: ginac
Binary: libginac1.3c2a ginac-tools libginac1.3c2a-dbg libginac-dev
Architecture: source i386
Version: 1.3.3-3
Distribution: unstable
Urgency: low
Maintainer: Richard Kreckel [EMAIL PROTECTED]
Changed-By: Richard Kreckel [EMAIL PROTECTED]
Description: 
 ginac-tools - Some tools for the GiNaC framework
 libginac-dev - The GiNaC framework (development files)
 libginac1.3c2a - The GiNaC framework (runtime library)
 libginac1.3c2a-dbg - The GiNaC framework (debugging symbols)
Closes: 340716
Changes: 
 ginac (1.3.3-3) unstable; urgency=low
 .
   * Add Replaces-field for the c2-libraries to control; closes: #340716.
Files: 
 7c755fcbb325b9d5d581651f9c2ed718 685 math optional ginac_1.3.3-3.dsc
 5ff707f14219d0d14824ed33ffaf12f2 4508 math optional ginac_1.3.3-3.diff.gz
 51c1a2f9490892e23a761d49de49760a 822722 libs optional 
libginac1.3c2a_1.3.3-3_i386.deb
 0785b0994d38929779d9ea4926ff6978 1484880 libdevel optional 
libginac-dev_1.3.3-3_i386.deb
 39784af56c9dab7d1562221088d039dd 89262 math optional 
ginac-tools_1.3.3-3_i386.deb
 d070a543e08368b9cc3997f7a9c65443 3154334 libdevel optional 
libginac1.3c2a-dbg_1.3.3-3_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiCvYXY7lDPAZkWIRAmBCAJ0f3b9upLZBY1MHqwdFOfcsMbIEKQCfZhzF
FtbzC0KknTDjIzPO6ymW3pQ=
=r0zE
-END PGP SIGNATURE-


Accepted:
ginac-tools_1.3.3-3_i386.deb
  to pool/main/g/ginac/ginac-tools_1.3.3-3_i386.deb
ginac_1.3.3-3.diff.gz
  to pool/main/g/ginac/ginac_1.3.3-3.diff.gz
ginac_1.3.3-3.dsc
  to pool/main/g/ginac/ginac_1.3.3-3.dsc
libginac-dev_1.3.3-3_i386.deb
  to pool/main/g/ginac/libginac-dev_1.3.3-3_i386.deb
libginac1.3c2a-dbg_1.3.3-3_i386.deb
  to pool/main/g/ginac/libginac1.3c2a-dbg_1.3.3-3_i386.deb
libginac1.3c2a_1.3.3-3_i386.deb
  to pool/main/g/ginac/libginac1.3c2a_1.3.3-3_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted sysstat 6.0.1-4 (source i386 all)

2005-11-26 Thread Robert Luberda
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 10:26:33 +0100
Source: sysstat
Binary: isag sysstat
Architecture: source i386 all
Version: 6.0.1-4
Distribution: unstable
Urgency: low
Maintainer: Robert Luberda [EMAIL PROTECTED]
Changed-By: Robert Luberda [EMAIL PROTECTED]
Description: 
 isag   - Interactive System Activity Grapher for sysstat
 sysstat- sar, iostat and mpstat - system performance tools for Linux
Closes: 316713 316855 334305
Changes: 
 sysstat (6.0.1-4) unstable; urgency=low
 .
   * Review changes made by upstream in 6.0.x versions to improve handling
 of transition from previous versions (closes: #316713).
 Sorry about doing this so late - one and a half year since the version 6
 was released.
 .
   * Re-enable collecting disk statistics by default (closes: #316855):
 + /etc/default/sysstat:
   - add `-d' option to OPTIONS passed to sadc by the init.d
   - introduce SA1_OPTIONS variable with `-d' as default value
   - for completion add SA2_OPTIONS, empty by default.
 + /etc/cron.d/sysstat: pass $SA1_OPTIONS to sa1 and $SA2_OPTIONS to sa2.
 + add NEWS.Debian file saying about the above change.
 .
   * ioconf.c: Fix overflow in ioc_conv() (closes: #334305).
 Many thanks to Andrew Patterson for the patch!
 .
   * Edit build-time configuration and change the default behaviour of
 the sa2 command: generate daily summary for the *previous* day, not
 for the current as before.
   * As a result of the above, move the sa2 invocation from cron.d to
 the new cron.daily job.
 .
   * /etc/cron.d/sysstat: run sa1 around midnight to have the daily
 statistics file properly rotated.
 .
   * Made the init.d script LSB-compliant.
   * Makefile: remove hard-coded setting CC to gcc-4.0, which me added in
 6.0.1-1 to test #314652 and than forgot to remove.
   * debian/sysstat.{postinst,postrm}: handle /etc/default/sysstat with ucf.
   * debian/compat: bump debhelper compatibility level to 5.
   * debian/sysstat.config: remove some old cruft.
   * debian/control: add dependency on ucf  lsb-base and update
 build-dependency on dephelper.
   * Remove lintian source overrides file, it's not needed.
Files: 
 56003234b3937f6827d1a0bde1167541 578 admin optional sysstat_6.0.1-4.dsc
 64b6385a68df22faf0d97f519eaa0aa6 23957 admin optional sysstat_6.0.1-4.diff.gz
 95c33bf88ec68ab591ca559b088e66fd 22256 admin optional isag_6.0.1-4_all.deb
 e5167c3b4855e3cda6e81f10a993979b 147796 admin optional sysstat_6.0.1-4_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiCrDThh1cJ0wnDsRAsE9AKCI/76Y9A0ewBrkW38NYEqpR5KASACgisBT
yhk7JXbj1jA5A25moAX9hUU=
=yVbQ
-END PGP SIGNATURE-


Accepted:
isag_6.0.1-4_all.deb
  to pool/main/s/sysstat/isag_6.0.1-4_all.deb
sysstat_6.0.1-4.diff.gz
  to pool/main/s/sysstat/sysstat_6.0.1-4.diff.gz
sysstat_6.0.1-4.dsc
  to pool/main/s/sysstat/sysstat_6.0.1-4.dsc
sysstat_6.0.1-4_i386.deb
  to pool/main/s/sysstat/sysstat_6.0.1-4_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted xbanner 1.31-25 (source i386)

2005-11-26 Thread Jose Carlos Medeiros
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 18 Nov 2005 15:59:11 -0200
Source: xbanner
Binary: xbanner
Architecture: source i386
Version: 1.31-25
Distribution: unstable
Urgency: low
Maintainer: Jose Carlos Medeiros [EMAIL PROTECTED]
Changed-By: Jose Carlos Medeiros [EMAIL PROTECTED]
Description: 
 xbanner- Beautify your X login screen
Closes: 151430 162215 331605 334126 334257
Changes: 
 xbanner (1.31-25) unstable; urgency=low
 .
   * Added dirs, docs, watch files. Deleted postinst and debian/autogen.sh (put
 its contents in rules). Updated copyright and rules files and updated
 package to Standards-Version: 3.6.2.
   * Deleted x-window-system from Depends. (closes: #334126)
   * Updated Swedish po-debconf translation, thanks to Daniel Nylander
 [EMAIL PROTECTED]. (Closes: #331605)
   * Updated French po-debconf translation, thanks to Christian Perrier
 [EMAIL PROTECTED]. (Closes: #334257)
   * Changed xbannerconfig to call xbanner without -file parameter, now
 default color is blue and Debian written Red. (Closes: #151430)
   * Added Brazilian Portuguese po-debconf translation, thanks to Jose Carlos
 Medeiros [EMAIL PROTECTED].
   * Changed xbannerconfig to solve problems when install in XDM. (Closes: 
#162215)
Files: 
 8734dbe4e46faef42f1fa3a752732851 633 x11 optional xbanner_1.31-25.dsc
 3ec200b685adc07a8e8650901e6865c7 19209 x11 optional xbanner_1.31-25.diff.gz
 6a803ccbaf30d4e53b1c3e635f693aef 151172 x11 optional xbanner_1.31-25_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDiDZcGKGxzw/lPdkRAiOCAKCd5JTJuJs11bfqKN4iXAMgqGUWFwCaAtJR
TCOt+K+sDB0tcRe3W+sGUbM=
=mC4G
-END PGP SIGNATURE-


Accepted:
xbanner_1.31-25.diff.gz
  to pool/main/x/xbanner/xbanner_1.31-25.diff.gz
xbanner_1.31-25.dsc
  to pool/main/x/xbanner/xbanner_1.31-25.dsc
xbanner_1.31-25_i386.deb
  to pool/main/x/xbanner/xbanner_1.31-25_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted php-http-request 1.3.0-1 (source all)

2005-11-26 Thread Jose Carlos Medeiros
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 14 Nov 2005 17:58:35 -0200
Source: php-http-request
Binary: php-http-request
Architecture: source all
Version: 1.3.0-1
Distribution: unstable
Urgency: low
Maintainer: Jose Carlos Medeiros [EMAIL PROTECTED]
Changed-By: Jose Carlos Medeiros [EMAIL PROTECTED]
Description: 
 php-http-request - provides an easy way to perform HTTP requests
Changes: 
 php-http-request (1.3.0-1) unstable; urgency=low
 .
   * New upstream release.
   * Added php-net-socket as dependence.
Files: 
 cdb3c0e732e3e9d0b5413feb1904db5a 675 web optional php-http-request_1.3.0-1.dsc
 fa64f5f4f3fe4d7e2896129e45ea0173 13808 web optional 
php-http-request_1.3.0.orig.tar.gz
 b703117c54384ce55a9ffea061e95a3e 2181 web optional 
php-http-request_1.3.0-1.diff.gz
 6c68e888df95aba0fa91ca4f73a0d898 16398 web optional 
php-http-request_1.3.0-1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDiDY5GKGxzw/lPdkRAkV5AJ4knVDe3AR0VMr9Uz3a+CrcUiviJgCdEoNi
5i3SSCE+Nyk3+YwQ3LYj4/E=
=YzzW
-END PGP SIGNATURE-


Accepted:
php-http-request_1.3.0-1.diff.gz
  to pool/main/p/php-http-request/php-http-request_1.3.0-1.diff.gz
php-http-request_1.3.0-1.dsc
  to pool/main/p/php-http-request/php-http-request_1.3.0-1.dsc
php-http-request_1.3.0-1_all.deb
  to pool/main/p/php-http-request/php-http-request_1.3.0-1_all.deb
php-http-request_1.3.0.orig.tar.gz
  to pool/main/p/php-http-request/php-http-request_1.3.0.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted snake4 1.0.12-5 (source i386)

2005-11-26 Thread Jose Carlos Medeiros
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 30 Sep 2005 14:09:26 -0300
Source: snake4
Binary: snake4
Architecture: source i386
Version: 1.0.12-5
Distribution: unstable
Urgency: low
Maintainer: Jose Carlos Medeiros [EMAIL PROTECTED]
Changed-By: Jose Carlos Medeiros [EMAIL PROTECTED]
Description: 
 snake4 - Snake game
Changes: 
 snake4 (1.0.12-5) unstable; urgency=low
 .
   * Updated debian/watch file.
   * Added Ola as Uploader.
   * Updated to Standards-Version: 3.6.2.
   * Added snake4.xpm file, snake4.desktop file and updated menu file.
   * Added debian/links file.
Files: 
 fe8ba0d75c64c6d6476f8567e0e357f1 667 games optional snake4_1.0.12-5.dsc
 2418e19af84d3a5880ba9a43b56727fc 5493 games optional snake4_1.0.12-5.diff.gz
 7ca3c1d02373a8cb411920fdeda80295 35972 games optional snake4_1.0.12-5_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDiDZDGKGxzw/lPdkRAlZtAJ0b7z8k0RkJnaEaBh7OSBdoDPvGVQCfbpdB
4dib8iEsmwRk2U3ddx7yJDU=
=IIFR
-END PGP SIGNATURE-


Accepted:
snake4_1.0.12-5.diff.gz
  to pool/main/s/snake4/snake4_1.0.12-5.diff.gz
snake4_1.0.12-5.dsc
  to pool/main/s/snake4/snake4_1.0.12-5.dsc
snake4_1.0.12-5_i386.deb
  to pool/main/s/snake4/snake4_1.0.12-5_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted scsiadd 1.95-5 (source i386)

2005-11-26 Thread Jose Carlos Medeiros
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue,  8 Nov 2005 20:07:05 -0200
Source: scsiadd
Binary: scsiadd
Architecture: source i386
Version: 1.95-5
Distribution: unstable
Urgency: low
Maintainer: Jose Carlos Medeiros [EMAIL PROTECTED]
Changed-By: Jose Carlos Medeiros [EMAIL PROTECTED]
Description: 
 scsiadd- add or remove SCSI devices by rescanning the bus
Closes: 338130
Changes: 
 scsiadd (1.95-5) unstable; urgency=low
 .
   * Cleaned fuzzy strings from debian/po/*.po files. (Closes: #338130)
Files: 
 7bfcc23879613b8a00fecf4117625ced 622 admin optional scsiadd_1.95-5.dsc
 0a640f04dd0214b7c54299c421d81b93 5501 admin optional scsiadd_1.95-5.diff.gz
 80c1e04fc19cf0ac3b3977cde21baa36 10468 admin optional scsiadd_1.95-5_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDiDY+GKGxzw/lPdkRAqotAJ9oH6ZFuyboxNStA99q6NEyEjokZQCglPH7
9ySi72kFT9gL1ecw+o4Ok3w=
=tg0q
-END PGP SIGNATURE-


Accepted:
scsiadd_1.95-5.diff.gz
  to pool/main/s/scsiadd/scsiadd_1.95-5.diff.gz
scsiadd_1.95-5.dsc
  to pool/main/s/scsiadd/scsiadd_1.95-5.dsc
scsiadd_1.95-5_i386.deb
  to pool/main/s/scsiadd/scsiadd_1.95-5_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted xpenguins-applet 2.1.1-2 (source i386)

