Bug#370807: (forw) Bug#370807: libpam-p11 spews odd error message about /var/run/pcscd.pub during authentication attempts

2006-06-25 Thread Daniel Kahn Gillmor
Hi Andreas-- On June 25, [EMAIL PROTECTED] said: if you use openct, i.e. don't need pcsc, you can a) uninstall pcscd b) edit opensc.conf, change # reader_drivers = openct, pcsc, ctapi; to reader_drivers= openct; and that message will be gone. That did the trick for

Bug#370556: initramfs-tools: does not handle cryptroot-on-lvm properly

2006-06-07 Thread Daniel Kahn Gillmor
On June 6, [EMAIL PROTECTED] said: I guess this isn't very clear, but if you have an encrypted root partition on top of lvm/evms/md, you have to point the root variable to the underlying lvm/evms/md partition (this is a limitation of how the current initramfs system works). Isn't there a

Bug#371828: sparsehash: New upstream version available

2006-06-07 Thread Daniel Kahn Gillmor
Package: sparsehash Severity: wishlist According to http://sourceforge.net/project/shownotes.php?release_id=415850group_id=133364 there is a new upstream version (v0.4) of google's sparsehash available, as of 2006-04-23. Thanks, --dkg -- System Information: Debian Release:

Bug#370556: initramfs-tools: does not handle cryptroot-on-lvm properly

2006-06-07 Thread Daniel Kahn Gillmor
On June 7, [EMAIL PROTECTED] said: On Tue, 06 Jun 2006, David Härdeman wrote: E.g. for root-on-lvm-on-crypto-on-lvm-on-raid-on-two-hds rootdeps=/dev/hda,/dev/hdb,/dev/md0,/dev/mapper/basevg-baselv,/dev/mapper/cryptdevice,/dev/mapper/mainvg-rootlv nack, this adds extra complexity

Bug#318464: minor fix for /etc/resolvconf/update.d/dnscache

2006-06-07 Thread Daniel Kahn Gillmor
Package: resolvconf Version: 1.35 Followup-For: Bug #318464 Here's a minor update for the dnscache script. This change makes the script work whether daemontools was compiled with the djb filesystem layout (svc in /command ) or with the FHS layout (svc in /usr/bin). Sorry that i missed this on

Bug#318464: minor fix for /etc/resolvconf/update.d/dnscache

2006-06-08 Thread Daniel Kahn Gillmor
On June 8, [EMAIL PROTECTED] said: --- resolvconf-1.35/etc/resolvconf/update.d/dnscache 2006-03-08 12:03:13.0 -0500 +++ /etc/resolvconf/update.d/dnscache2006-06-08 01:06:20.0 -0400 @@ -94,8 +94,10 @@ for CACHE in $CACHES ; do cp $TMPFILE

Bug#372158: socat: please remove space from manpage description of -lf option

2006-06-08 Thread Daniel Kahn Gillmor
Package: socat Version: 1.4.3.1-1 Severity: minor Tags: patch socat(1) currently suggests a space between -lf and the file name to accept the log: -lf logfile Writes messages to logfile [filename] instead of stderr. However, this fails with an error message like:

Bug#318464: [Resolvconf-devel] Bug#318464: minor fix for /etc/resolvconf/update.d/dnscache

2006-06-09 Thread Daniel Kahn Gillmor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Thomas-- On June 9, [EMAIL PROTECTED] said: Hi and thanks for the tips. Please test the attached dnscache script. If you add /usr/bin to the path, the attached script works fine. Without that, it fails to restart the script (because which

Bug#372490: samba-common: typo in debian/smb.conf causes ugly warning in smbclient

2006-06-09 Thread Daniel Kahn Gillmor
Package: samba-common Version: 3.0.22-1 Severity: minor Tags: patch There's a typo (a leading + that probably didn't get properly stripped from a diff) in debian/smb.conf. On a fresh install of smbclient, it causes an error like the following: [0 [EMAIL PROTECTED] ~]$ smbclient -L serverx

Bug#370807: libpam-p11 spews odd error message about /var/run/pcscd.pub during authentication attempts

2006-06-14 Thread Daniel Kahn Gillmor
On June 15, [EMAIL PROTECTED] said: Interesting. Can you try installing pcscd and see if it changes the behavior at all. Yep. installing pcscd makes the error message go away. And removing it makes the message come back. However, libpam-p11 appears to work properly for me without the

Bug#371135: An alternate proposal

2006-06-17 Thread Daniel Kahn Gillmor
Thanks for the interesting discussion, all! Crypted swap with randomly-generated keys *is* useful. But it's also a fundamentally dangerous operation, and hard (if not impossible) to protect against user error in an automated way. Here's an alternate proposal: leave all of the initscripts as

Bug#377151: linux-2.6: please set CONFIG_SERIAL_8250_NR_UARTS higher than 4

2006-07-06 Thread Daniel Kahn Gillmor
Package: linux-2.6 Severity: wishlist As of kernel 2.6.16, debian (or upstream) seems to have adopted Dave Jones' patch [0] that allows one to configure the number of registered 8250 serial UARTS on a system. debian leaves the default CONFIG_SERIAL_8250_NR_UARTS at 4 and sets

