Re: [joey@infodrom.north.de (Martin Schulze)] Re: Re: kernel building

2000-03-16 Thread Mikolaj J. Habryn
>>>>> "JR" == Josip Rodin <[EMAIL PROTECTED]> writes:

JR> On Thu, Mar 16, 2000 at 09:47:41PM +1100, Mikolaj J. Habryn
JR> wrote:

>> If you haven't sent from a root account there is a chance that
>> our list server has inserted a line like "Sender: [EMAIL PROTECTED]"
>> which confuses the lists software.  In that case please wait
>> few hours and resend.

JR> Maybe this is the problem? Why would this happen, anyway?

  That would be a valid idea, were it not for the fact that it
*consistently* bounces mail with a from address of
<[EMAIL PROTECTED]>, and accepts
<[EMAIL PROTECTED]>. Consistently. Within timespans of seconds,
minutes, hours, days, weeks, or months.

m.



[joey@infodrom.north.de (Martin Schulze)] Re: Re: kernel building

2000-03-16 Thread Mikolaj J. Habryn

  This is *still* happening. Will someone please do something about
it? root isn't even mentioned in the headers. I get this error when I
mail with one of my complex cookie'd from lines, and don't when I
simplify it. Why is this feature even in place? Does it add any kind
of value to stop root users posting, even if it doesn't kill innocent
mail in the process?

m.

--- Begin Message ---
You should not send mail from your »root« account.  The »root« is a
login that bypasses all security protection on your system.  The root
account should only be used to perform system administration, and only
used for as short a time as possible.

You should *not* use the »root« account for daily use or as your
personal login.  Why not? Well, one reason to avoid using root's
privileges is that it is very easy to do irreparable damage as
root. Another reason is that you might be tricked into running a
Trojan-horse program -- that is a program that takes advantage of your
super-user powers to compromise the security of your system behind
your back. Any good book on Unix system administration will cover this
topic in more detail -- consider reading one if it is new to you.

Please use adduser and create a regular user account for you and send
mail from that account.

If you haven't sent from a root account there is a chance that
our list server has inserted a line like "Sender: [EMAIL PROTECTED]"
which confuses the lists software.  In that case please wait few
hours and resend.

> From [EMAIL PROTECTED]  Thu Mar 16 11:33:07 2000
> Return-Path: <[EMAIL PROTECTED]>
> Received: at Infodrom Oldenburg (/\##/\ Smail-3.2.0.102 1998-Aug-2 #2)
>   from murphy.debian.org by finlandia.Infodrom.North.DE
>   via smail with smtp
>   id <[EMAIL PROTECTED]>
>   for <[EMAIL PROTECTED]>; Thu, 16 Mar 2000 11:33:04 +0100 (CET) 
> Received: from ([216.234.231.6]) by teergrube (0 sec delayed, relaying denied)
> Received: (qmail 13818 invoked by uid 847); 16 Mar 2000 10:32:31 -
> Received: (qmail 13781 invoked by uid 38); 16 Mar 2000 10:32:31 -
> Received: (qmail 13774 invoked by uid 38); 16 Mar 2000 10:32:30 -
> Date: 16 Mar 2000 10:32:30 -
> X-From_:[EMAIL PROTECTED]  Thu Mar 16 04:32:30 2000
> X-Envelope-Sender: [EMAIL PROTECTED]
> Received: (qmail 13752 invoked from network); 16 Mar 2000 10:32:26 -
> Received: from mooneye.ucc.gu.uwa.edu.au (HELO ucc.gu.uwa.edu.au) 
> (130.95.13.9)
>   by murphy.debian.org with SMTP; 16 Mar 2000 10:32:26 -
> Received: from mussel.ucc.gu.uwa.edu.au ([EMAIL PROTECTED] [130.95.13.18])
>   by ucc.gu.uwa.edu.au (8.9.3/8.9.3/Debian 8.9.3-6) with ESMTP id 
> SAA17126;
>   Thu, 16 Mar 2000 18:32:22 +0800
> Received: (from [EMAIL PROTECTED])
>   by mussel.ucc.gu.uwa.edu.au (8.9.3/8.9.3/Debian 8.9.3-6) id SAA01423;
>   Thu, 16 Mar 2000 18:32:21 +0800
> X-Authentication-Warning: mussel.ucc.gu.uwa.edu.au: dichro set sender to 
> [EMAIL PROTECTED] using -f
> Sender: [EMAIL PROTECTED]
> From: "Mikolaj J. Habryn" <[EMAIL PROTECTED]>
> To: DI Peter Burgstaller <[EMAIL PROTECTED]>
> Cc: debian-alpha@lists.debian.org
> Subject: Re: kernel building
> References: <[EMAIL PROTECTED]>
> Old-Date: 16 Mar 2000 21:32:21 +1100
> In-Reply-To: DI Peter Burgstaller's message of "Wed, 15 Mar 2000 15:23:17 
> +0100 (MET)"
> Message-ID: <[EMAIL PROTECTED]>
> Lines: 10
> User-Agent: Gnus/5.0802 (Gnus v5.8.2) XEmacs/20.4 (Emerald)
> MIME-Version: 1.0
> Content-Type: text/plain; charset=us-ascii
> X-Diagnostic: Mail coming from a daemon, ignored
> X-Envelope-To: debian-alpha
> Delivered-To: [EMAIL PROTECTED]
> X-Loop: [EMAIL PROTECTED]
> 