2005-11-26 Thread Jose Carlos Medeiros
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 31 Oct 2005 15:12:29 -0200
Source: xpenguins-applet
Binary: xpenguins-applet
Architecture: source i386
Version: 2.1.1-2
Distribution: unstable
Urgency: low
Maintainer: Jose Carlos Medeiros [EMAIL PROTECTED]
Changed-By: Jose Carlos Medeiros [EMAIL PROTECTED]
Description: 
 xpenguins-applet - GNOME2 panel applet implementation of xpenguins
Closes: 297854
Changes: 
 xpenguins-applet (2.1.1-2) unstable; urgency=low
 .
   * New Mantainer. (Closes: #297854)
   * Updated debian/watch file.
   * Added license text in debian/copyright file.
   * Updated package to Standards-Version: 3.6.2
Files: 
 b9732789052d55cb19e7852735ccde45 829 gnome optional 
xpenguins-applet_2.1.1-2.dsc
 dc4f0057e9d3df098a90ac4c3a136184 5683 gnome optional 
xpenguins-applet_2.1.1-2.diff.gz
 73fa9c1f55b10e05ceab4542dbd619e4 113000 gnome optional 
xpenguins-applet_2.1.1-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDiDZiGKGxzw/lPdkRAiWSAKCyGnZHI1Jv6NmZa6Xc6S1b3b0/1ACdEQZ4
VnS5OxjlSYXqLcVewKx0sq4=
=KA4g
-END PGP SIGNATURE-


Accepted:
xpenguins-applet_2.1.1-2.diff.gz
  to pool/main/x/xpenguins-applet/xpenguins-applet_2.1.1-2.diff.gz
xpenguins-applet_2.1.1-2.dsc
  to pool/main/x/xpenguins-applet/xpenguins-applet_2.1.1-2.dsc
xpenguins-applet_2.1.1-2_i386.deb
  to pool/main/x/xpenguins-applet/xpenguins-applet_2.1.1-2_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted kronolith2 2.0.5-1 (source all)

2005-11-26 Thread Jose Carlos Medeiros
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 14 Nov 2005 17:11:54 -0200
Source: kronolith2
Binary: kronolith2
Architecture: source all
Version: 2.0.5-1
Distribution: unstable
Urgency: low
Maintainer: Jose Carlos Medeiros [EMAIL PROTECTED]
Changed-By: Jose Carlos Medeiros [EMAIL PROTECTED]
Description: 
 kronolith2 - calendar component for Horde Framework
Changes: 
 kronolith2 (2.0.5-1) unstable; urgency=low
 .
   * New upstream release.
Files: 
 d57db461482791f32eedb03d291e62e6 632 web optional kronolith2_2.0.5-1.dsc
 cce9751c2de5ebb5ce55cb643662fd3e 1299242 web optional 
kronolith2_2.0.5.orig.tar.gz
 3d96c6ee893fd44ef97abe991de1a065 4515 web optional kronolith2_2.0.5-1.diff.gz
 7877e8c559b9c553d98002b09ae6eaef 1308562 web optional 
kronolith2_2.0.5-1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDiDY0GKGxzw/lPdkRAsgoAJ9KOzavfeI2fLQ24UnOuI/HvzecqwCgi+9L
KKyk7gf0gSRktiNLS5HqMnw=
=larG
-END PGP SIGNATURE-


Accepted:
kronolith2_2.0.5-1.diff.gz
  to pool/main/k/kronolith2/kronolith2_2.0.5-1.diff.gz
kronolith2_2.0.5-1.dsc
  to pool/main/k/kronolith2/kronolith2_2.0.5-1.dsc
kronolith2_2.0.5-1_all.deb
  to pool/main/k/kronolith2/kronolith2_2.0.5-1_all.deb
kronolith2_2.0.5.orig.tar.gz
  to pool/main/k/kronolith2/kronolith2_2.0.5.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted zoo 2.10-16 (source i386)

2005-11-26 Thread Jose Carlos Medeiros
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 16 Nov 2005 16:48:24 -0200
Source: zoo
Binary: zoo
Architecture: source i386
Version: 2.10-16
Distribution: unstable
Urgency: low
Maintainer: Jose Carlos Medeiros [EMAIL PROTECTED]
Changed-By: Jose Carlos Medeiros [EMAIL PROTECTED]
Description: 
 zoo- manipulate zoo archives
Closes: 335114
Changes: 
 zoo (2.10-16) unstable; urgency=low
 .
   * Added 03_fix_manage_archive_under_AMD64 patch, thanks to carlj
 [EMAIL PROTECTED]. (closes: #335114)
   * Updated debian/rules to test and compile to AMD64.
   * Updated to Standards-Version 3.6.2.
   * Changed 01_old_fixes dpatch to solve problem missing \? in zoo.1.
Files: 
 aa412118bf7a2540dc621b7a255fcf99 574 utils optional zoo_2.10-16.dsc
 b5651c97c6c8694505aa5270a0c44d9a 11606 utils optional zoo_2.10-16.diff.gz
 e5ece204b87ac38c609c909f6f4a725d 61724 utils optional zoo_2.10-16_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDiDZrGKGxzw/lPdkRAiugAKCsiNJb5G6IFtFapmtTr9fPZdofAQCbB6fo
aAEQKTr6YZGF1lAYUY8pveg=
=Xc0E
-END PGP SIGNATURE-


Accepted:
zoo_2.10-16.diff.gz
  to pool/main/z/zoo/zoo_2.10-16.diff.gz
zoo_2.10-16.dsc
  to pool/main/z/zoo/zoo_2.10-16.dsc
zoo_2.10-16_i386.deb
  to pool/main/z/zoo/zoo_2.10-16_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted gkrelldnet 0.14.2-3 (source i386)

2005-11-26 Thread Jose Carlos Medeiros
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 17 Nov 2005 13:02:16 -0200
Source: gkrelldnet
Binary: gkrelldnet
Architecture: source i386
Version: 0.14.2-3
Distribution: unstable
Urgency: low
Maintainer: Jose Carlos Medeiros [EMAIL PROTECTED]
Changed-By: Jose Carlos Medeiros [EMAIL PROTECTED]
Description: 
 gkrelldnet - dnetc plugin for GKrellM
Closes: 337569
Changes: 
 gkrelldnet (0.14.2-3) unstable; urgency=low
 .
   * Change to do not build in alpha, m68k and mips archs, because this is
 uninstallable in these archs. (closes: #337569)
   * Updated package to Standards-Version: 3.6.2
   * Updated address of FSF in copyright file.
Files: 
 6097743dddcc3303c5c0022d9088bb43 736 contrib/x11 optional 
gkrelldnet_0.14.2-3.dsc
 6cf757cd16b6653e2e1769c3e788573e 3039 contrib/x11 optional 
gkrelldnet_0.14.2-3.diff.gz
 8e01797214b5078d7ca60f994a1f3b7f 15860 contrib/x11 optional 
gkrelldnet_0.14.2-3_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDiDYuGKGxzw/lPdkRAlCRAJ0evjcVSJ8h2xtqQ8rpNb6lHkiVawCgpT94
BEV8tavJRb5BeSeXOCwBkWA=
=sfk1
-END PGP SIGNATURE-


Accepted:
gkrelldnet_0.14.2-3.diff.gz
  to pool/contrib/g/gkrelldnet/gkrelldnet_0.14.2-3.diff.gz
gkrelldnet_0.14.2-3.dsc
  to pool/contrib/g/gkrelldnet/gkrelldnet_0.14.2-3.dsc
gkrelldnet_0.14.2-3_i386.deb
  to pool/contrib/g/gkrelldnet/gkrelldnet_0.14.2-3_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted steam 2.0.0-1 (source all i386)

2005-11-26 Thread Alain Schroeder
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 10:39:36 +0100
Source: steam
Binary: steam-lib steam
Architecture: source all i386
Version: 2.0.0-1
Distribution: unstable
Urgency: low
Maintainer: Alain Schroeder [EMAIL PROTECTED]
Changed-By: Alain Schroeder [EMAIL PROTECTED]
Description: 
 steam  - Environment for cooperative knowledge management
 steam-lib  - Environment for cooperative knowledge management (libs)
Closes: 332106 337432
Changes: 
 steam (2.0.0-1) unstable; urgency=low
 .
   * New Upstream Version.
 * Version management
 * Persistence layer support
 * Extension mechanism via spm packages
 * Support for Java services
   * Depend on debconf | debconf-2.0 (closes: #332106)
   * Correct depends to pike 7.4 (closes: #337432)
Files: 
 541f80d11a84995cb5daaf3ffc5560b4 653 misc optional steam_2.0.0-1.dsc
 1fe9a5b2774fffd41f6d0abe90674857 613738 misc optional steam_2.0.0.orig.tar.gz
 f893075aee0c5f7b03f48bd9c15e7a66 151350 misc optional steam_2.0.0-1.diff.gz
 5d0012e90c37770db4457074d21944f5 525186 misc optional steam_2.0.0-1_all.deb
 7d6a7a4b04fd6dafe8cdc77a9c318fd3 38202 misc optional steam-lib_2.0.0-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDiDhejO6yWbPCgfQRAvP8AJ9WVkZHeZAupRrRjxajKpABuJv/lQCdEMHJ
itJeCvlHpjyDNS38ynWh5rQ=
=BGvd
-END PGP SIGNATURE-


Accepted:
steam-lib_2.0.0-1_i386.deb
  to pool/main/s/steam/steam-lib_2.0.0-1_i386.deb
steam_2.0.0-1.diff.gz
  to pool/main/s/steam/steam_2.0.0-1.diff.gz
steam_2.0.0-1.dsc
  to pool/main/s/steam/steam_2.0.0-1.dsc
steam_2.0.0-1_all.deb
  to pool/main/s/steam/steam_2.0.0-1_all.deb
steam_2.0.0.orig.tar.gz
  to pool/main/s/steam/steam_2.0.0.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted ooo2dbk 1.4.3-1 (source all)

2005-11-26 Thread Mohammed Adnène Trojette
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 25 Nov 2005 00:23:28 +0100
Source: ooo2dbk
Binary: ooo2dbk
Architecture: source all
Version: 1.4.3-1
Distribution: unstable
Urgency: low
Maintainer: Mohammed Adnène Trojette [EMAIL PROTECTED]
Changed-By: Mohammed Adnène Trojette [EMAIL PROTECTED]
Description: 
 ooo2dbk- converts OpenOffice.org SXW documents to DocBook XML
Changes: 
 ooo2dbk (1.4.3-1) unstable; urgency=low
 .
   * New upstream release
Files: 
 e45bb44a40317bcfaf705f67c6a2e325 593 text optional ooo2dbk_1.4.3-1.dsc
 1031dc4fabe76e6ad47db9de5b9f7c1a 408629 text optional ooo2dbk_1.4.3.orig.tar.gz
 ff814eee2f2c74f3faf91d196be2e7d9 2901 text optional ooo2dbk_1.4.3-1.diff.gz
 1ca0fe3f98e3a68117c3f2b73c9f797c 353546 text optional ooo2dbk_1.4.3-1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiD1LrSbtgqbIBbkRAgGmAJ9vtF4rdflYccqbnl7UvGGQtFfiXACfULqK
mFgL7G9ZY4B1HAy0OjqNMv0=
=gb09
-END PGP SIGNATURE-


Accepted:
ooo2dbk_1.4.3-1.diff.gz
  to pool/main/o/ooo2dbk/ooo2dbk_1.4.3-1.diff.gz
ooo2dbk_1.4.3-1.dsc
  to pool/main/o/ooo2dbk/ooo2dbk_1.4.3-1.dsc
ooo2dbk_1.4.3-1_all.deb
  to pool/main/o/ooo2dbk/ooo2dbk_1.4.3-1_all.deb
ooo2dbk_1.4.3.orig.tar.gz
  to pool/main/o/ooo2dbk/ooo2dbk_1.4.3.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted ocaml-mad 0.1.3-2 (source i386)

2005-11-26 Thread Samuel Mimram
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 11:51:16 +0100
Source: ocaml-mad
Binary: libmad-ocaml-dev libmad-ocaml
Architecture: source i386
Version: 0.1.3-2
Distribution: unstable
Urgency: low
Maintainer: Samuel Mimram [EMAIL PROTECTED]
Changed-By: Samuel Mimram [EMAIL PROTECTED]
Description: 
 libmad-ocaml - OCaml bindings for the MAD library
 libmad-ocaml-dev - OCaml bindings for the MAD library
Changes: 
 ocaml-mad (0.1.3-2) unstable; urgency=low
 .
   * Rebuild with OCaml 3.09.0.
   * No longer hardcoding OCaml's ABI in the package.
   * Updated standards version to 3.6.2, no changes needed.
   * Updated watch file.
Files: 
 ac63e1f51680e03f92fa418f97d06f12 641 devel optional ocaml-mad_0.1.3-2.dsc
 ba2ed437f11f30e003065bea9c618fee 2467 devel optional ocaml-mad_0.1.3-2.diff.gz
 5131b17ad33bbd379fca9ec832ddce78 5688 libs optional 
libmad-ocaml_0.1.3-2_i386.deb
 9e4a94ca97dded4f00c460019baacd2a 53280 libdevel optional 
libmad-ocaml-dev_0.1.3-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiEBPIae1O4AJae8RAjEBAJ9mXTkFCypQANhTlA+i4OL7nSfZEACfT3Bd
znXZM2KMXd3/tGv+ptwn2Us=
=dWsC
-END PGP SIGNATURE-


Accepted:
libmad-ocaml-dev_0.1.3-2_i386.deb
  to pool/main/o/ocaml-mad/libmad-ocaml-dev_0.1.3-2_i386.deb
libmad-ocaml_0.1.3-2_i386.deb
  to pool/main/o/ocaml-mad/libmad-ocaml_0.1.3-2_i386.deb
ocaml-mad_0.1.3-2.diff.gz
  to pool/main/o/ocaml-mad/ocaml-mad_0.1.3-2.diff.gz
ocaml-mad_0.1.3-2.dsc
  to pool/main/o/ocaml-mad/ocaml-mad_0.1.3-2.dsc


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted gmsh 1.61.1-1 (source i386)

2005-11-26 Thread Christophe Prud'homme
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 11:27:08 +0100
Source: gmsh
Binary: gmsh
Architecture: source i386
Version: 1.61.1-1
Distribution: unstable
Urgency: low
Maintainer: Christophe Prud'homme [EMAIL PROTECTED]
Changed-By: Christophe Prud'homme [EMAIL PROTECTED]
Description: 
 gmsh   - three-dimensional finite element mesh generator
Changes: 
 gmsh (1.61.1-1) unstable; urgency=low
 .
   * New upstream release
Files: 
 ec196d7f3e317161c698e0842582c55a 761 math optional gmsh_1.61.1-1.dsc
 6dace74bdd4aaa544e241fcabd215dc7 2133889 math optional gmsh_1.61.1.orig.tar.gz
 51f3dce3de735bdcf839269bb9c5096a 29269 math optional gmsh_1.61.1-1.diff.gz
 cdee6dfb30cb1bf1984fd1df04dc435f 2510768 math optional gmsh_1.61.1-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiEZ4oY+0C9S+FFARAibQAJoC0rZCz9+otrLUwhpYdSU2ugbc0QCdGqy3
8TOnLeR0LsrNi5VsPQ6HZyo=
=cKdV
-END PGP SIGNATURE-