Bug#377151: tested and confirmed

2006-07-09 Thread Daniel Kahn Gillmor
Hi good kernel team-- I finally got a chance to test this with a modified kernel against a machine with an extra 8-port serial card, and raising CONFIG_SERIAL_8250_NR_UARTS to 24 does the trick without causing a proliferation of devices for machines with a standard 2-4 serial devices. Please

Bug#369414: dspam: add-config-dir.dpatch passes args of wrong type, resulting in spurious compiler warnings

2006-05-29 Thread Daniel Kahn Gillmor
Package: dspam Version: 3.6.6-1 Severity: normal Tags: patch add-config-dir.dpatch passes several arguments around as config_t**, when it should probably be config_t*. since config_t itself is typedef'ed to attrib_t, the extra layer of dereferencing is one too many. i'm attaching a new version

Bug#369426: Please clean up minor warnings during dspam configuration and build

2006-05-29 Thread Daniel Kahn Gillmor
Package: dspam Version: 3.6.6-1 Severity: wishlist Tags: patch I find it useful to run gcc with -Werror to help catch problems in the code that i'm actively working on. However, because of the warnings that exist in current versions of dspam, i can't do a full debuild with -Werror turned on.

Bug#369421: dspam segfaults if DeliveryHost is unset

2006-05-29 Thread Daniel Kahn Gillmor
Package: dspam Version: 3.6.6-1 Severity: normal Tags: patch dspam will segfault if DeliveryHost is not set in the config file, and it wants to attempt delivery. While this would probably be a misconfiguration, dspam probably should fail more gracefully. i'm attaching a patch which seems to

Bug#369432: dspam: QuarantineMailbox option does not work properly if the user is domain-qualified

2006-05-29 Thread Daniel Kahn Gillmor
Package: dspam Version: 3.6.6-1 Severity: normal Tags: patch If you use dspam and your users are qualified by their domain (e.g. [EMAIL PROTECTED] instead of foo), then the QuarantineMailbox option will goofily append itself to the entire string, instead of to the username portion (e.g. [EMAIL

Bug#354218: build-depend on libmysqlclient15-dev | libmysqlclient14-dev to ease backporting to sarge?

2006-06-01 Thread Daniel Kahn Gillmor
if dspam build-depends on: libmysqlclient15-dev | libmysqlclient14-dev instead of just libmysqlclient15-dev it makes the source package easier to backport to sarge (which many mailservers are running, i think). This is just a suggestion for the near future, until etch becomes stable.

Bug#366931: confirming this report

2006-06-01 Thread Daniel Kahn Gillmor
I'm also seeing this behavior here. it was not a problem until the upgrade to 0.6.44 i can verify that the 0-byte Sources files are indeed present in older versions of apt. sarge's apt (0.5.28.6) creates them when pulling from a repository section with no packages in it. Thanks for looking

Bug#369862: dspam_admin's delete preference sub-command causes infinite loop

2006-06-01 Thread Daniel Kahn Gillmor
Package: dspam Version: 3.6.6-1 Severity: normal Tags: patch dspam_admin delete preference does not work. it sends dspam_admin into an infinite loop on any backend that uses flat files for storing preferences. i'm attaching a patch to fix the infinite loop in the various backends. Also, the

Bug#369886: dspam: Please allow alternate configuration files

2006-06-01 Thread Daniel Kahn Gillmor
Package: dspam Version: 3.6.6-1 Severity: wishlist Tags: patch dspam appears to actually be able to be much more than a spam filter. it can be a full-fledged classifier for arbitrary content. The way that the debian dspam package is installed is a pretty good strategy for using it as a spam

Bug#370180: cryptsetup: cryptroot initramfs hook script fails if root blockdevice has no options in /etc/crypttab

2006-06-03 Thread Daniel Kahn Gillmor
Package: cryptsetup Version: 2:1.0.3-1 Severity: normal Tags: patch On a system with a simple cryptoroot setup, the cryptroot initramfs hook script fails to generate a proper initramfs if no options are specified in /etc/crypttab for the root block device. For example, consider the following

Bug#370180: [Pkg-cryptsetup-devel] Bug#370180: cryptsetup: cryptroot initramfs hook script fails if root blockdevice has no options in /etc/crypttab

2006-06-05 Thread Daniel Kahn Gillmor
On June 4, [EMAIL PROTECTED] said: I've committed a fix to cryptsetup SVN. It will be included in the next upload. Great, thanks! i'm also attaching a patch for /usr/share/initramfs/scripts/local-top/cryptroot which should properly handle missing (i.e. default) arguments for a standard

Bug#370556: initramfs-tools: does not handle cryptroot-on-lvm properly

2006-06-05 Thread Daniel Kahn Gillmor
Package: initramfs-tools Version: 0.60 Severity: normal i have a system where the root block device is a LUKS device on top of a logical volume: [0 [EMAIL PROTECTED] ~]# lvs LV VG Attr LSize Origin Snap% Move Log Copy% rt squeak0 -wi-ao 500.00M

Bug#370556: initramfs-tools: does not handle cryptroot-on-lvm properly

2006-06-06 Thread Daniel Kahn Gillmor
(hi again, David!) On June 6, [EMAIL PROTECTED] said: On Mon, Jun 05, 2006 at 05:05:15PM -0400, Daniel Kahn Gillmor wrote: [0 [EMAIL PROTECTED] ~]# cat /proc/cmdline root=/dev/mapper/croot ro this is obviously wrong, current cryptsetup scripts expect the cryptoroot to be set