Regards,

SPI and Debian listmaster

-- 
   Debian GNU/Linux - The Universal Operating System

[EMAIL PROTECTED]   [EMAIL PROTECTED]
--- End Message ---


Re: libtool .la archives - name collision?

1999-09-23 Thread Mikolaj J. Habryn
> "BC" == Ben Collins <[EMAIL PROTECTED]> writes:

BC> No because the .la files only go into the -dev package for the
BC> library, 

  Section 4.2 of the policy manual, according to my reading, seems to
disagree...

 Packages that use libtool to create shared libraries must include the
 _.la_ files in the _-dev_ packages, with the exception that if the
 package relies on libtool's _libltdl_ library, in which case the .la
 files must go in the run-time library package. This is a good idea in
 general, and especially for static linking issues.

  It seems to be suggesting that .la files in the run-time library
package is a good idea in general, and even if I'm misreading that,
they definitely go in if the libraries are used by something relying
on libltdl.

  Or am I missing something?

m.



libtool .la archives - name collision?

1999-09-23 Thread Mikolaj J. Habryn
  Hmm - it strikes me that there may be a potential problem with
including .la archives with library packages. The filename for the
libtool file is independent of the version number of the library. ie,
libfish2 will ship with a libfish.la, and so will libfish3. This might 
be an obstacle to installing multiple versions of the same library,
might it not?

m.



Re: /usr/lib/libgnomeui.so.0: undefined symbol: argp_program_version

1999-01-28 Thread Mikolaj J. Habryn
> "IEM" == Ivan E Moore <[EMAIL PROTECTED]> writes:

IEM> /usr/lib/libgnomeui.so.0: undefined symbol:
IEM> argp_program_version This happens with some of the GNOME
IEM> based packages I've installed from both slink and potatoe
IEM> lately...
IEM> Any ideas what I'm missing or what I did???

  One of the backend libraries changed. libimlib, from memory, caused
this going from 1.8 to 1.9. Make sure you've upgraded everything, and
if it still doesn't work, rebuild things in the right order.

m, who did this for alpha just a few days ago.



Re: Getting Slink compatible with Linux-2.2.0

1999-01-27 Thread Mikolaj J. Habryn
> "VR" == Vincent Renardias <[EMAIL PROTECTED]> writes:

VR> The 2.9 Debian package already contains the alpha patches
VR> supplied by Christopher C Chimelis
VR> <[EMAIL PROTECTED]> (see bug report #17661).  I am
VR> not aware of any other patch or problem specific to the alpha
VR> platform. Can you please elaborate?

  The structure in partition.h that's specific to the alpha does not
match the generic one - the difference that I first noticed (from
memory) was the naming of the last two fields in struct partition.

  One solution is to mark the generic structure definition with
__attribute__((packed)), as this shouldn't make any difference to any
platform other than those that actually need it there. I was going to
test this before suggesting it, but time constraints etc, etc, etc :)

m.



Re: Getting Slink compatible with Linux-2.2.0

1999-01-27 Thread Mikolaj J. Habryn
> "VR" == Vincent Renardias <[EMAIL PROTECTED]> writes:

VR> Including the current (2.9g-5) util-linux from unstable in
VR> frozen is a Bad Idea(tm). This version has several big
VR> packaging issues.

  On top of everything else, alpha support (and quite possibly other
non-x86 architectures) in 2.9 is ever so slightly flaky.

m.



Re: Bug#27050 (fdutils): A cause for security concern?

1999-01-22 Thread Mikolaj J. Habryn
> "AF" == Anthony Fok <[EMAIL PROTECTED]> writes:

AF> if (geteuid()!=0) die("Must run with EUID=root");

AF> I am a little bit tempted to comment that line out, but it's
AF> probably there for a reason, and I am definitely not qualified
AF> to hack fdmount.c, so for now I should probably add a
AF> /usr/sbin/fdutilsconfig as Thomas has suggested.

  This sort of thing should be shot on sight. It will need to be
removed one way or another when we move to a capability based
system. The downside is that the reason things like this exist is the
complete lack of any error handling in the rest of the code.

  If you need something to do, dike it out. If it's run as root, it
will work as expected. If not, then it can't do any real damage,
right? ;)

m.