Accepted:
gmsh_1.61.1-1.diff.gz
  to pool/main/g/gmsh/gmsh_1.61.1-1.diff.gz
gmsh_1.61.1-1.dsc
  to pool/main/g/gmsh/gmsh_1.61.1-1.dsc
gmsh_1.61.1-1_i386.deb
  to pool/main/g/gmsh/gmsh_1.61.1-1_i386.deb
gmsh_1.61.1.orig.tar.gz
  to pool/main/g/gmsh/gmsh_1.61.1.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted ocaml-shout 0.2.0-2 (source i386)

2005-11-26 Thread Samuel Mimram
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 12:04:04 +0100
Source: ocaml-shout
Binary: libshout-ocaml-dev libshout-ocaml
Architecture: source i386
Version: 0.2.0-2
Distribution: unstable
Urgency: low
Maintainer: Samuel Mimram [EMAIL PROTECTED]
Changed-By: Samuel Mimram [EMAIL PROTECTED]
Description: 
 libshout-ocaml - OCaml bindings for the shout library
 libshout-ocaml-dev - OCaml bindings for the shout library
Changes: 
 ocaml-shout (0.2.0-2) unstable; urgency=low
 .
   * Rebuild with OCaml 3.09.0.
   * No longer hardcoding OCaml's ABI in package.
   * Updated standards version to 3.6.2, no changes needed.
   * Updated watch file.
Files: 
 f88d9e009ebc189305cc24031bccb944 653 devel optional ocaml-shout_0.2.0-2.dsc
 cd0c1daf3c930e606031f75239b6546e 2425 devel optional 
ocaml-shout_0.2.0-2.diff.gz
 34c72c645c9ade425cad45994d9582f4 7640 libs optional 
libshout-ocaml_0.2.0-2_i386.deb
 1a98c89a0739cc2c4c3772a6856f1a1a 62186 libdevel optional 
libshout-ocaml-dev_0.2.0-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiEpUIae1O4AJae8RAs6JAJ923NjLd8on1ug1NlPkLpEZ7sU/0wCfW/Oo
zETF8SVA5YQvQXJGSWuZot4=
=QHb6
-END PGP SIGNATURE-


Accepted:
libshout-ocaml-dev_0.2.0-2_i386.deb
  to pool/main/o/ocaml-shout/libshout-ocaml-dev_0.2.0-2_i386.deb
libshout-ocaml_0.2.0-2_i386.deb
  to pool/main/o/ocaml-shout/libshout-ocaml_0.2.0-2_i386.deb
ocaml-shout_0.2.0-2.diff.gz
  to pool/main/o/ocaml-shout/ocaml-shout_0.2.0-2.diff.gz
ocaml-shout_0.2.0-2.dsc
  to pool/main/o/ocaml-shout/ocaml-shout_0.2.0-2.dsc


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted mkvmlinuz 16 (source powerpc)

2005-11-26 Thread Sven Luther
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon,  7 Nov 2005 14:47:22 +
Source: mkvmlinuz
Binary: mkvmlinuz
Architecture: source powerpc
Version: 16
Distribution: unstable
Urgency: low
Maintainer: Debian Kernel Team debian-kernel@lists.debian.org
Changed-By: Sven Luther [EMAIL PROTECTED]
Description: 
 mkvmlinuz  - create a kernel to boot a PowerPC machine from Open Firmware
Changes: 
 mkvmlinuz (16) unstable; urgency=low
 .
   * Added -l option, enabling the caller to specify the elf link address.
Files: 
 0788f3e5f57d7d17b552ed20694483a8 607 devel optional mkvmlinuz_16.dsc
 706aef4931fe02dd56bc490f8061bf73 9239 devel optional mkvmlinuz_16.tar.gz
 1ed53ee0e967c4ee0d8f29a1dff26043 9992 devel optional mkvmlinuz_16_powerpc.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDiEwN2WTeT3CRQaQRAl4GAKCeP583ImUJcK+Wu+OBAZ9AvwvnlQCgnjUa
Yg9Mm9e7+IoioQ3OKpejLCI=
=2Ezr
-END PGP SIGNATURE-


Accepted:
mkvmlinuz_16.dsc
  to pool/main/m/mkvmlinuz/mkvmlinuz_16.dsc
mkvmlinuz_16.tar.gz
  to pool/main/m/mkvmlinuz/mkvmlinuz_16.tar.gz
mkvmlinuz_16_powerpc.deb
  to pool/main/m/mkvmlinuz/mkvmlinuz_16_powerpc.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted libhtml-template-perl 2.7-1 (source all)

2005-11-26 Thread Florian Ernst
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 12:59:19 +0100
Source: libhtml-template-perl
Binary: libhtml-template-perl
Architecture: source all
Version: 2.7-1
Distribution: unstable
Urgency: low
Maintainer: Florian Ernst [EMAIL PROTECTED]
Changed-By: Florian Ernst [EMAIL PROTECTED]
Description: 
 libhtml-template-perl - HTML::Template : A module for using HTML Templates 
with Perl
Closes: 204075 329556
Changes: 
 libhtml-template-perl (2.7-1) unstable; urgency=low
 .
   * New maintainer, taking over with the previous maintainer's consent
   * New upstream release (Closes: #329556)
   * Fix small html error in man page, thanks to Thomas Poindessous
 (Closes: #204075)
   * Remove README.Debian, as dpkg doesn't care about this...
   * debian/watch: added
   * Miscellaneous packaging adjustments, following latest Policy -
 Standards-Version 3.6.2
Files: 
 221fd31598632cede7a34f1b840e23b7 647 perl optional 
libhtml-template-perl_2.7-1.dsc
 376f572659b4c0c40a9dd68823a0dd6b 62478 perl optional 
libhtml-template-perl_2.7.orig.tar.gz
 a54302d8b8c85349231832b3756c689b 2414 perl optional 
libhtml-template-perl_2.7-1.diff.gz
 179da8da0ddd54a157876cf8472ab83c 63464 perl optional 
libhtml-template-perl_2.7-1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiFDcs3U+TVFLPnwRAmcoAJ91tPSOMMZayUDCdnQ0rj2U6/JjWQCcD4Fn
1fEvaExV6iZIJSJ6qNKsL9s=
=vNPj
-END PGP SIGNATURE-


Accepted:
libhtml-template-perl_2.7-1.diff.gz
  to pool/main/libh/libhtml-template-perl/libhtml-template-perl_2.7-1.diff.gz
libhtml-template-perl_2.7-1.dsc
  to pool/main/libh/libhtml-template-perl/libhtml-template-perl_2.7-1.dsc
libhtml-template-perl_2.7-1_all.deb
  to pool/main/libh/libhtml-template-perl/libhtml-template-perl_2.7-1_all.deb
libhtml-template-perl_2.7.orig.tar.gz
  to pool/main/libh/libhtml-template-perl/libhtml-template-perl_2.7.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted openc++ 2.8-8 (source i386)

2005-11-26 Thread Yann Dirson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 13:23:42 +0100
Source: openc++
Binary: libocc0-dev openc++ libocc0c2a
Architecture: source i386
Version: 2.8-8
Distribution: unstable
Urgency: low
Maintainer: Yann Dirson [EMAIL PROTECTED]
Changed-By: Yann Dirson [EMAIL PROTECTED]
Description: 
 libocc0-dev - OpenC++ library - development
 libocc0c2a - OpenC++ library - runtime
 openc++- extensible C++ compiler
Closes: 340795
Changes: 
 openc++ (2.8-8) unstable; urgency=low
 .
   * Fixed dependency of -dev package to refer to the new library package
 (Closes: #340795).
Files: 
 4fdd113ff1c35647a463fc64ef849037 633 devel optional openc++_2.8-8.dsc
 978b38c046ebb32836082342994bfda5 50985 devel optional openc++_2.8-8.diff.gz
 b0d1a745a7364f6f4b8f0bbbee31d4ac 170868 devel optional openc++_2.8-8_i386.deb
 a38faa6830491276cda28403d4546c9e 211484 libs optional libocc0c2a_2.8-8_i386.deb
 c2443c659ac50bee7090cb56972c00e6 376818 libdevel optional 
libocc0-dev_2.8-8_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiFvWV1uVslwzwbgRAn95AJ4piDBK7nD5+Zn2dX6e4fKzcZcdXgCggpDX
EOxvxMkR3HTBFJm+EaAtRhY=
=ZMVj
-END PGP SIGNATURE-


Accepted:
libocc0-dev_2.8-8_i386.deb
  to pool/main/o/openc++/libocc0-dev_2.8-8_i386.deb
libocc0c2a_2.8-8_i386.deb
  to pool/main/o/openc++/libocc0c2a_2.8-8_i386.deb
openc++_2.8-8.diff.gz
  to pool/main/o/openc++/openc++_2.8-8.diff.gz
openc++_2.8-8.dsc
  to pool/main/o/openc++/openc++_2.8-8.dsc
openc++_2.8-8_i386.deb
  to pool/main/o/openc++/openc++_2.8-8_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted netclient 0.91-3 (source i386)

2005-11-26 Thread Stefano Zacchiroli
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 14:14:53 +0100
Source: netclient
Binary: libnetclient-ocaml-dev
Architecture: source i386
Version: 0.91-3
Distribution: unstable
Urgency: low
Maintainer: Stefano Zacchiroli [EMAIL PROTECTED]
Changed-By: Stefano Zacchiroli [EMAIL PROTECTED]
Description: 
 libnetclient-ocaml-dev - OCaml HTTP/1.1, Telnet, and FTP clients library
Closes: 340843
Changes: 
 netclient (0.91-3) unstable; urgency=low
 .
   * debian/control
 - added missing build-dep on cdbs, fixes FTBFS (closes: #340843)
Files: 
 4376d241d665f41cc2ef4e5476414714 744 devel optional netclient_0.91-3.dsc
 e04a45bba06009d223ccd4b487e86e84 4394 devel optional netclient_0.91-3.diff.gz
 2b84be45139cc2b88e8c77409e1811c4 776536 libdevel optional 
libnetclient-ocaml-dev_0.91-3_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiGBC1cqbBPLEI7wRAmtyAKDY4BpnKB4Zq8W9NvZWpJ6+WsYuIgCgll7+
pwkXG7QRw1WpmoC5gDRvR38=
=5NbN
-END PGP SIGNATURE-


Accepted:
libnetclient-ocaml-dev_0.91-3_i386.deb
  to pool/main/n/netclient/libnetclient-ocaml-dev_0.91-3_i386.deb
netclient_0.91-3.diff.gz
  to pool/main/n/netclient/netclient_0.91-3.diff.gz
netclient_0.91-3.dsc
  to pool/main/n/netclient/netclient_0.91-3.dsc


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted octave-forge 2005.06.13-3 (source i386)

2005-11-26 Thread Rafael Laboissiere
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 11:31:12 +0100
Source: octave-forge
Binary: octave-forge
Architecture: source i386
Version: 2005.06.13-3
Distribution: unstable
Urgency: low
Maintainer: Debian Octave Group [EMAIL PROTECTED]
Changed-By: Rafael Laboissiere [EMAIL PROTECTED]
Description: 
 octave-forge - Contributed functions for GNU Octave from http://octave.sf.net
Changes: 
 octave-forge (2005.06.13-3) unstable; urgency=low
 .
+++ Changes by Rafael Laboissiere
 .
   * debian/control:
 - Build-depends on gfortran for all achitectures, instead of g77 and
   the special exception of fort77 on m68k.  I am glad we did this
   move.
 - Tight build-dependency on libginac-dev = 1.3.3-2+b1, since this
   library underwnet another ABI transition
 - Bumped build-dependency octave2.1-headers = 2.1.72-6
 - Bumped build-dependency debhelper = 4
   * debian/rules:
 - Removed special settign for the m68k architecture (fort77)
 - Use /usr/bin/gfortran as the Fortran compiler
Files: 
 b2cf51444c3837d06d185a9211e86672 936 math optional 
octave-forge_2005.06.13-3.dsc
 a5b07cf721f17e9f2202512f5563a79f 13920 math optional 
octave-forge_2005.06.13-3.diff.gz
 99e546d795d3963d84075062f12f6bfd 2720402 math optional 
octave-forge_2005.06.13-3_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDiGltk3oga0pdcv4RAiHJAKCF40DY/VDZMqB/T51dibJcWGGnfACgntU0
44KAYZc6jm6NjTcLZgkpVS0=
=Lxq0
-END PGP SIGNATURE-


Accepted:
octave-forge_2005.06.13-3.diff.gz
  to pool/main/o/octave-forge/octave-forge_2005.06.13-3.diff.gz
octave-forge_2005.06.13-3.dsc
  to pool/main/o/octave-forge/octave-forge_2005.06.13-3.dsc
octave-forge_2005.06.13-3_i386.deb
  to pool/main/o/octave-forge/octave-forge_2005.06.13-3_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted rsh-redone 78-1 (source i386)

2005-11-26 Thread Guus Sliepen
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 14:48:35 +0100
Source: rsh-redone
Binary: rsh-redone-client rsh-redone-server
Architecture: source i386
Version: 78-1
Distribution: unstable
Urgency: low
Maintainer: Guus Sliepen [EMAIL PROTECTED]
Changed-By: Guus Sliepen [EMAIL PROTECTED]
Description: 
 rsh-redone-client - Reimplementation of rsh and rlogin
 rsh-redone-server - Reimplementation of rshd and rlogind
Closes: 198840 211301 262983
Changes: 
 rsh-redone (78-1) unstable; urgency=low
 .
   * New upstream release. Closes: #198840, #211301, #262983.
Files: 
 21f65f177bf6cdfc89d80dad22c7b8d8 600 net optional rsh-redone_78-1.dsc
 096a70b6ea5d88bdadff1198aaeeaf71 17044 net optional rsh-redone_78.orig.tar.gz
 dad9f2fcc6d6bb3580ef0f3d5a0a7e50 2615 net optional rsh-redone_78-1.diff.gz
 786360b9268b51e7e5f718f1c14c9953 14380 net optional 
rsh-redone-server_78-1_i386.deb
 bb9b75fa77a6c66fb2c15d3ac85dfdb2 14566 net optional 
rsh-redone-client_78-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiGgwAxLow12M2nsRAk8+AKCTG1lnl0u5JNAGZ300Di5l99Uo6ACdExly
YhN6zS1oKn7JSoQgscAJLS4=
=uKeN
-END PGP SIGNATURE-