Bug#370807: libpam-p11 spews odd error message about /var/run/pcscd.pub during authentication attempts

2006-06-06 Thread Daniel Kahn Gillmor
Package: libpam-p11 Version: 0.1.2-2 Severity: minor i'm using libpam-p11 with the openct framework. when i try to log in at the console (via login), i get an odd error message (the line after the login: prompt shows up in red): Debian GNU/Linux testing/unstable squeak tty1 squeak login:

Bug#370813: bash: DEBUG trap munges job title to trap command string, rather than job command string

2006-06-06 Thread Daniel Kahn Gillmor
Package: bash Version: 3.1-4 Severity: normal i'm experimenting with the DEBUG trap. There has been a regression since sarge's bash version in how it interacts with bash's job list. It appears that in bash 3.1.14, bash overwrites each job's title string with the contents of the DEBUG trap

Bug#309464: This appears to be fixed.

2006-06-06 Thread Daniel Kahn Gillmor
This looks like it's fixed in etch already: [0 [EMAIL PROTECTED] ~]$ grep DEBUG /etc/bash_completion [ -n ${BASH_COMPLETION_DEBUG:-} ] set -v || set +v [0 [EMAIL PROTECTED] ~]$ dpkg -l bash Desired=Unknown/Install/Remove/Purge/Hold |

Bug#370826: getfacl segfaults when run on missing file

2006-06-06 Thread Daniel Kahn Gillmor
Package: acl Version: 2.2.37-1 Severity: normal Tags: patch when getfacl is run on a non-existant file, it segfaults because it passes a NULL string to ftw(). the attached patch fixes things for me. --dkg -- System Information: Debian Release: testing/unstable APT prefers testing

Bug#304764: this is currently documented in mount(8)

2006-06-06 Thread Daniel Kahn Gillmor
Actually, this *is* currently documented in mount(8) in etch (2.12r-8), though it is not in sarge (2.12p-4sarge1): [0 [EMAIL PROTECTED] ~]$ man 8 mount | grep -C1 -i acl Reformatting mount(8), please wait... acl / noacl Support POSIX Access Control Lists (or not). [0 [EMAIL

Bug#359315: subversion now Depends: on libsvn0 twice (with different version requirements)

2006-08-27 Thread Daniel Kahn Gillmor
i appreciate why this was fixed, but it seems like it's still a bit buggy because there are now two different dependencies on libsvn0 for subversion. From a mixed etch/sid system: [0 [EMAIL PROTECTED] ~]$ apt-cache show subversion | grep ^Depend Depends: libsvn0 (= 1.3.2-5+b1), libapr0 (=

Bug#383964: more information, please!

2006-08-27 Thread Daniel Kahn Gillmor
Can you give some documentation of this behavior? Steps to reproduce? What configuration are you running dspam in? is it an LMTP pass-through? Where are you placing the DSPAM signature? if the DSPAM signature is in the body, that would be a good reason to include an extra newline, yes? Does

Bug#384936: dspam LMTP does not obey line length restriction of 1000 chars

2006-08-27 Thread Daniel Kahn Gillmor
Package: dspam Version: 3.6.8-2 Severity: important dspam can violate the LMTP protocol on delivery by producing lines longer than 1000 characters. It can do this even if it is fed proper, LMTP-compliant data as input. I have a dspam setup listening on a unix socket via LMTP, and delivering

Bug#385353: in daemon mode, dspam occasionally crashes with 'Unable to determine the runtime user'

2006-08-30 Thread Daniel Kahn Gillmor
Package: dspam Version: 3.6.8-2 Severity: important Sorry to be reporting another problem without a fix yet: i have a system running dspam 3.6.8 in daemon mode, listening on a local UNIX socket via LMTP, feeding to clamav, and delivering to another UNIX socket via LMTP. It runs fine under

Bug#383964: Bug: dspam adds additional newline to message body when processed with LMTP

2006-09-01 Thread Daniel Kahn Gillmor
dspam appears to add a trailing newline to the message body as it passes through dspam's LMTP processing, regardless of the location of the dspam signature. It may also do this in non-LMTP cases, but i have not had a chance to test any other cases. I first saw this problem mentioned as debian

Bug#384936: Followup including workaround

2006-09-01 Thread Daniel Kahn Gillmor
It turns out that this behavior is only triggered when signatureLocation=message. You can see jonz's suggestion for a workaround here: http://thread.gmane.org/gmane.mail.spam.dspam.devel/2539/focus=2546 So it's possible to avoid this bug by setting signatureLocation=headers in

Bug#372207: FHS commentary on this bug

2006-09-04 Thread Daniel Kahn Gillmor
according to FHS 2.3 [0]: The contents of the root filesystem must be adequate to boot, restore, recover, and/or repair the system. if LVM is needed in the boot, /var is a separate partition, and LVM cannot operate without its cache, archives, and backups, it would seem that LVM must store

Bug#301557: This causes problems given that expect now refuses to trap SEGV

2006-07-24 Thread Daniel Kahn Gillmor
I'm just playing around with expect and dejagnu for the first time, so forgive me if i get this wrong. I'm running a mostly-etch system right now, trying to rebuild GNU mailutils, and make check chokes up seriously due to attempted SIGSEGV trapping. Applying Matthias Klose's patch lets me get on

Bug#301557: This appears to be resolved in 1.4.4.cvs20060709-2

2006-07-24 Thread Daniel Kahn Gillmor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 After much futzing around, i tried upgrading dejagnu to the latest version in sid (i'm running a mixed etch/sid system), and the problem appears to have been resolved with the upgrade. That is, dejagnu's runtest in the latest version appears to avoid

Bug#206572: clarification request

2006-07-26 Thread Daniel Kahn Gillmor
without specifying what chronological sort you are interested in, it's hard to know what you want. I can imagine several chronological orderings: sort by time of screen session invocation sort by last activity in any window of screen session sort by last activity in current window of screen

Bug#348657: cannot reproduce either.

2006-07-26 Thread Daniel Kahn Gillmor
I can't reproduce this either on a mixed etch/sid system, and the version of screen i'm invoking appears to have the same md5sum as your own. Perhaps it's your shell that's having trouble? [0 [EMAIL PROTECTED] tmp.uoBpY12621]$ cat .screenrc-debian shell -/bin/bash [0 [EMAIL PROTECTED]

Bug#380005: matrixssl: new upstream version 1.8.1 available

2006-07-26 Thread Daniel Kahn Gillmor
Package: matrixssl Severity: wishlist According to http://matrixssl.org/news.html, matrixssl 1.8.1 is available, apparently with the following SHA1 sum: SHA-1 (matrixssl-1-8-1-open.tar.gz) 8a493377a621bdc78fe74ccc3e2440b1de038beb Thanks for packaging this for debian. --dkg -- System

Bug#380022: confirming bug on sarge install

2006-07-27 Thread Daniel Kahn Gillmor
I'm seeing the same problem: upgrading to the security release 4.5.3-6.1sarge1 broke my drupal installation because of this missing semicolon. Here's the diff in unified-diff format: --- /usr/share/drupal/includes/file.inc~2006-07-17 09:43:29.0 -0400 +++

Bug#380119: resolvconf: patch to support dnscache instances managed by runit instead of by daemontools

2006-07-27 Thread Daniel Kahn Gillmor
Package: resolvconf Version: 1.35 Severity: wishlist Tags: patch Hello again-- the /etc/resolvconf/update.d/dnscache script currently finds and resets any forwarding dnscache instance managed by daemontools. Gerrit Pape's runit package is a service supervision suite that is a workalike

Bug#380119: [Resolvconf-devel] Bug#380119: resolvconf: patch to support dnscache instances managed by runit instead of by daemontools

2006-07-28 Thread Daniel Kahn Gillmor
are offered, we ask the dnscache instances to fall # back to the root nameservers listed in /etc/dnsroots.global # # Licensed under the GNU GPL. See /usr/share/doc/resolvconf/copyright. # # Written by Daniel Kahn Gillmor [EMAIL PROTECTED] # based on other scripts by Thomas Hood set -e PATH=/sbin

Bug#380119: [Resolvconf-devel] Bug#380119: resolvconf: patch to support dnscache instances managed by runit instead of by daemontools

2006-07-28 Thread Daniel Kahn Gillmor
nameservers listed in /etc/dnsroots.global # # Licensed under the GNU GPL. See /usr/share/doc/resolvconf/copyright. # # Written by Daniel Kahn Gillmor [EMAIL PROTECTED] # based on other scripts by Thomas Hood set -e PATH=/sbin:/bin:/usr/sbin:/usr/bin [ -x /usr/bin/dnscache ] || exit 0 [ -x /lib/resolvconf

Bug#381066: vm: please Recommend: or Suggest: stunnel

2006-08-01 Thread Daniel Kahn Gillmor
Package: vm Version: 7.19-9 Severity: wishlist Many modern mail systems use SSL or TLS. however, vm cannot connect via ssl without /usr/bin/stunnel being available. Therefore, i think vm should either Recommend: or Suggest: stunnel. Thanks for maintaining VM, --dkg -- System

Bug#359078: Bug report confirmation of dependency between kernel 2.6.16 and lvm 2.02

2006-08-01 Thread Daniel Kahn Gillmor
retitle 359078 linux kernel 2.6.16+ needs lvm 2.02 or it will hang on lvremove thanks I can confirm that this is an issue. I'm seeing it on a sarge machine running kernel 2.6.16-2-686 from backports.org, and a simple lvremove of a snapshot volume never returns... Meanwhile, load on the system

Bug#381253: [Pkg-dspam-misc] Bug#381253: dspam: Missing documentation: relay.txt

2006-08-03 Thread Daniel Kahn Gillmor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Micah-- On August 2, [EMAIL PROTECTED] said: However, there is no doc/relay.txt to be found (not in dspam-doc package either). Thanks for catching this. i've just committed a change to the pkg-dspam SVN to put this file into dspam-doc, so

Bug#381395: dspam fails to update header when classifying based on shared group

2006-08-03 Thread Daniel Kahn Gillmor
Package: dspam Severity: normal Tags: patch When dspam is configured with a global shared user in addition to individual dspam learners, it occasionally classifies the message one way but writes the headers the other. I brought this up on the dspam development list a while back in hopes of

Bug#381511: Please have spell support aspell as a backend in addition to ispell

2006-08-04 Thread Daniel Kahn Gillmor
Package: spell Severity: wishlist According to its description, aspell is a drop-in replacement for ispell. It would be good if spell could support aspell as a backend in addition to (or as a replacement for) ispell. This would change the dependencies for spell to ispell | aspell, which would