Accepted:
rsh-redone-client_78-1_i386.deb
  to pool/main/r/rsh-redone/rsh-redone-client_78-1_i386.deb
rsh-redone-server_78-1_i386.deb
  to pool/main/r/rsh-redone/rsh-redone-server_78-1_i386.deb
rsh-redone_78-1.diff.gz
  to pool/main/r/rsh-redone/rsh-redone_78-1.diff.gz
rsh-redone_78-1.dsc
  to pool/main/r/rsh-redone/rsh-redone_78-1.dsc
rsh-redone_78.orig.tar.gz
  to pool/main/r/rsh-redone/rsh-redone_78.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted mkvmlinuz 17 (source powerpc)

2005-11-26 Thread Sven Luther
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 14:07:45 +
Source: mkvmlinuz
Binary: mkvmlinuz
Architecture: source powerpc
Version: 17
Distribution: unstable
Urgency: low
Maintainer: Debian Kernel Team debian-kernel@lists.debian.org
Changed-By: Sven Luther [EMAIL PROTECTED]
Description: 
 mkvmlinuz  - create a kernel to boot a PowerPC machine from Open Firmware
Changes: 
 mkvmlinuz (17) unstable; urgency=low
 .
   * Fixed lame typo in version 16 :/
Files: 
 0beaf38f8b0b92a3c1fa58d6a3d20f59 607 devel optional mkvmlinuz_17.dsc
 9b9753aae25c1dfe044044e726c5cf6b 9276 devel optional mkvmlinuz_17.tar.gz
 d5659763fe6b4008ad614b832b0740ba 10016 devel optional mkvmlinuz_17_powerpc.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDiG042WTeT3CRQaQRAiLDAJ0WlGBHE2OmxRMqV9vQeofTedcJswCfSW0O
T0npIiE70GKtOWj6LxwVd7k=
=G2fB
-END PGP SIGNATURE-


Accepted:
mkvmlinuz_17.dsc
  to pool/main/m/mkvmlinuz/mkvmlinuz_17.dsc
mkvmlinuz_17.tar.gz
  to pool/main/m/mkvmlinuz/mkvmlinuz_17.tar.gz
mkvmlinuz_17_powerpc.deb
  to pool/main/m/mkvmlinuz/mkvmlinuz_17_powerpc.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted gnomebaker 0.5.0-4 (source i386)

2005-11-26 Thread Goedson Teixeira Paixao
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 12:03:25 -0200
Source: gnomebaker
Binary: gnomebaker
Architecture: source i386
Version: 0.5.0-4
Distribution: unstable
Urgency: low
Maintainer: Goedson Teixeira Paixao [EMAIL PROTECTED]
Changed-By: Goedson Teixeira Paixao [EMAIL PROTECTED]
Description: 
 gnomebaker - application for CD/DVD creation in the GNOME desktop
Closes: 339895
Changes: 
 gnomebaker (0.5.0-4) unstable; urgency=low
 .
   * Added gstremamer0.8-{vorbis,mad,flac} to Recommends (Closes: #339895).
   * Updated pt_BR translation.
Files: 
 6c93d511d8f46ed407a6e65218a7044d 696 gnome optional gnomebaker_0.5.0-4.dsc
 1771eeb461d44adc66be57a78f01772b 9686 gnome optional gnomebaker_0.5.0-4.diff.gz
 9c2d708be33154fba2f7b5742b240c97 777504 gnome optional 
gnomebaker_0.5.0-4_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD4DBQFDiHXn7tjUzB3rjq4RAhX8AJiVzhWaXcbmphHs5bFKC+lZIkz6AJ4lZouU
6KZ08tdQWwYsJWfdihgWsg==
=S0RL
-END PGP SIGNATURE-


Accepted:
gnomebaker_0.5.0-4.diff.gz
  to pool/main/g/gnomebaker/gnomebaker_0.5.0-4.diff.gz
gnomebaker_0.5.0-4.dsc
  to pool/main/g/gnomebaker/gnomebaker_0.5.0-4.dsc
gnomebaker_0.5.0-4_i386.deb
  to pool/main/g/gnomebaker/gnomebaker_0.5.0-4_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted slgtk 0.5.15.r4-7 (source i386)

2005-11-26 Thread Rafael Laboissiere
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 15:16:47 +0100
Source: slgtk
Binary: slang-gtk
Architecture: source i386
Version: 0.5.15.r4-7
Distribution: unstable
Urgency: low
Maintainer: Debian JED Group [EMAIL PROTECTED]
Changed-By: Rafael Laboissiere [EMAIL PROTECTED]
Description: 
 slang-gtk  - binds the GIMP Toolkit (GTK) to the S-Lang scripting language
Changes: 
 slgtk (0.5.15.r4-7) unstable; urgency=low
 .
+++ Changes by Rafael Laboissiere
 .
   * debian/control: Added build-dependency on xfonts-base, such that the
 build daemons will not choke on xvfb-run
   * tests/Makefile (test): Restored  upstream vesion of this file
   * debian/rules: Do not specify the verbose switch when running make test
Files: 
 6911d3e60eefce3dcbb2201b79db210a 761 interpreters optional 
slgtk_0.5.15.r4-7.dsc
 b93986c71234a7875e7b62c5e6274c64 5234 interpreters optional 
slgtk_0.5.15.r4-7.diff.gz
 2405d23f4a43de918c439918708baf3b 506432 interpreters optional 
slang-gtk_0.5.15.r4-7_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDiHTmk3oga0pdcv4RAnw6AJ0TnuVXYhiH+0nYbq4nrTOVXcVZcgCfT1F0
IEJ/gReaY15ZlRBdlmX1+Mw=
=8cVO
-END PGP SIGNATURE-


Accepted:
slang-gtk_0.5.15.r4-7_i386.deb
  to pool/main/s/slgtk/slang-gtk_0.5.15.r4-7_i386.deb
slgtk_0.5.15.r4-7.diff.gz
  to pool/main/s/slgtk/slgtk_0.5.15.r4-7.diff.gz
slgtk_0.5.15.r4-7.dsc
  to pool/main/s/slgtk/slgtk_0.5.15.r4-7.dsc


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted gdome2-xslt 0.0.7-2 (source i386)

2005-11-26 Thread Stefano Zacchiroli
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 23 Nov 2005 10:30:16 +
Source: gdome2-xslt
Binary: libgdome2-xslt-dev libgdome2-xslt-ocaml-dev libgdome2-xslt0c2a 
libgdome2-xslt-ocaml
Architecture: source i386
Version: 0.0.7-2
Distribution: unstable
Urgency: low
Maintainer: Stefano Zacchiroli [EMAIL PROTECTED]
Changed-By: Stefano Zacchiroli [EMAIL PROTECTED]
Description: 
 libgdome2-xslt-dev - Minimal XSLT processor working on GDome2 documents
 libgdome2-xslt-ocaml - OCaml bindings for a minimal GDome2 based XSLT processor
 libgdome2-xslt-ocaml-dev - OCaml bindings for a minimal GDome2 based XSLT 
processor
 libgdome2-xslt0c2a - Minimal XSLT processor working on GDome2 documents
Closes: 339167
Changes: 
 gdome2-xslt (0.0.7-2) unstable; urgency=low
 .
   * ocaml 3.09 transition
   * rebuild/renaming due to changed libstdc++ configuration
 (closes: #339167)
   * debian/*
 - no longer hard coding of ocaml abi number anywhere
   * debian/control
 - bumped standards version
Files: 
 012d8d5497919d0fe959b13061a35207 762 devel optional gdome2-xslt_0.0.7-2.dsc
 7141a1f0cef9a07d6fdd7cfd3176d20e 322264 devel optional 
gdome2-xslt_0.0.7-2.tar.gz
 49f000c06ed9ee0262656b4582e36030 10164 libs optional 
libgdome2-xslt0c2a_0.0.7-2_i386.deb
 2e45deceb1e9f5f24ec51e3361a6bd35 16930 libdevel optional 
libgdome2-xslt-dev_0.0.7-2_i386.deb
 a95f4df229523fd173b6a0d98c0c6c8c 8036 devel optional 
libgdome2-xslt-ocaml_0.0.7-2_i386.deb
 9a17e34573940bc3a5b54e25593da750 20172 libdevel optional 
libgdome2-xslt-ocaml-dev_0.0.7-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDh65K1cqbBPLEI7wRAmMaAJ9za/D0eBq088611PLay1X/S0yc/gCgjTiJ
mvMdKDyEDLm97pOlNthtSmk=
=+c14
-END PGP SIGNATURE-


Accepted:
gdome2-xslt_0.0.7-2.dsc
  to pool/main/g/gdome2-xslt/gdome2-xslt_0.0.7-2.dsc
gdome2-xslt_0.0.7-2.tar.gz
  to pool/main/g/gdome2-xslt/gdome2-xslt_0.0.7-2.tar.gz
libgdome2-xslt-dev_0.0.7-2_i386.deb
  to pool/main/g/gdome2-xslt/libgdome2-xslt-dev_0.0.7-2_i386.deb
libgdome2-xslt-ocaml-dev_0.0.7-2_i386.deb
  to pool/main/g/gdome2-xslt/libgdome2-xslt-ocaml-dev_0.0.7-2_i386.deb
libgdome2-xslt-ocaml_0.0.7-2_i386.deb
  to pool/main/g/gdome2-xslt/libgdome2-xslt-ocaml_0.0.7-2_i386.deb
libgdome2-xslt0c2a_0.0.7-2_i386.deb
  to pool/main/g/gdome2-xslt/libgdome2-xslt0c2a_0.0.7-2_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted taglib 1.4-3 (source all i386)

2005-11-26 Thread Adeodato Simó
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 04:57:44 +0100
Source: taglib
Binary: libtag1c2a libtagc0-dev libtag1-doc libtagc0 libtag1-dev
Architecture: all i386 source 
Version: 1.4-3
Distribution: unstable
Urgency: low
Maintainer: Christopher L Cheney [EMAIL PROTECTED]
Changed-By: Adeodato Simó [EMAIL PROTECTED]
Description: 
 libtag1-dev - TagLib Audio Meta-Data Library [development]
 libtag1-doc - TagLib Audio Meta-Data Library [documentation]
 libtag1c2a - TagLib Audio Meta-Data Library
 libtagc0   - TagLib Audio Meta-Data Library (C bindings)
 libtagc0-dev - TagLib Audio Meta-Data Library (C bindings) [development]
Closes: 337953 339270
Changes: 
 taglib (1.4-3) unstable; urgency=low
 .
   * libstdc++ allocator transition: rename libtag1c2 to libtag1c2a.
 (Closes: #339270)
 .
   * Re-libtoolize, fixing FTBFS on GNU/k*BSD. (Closes: #337953) (Patch in
 debian/patches/01_update-libtool.diff, plus a bit of touch magic in
 debian/rules.)
 .
   * Update FSF postal address in debian/copyright.
 .
   * Again, update my e-mail address in debian/control, yada yada.
Files: 
 29c5fd49fbcec604bda591d81e7ca86b 205804 libdevel optional 
libtag1-dev_1.4-3_i386.deb
 42951352a62b867853229c825009a166 103984 libs optional libtag1c2a_1.4-3_i386.deb
 73f0ada4baf08c565672c97f0971c4f9 84693 libs optional taglib_1.4-3.diff.gz
 86357dfa491a54bc32d9981a3f55ec65 10238 libdevel optional 
libtagc0-dev_1.4-3_i386.deb
 893d47dd6d310221ad2c56ae2db709ad 7778 libs optional libtagc0_1.4-3_i386.deb
 107873a39b423d79353a688c3e3127ac 790 libs optional taglib_1.4-3.dsc
 b34bf943f888b343e8943ae4eed992c1 777010 doc optional libtag1-doc_1.4-3_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)
Comment: Signed by Adeodato Simó [EMAIL PROTECTED]

iEYEARECAAYFAkOH4UwACgkQgyNlRdHEGIJymgCgu3RWu3pY12AOzc/ItFusjFoS
cg4AoMJeEEOeWfyfEPjCUGss2+Nu0kYU
=sxnf
-END PGP SIGNATURE-


Accepted:
libtag1-dev_1.4-3_i386.deb
  to pool/main/t/taglib/libtag1-dev_1.4-3_i386.deb
libtag1-doc_1.4-3_all.deb
  to pool/main/t/taglib/libtag1-doc_1.4-3_all.deb
libtag1c2a_1.4-3_i386.deb
  to pool/main/t/taglib/libtag1c2a_1.4-3_i386.deb
libtagc0-dev_1.4-3_i386.deb
  to pool/main/t/taglib/libtagc0-dev_1.4-3_i386.deb
libtagc0_1.4-3_i386.deb
  to pool/main/t/taglib/libtagc0_1.4-3_i386.deb
taglib_1.4-3.diff.gz
  to pool/main/t/taglib/taglib_1.4-3.diff.gz
taglib_1.4-3.dsc
  to pool/main/t/taglib/taglib_1.4-3.dsc


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted openexr 1.2.2-4.1 (source i386)

2005-11-26 Thread Adeodato Simó
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 01:31:40 +0100
Source: openexr
Binary: openexr libopenexr-dev libopenexr2c2a
Architecture: i386 source 
Version: 1.2.2-4.1
Distribution: unstable
Urgency: low
Maintainer: Andrew Lau [EMAIL PROTECTED]
Changed-By: Adeodato Simó [EMAIL PROTECTED]
Description: 
 libopenexr-dev - development files for the OpenEXR image library
 libopenexr2c2a - runtime files for the OpenEXR image library
 openexr- viewer and docs for the OpenEXR image format
Closes: 339241
Changes: 
 openexr (1.2.2-4.1) unstable; urgency=low
 .
   * Non-maintainer upload.
 .
   * libstdc++ allocator transition: rename libopenexr2c2 to libopenexr2c2a.
 (Closes: #339241)
 .
 + debian/control: rename package, make it replace and conflict
   libopenexr2c2, update libopenexr-dev dependency.
 .
 + debian/*: s/libopenexr2c2/libopenexr2c2a/g
 .
 + mv debian/libopenexr2c2{,a}.install
Files: 
 768bafecc019c6a612e548df5ba8288b 496514 libdevel optional 
libopenexr-dev_1.2.2-4.1_i386.deb
 7f91d3e7f8e0f1c10ae5d6aef6eaaad4 280108 libs optional 
libopenexr2c2a_1.2.2-4.1_i386.deb
 8037f24bea025c36b4c6cb083f182459 726198 graphics optional 
openexr_1.2.2-4.1_i386.deb
 a4a956885c2a19a6318509241a0e9704 8458 graphics optional 
openexr_1.2.2-4.1.diff.gz
 98c043b68f7d8833d70c930fc3dbea88 794 graphics optional openexr_1.2.2-4.1.dsc

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)
Comment: Signed by Adeodato Simó [EMAIL PROTECTED]

iEYEARECAAYFAkOHrxsACgkQgyNlRdHEGII7iwCfaWVICUvxrfzWeNtEvzneDStJ
UyEAn3Q9M7HcY4NJr8vqE2VQMOTVFXtk
=ryTe
-END PGP SIGNATURE-


Accepted:
libopenexr-dev_1.2.2-4.1_i386.deb
  to pool/main/o/openexr/libopenexr-dev_1.2.2-4.1_i386.deb
libopenexr2c2a_1.2.2-4.1_i386.deb
  to pool/main/o/openexr/libopenexr2c2a_1.2.2-4.1_i386.deb
openexr_1.2.2-4.1.diff.gz
  to pool/main/o/openexr/openexr_1.2.2-4.1.diff.gz
openexr_1.2.2-4.1.dsc
  to pool/main/o/openexr/openexr_1.2.2-4.1.dsc
openexr_1.2.2-4.1_i386.deb
  to pool/main/o/openexr/openexr_1.2.2-4.1_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted slgtk 0.5.15.r4-8 (source i386)

2005-11-26 Thread Rafael Laboissiere
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 16:29:37 +0100
Source: slgtk
Binary: slang-gtk
Architecture: source i386
Version: 0.5.15.r4-8
Distribution: unstable
Urgency: low
Maintainer: Debian JED Group [EMAIL PROTECTED]
Changed-By: Rafael Laboissiere [EMAIL PROTECTED]
Description: 
 slang-gtk  - binds the GIMP Toolkit (GTK) to the S-Lang scripting language
Changes: 
 slgtk (0.5.15.r4-8) unstable; urgency=low
 .
+++ Changes by Rafael Laboissiere
 .
   * debian/rules: Desperate try to get more information from tessrun when
 doing make test.  I ought to get the autobuilders working for this
 package.
Files: 
 5d6b72a9952e076311554b2b710c1540 761 interpreters optional 
slgtk_0.5.15.r4-8.dsc
 6f9e98b8d9a8cf37b29980ffc605ce26 5301 interpreters optional 
slgtk_0.5.15.r4-8.diff.gz
 d2592080b318f35307b4734f22f13490 506506 interpreters optional 
slang-gtk_0.5.15.r4-8_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDiIDIk3oga0pdcv4RAof0AJ9iZlf8mLwktMWd53XUFJU6B3jqeACfTVT8
zNhuB5GdDKyPthxif3dyoHA=
=5muA
-END PGP SIGNATURE-


Accepted:
slang-gtk_0.5.15.r4-8_i386.deb
  to pool/main/s/slgtk/slang-gtk_0.5.15.r4-8_i386.deb
slgtk_0.5.15.r4-8.diff.gz
  to pool/main/s/slgtk/slgtk_0.5.15.r4-8.diff.gz
slgtk_0.5.15.r4-8.dsc
  to pool/main/s/slgtk/slgtk_0.5.15.r4-8.dsc


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted cl-sql 3.5.0-1 (source all i386)

2005-11-26 Thread Kevin M. Rosenberg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 08:58:22 -0700
Source: cl-sql
Binary: cl-sql-sqlite3 cl-sql-oracle cl-sql-aodbc cl-sql-postgresql-socket 
cl-sql-postgresql cl-sql-odbc cl-sql cl-sql-uffi cl-sql-tests cl-sql-sqlite 
cl-sql-mysql
Architecture: source all i386
Version: 3.5.0-1
Distribution: unstable
Urgency: low
Maintainer: Kevin M. Rosenberg [EMAIL PROTECTED]
Changed-By: Kevin M. Rosenberg [EMAIL PROTECTED]
Description: 
 cl-sql - SQL Interface for Common Lisp
 cl-sql-aodbc - CLSQL database backend, AODBC
 cl-sql-mysql - CLSQL database backend, MySQL
 cl-sql-odbc - CLSQL database backend, ODBC
 cl-sql-oracle - CLSQL database backend, Oracle
 cl-sql-postgresql - CLSQL database backend, PostgreSQL
 cl-sql-postgresql-socket - CLSQL database backend, PostgreSQL
 cl-sql-sqlite - CLSQL database backend, SQLite
 cl-sql-sqlite3 - CLSQL database backend, SQLite3
 cl-sql-tests - Testing suite for CLSQL
 cl-sql-uffi - Common UFFI functions for CLSQL database backends
Closes: 339824 339842
Changes: 
 cl-sql (3.5.0-1) unstable; urgency=low
 .
   * New upstream (closes: 339842)
   * Change libmyclient run-time requirement (closes: 339824)
Files: 
 59261cf6c34dbfd9081cefb006b3ac7c 796 devel extra cl-sql_3.5.0-1.dsc
 9acb8c513d8e518a0d0c56375a342e5b 704072 devel extra cl-sql_3.5.0.orig.tar.gz
 a9fba5dfa7f205fc2f785da1d26ecbb0 7 devel extra cl-sql_3.5.0-1.diff.gz
 27406bc494b77c1587bd951c1c230430 490722 devel extra cl-sql_3.5.0-1_all.deb
 87a9600ab3217e8b791caa82f8c525c2 35984 devel extra cl-sql-aodbc_3.5.0-1_all.deb
 e8c1607da516d17ee03265f16ad1f676 62572 devel extra cl-sql-odbc_3.5.0-1_all.deb
 4c96a1ad7ba84a1a6d43d24121075d7f 40762 devel extra 
cl-sql-postgresql_3.5.0-1_all.deb
 4f0b0df8446946f6f1fa324e1a51bfb2 44884 devel extra 
cl-sql-postgresql-socket_3.5.0-1_all.deb
 b2eba5b15ff6612b5e480ff9732514b4 40628 devel extra 
cl-sql-sqlite_3.5.0-1_all.deb
 7681a3b7117e5aede51e1c6e3a8e4418 41398 devel extra 
cl-sql-sqlite3_3.5.0-1_all.deb
 3ae8541a95b660ffe0913d2f58e4e406 57062 contrib/devel extra 
cl-sql-oracle_3.5.0-1_all.deb
 842005d9e42ecc6fb05e77f048928cf2 59294 devel extra cl-sql-tests_3.5.0-1_all.deb
 675592401610788e3a0b8c27909fca2c 39380 devel extra cl-sql-uffi_3.5.0-1_i386.deb
 3339d466a05f6352a06fa2736f367810 49772 devel extra 
cl-sql-mysql_3.5.0-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiIj0ES7N8sSjgj4RAmQwAJ0cuXndJoMmAfhD6QSMo8vN0kGESQCbBpYG
xViuxWRmX43iLd1fbU2AMlM=
=80Cr
-END PGP SIGNATURE-


Accepted:
cl-sql-aodbc_3.5.0-1_all.deb
  to pool/main/c/cl-sql/cl-sql-aodbc_3.5.0-1_all.deb
cl-sql-mysql_3.5.0-1_i386.deb
  to pool/main/c/cl-sql/cl-sql-mysql_3.5.0-1_i386.deb
cl-sql-odbc_3.5.0-1_all.deb
  to pool/main/c/cl-sql/cl-sql-odbc_3.5.0-1_all.deb
cl-sql-oracle_3.5.0-1_all.deb
  to pool/contrib/c/cl-sql/cl-sql-oracle_3.5.0-1_all.deb
cl-sql-postgresql-socket_3.5.0-1_all.deb
  to pool/main/c/cl-sql/cl-sql-postgresql-socket_3.5.0-1_all.deb
cl-sql-postgresql_3.5.0-1_all.deb
  to pool/main/c/cl-sql/cl-sql-postgresql_3.5.0-1_all.deb
cl-sql-sqlite3_3.5.0-1_all.deb
  to pool/main/c/cl-sql/cl-sql-sqlite3_3.5.0-1_all.deb
cl-sql-sqlite_3.5.0-1_all.deb
  to pool/main/c/cl-sql/cl-sql-sqlite_3.5.0-1_all.deb
cl-sql-tests_3.5.0-1_all.deb
  to pool/main/c/cl-sql/cl-sql-tests_3.5.0-1_all.deb
cl-sql-uffi_3.5.0-1_i386.deb
  to pool/main/c/cl-sql/cl-sql-uffi_3.5.0-1_i386.deb
cl-sql_3.5.0-1.diff.gz
  to pool/main/c/cl-sql/cl-sql_3.5.0-1.diff.gz
cl-sql_3.5.0-1.dsc
  to pool/main/c/cl-sql/cl-sql_3.5.0-1.dsc
cl-sql_3.5.0-1_all.deb
  to pool/main/c/cl-sql/cl-sql_3.5.0-1_all.deb
cl-sql_3.5.0.orig.tar.gz
  to pool/main/c/cl-sql/cl-sql_3.5.0.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted leafnode 1.11.4-1 (source i386 powerpc)

2005-11-26 Thread Mark Brown
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 11:12:59 +
Source: leafnode
Binary: leafnode
Architecture: source powerpc i386
Version: 1.11.4-1
Distribution: unstable
Urgency: low
Maintainer: Mark Brown [EMAIL PROTECTED]
Changed-By: Mark Brown [EMAIL PROTECTED]
Description: 
 leafnode   - NNTP server for small leaf sites
Changes: 
 leafnode (1.11.4-1) unstable; urgency=low
 .
   * New upstream release.
Files: 
 58650e0950ec640216cdd5284d1fd83f 582 news extra leafnode_1.11.4-1.dsc
 d8632c7ad9b97826ddd0c834e5bdb3b6 503746 news extra leafnode_1.11.4.orig.tar.gz
 ea3c29f3aa1f96d1190eee10aae510e2 40988 news extra leafnode_1.11.4-1.diff.gz
 e2eadf68c8e3a85859145810994170f4 332180 news extra 
leafnode_1.11.4-1_powerpc.deb
 e92d7acc1dc1327d966c00e4c2f43802 318508 news extra leafnode_1.11.4-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiIkWJ2Vo11xhU60RAiM0AJ94NhnmGCm9+FcZCfEPV+yw3VYL7gCg8ilz
EbKrLUxqy64eel/UuvAHUYs=
=3QdM
-END PGP SIGNATURE-


Accepted:
leafnode_1.11.4-1.diff.gz
  to pool/main/l/leafnode/leafnode_1.11.4-1.diff.gz
leafnode_1.11.4-1.dsc
  to pool/main/l/leafnode/leafnode_1.11.4-1.dsc
leafnode_1.11.4-1_i386.deb
  to pool/main/l/leafnode/leafnode_1.11.4-1_i386.deb
leafnode_1.11.4-1_powerpc.deb
  to pool/main/l/leafnode/leafnode_1.11.4-1_powerpc.deb
leafnode_1.11.4.orig.tar.gz
  to pool/main/l/leafnode/leafnode_1.11.4.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted linux-2.6 2.6.14-4 (source i386 all)