Bug#379156: mailutils' /usr/bin/mail segfaults when tab-completing after cd x

2006-07-21 Thread Daniel Kahn Gillmor
prompt, type cd x and hit tab. you will get a segmentation fault: [0 [EMAIL PROTECTED] tmp.UoUsZ25790]$ cat example EOF From - Fri Jul 21 09:35:47 2006 Subject: example simple mbox From: Daniel Kahn Gillmor [EMAIL PROTECTED] To: Daniel Kahn Gillmor [EMAIL PROTECTED] Date: Fri, 21 Jul 2006 14:40

Bug#308825: libnss-ldap and gdm trouble (and patch)

2006-03-16 Thread Daniel Kahn Gillmor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 hi there-- i've run into this problem (or something very similar) with the version of gdm in ubuntu 5.10 (gdm 2.8.0.5-0ubuntu1). my /etc/nsswitch.conf uses ldap compat, and i've removed nscd entirely. i'm not using LDAP for PAM at all (preferring

Bug#466552: binary djbdns package is now available in unstable

2008-02-28 Thread Daniel Kahn Gillmor
Gerrit Pape has packaged djbdns and daemontools, and they're now in unstable, as of 2008-02-27: http://packages.qa.debian.org/djbdns http://packages.qa.debian.org/daemontools Thanks, Gerrit! --dkg (Maybe #466552 can be closed now?) pgpMp7nHW4pvG.pgp Description: PGP signature

Bug#473609: reprepro: includedsc complains about missing section when it means missing priority

2008-03-31 Thread Daniel Kahn Gillmor
Package: reprepro Version: 3.3.2-1 Severity: normal -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 In trying to install a package in a self-maintained repository, i found that i needed to do an includedsc (why that is might be another bug, but i'll leave it alone for now). Here's me trying to do

Bug#473682: fakechroot fails to chroot /bin/rm from coreutils 6.10-3

2008-03-31 Thread Daniel Kahn Gillmor
Package: fakechroot Version: 2.6-1.3 Severity: important -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I made a simple fakechroot environment including only busybox and /bin/rm, using these versions: [0 [EMAIL PROTECTED] ~]$ dpkg -l busybox coreutils Desired=Unknown/Install/Remove/Purge/Hold |

Bug#473682: followup about the consequences of #473682

2008-03-31 Thread Daniel Kahn Gillmor
Just to follow up about this bug: I ran into this while trying to use fakechroot to do a debootstrap of a debian lenny system, which choked on the installation of the bash package with a message like this: Setting up bash (3.1dfsg-9) ... chmod: changing permissions of `/etc/shells.tmp': No such

Bug#473682: More details -- this appears to be due to the use of unlinkat() and fstatat64()

2008-03-31 Thread Daniel Kahn Gillmor
retitle 473682 fakechroot does not properly wrap *at syscalls (openat, unlinkat, fstatat, etc) tags 473682 +patch thanks I think i've narrowed down what's happening here. /bin/rm from coreutils 6.10 appears to use the new fstatat64() and unlinkat() system calls (they were added to the kernel in

Bug#473841: gpgkey2ssh: produces incorrect openssh-style public keys

2008-04-01 Thread Daniel Kahn Gillmor
Package: gnupg-agent Version: 2.0.9-1 Severity: normal -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 it's hard for me to tell if this is a bug or not, given the complete lack of documentation for the gpgkey2ssh utility (see #380241). But i'm pretty sure gpgkey2ssh is not supposed to be doing

Bug#473841: a patch for RSA ssh key output, and worse news for DSA keys

2008-04-01 Thread Daniel Kahn Gillmor
tags 473841 +patch thanks The following patch fixes the problem for RSA keys for me: --- gnupg2-2.0.9.orig/tools/gpgkey2ssh.c +++ gnupg2-2.0.9/tools/gpgkey2ssh.c @@ -272,7 +272,7 @@ { identifier = ssh-rsa; ret = key_to_blob (blob, blob_n, identifier, -

Bug#469221: any chance of an automated check and mention of the problem?

2008-04-03 Thread Daniel Kahn Gillmor
Hey good people-- I got bit by this bug, and fixed it with: aptitude install db4.6-util db4.5-util TMPDB=$(mktemp -d)/listchanges.db db4.6_dump /var/lib/apt/listchanges.db | db4.5_load $TMPDB ln /var/lib/apt/listchanges.db /var/lib/apt/listchanges.db.old mv $TMPDB

Bug#473841: resolution for DSA keys as well

2008-04-08 Thread Daniel Kahn Gillmor
forwarded 473841 https://bugs.g10code.com/gnupg/issue901 thanks The DSA key errors appear to be because gpgkey2ssh uses the wrong label for DSA keys. It should be using ssh-dss instead of ssh-dsa. The following patch fixes both types of key output for me. Regards, --dkg ---

Bug#475168: [Pkg-gnutls-maint] Bug#475168: certtool --generate-dh-params is ridiculously wasteful of entropy

2008-04-10 Thread Daniel Kahn Gillmor
I've packaged gnutls 2.3.4 (upstream's current development version) for my own testing, and i see the same behavior described in this ticket using 2.3.4 on a lenny/sid i386 system (see strace and package versions below). So the problem isn't unique to the version in lenny. I'm afraid I don't