2005-11-26 Thread Frederik Schüler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 13:18:41 +0100
Source: linux-2.6
Binary: linux-image-sun3 linux-headers-2.6.14-2-em64t-p4-smp 
linux-image-2.6.14-2-atari linux-image-2.6-powerpc-miboot 
linux-headers-2.6.14-2-atari linux-headers-2.6.14-2-386 
linux-image-2.6.14-2-sun3 linux-image-2.6.14-2-em64t-p4-smp 
linux-image-2.6.14-2-hp linux-image-2.6-footbridge 
linux-image-2.6-amd64-generic linux-image-2.6.14-2-apus 
linux-headers-2.6-64-smp kernel-image-2.6-686-smp linux-headers-2.6-atari 
kernel-image-2.6-386 linux-headers-2.6-s390 linux-headers-2.6.14-2-sun3 
linux-image-mvme16x linux-image-2.6.14-2-s3c2410 linux-image-itanium 
linux-headers-2.6.14-2-64 linux-image-2.6-amd64-k8-smp 
linux-headers-2.6.14-2-32 linux-image-2.6-rpc linux-image-2.6-s390 
linux-image-q40 linux-headers-2.6-sparc64-smp linux-headers-2.6-mvme147 
linux-image-footbridge kernel-image-2.6-itanium-smp 
linux-headers-2.6.14-2-powerpc linux-image-2.6.14-2-amd64-k8 
linux-headers-2.6.14-2-amiga linux-headers-2.6-686-smp linux-image-atari 
linux-image-2.6.14-2-32 linux-headers-2.6.14-2-s390 linux-image-2.6-q40 
linux-manual-2.6.14 kernel-image-2.6-k7-smp linux-headers-2.6.14-2-mvme147 
linux-headers-2.6-powerpc-miboot linux-headers-2.6-apus linux-image-s390 
linux-image-apus linux-image-2.6.14-2-mvme16x 
linux-headers-2.6.14-2-alpha-generic linux-patch-debian-2.6.14 
linux-headers-2.6.14-2-s390x linux-image-2.6-itanium linux-image-amd64-k8-smp 
linux-image-2.6.14-2-mac linux-image-2.6.14-2-k7-smp 
linux-image-2.6.14-2-itanium linux-image-2.6.14-2-k7 
linux-headers-2.6-amd64-generic linux-image-2.6-mckinley-smp linux-image-amiga 
linux-image-2.6-k7 linux-headers-2.6.14-2-32-smp linux-image-2.6.14-2-64-smp 
linux-headers-2.6.14-2-mckinley linux-image-mckinley-smp 
linux-image-2.6.14-2-amd64-k8-smp linux-image-em64t-p4-smp 
linux-image-2.6-powerpc linux-headers-2.6-s3c2410 linux-image-2.6-hp 
linux-image-2.6.14-2-itanium-smp linux-image-sparc64-smp 
linux-headers-2.6.14-2-amd64-k8 kernel-image-2.6-mckinley 
linux-image-powerpc-smp linux-headers-2.6-itanium-smp kernel-image-2.6-power3 
linux-image-2.6-64-smp kernel-image-2.6-powerpc linux-headers-2.6-32 
linux-tree-2.6.14 kernel-image-2.6-generic linux-headers-2.6-mvme16x 
linux-headers-2.6.14-2-mac linux-image-2.6.14-2-386 
linux-headers-2.6.14-2-powerpc64 linux-image-2.6-alpha-generic 
linux-headers-2.6-amd64-k8-smp linux-image-2.6-em64t-p4 linux-image-32 
linux-headers-2.6.14-2-sparc64-smp linux-headers-2.6.14-2-itanium 
linux-headers-2.6.14-2-em64t-p4 linux-headers-2.6-powerpc linux-image-hp 
linux-headers-2.6-em64t-p4-smp kernel-image-powerpc-smp 
linux-headers-2.6-sparc64 linux-image-powerpc64 linux-headers-2.6-hp 
linux-headers-2.6.14-2-mckinley-smp linux-image-2.6.14-2-686-smp 
linux-headers-2.6.14 linux-headers-2.6-powerpc64 linux-image-2.6-apus 
linux-headers-2.6.14-2-apus linux-image-2.6.14-2-64 
linux-image-2.6.14-2-alpha-generic linux-headers-2.6-mac 
linux-headers-2.6-32-smp linux-image-2.6.14-2-sparc64 
linux-headers-2.6-em64t-p4 linux-headers-2.6-rpc linux-image-2.6-mckinley 
linux-headers-2.6.14-2-sparc64 linux-headers-2.6-alpha-generic 
linux-image-2.6.14-2-amiga linux-headers-2.6-bvme6000 
linux-image-2.6.14-2-alpha-smp kernel-image-2.6-sparc64-smp 
kernel-image-powerpc linux-image-bvme6000 linux-headers-2.6-alpha-smp 
linux-headers-2.6.14-2-k7 linux-headers-2.6.14-2-footbridge 
linux-image-2.6.14-2-q40 linux-image-2.6-atari linux-image-64 
linux-image-s3c2410 linux-headers-2.6-386 linux-doc-2.6.14 
linux-headers-2.6-sun3 linux-headers-2.6-mckinley-smp 
kernel-image-2.6-power4-smp linux-image-k7-smp linux-image-386 
linux-source-2.6.14 linux-image-2.6.14-2-footbridge 
linux-image-2.6.14-2-mckinley-smp kernel-image-power3-smp 
linux-image-2.6.14-2-32-smp linux-image-2.6.14-2-bvme6000 
linux-image-2.6-bvme6000 linux-image-mckinley linux-headers-2.6.14-2-686-smp 
linux-image-itanium-smp linux-image-2.6-sparc64-smp linux-headers-2.6-s390x 
linux-image-2.6.14-2-powerpc-smp linux-image-2.6-ixp4xx linux-headers-2.6-q40 
linux-headers-2.6.14-2-alpha-smp kernel-image-2.6-k7 linux-image-ixp4xx 
linux-image-rpc linux-image-2.6.14-2-mckinley linux-image-2.6-mac 
linux-headers-2.6.14-2-powerpc-miboot linux-headers-2.6-64 
kernel-image-2.6-power3-smp linux-image-2.6-s390x linux-image-2.6.14-2-em64t-p4 
kernel-image-2.6-smp linux-headers-2.6.14-2-hp linux-image-2.6.14-2-rpc 
linux-image-alpha-smp linux-headers-2.6.14-2-amd64-k8-smp 
linux-headers-2.6.14-2-mvme16x linux-image-2.6-amd64-k8 
linux-headers-2.6-footbridge linux-image-2.6-sparc64 linux-image-amd64-k8 
kernel-image-power4 linux-image-2.6.14-2-686 linux-image-2.6.14-2-sparc64-smp 
linux-image-2.6-s3c2410 linux-headers-2.6.14-2-powerpc-smp 
linux-headers-2.6.14-2-686 linux-headers-2.6-k7-smp 
linux-headers-2.6.14-2-k7-smp linux-image-2.6.14-2-powerpc64 
linux-headers-2.6-mckinley linux-image-em64t-p4 linux-image-2.6-686-smp 
linux-image-2.6-mvme147 linux-headers-2.6-ixp4xx 

Accepted arts 1.4.3-3 (source all i386)

2005-11-26 Thread Debian Qt/KDE Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 17:44:33 +0100
Source: arts
Binary: libarts1c2a libarts1-dev libartsc0-dev libartsc0 arts
Architecture: all i386 source 
Version: 1.4.3-3
Distribution: unstable
Urgency: low
Maintainer: Debian Qt/KDE Maintainers debian-qt-kde@lists.debian.org
Changed-By: Debian Qt/KDE Maintainers debian-qt-kde@lists.debian.org
Description: 
 arts   - sound system from the official KDE release
 libarts1-dev - development files for the aRts sound system core components
 libarts1c2a - aRts sound system core components
 libartsc0  - aRts sound system C support library
 libartsc0-dev - development files for the aRts sound system C support library
Changes: 
 arts (1.4.3-3) unstable; urgency=low
 .
   +++ Changes by Adeodato Simó:
 .
   * Do build with g++-3.4 on arm, m68k and hppa, now that #323133 is reopened.
Files: 
 221a4bcd0d121466af239b1694a35dd4 119422 libs optional arts_1.4.3-3.diff.gz
 4e27d282503caa4f29c63f9e1c566d86 1036632 libs optional 
libarts1c2a_1.4.3-3_i386.deb
 8b20bcc57a323553f5a811279cb284bc 13874 libs optional libartsc0_1.4.3-3_i386.deb
 9d53513e32059e8a884faf743c475111 1252 libs optional arts_1.4.3-3.dsc
 cbdee488fc1498787983a34f338463b0 4882 sound optional arts_1.4.3-3_all.deb
 d1225f5275b5513d380020a760b123ba 20294 libdevel optional 
libartsc0-dev_1.4.3-3_i386.deb
 edc97fe8e4b02e52b0f3d47683de4d21 1226664 libdevel optional 
libarts1-dev_1.4.3-3_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)
Comment: Signed by Adeodato Simó [EMAIL PROTECTED]

iEYEARECAAYFAkOIlt4ACgkQgyNlRdHEGIIOJQCfbLAqJG0ak6mVJ5sFkeyJe6DE
rfYAoIeMSt7YjYGAsuWxcAocStojZOix
=62Xy
-END PGP SIGNATURE-


Accepted:
arts_1.4.3-3.diff.gz
  to pool/main/a/arts/arts_1.4.3-3.diff.gz
arts_1.4.3-3.dsc
  to pool/main/a/arts/arts_1.4.3-3.dsc
arts_1.4.3-3_all.deb
  to pool/main/a/arts/arts_1.4.3-3_all.deb
libarts1-dev_1.4.3-3_i386.deb
  to pool/main/a/arts/libarts1-dev_1.4.3-3_i386.deb
libarts1c2a_1.4.3-3_i386.deb
  to pool/main/a/arts/libarts1c2a_1.4.3-3_i386.deb
libartsc0-dev_1.4.3-3_i386.deb
  to pool/main/a/arts/libartsc0-dev_1.4.3-3_i386.deb
libartsc0_1.4.3-3_i386.deb
  to pool/main/a/arts/libartsc0_1.4.3-3_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted centericq 4.21.0-5 (source i386)

2005-11-26 Thread Julien Lemoine
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 15:52:12 +0100
Source: centericq
Binary: centericq-common centericq-utf8 centericq-fribidi centericq
Architecture: source i386
Version: 4.21.0-5
Distribution: unstable
Urgency: low
Maintainer: Julien LEMOINE [EMAIL PROTECTED]
Changed-By: Julien Lemoine [EMAIL PROTECTED]
Description: 
 centericq  - A text-mode multi-protocol instant messenger client
 centericq-common - A text-mode multi-protocol instant messenger client (data 
files)
 centericq-fribidi - A text-mode multi-protocol instant messenger client 
(Hebrew)
 centericq-utf8 - A text-mode multi-protocol instant messenger client
Closes: 340790
Changes: 
 centericq (4.21.0-5) unstable; urgency=low
 .
   * Fixed compilation error (redefinition of stpcpy)
 (Closes: #340790)
Files: 
 11ec5dcd6e42c8858addf4541431db35 861 net optional centericq_4.21.0-5.dsc
 fe1c6d870e97c7735eaa64b758313db0 117579 net optional centericq_4.21.0-5.diff.gz
 de82bb3b7d3e91a4303fefc808ad475d 345458 net optional 
centericq-common_4.21.0-5_i386.deb
 ffcc97eb627354eae7fd54591832ab89 1233230 net optional 
centericq_4.21.0-5_i386.deb
 143bb5959153e291857dc1377210bb30 1233292 net optional 
centericq-utf8_4.21.0-5_i386.deb
 4ab952802b4a67ec3e8a1ccedcca1e68 1233842 net optional 
centericq-fribidi_4.21.0-5_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiJZnc29c8N2YKnURAplvAKC326qm+ZXqT674xiONH9oPOE7PXACgtwdK
61+T4AaOQPSkj2fjMVgZkis=
=ssUN
-END PGP SIGNATURE-


Accepted:
centericq-common_4.21.0-5_i386.deb
  to pool/main/c/centericq/centericq-common_4.21.0-5_i386.deb
centericq-fribidi_4.21.0-5_i386.deb
  to pool/main/c/centericq/centericq-fribidi_4.21.0-5_i386.deb
centericq-utf8_4.21.0-5_i386.deb
  to pool/main/c/centericq/centericq-utf8_4.21.0-5_i386.deb
centericq_4.21.0-5.diff.gz
  to pool/main/c/centericq/centericq_4.21.0-5.diff.gz
centericq_4.21.0-5.dsc
  to pool/main/c/centericq/centericq_4.21.0-5.dsc
centericq_4.21.0-5_i386.deb
  to pool/main/c/centericq/centericq_4.21.0-5_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted kernel-wedge 2.11 (source all)

2005-11-26 Thread Frederik Schüler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 24 Nov 2005 23:43:59 +0100
Source: kernel-wedge
Binary: kernel-wedge
Architecture: source all
Version: 2.11
Distribution: unstable
Urgency: low
Maintainer: Debian Install System Team debian-boot@lists.debian.org
Changed-By: Frederik Schüler [EMAIL PROTECTED]
Description: 
 kernel-wedge - udeb package builder for Debian-Installer
Changes: 
 kernel-wedge (2.11) unstable; urgency=low
 .
   * Remove socket-modules: unix.ko and af_packet.ko are now builtin into
 the kernel.
Files: 
 2654f832e4889e051c53b379289eaf40 567 utils optional kernel-wedge_2.11.dsc
 e69e0e40f052d219bb32b83051ab45f3 30284 utils optional kernel-wedge_2.11.tar.gz
 664348b4abd6450ca8951fad06f23e87 34058 utils optional kernel-wedge_2.11_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiJW66n7So0GVSSARAsD8AKCGQwLlNTCXVx4Xwbfd4tBmdOmBzACdHhM6
W/rto4pLtOiBn0K89gm24hc=
=XQJE
-END PGP SIGNATURE-


Accepted:
kernel-wedge_2.11.dsc
  to pool/main/k/kernel-wedge/kernel-wedge_2.11.dsc
kernel-wedge_2.11.tar.gz
  to pool/main/k/kernel-wedge/kernel-wedge_2.11.tar.gz
kernel-wedge_2.11_all.deb
  to pool/main/k/kernel-wedge/kernel-wedge_2.11_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted ocaml-getopt 0.0.20040811-3 (source i386)

2005-11-26 Thread Mike Furr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 25 Nov 2005 13:38:49 -0500
Source: ocaml-getopt
Binary: libgetopt-ocaml-dev
Architecture: source i386
Version: 0.0.20040811-3
Distribution: unstable
Urgency: low
Maintainer: Mike Furr [EMAIL PROTECTED]
Changed-By: Mike Furr [EMAIL PROTECTED]
Description: 
 libgetopt-ocaml-dev - command line parsing library for OCaml
Changes: 
 ocaml-getopt (0.0.20040811-3) unstable; urgency=low
 .
   * Rebuild with 3.09.0
Files: 
 ba234ecee5e6b43ebf0dfd47b26faacd 635 devel optional 
ocaml-getopt_0.0.20040811-3.dsc
 796ac69d119b82cb760ada5ac8215dc2 1959 devel optional 
ocaml-getopt_0.0.20040811-3.diff.gz
 bea0196acddc3422bf557d9fcd0e5b9c 9902 devel optional 
libgetopt-ocaml-dev_0.0.20040811-3_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiJel7ZPKKRJLJvMRArfWAJ4tPmk2a4ILHnVTCaPm6olq9xkdtQCfa+eN
MH+cK/DMyTmIS574zroSG7o=
=5/bj
-END PGP SIGNATURE-


Accepted:
libgetopt-ocaml-dev_0.0.20040811-3_i386.deb
  to pool/main/o/ocaml-getopt/libgetopt-ocaml-dev_0.0.20040811-3_i386.deb
ocaml-getopt_0.0.20040811-3.diff.gz
  to pool/main/o/ocaml-getopt/ocaml-getopt_0.0.20040811-3.diff.gz
ocaml-getopt_0.0.20040811-3.dsc
  to pool/main/o/ocaml-getopt/ocaml-getopt_0.0.20040811-3.dsc


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted ifrit 2.9.4-1 (source i386)

2005-11-26 Thread Mark Hymers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 14:02:48 +
Source: ifrit
Binary: ifrit
Architecture: source i386
Version: 2.9.4-1
Distribution: unstable
Urgency: low
Maintainer: Mark Hymers [EMAIL PROTECTED]
Changed-By: Mark Hymers [EMAIL PROTECTED]
Description: 
 ifrit  - a powerful tool for visualizing 3-dimensional data sets
Changes: 
 ifrit (2.9.4-1) unstable; urgency=low
 .
   * New upstream release.
Files: 
 9779be9c851852ba1b844796b66ba059 597 science optional ifrit_2.9.4-1.dsc
 623b723678102e244d71ba4b8ae91873 1920356 science optional 
ifrit_2.9.4.orig.tar.gz
 eb8ce85d2df4cb37700b9f029bf839c1 4587 science optional ifrit_2.9.4-1.diff.gz
 804b42653c6060f33ad59c8eccf6987b 2008674 science optional 
ifrit_2.9.4-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiJxSSYIMHOpZA44RAmRnAKDY24IUYe7VuIpX1TL4c9e6pO/D+ACfZe2U
jVuIs7gdeZKt0x6kDV8YJCE=
=/LKQ
-END PGP SIGNATURE-


Accepted:
ifrit_2.9.4-1.diff.gz
  to pool/main/i/ifrit/ifrit_2.9.4-1.diff.gz
ifrit_2.9.4-1.dsc
  to pool/main/i/ifrit/ifrit_2.9.4-1.dsc
ifrit_2.9.4-1_i386.deb
  to pool/main/i/ifrit/ifrit_2.9.4-1_i386.deb
ifrit_2.9.4.orig.tar.gz
  to pool/main/i/ifrit/ifrit_2.9.4.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted extlib 1.4-4 (source i386)

2005-11-26 Thread Stefano Zacchiroli
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 18:52:47 +0100
Source: extlib
Binary: libextlib-ocaml-dev
Architecture: source i386
Version: 1.4-4
Distribution: unstable
Urgency: low
Maintainer: Stefano Zacchiroli [EMAIL PROTECTED]
Changed-By: Stefano Zacchiroli [EMAIL PROTECTED]
Description: 
 libextlib-ocaml-dev - extended standard library for OCaml
Closes: 340879
Changes: 
 extlib (1.4-4) unstable; urgency=low
 .
   * debian/rules
 - more precise mv statement due to more restrictive coreutils,
   fixes FTBFS (closes: #340879).
   Thanks to Roland Stigge for the patch.
Files: 
 c3a5c351f8b6e68a838ef8ce9c24f240 621 libdevel optional extlib_1.4-4.dsc
 de045db9898e4f5abc85d530cf89dbf7 3295 libdevel optional extlib_1.4-4.diff.gz
 12f916e6d54804eb2f5fb1b11312ba5c 267650 libdevel optional 
libextlib-ocaml-dev_1.4-4_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiKGb1cqbBPLEI7wRArqOAKCzhyYLEnSRiNy8Mbyl+1xuywy7lgCfSz6g
a/wpNJJEX18U9HXfYjw73nY=
=4/Dr
-END PGP SIGNATURE-


Accepted:
extlib_1.4-4.diff.gz
  to pool/main/e/extlib/extlib_1.4-4.diff.gz
extlib_1.4-4.dsc
  to pool/main/e/extlib/extlib_1.4-4.dsc
libextlib-ocaml-dev_1.4-4_i386.deb
  to pool/main/e/extlib/libextlib-ocaml-dev_1.4-4_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted arkhart 0.1.4-7 (source all)

2005-11-26 Thread Duck
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 16:43:56 +0100
Source: arkhart
Binary: arkhart
Architecture: source all
Version: 0.1.4-7
Distribution: unstable
Urgency: low
Maintainer: Marc Dequènes (Duck) [EMAIL PROTECTED]
Changed-By: Marc Dequènes (Duck) [EMAIL PROTECTED]
Description: 
 arkhart- former world for Arkrpg
Changes: 
 arkhart (0.1.4-7) unstable; urgency=low
 .
   * Updated URL in 'debian/copyright'.
   * Increased Standards-Version to 3.6.2.1 (no changes needed).
   * Added watch file.
   * Added '.desktop' file.
   * Fix FSF address in 'debian/copyright'.
Files: 
 b2dc08eb5eb354ed2a3e6831757ae5ce 584 games optional arkhart_0.1.4-7.dsc
 c28f04dfe2cf92f47c7ad053ae738de3 2545 games optional arkhart_0.1.4-7.diff.gz
 8ed0f4a5d387ce8a6ae5a778c8c54f13 9435376 games optional arkhart_0.1.4-7_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiIiOsczZcpAmcIYRAutaAJ4zqdrYba8icgtDcDuvhC39mCCv8wCfbyFc
M3krKl0MAmTMlW5+5gmzEiQ=
=NwqI
-END PGP SIGNATURE-


Accepted:
arkhart_0.1.4-7.diff.gz
  to pool/main/a/arkhart/arkhart_0.1.4-7.diff.gz
arkhart_0.1.4-7.dsc
  to pool/main/a/arkhart/arkhart_0.1.4-7.dsc
arkhart_0.1.4-7_all.deb
  to pool/main/a/arkhart/arkhart_0.1.4-7_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted ocamlnet 1.1-7 (source i386)

2005-11-26 Thread Stefano Zacchiroli
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 19:23:34 +0100
Source: ocamlnet
Binary: libocamlnet-ocaml libocamlnet-ocaml-dev
Architecture: source i386
Version: 1.1-7
Distribution: unstable
Urgency: low
Maintainer: Stefano Zacchiroli [EMAIL PROTECTED]
Changed-By: Stefano Zacchiroli [EMAIL PROTECTED]
Description: 
 libocamlnet-ocaml - OCaml application-level Internet protocols and conventions 
librar
 libocamlnet-ocaml-dev - OCaml application-level Internet protocols and 
conventions librar
Changes: 
 ocamlnet (1.1-7) unstable; urgency=low
 .
   * ships runtime .so in libocamlnet-ocaml instead of libocamlnet-ocaml-dev
Files: 
 3e23090430d2778c901954b07d851ea0 720 devel optional ocamlnet_1.1-7.dsc
 306e6b1e32b3684237e028666881863c 7715 devel optional ocamlnet_1.1-7.diff.gz
 e77ede66f676fc38155e086aba8979f2 1920184 libdevel optional 
libocamlnet-ocaml-dev_1.1-7_i386.deb
 8968d7d2e98c749750cb00d411f44272 8604 libs optional 
libocamlnet-ocaml_1.1-7_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiKi/1cqbBPLEI7wRAtghAKCYDNO6cRCYxidTovxJ7VF04Gpr5wCaA5ls
REXF9ieqZa/rBs0PFva110A=
=nkyR
-END PGP SIGNATURE-


Accepted:
libocamlnet-ocaml-dev_1.1-7_i386.deb
  to pool/main/o/ocamlnet/libocamlnet-ocaml-dev_1.1-7_i386.deb
libocamlnet-ocaml_1.1-7_i386.deb
  to pool/main/o/ocamlnet/libocamlnet-ocaml_1.1-7_i386.deb
ocamlnet_1.1-7.diff.gz
  to pool/main/o/ocamlnet/ocamlnet_1.1-7.diff.gz
ocamlnet_1.1-7.dsc
  to pool/main/o/ocamlnet/ocamlnet_1.1-7.dsc


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted perforate 1.1-7 (source i386)

2005-11-26 Thread Amaya Rodrigo Sastre
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 01:07:29 +0100
Source: perforate
Binary: perforate
Architecture: source i386
Version: 1.1-7
Distribution: unstable
Urgency: low
Maintainer: Amaya Rodrigo Sastre [EMAIL PROTECTED]
Changed-By: Amaya Rodrigo Sastre [EMAIL PROTECTED]
Description: 
 perforate  - Utilities to save disk space
Changes: 
 perforate (1.1-7) unstable; urgency=low
 .
   * The I should test patches before I upload Release.
   * Fix nasty syntax error (I introduced myself, 100% unassisted, and quite
 successfully, I must admit) in finddup, with patch from Hector García.
 You know I love you too :P
Files: 
 a47c61aeb6664211081298919a8133f7 571 utils optional perforate_1.1-7.dsc
 c6f4e2fc7ffcea2411f78ec3e92e33c8 6792 utils optional perforate_1.1-7.diff.gz
 218142707cf66c07fc6f924ca070d9bd 14346 utils optional perforate_1.1-7_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiKpNNFDtUT/MKpARAqsGAJ9wooY7gxZjkt/Atd8JUab+hNw6sgCg054E
+M+gHYE3yVlZz5H0LUhe41k=
=jCld
-END PGP SIGNATURE-


Accepted:
perforate_1.1-7.diff.gz
  to pool/main/p/perforate/perforate_1.1-7.diff.gz
perforate_1.1-7.dsc
  to pool/main/p/perforate/perforate_1.1-7.dsc
perforate_1.1-7_i386.deb
  to pool/main/p/perforate/perforate_1.1-7_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted comix 2.1-1 (source i386)

2005-11-26 Thread Emfox Zhou
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 15:49:16 +0800
Source: comix
Binary: comix
Architecture: source i386
Version: 2.1-1
Distribution: unstable
Urgency: low
Maintainer: Emfox Zhou [EMAIL PROTECTED]
Changed-By: Emfox Zhou [EMAIL PROTECTED]
Description: 
 comix  - GTK Comic Book Viewer
Changes: 
 comix (2.1-1) unstable; urgency=low
 .
   * New upstream release: mainly a bug fix release.
Files: 
 45604749854e847860efa679b5b29d48 564 x11 optional comix_2.1-1.dsc
 6634f4373a4922f7f927ed41ee41d7e3 41803 x11 optional comix_2.1.orig.tar.gz
 63b40a38a28e356402f16ffab03db804 2460 x11 optional comix_2.1-1.diff.gz
 1715843b626041c439e7b8540bc5d949 37564 x11 optional comix_2.1-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiKtfCV53xXnMZYYRAq4jAJ4ol5t+J/arrbvadCzaQq7J3HWmvwCgkd1m
8kTNcPnk3tid6XbPEXWV8tU=
=GuJc
-END PGP SIGNATURE-


Accepted:
comix_2.1-1.diff.gz
  to pool/main/c/comix/comix_2.1-1.diff.gz
comix_2.1-1.dsc
  to pool/main/c/comix/comix_2.1-1.dsc
comix_2.1-1_i386.deb
  to pool/main/c/comix/comix_2.1-1_i386.deb
comix_2.1.orig.tar.gz
  to pool/main/c/comix/comix_2.1.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted pxp 1.1.96-1 (source i386)

2005-11-26 Thread Stefano Zacchiroli
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 19:08:25 +0100
Source: pxp
Binary: libpxp-ocaml-dev
Architecture: source i386
Version: 1.1.96-1
Distribution: unstable
Urgency: low
Maintainer: Stefano Zacchiroli [EMAIL PROTECTED]
Changed-By: Stefano Zacchiroli [EMAIL PROTECTED]
Description: 
 libpxp-ocaml-dev - OCaml library that implement an XML-1.0 validating parser
Changes: 
 pxp (1.1.96-1) unstable; urgency=low
 .
   * new upstream release
   * rebuilt with ocaml 3.09
   * debian/*
 - no more hardcoding of ocaml abi version anywhere
   * debian/rules
 - use cdbs
Files: 
 ae119201f9685e36544a1c9032eed8ba 682 libdevel optional pxp_1.1.96-1.dsc
 686c4688980126b4711800b33a403d17 369803 libdevel optional 
pxp_1.1.96.orig.tar.gz
 130c060648427d7c81a1d1c5122616e2 6155 libdevel optional pxp_1.1.96-1.diff.gz
 ecf68b9f66f8f208fb92f9bccc7fd5d9 1541216 libdevel optional 
libpxp-ocaml-dev_1.1.96-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiK+v1cqbBPLEI7wRAk0nAJwLaKxSp1Ve5vTmUOvOXRk7pxBqaACeKSUl
TZihRpb/e7PEOZTD3E8sBJM=
=1l7Z
-END PGP SIGNATURE-


Accepted:
libpxp-ocaml-dev_1.1.96-1_i386.deb
  to pool/main/p/pxp/libpxp-ocaml-dev_1.1.96-1_i386.deb
pxp_1.1.96-1.diff.gz
  to pool/main/p/pxp/pxp_1.1.96-1.diff.gz
pxp_1.1.96-1.dsc
  to pool/main/p/pxp/pxp_1.1.96-1.dsc
pxp_1.1.96.orig.tar.gz
  to pool/main/p/pxp/pxp_1.1.96.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted perforate 1.1-8 (source i386)

2005-11-26 Thread Amaya Rodrigo Sastre
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 20:09:52 +0100
Source: perforate
Binary: perforate
Architecture: source i386
Version: 1.1-8
Distribution: unstable
Urgency: low
Maintainer: Amaya Rodrigo Sastre [EMAIL PROTECTED]
Changed-By: Amaya Rodrigo Sastre [EMAIL PROTECTED]
Description: 
 perforate  - Utilities to save disk space
Changes: 
 perforate (1.1-8) unstable; urgency=low
 .
   * Patch provided by Miriam Ruiz, to get rid of gcc4 warnings building zum.c
Files: 
 c121e6c491501842d27ecd196ad7 571 utils optional perforate_1.1-8.dsc
 56e42ac0a3d96f53cb671243e6412da6 7219 utils optional perforate_1.1-8.diff.gz
 30190ed9a339b98c0e88f794b4c3d207 14418 utils optional perforate_1.1-8_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiLO9NFDtUT/MKpARAmVKAKC4OrOrGs6xu79Z8EZP0O6bDhc+KwCfX82f
2KMrxC3LPgbndA4vzmuP/do=
=UMur
-END PGP SIGNATURE-


Accepted:
perforate_1.1-8.diff.gz
  to pool/main/p/perforate/perforate_1.1-8.diff.gz
perforate_1.1-8.dsc
  to pool/main/p/perforate/perforate_1.1-8.dsc
perforate_1.1-8_i386.deb
  to pool/main/p/perforate/perforate_1.1-8_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted kernel-wedge 2.12 (source all)

2005-11-26 Thread Frederik Schüler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 19:49:14 +0100
Source: kernel-wedge
Binary: kernel-wedge
Architecture: source all
Version: 2.12
Distribution: unstable
Urgency: low
Maintainer: Debian Install System Team debian-boot@lists.debian.org
Changed-By: Frederik Schüler [EMAIL PROTECTED]
Description: 
 kernel-wedge - udeb package builder for Debian-Installer
Changes: 
 kernel-wedge (2.12) unstable; urgency=low
 .
   * Revert previous change to retain compatibility with current 2.4 kernels
 and 2.6.12/2.4.27 packages in etch.
Files: 
 fa9ece6a283364c71647d1f0f053fd91 567 utils optional kernel-wedge_2.12.dsc
 41d4cef420247fa0ceaf9dc063f09273 30454 utils optional kernel-wedge_2.12.tar.gz
 b983ea6e27be22b50db11902f69e3026 34286 utils optional kernel-wedge_2.12_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiK906n7So0GVSSARApWSAJ4t2eTbnW1g+AcN6PR6a/W0UWBi5ACcCRl6
/DR9+TADHS1poqQs7F/o5Is=
=HQYb
-END PGP SIGNATURE-


Accepted:
kernel-wedge_2.12.dsc
  to pool/main/k/kernel-wedge/kernel-wedge_2.12.dsc
kernel-wedge_2.12.tar.gz
  to pool/main/k/kernel-wedge/kernel-wedge_2.12.tar.gz
kernel-wedge_2.12_all.deb
  to pool/main/k/kernel-wedge/kernel-wedge_2.12_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted libebml 0.7.6-2 (source i386)