Bug#475396: [Resolvconf-devel] Bug#475396: resolvconf: dnscache script fails to set forward only nameserver

2008-04-10 Thread Daniel Kahn Gillmor
tags 475396 +pending thanks On Thu 2008-04-10 09:49:16 -0400, Jamie McClelland wrote: Both fixes seem to be implemented in the svn repository: http://svn.debian.org/wsvn/resolvconf/resolvconf/trunk/etc/resolvconf/update.d/dnscache?op=diffrev=0sc=1 Thanks for the report. Since the fixes are

Bug#466579: runit: update-service can erroneously report will be started within the next 5 seconds

2008-02-19 Thread Daniel Kahn Gillmor
Package: runit Version: 1.8.0-2 Severity: minor In testing vblade-persist in preparation for a new release in response to #466376, i uncovered a potentially misleadeing message from update-service: If a service directory contains a file named down in it, the service will *not* be automatically

Bug#466771: busybox cpio: double free or corruption during cpio extraction of hardlinks

2008-02-20 Thread Daniel Kahn Gillmor
Package: busybox Version: 1:1.1.3-5 Severity: important -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 busybox cpio seems to corrupt its memory (maybe with a double free?) when extracting a hardlink. Here's a transcript of a simple case to trigger the failure: 0 [EMAIL PROTECTED]:/tmp$ mkdir tt

Bug#310146: making djbdns depend on runit instead of daemontools

2008-02-20 Thread Daniel Kahn Gillmor
I like using djbdns with runit instead of daemontools as well. The technique i've been using is to build a shim package that Depends: runit, Provides: daemontools, and includes a set of symlinks and wrapper scripts to emulate most of the missing pieces of daemontools interface. This is

Bug#465504: ascii dump only visible when terminal is wide enough to see it

2008-03-16 Thread Daniel Kahn Gillmor
retitle 465504 ASCII dump is only visible when terminal is wide enough to see it severity 465504 minor thanks Thanks for the report, A. Costa-- I can reproduce the behavior that you describe, but i think i'd describe it differently. It seems to me that what's happening is that the ASCII dump

Bug#466771: version 1.9.2 does unpack hardlinks, but not for empty files

2008-03-25 Thread Daniel Kahn Gillmor
retitle 466771 busybox cpio: does not unpack hardlinks to empty files thanks Testing this out with the new busybox-static 1.9.2-1 from unstable, it appears that most hardlinks *are* actually unpacked, with the exception of zero-byte files that are linked to more than once. [0 [EMAIL PROTECTED]

Bug#42158: test case showing data loss

2008-03-25 Thread Daniel Kahn Gillmor
severity 42158 grave retitle 42158 pax: hard linked files from cpio archives restored with zero size (can cause data loss) thanks Hi there-- Feels weird touching on an 8-year-old bug, but i've stumbled into a simple use case for #42158 which i found while reviewing #466771. I'm upgrading the

Bug#473019: debian-policy: clarification needed for local builtin exception for /bin/sh

2008-03-27 Thread Daniel Kahn Gillmor
Package: debian-policy Version: 3.7.3.0 Severity: normal Tags: patch The scripts section of chapter 10 is somewhat ambiguous about whether declaring multiple local variables is acceptable or not: file:///usr/share/doc/debian-policy/policy.html/ch-files.html#s-scripts For example, is the

Bug#473019: debian-policy: clarification needed for local builtin exception for /bin/sh

2008-03-27 Thread Daniel Kahn Gillmor
Thanks for the quick response, Russ. On Thu 2008-03-27 16:16:31 -0400, Russ Allbery wrote: The intention when I originally wrote the text was to not allow declaring multiple variables with one local line, since at the time I was told that some shells didn't support this. I think your first

Bug#395392: libpg-perl: Synopsis in perl documentation is flawed

2006-10-26 Thread Daniel Kahn Gillmor
Package: libpg-perl Version: 1:2.1.1-2 Severity: minor Tags: patch The synopsis from perldoc Pg doesn't work properly, because print should not be assigned to. Removing the assignment operator (=) makes it functional but ugly, as it prints the information without newlines between the rows. The

Bug#514386: proposing adopting the firegpg package (maybe going through NEW again)

2009-04-22 Thread Daniel Kahn Gillmor
this is just a note that i've mailed Joao roughly about this issue weekly for the last six weeks (since March 8) and haven't gotten a response. since firegpg is no longer in debian, i'm planning on filing an ITP to effectively take over the package (and push it through NEW again) sometime in the

Bug#525680: [Resolvconf-devel] Bug#525680: init.d status support

2009-04-26 Thread Daniel Kahn Gillmor
tags 525680 +pending thanks On 04/26/2009 11:10 AM, Peter Eisentraut wrote: Here is a patch to support the status action in the init script. Thanks, Peter. This is applied, and should be part of 1.44, when that version is released. For future reference, LSB 3.0.0 mandates the status action

Bug#525681: [Resolvconf-devel] Bug#525681: typo in init script

2009-04-26 Thread Daniel Kahn Gillmor
tags 525681 +pending thanks On 04/26/2009 11:12 AM, Peter Eisentraut wrote: In the init script under restart, enable_updates || log_action_end_msg_and_exit 1 could not enabling updates should be changed to enable_updates || log_action_end_msg_and_exit 1 could not enable updates

Bug#524760: confirmation of #524760

2009-04-28 Thread Daniel Kahn Gillmor
I'm seeing the same behavior reported in #524760: i need to explicitly add nfsvers=2 to my mount options from a sid client running nfs-common 1:1.1.6-1 to a server running lenny's nfs-user-server 2.2beta47-25. otherwise, the mount fails with this message (and with return code 32: 0 clam:/etc#

Bug#547525: FTBFS on armel: 'OV_CALLBACKS_STREAMONLY' undeclared

2009-09-22 Thread Daniel Kahn Gillmor
On 09/20/2009 07:13 PM, Joey Hess wrote: ARM hardware certianly has floating point hardware, and with EABI binaries can be built that use it on the otherwise softfloat system. But different ARM systems have different FPUs, and so it would be very hard to get coverage for all/most of them.

Bug#547466: confirmed too-narrow ruler

2009-09-23 Thread Daniel Kahn Gillmor
i'm also seeing the concern raised by dylan thurston in debian bug #547466 -- the ruler along the left-hand edge of inkscape's main window is extremely skinny when visible (note: i'd call this the vertical ruler, not the horizontal ruler, as dylan does, but i understand the reasoning for calling

Bug#548815: ivorbisfile_example.c triggers alignment error on armel

2009-09-28 Thread Daniel Kahn Gillmor
Package: libvorbisidec-dev On armel, when i build ivorbisfile_example.c against the stock libvorbisidec package, it triggers a series of CPU alignment faults, and consequently produces bad data. Interestingly, this seems to be because gcc is happy to align an array of chars on an odd address

Bug#548842: libc6: alignment error in /lib/ld-linux.so.3 on armel

2009-09-28 Thread Daniel Kahn Gillmor
Package: libc6 Version: 2.9-25 Severity: normal I'm running alsaplayer on an armel platform, using the -text frontend and the -alsa output. I've configured my armel machine to send a SIGBUS to any process which makes an alignment error by doing this: echo 5 /proc/cpu/alignment when i launch

Bug#548842: libc6: alignment error in /lib/ld-linux.so.3 on armel

2009-09-30 Thread Daniel Kahn Gillmor
found 548842 2.10.1-0exp1 thanks On 09/28/2009 11:34 PM, Daniel Kahn Gillmor wrote: Version: 2.9-25 I tried upgrading libc6 on the machine that was experiencing this, and it didn't improve. I'm still seeing the alignment error during the dynamic linking step when i launch alsaplayer using

Bug#413954: incompatibilities between graphicsmagick-imagemagick-compat and imagemagick

2009-10-02 Thread Daniel Kahn Gillmor
A few more things that are missing (i just ran into this while trying to convert some private scripts from imagemagick to graphicsmagick-imagemagick-compat: graphicsmagick-imagemagick-compat does not know about the Alpha channel -- it knows about Opacity, but the convert wrapper apparently isn't

Bug#605710: ncmpc incorrectly reports connection when relying on $MPD_HOST environment variable

2010-12-02 Thread Daniel Kahn Gillmor
Package: ncmpc Version: 0.17-1 Severity: minor My mpd daemon is running on a machine named igor. If i do: ncmpc --host igor then the status line of ncmpc says (for the first second or two): Connected to igor But if i do: MPD_HOST=igor ncmpc then the status line of ncmpc says (for the

Bug#605901: ~/.infinote-records

2010-12-04 Thread Daniel Kahn Gillmor
tags 605901 +security thanks the fact that gobby stores logs in ~/.infinote-records is also problematic from a security perspective, because most users' default umask is 022, and the library apparently makes no attempt to make the logs themselves more hidden. So the default mode is to leak

Bug#605949: arora: going Back doesn't update URL in address bar

2010-12-04 Thread Daniel Kahn Gillmor
Package: arora Version: 0.10.2-1 Severity: normal In arora, going Back doesn't seem update the URL in the address bar. Steps to reproduce: 0) go to a web page that has an outbound link (e.g. http://google.com/) 1) click on a link in that page (e.g. follow the Privacy link to

Bug#606058: libio-socket-ssl-perl: IO::Socket::SSL ignores user request for peer verification

2010-12-05 Thread Daniel Kahn Gillmor
Package: libio-socket-ssl-perl Version: 1.34-1 Severity: normal Tags: patch , security Using IO::Socket::SSL, if i set verify_mode to 0x03 (verify peer, fail verification if no peer certificate exists), these requests are removed unless i also supply either ca_file or ca_path. This is

Bug#606058: [rt.cpan.org #63637] Re: IO::Socket::SSL ignores user request for peer verification

2010-12-05 Thread Daniel Kahn Gillmor
Thanks for forwarding this, Salvatore-- On 12/06/2010 01:55 AM, Salvatore Bonaccorso wrote: Of the two patches, i prefer no-default-ca-certs.patch. The documentation makes references to ca/ and certs/my-ca.pem -- if these are actually used by the tool, then no-default-ca-certs.patch is

Bug#606224: oggvideotools: oggJoin fails on powerpc

2010-12-07 Thread Daniel Kahn Gillmor
Package: oggvideotools Version: 0.8-1+b1 Severity: normal on a powerpc machine, oggJoin can't seem to properly detect ogg audio files: consoleu...@bigpuff:~$ oggSlideshow /usr/share/pixmaps/debian-logo.png creating video stream for picture /usr/share/pixmaps/debian-logo.png 8.08