2005-11-26 Thread Debian packages
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 20:01:04 +0100
Source: libebml
Binary: libebml-dev
Architecture: source i386
Version: 0.7.6-2
Distribution: unstable
Urgency: low
Maintainer: Sam Hocevar (Debian packages) [EMAIL PROTECTED]
Changed-By: Sam Hocevar (Debian packages) [EMAIL PROTECTED]
Description: 
 libebml-dev - access library for the EBML format
Changes: 
 libebml (0.7.6-2) unstable; urgency=low
 .
   * debian/compat: set level to 4.
Files: 
 f2030fe85abc856b0047dc38e9a908d7 578 devel optional libebml_0.7.6-2.dsc
 bbd7440eed8e3f2c226b4dfe2eb8795a 3450 devel optional libebml_0.7.6-2.diff.gz
 71b8383a95f519c693dce25922e43fca 152256 libdevel optional 
libebml-dev_0.7.6-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiLOLfPP1rylJn2ERAjW6AJ0RO9UC6+CPWcte+jtDr3tFtXdiwgCePlg5
Dzjbxag2L1LUJYLWd6hkqlg=
=5qjf
-END PGP SIGNATURE-


Accepted:
libebml-dev_0.7.6-2_i386.deb
  to pool/main/libe/libebml/libebml-dev_0.7.6-2_i386.deb
libebml_0.7.6-2.diff.gz
  to pool/main/libe/libebml/libebml_0.7.6-2.diff.gz
libebml_0.7.6-2.dsc
  to pool/main/libe/libebml/libebml_0.7.6-2.dsc


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted ocaml-http 0.1.2-2 (source i386)

2005-11-26 Thread Stefano Zacchiroli
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 20:28:26 +0100
Source: ocaml-http
Binary: libhttp-ocaml-dev
Architecture: source i386
Version: 0.1.2-2
Distribution: unstable
Urgency: low
Maintainer: Stefano Zacchiroli [EMAIL PROTECTED]
Changed-By: Stefano Zacchiroli [EMAIL PROTECTED]
Description: 
 libhttp-ocaml-dev - OCaml library for writing HTTP servers
Changes: 
 ocaml-http (0.1.2-2) unstable; urgency=low
 .
   * rebuilt with ocaml 3.09
   * debian/*
 - no more hardcoding of ocaml abi version anywhere
   * debian/rules
 - use cdbs
Files: 
 41370af5a7259c0105fe6897ed9fca36 632 devel optional ocaml-http_0.1.2-2.dsc
 b85c6551ae7fcd822f667bf400ba87d9 140993 devel optional 
ocaml-http_0.1.2-2.tar.gz
 1693d43384710f733fe31b2af924e36f 271226 devel optional 
libhttp-ocaml-dev_0.1.2-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiLiK1cqbBPLEI7wRAqLQAJ4vW0ieXvNwUyC+QqOy3EMEcDgo0ACgkUn7
1DuqxwjdcB0eXWQfssAVE0w=
=qkeG
-END PGP SIGNATURE-


Accepted:
libhttp-ocaml-dev_0.1.2-2_i386.deb
  to pool/main/o/ocaml-http/libhttp-ocaml-dev_0.1.2-2_i386.deb
ocaml-http_0.1.2-2.dsc
  to pool/main/o/ocaml-http/ocaml-http_0.1.2-2.dsc
ocaml-http_0.1.2-2.tar.gz
  to pool/main/o/ocaml-http/ocaml-http_0.1.2-2.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted pure-ftpd 1.0.19-7 (source i386 all)

2005-11-26 Thread Racke
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 12:59:18 +0100
Source: pure-ftpd
Binary: pure-ftpd pure-ftpd-common pure-ftpd-ldap pure-ftpd-mysql 
pure-ftpd-postgresql
Architecture: source i386 all
Version: 1.0.19-7
Distribution: unstable
Urgency: low
Maintainer: Stefan Hornburg (Racke) [EMAIL PROTECTED]
Changed-By: Stefan Hornburg (Racke) [EMAIL PROTECTED]
Description: 
 pure-ftpd  - Pure-FTPd FTP server
 pure-ftpd-common - Pure-FTPd FTP server (Common Files)
 pure-ftpd-ldap - Pure-FTPd FTP server with LDAP user authentication
 pure-ftpd-mysql - Pure-FTPd FTP server with MySQL user authentication
 pure-ftpd-postgresql - Pure-FTPd FTP server with PostgreSQL user authentication
Closes: 338919
Changes: 
 pure-ftpd (1.0.19-7) unstable; urgency=low
 .
   * transition to new PostgreSQL architecture
   * changed alternative dependency for libmysqlclient-dev to
 libmysqlclient14-dev
   * converted changelog to UTF-8
   * Swedish translation of debconf templates added (Closes: #338919,
 thanks to Daniel Nylander [EMAIL PROTECTED])
Files: 
 0b92059d1e46b7506161a759fa98d689 797 net optional pure-ftpd_1.0.19-7.dsc
 17cc9c56a0750de8990012b0f0397344 30027 net optional pure-ftpd_1.0.19-7.diff.gz
 0d15f1801144efe294d4114e2e157a4a 161244 net optional 
pure-ftpd-common_1.0.19-7_all.deb
 621df5ba973c23c3e32f54beeed6a362 144382 net optional 
pure-ftpd_1.0.19-7_i386.deb
 cd4795920f37120be9e49042011ce499 159914 net optional 
pure-ftpd-mysql_1.0.19-7_i386.deb
 cb565c9cab74adc8161e48ef57370d1f 159378 net optional 
pure-ftpd-postgresql_1.0.19-7_i386.deb
 2189f1af48785207bf8c190406d46a48 157780 net optional 
pure-ftpd-ldap_1.0.19-7_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDiMSZjgVfE5tya3ERAhkgAKDazoHHA9gzeivmz0TfGO4xWuUfgQCdGDkY
NKCDMcZ43aOJ1TJrk9V4qI4=
=RCT6
-END PGP SIGNATURE-


Accepted:
pure-ftpd-common_1.0.19-7_all.deb
  to pool/main/p/pure-ftpd/pure-ftpd-common_1.0.19-7_all.deb
pure-ftpd-ldap_1.0.19-7_i386.deb
  to pool/main/p/pure-ftpd/pure-ftpd-ldap_1.0.19-7_i386.deb
pure-ftpd-mysql_1.0.19-7_i386.deb
  to pool/main/p/pure-ftpd/pure-ftpd-mysql_1.0.19-7_i386.deb
pure-ftpd-postgresql_1.0.19-7_i386.deb
  to pool/main/p/pure-ftpd/pure-ftpd-postgresql_1.0.19-7_i386.deb
pure-ftpd_1.0.19-7.diff.gz
  to pool/main/p/pure-ftpd/pure-ftpd_1.0.19-7.diff.gz
pure-ftpd_1.0.19-7.dsc
  to pool/main/p/pure-ftpd/pure-ftpd_1.0.19-7.dsc
pure-ftpd_1.0.19-7_i386.deb
  to pool/main/p/pure-ftpd/pure-ftpd_1.0.19-7_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted sirc 2.211-9 (source i386)

2005-11-26 Thread Rudolf Weeber
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 18:00:00 +1000
Source: sirc
Binary: sirc
Architecture: source i386
Version: 2.211-9
Distribution: unstable
Urgency: low
Maintainer: Rudolf Weeber [EMAIL PROTECTED]
Changed-By: Rudolf Weeber [EMAIL PROTECTED]
Description: 
 sirc   - The full-featured Perl IRC client
Closes: 337852
Changes: 
 sirc (2.211-9) unstable; urgency=low
 .
   * Fixed bug in postinst script (closes: #337852)
Files: 
 36fdf6fe078dea5e967cfa1a8dc8e366 575 net optional sirc_2.211-9.dsc
 5e356f68cca9cd8c0be65f4529efbb94 38387 net optional sirc_2.211-9.diff.gz
 584d4639cd6db0dcc66befd8e4676fde 106622 net optional sirc_2.211-9_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiMkChQui3hP+/EARAjj0AKDXMmij5go1O031TTQEo+EkS4+iZACfR225
9ZrY8k0CXcEOjFtdJH2HRRc=
=myKP
-END PGP SIGNATURE-


Accepted:
sirc_2.211-9.diff.gz
  to pool/main/s/sirc/sirc_2.211-9.diff.gz
sirc_2.211-9.dsc
  to pool/main/s/sirc/sirc_2.211-9.dsc
sirc_2.211-9_i386.deb
  to pool/main/s/sirc/sirc_2.211-9_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted autobook 1.4.4-unofficial-4 (source all)

2005-11-26 Thread Anibal Monsalve Salazar
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 20:31:32 +1100
Source: autobook
Binary: autobook
Architecture: source all
Version: 1.4.4-unofficial-4
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group [EMAIL PROTECTED]
Changed-By: Anibal Monsalve Salazar [EMAIL PROTECTED]
Description: 
 autobook   - GNU Autoconf, Automake and Libtool Book
Changes: 
 autobook (1.4.4-unofficial-4) unstable; urgency=low
 .
   * Orphaning this package. Maintainer set to Debian QA Group.
   * Added watch file.
Files: 
 14bfd3d6b84af08e43bd8183f4ed7a8d 628 non-free/doc optional 
autobook_1.4.4-unofficial-4.dsc
 fa9f74f2feedf9c0b7770367e1479372 6924 non-free/doc optional 
autobook_1.4.4-unofficial-4.diff.gz
 afa90368014e2c018a9eb3880a14dcf0 2482178 non-free/doc optional 
autobook_1.4.4-unofficial-4_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiMgRipBneRiAKDwRAk7uAJ4/xHqaO7AgkASs17t//lkqhu5HkQCfT13C
k9//vbddkZkLKCIhgLyZtNg=
=qtzR
-END PGP SIGNATURE-


Accepted:
autobook_1.4.4-unofficial-4.diff.gz
  to pool/non-free/a/autobook/autobook_1.4.4-unofficial-4.diff.gz
autobook_1.4.4-unofficial-4.dsc
  to pool/non-free/a/autobook/autobook_1.4.4-unofficial-4.dsc
autobook_1.4.4-unofficial-4_all.deb
  to pool/non-free/a/autobook/autobook_1.4.4-unofficial-4_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted dnsmasq 2.24-1 (source i386)

2005-11-26 Thread Simon Kelley
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 03 Sep 2005 20:02:32 +
Source: dnsmasq
Binary: dnsmasq
Architecture: source i386
Version: 2.24-1
Distribution: unstable
Urgency: low
Maintainer: Simon Kelley [EMAIL PROTECTED]
Changed-By: Simon Kelley [EMAIL PROTECTED]
Description: 
 dnsmasq- A small caching DNS proxy and DHCP server
Closes: 304446 326057 330422 336413 338353
Changes: 
 dnsmasq (2.24-1) unstable; urgency=low
 .
* New upstream. (closes: #330422)
* Fix typo and clean up dnsmasq.conf (closes: #326057) (closes: #304446)
* Add build support for I18N and gettext.
* Fixed manpage typos. (closes: #336413)
* Create a dnsmasq-unique userid for the daemon to run as. (closes: #338353)
Files: 
 3716e09c01204f9c0300c46565e40dae 551 net optional dnsmasq_2.24-1.dsc
 2be8eae10f59bdc7943fce24a6909d39 186949 net optional dnsmasq_2.24.orig.tar.gz
 bd9b526d746f79ee2099acd290969f77 10487 net optional dnsmasq_2.24-1.diff.gz
 d2d9babbe25b700c345614506bc6a51b 145714 net optional dnsmasq_2.24-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFDhyVowEl0z99oB74RAoPSAJ9Oo+dfptn8tkPYWABpXeX7C350RwCfSV57
lR/e7UMkZdNUeJ4eb8jdOsQ=
=uOnk
-END PGP SIGNATURE-


Accepted:
dnsmasq_2.24-1.diff.gz
  to pool/main/d/dnsmasq/dnsmasq_2.24-1.diff.gz
dnsmasq_2.24-1.dsc
  to pool/main/d/dnsmasq/dnsmasq_2.24-1.dsc
dnsmasq_2.24-1_i386.deb
  to pool/main/d/dnsmasq/dnsmasq_2.24-1_i386.deb
dnsmasq_2.24.orig.tar.gz
  to pool/main/d/dnsmasq/dnsmasq_2.24.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted mutt-ng 0.0+20051125-1 (source i386)

2005-11-26 Thread Elimar Riesebieter
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 26 Nov 2005 00:05:56 +0100
Source: mutt-ng
Binary: mutt-ng
Architecture: source i386
Version: 0.0+20051125-1
Distribution: experimental
Urgency: low
Maintainer: Elimar Riesebieter [EMAIL PROTECTED]
Changed-By: Elimar Riesebieter [EMAIL PROTECTED]
Description: 
 mutt-ng- text-based mailreader supporting MIME, GPG, PGP and threading
Closes: 339737
Changes: 
 mutt-ng (0.0+20051125-1) experimental; urgency=low
 .
   * Updated to snapshot 20051124
   * make hcache dump/restore List-Post: information (closes: #339737)
   * merge in latest mutt changes
   * This is of version devel-r622.
   * Upload sponsored by Norbert Tretkowski [EMAIL PROTECTED]
Files: 
 1f13739bac29d4dd25b240b627afc2a0 821 mail optional mutt-ng_0.0+20051125-1.dsc
 43142f013addfc54bb87b978c57efe33 2659478 mail optional 
mutt-ng_0.0+20051125.orig.tar.gz
 33d45cb2d09bce207ed05c62ae497f11 32023 mail optional 
mutt-ng_0.0+20051125-1.diff.gz
 b79df6da3493b4462a58b247ad6aa89e 1809208 mail optional 
mutt-ng_0.0+20051125-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDiMI7r/RnCw96jQERAh1VAJ0akzrLyo/re07ro3PGG7auOYdWfwCfaLnt
kZz2l/kDPzwz1xa6uT1e7v8=
=EDdG
-END PGP SIGNATURE-


Accepted:
mutt-ng_0.0+20051125-1.diff.gz
  to pool/main/m/mutt-ng/mutt-ng_0.0+20051125-1.diff.gz
mutt-ng_0.0+20051125-1.dsc
  to pool/main/m/mutt-ng/mutt-ng_0.0+20051125-1.dsc
mutt-ng_0.0+20051125-1_i386.deb
  to pool/main/m/mutt-ng/mutt-ng_0.0+20051125-1_i386.deb
mutt-ng_0.0+20051125.orig.tar.gz
  to pool/main/m/mutt-ng/mutt-ng_0.0+20051125.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



  1   2   >