Bug#606225: oggvideotools: english man page for oggThumb(1) misspells the word commas as komas

2010-12-07 Thread Daniel Kahn Gillmor
Package: oggvideotools Version: 0.8-1+b1 Severity: minor oggThumb(1) contains several instances of the word komas. From the context, i think the intended word is commas. Regards, --dkg -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (500,

Bug#606243: libio-socket-ssl-perl: IO::Socket::SSL fails when verify_callback is supplied without ca_path or ca_file

2010-12-07 Thread Daniel Kahn Gillmor
Package: libio-socket-ssl-perl Version: 1.35-1 Severity: normal Tags: patch if i supply a verify_callback to IO::Socket::SSL, but fail to supply ca_file or ca_path (and the default ca_file and ca_path locations are not populated), initialization fails. This is silly because i'm using my own

Bug#606248: libio-socket-ssl-perl: documentation of verify_callback argument needs update

2010-12-07 Thread Daniel Kahn Gillmor
Package: libio-socket-ssl-perl Version: 1.35-1 Severity: normal Tags: patch The documentation of the SSL_verify_callback for IO::Socket::SSL seems to have drifted from its current implementation, and is difficult to read. The attached patch fixes both problems. Regards, --dkg -- System

Bug#606249: libio-socket-ssl-perl: verify_callback invoked 3 times per connection

2010-12-07 Thread Daniel Kahn Gillmor
Package: libio-socket-ssl-perl Version: 1.35-1 Severity: normal If i supply a verify_callback, i find it gets invoked three times for a single connection, if the callback is approved each time (if the callback ever fails, it looks like it shortcuts the repeated verify attempts). This is

Bug#606269: mailman: Mailman should allow users to set the secure flag on cookies

2010-12-07 Thread Daniel Kahn Gillmor
Package: mailman Severity: normal Tags: patch Mailman offers a web interface that relies heavily on cookies. If the web interface is used via https, those cookies should have the secure flag set. Attached is a patch which allows system administrators to indicate manually whether they would like

Bug#606243: [rt.cpan.org #63741] Re: Bug#606243: IO::Socket::SSL fails when verify_callback is supplied without ca_path or ca_file

2010-12-08 Thread Daniel Kahn Gillmor
On 12/08/2010 04:24 PM, Salvatore Bonaccorso wrote: - Forwarded message from Steffen Ullrich via RT bug-io-socket-...@rt.cpan.org - it's not that simple: - usually SSL_verify_callback is used together with a valid CA file or CA path, because one wants to let openssl pre-check the

Bug#606925: netcat-openbsd: -q flag behavior seems inverted from netcat-traditional

2010-12-12 Thread Daniel Kahn Gillmor
Package: netcat-openbsd Version: 1.89-4 Severity: normal It seems that the behavior of the -q flag for netcat-openbsd is the exact opposite of the behavior for the same flag in netcat-traditional, despite the documentation being the same. Here's the documentation: 0 d...@pip:~$ man

Bug#606934: ssh-askpass gets hidden behind windows with _NET_WM_STATE(ATOM) _NET_WM_STATE_ABOVE set

2010-12-12 Thread Daniel Kahn Gillmor
Package: ssh-askpass Version: 1:1.2.4.1-9 Severity: normal Using openbox, i sometimes mark a window always on top with the window context menu. According to xprop, this apparently adds the _NET_WM_STATE_ABOVE flag to the _NET_WM_STATE(ATOM) list. I believe the same thing is done by lxterm

Bug#608719: dovecot-common: please do not use /etc/ssl/certs for end-entity X.509 certificates (/etc/ssl/certs/dovecot.pem)

2011-01-02 Thread Daniel Kahn Gillmor
Package: dovecot-common Version: 1:1.2.15-3 Severity: normal It looks like dovecot-common's postinst script creates a new X.509 certificate and places it in /etc/ssl/certs/dovecot.pem. This certificate is for use as the IMAP or POP server's end entity certificate. However, /etc/ssl/certs/ is

Bug#608846: xserver-xorg-video-nouveau: bad graphics on GeForce2 MX/MX 400 on powerpc (falls back to fbdev)

2011-01-03 Thread Daniel Kahn Gillmor
Package: xserver-xorg-video-nouveau Version: 1:0.0.15+git20100329+7858345-5 Severity: normal if i boot with no xorg.conf on a brand new squeeze install (on powerpc, with a GeForce2 MX/MX 400 (rev b2)) then i get a 1024x768, 8bpp display because X seems to have fallen back to the fbdev driver.

Bug#608846: xserver-xorg-video-nouveau: bad graphics on GeForce2 MX/MX 400 on powerpc (falls back to fbdev)

2011-01-04 Thread Daniel Kahn Gillmor
On 01/04/2011 03:05 AM, Sven Joachim wrote: On 2011-01-04 00:50 +0100, Daniel Kahn Gillmor wrote: I also tried (using no xorg.conf) with linux-image-2.6.37-rc7-powerpc as the kernel, and with the xorg and drm components from experimental (including building xserver-xorg-video-nouveau from

<    1   2   3   4   5   6   7   8   9   10   >