Hi Andreas--
On June 25, [EMAIL PROTECTED] said:
if you use openct, i.e. don't need pcsc, you can
a) uninstall pcscd
b) edit opensc.conf, change
# reader_drivers = openct, pcsc, ctapi;
to
reader_drivers= openct;
and that message will be gone.
That did the trick for
On June 6, [EMAIL PROTECTED] said:
I guess this isn't very clear, but if you have an encrypted root
partition on top of lvm/evms/md, you have to point the root
variable to the underlying lvm/evms/md partition (this is a
limitation of how the current initramfs system works).
Isn't there a
Package: sparsehash
Severity: wishlist
According to
http://sourceforge.net/project/shownotes.php?release_id=415850group_id=133364
there is a new upstream version (v0.4) of google's sparsehash
available, as of 2006-04-23.
Thanks,
--dkg
-- System Information:
Debian Release:
On June 7, [EMAIL PROTECTED] said:
On Tue, 06 Jun 2006, David Härdeman wrote:
E.g. for root-on-lvm-on-crypto-on-lvm-on-raid-on-two-hds
rootdeps=/dev/hda,/dev/hdb,/dev/md0,/dev/mapper/basevg-baselv,/dev/mapper/cryptdevice,/dev/mapper/mainvg-rootlv
nack, this adds extra complexity
Package: resolvconf
Version: 1.35
Followup-For: Bug #318464
Here's a minor update for the dnscache script. This change makes the
script work whether daemontools was compiled with the djb filesystem
layout (svc in /command ) or with the FHS layout (svc in /usr/bin).
Sorry that i missed this on
On June 8, [EMAIL PROTECTED] said:
--- resolvconf-1.35/etc/resolvconf/update.d/dnscache 2006-03-08
12:03:13.0 -0500
+++ /etc/resolvconf/update.d/dnscache2006-06-08 01:06:20.0
-0400
@@ -94,8 +94,10 @@
for CACHE in $CACHES ; do
cp $TMPFILE
Package: socat
Version: 1.4.3.1-1
Severity: minor
Tags: patch
socat(1) currently suggests a space between -lf and the file name to
accept the log:
-lf logfile
Writes messages to logfile [filename] instead of stderr.
However, this fails with an error message like:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi Thomas--
On June 9, [EMAIL PROTECTED] said:
Hi and thanks for the tips. Please test the attached dnscache
script.
If you add /usr/bin to the path, the attached script works fine.
Without that, it fails to restart the script (because which
Package: samba-common
Version: 3.0.22-1
Severity: minor
Tags: patch
There's a typo (a leading + that probably didn't get properly stripped
from a diff) in debian/smb.conf. On a fresh install of smbclient, it
causes an error like the following:
[0 [EMAIL PROTECTED] ~]$ smbclient -L serverx
On June 15, [EMAIL PROTECTED] said:
Interesting. Can you try installing pcscd and see if it changes the
behavior at all.
Yep. installing pcscd makes the error message go away. And removing
it makes the message come back. However, libpam-p11 appears to work
properly for me without the
Thanks for the interesting discussion, all! Crypted swap with
randomly-generated keys *is* useful. But it's also a fundamentally
dangerous operation, and hard (if not impossible) to protect against
user error in an automated way.
Here's an alternate proposal: leave all of the initscripts as
Package: linux-2.6
Severity: wishlist
As of kernel 2.6.16, debian (or upstream) seems to have adopted Dave
Jones' patch [0] that allows one to configure the number of registered
8250 serial UARTS on a system.
debian leaves the default CONFIG_SERIAL_8250_NR_UARTS at 4 and sets
Hi good kernel team--
I finally got a chance to test this with a modified kernel against a
machine with an extra 8-port serial card, and raising
CONFIG_SERIAL_8250_NR_UARTS to 24 does the trick without causing a
proliferation of devices for machines with a standard 2-4 serial
devices. Please
Package: dspam
Version: 3.6.6-1
Severity: normal
Tags: patch
add-config-dir.dpatch passes several arguments around as config_t**,
when it should probably be config_t*.
since config_t itself is typedef'ed to attrib_t, the extra layer of
dereferencing is one too many.
i'm attaching a new version
Package: dspam
Version: 3.6.6-1
Severity: wishlist
Tags: patch
I find it useful to run gcc with -Werror to help catch problems in the
code that i'm actively working on.
However, because of the warnings that exist in current versions of dspam, i
can't do a full debuild with -Werror turned on.
Package: dspam
Version: 3.6.6-1
Severity: normal
Tags: patch
dspam will segfault if DeliveryHost is not set in the config file, and
it wants to attempt delivery. While this would probably be a
misconfiguration, dspam probably should fail more gracefully.
i'm attaching a patch which seems to
Package: dspam
Version: 3.6.6-1
Severity: normal
Tags: patch
If you use dspam and your users are qualified by their domain
(e.g. [EMAIL PROTECTED] instead of foo), then the QuarantineMailbox
option will goofily append itself to the entire string, instead of to
the username portion (e.g. [EMAIL
if dspam build-depends on:
libmysqlclient15-dev | libmysqlclient14-dev
instead of just
libmysqlclient15-dev
it makes the source package easier to backport to sarge (which many
mailservers are running, i think).
This is just a suggestion for the near future, until etch becomes
stable.
I'm also seeing this behavior here. it was not a problem until the
upgrade to 0.6.44
i can verify that the 0-byte Sources files are indeed present in older
versions of apt.
sarge's apt (0.5.28.6) creates them when pulling from a repository
section with no packages in it.
Thanks for looking
Package: dspam
Version: 3.6.6-1
Severity: normal
Tags: patch
dspam_admin delete preference does not work. it sends dspam_admin
into an infinite loop on any backend that uses flat files for storing
preferences.
i'm attaching a patch to fix the infinite loop in the various
backends.
Also, the
Package: dspam
Version: 3.6.6-1
Severity: wishlist
Tags: patch
dspam appears to actually be able to be much more than a spam filter.
it can be a full-fledged classifier for arbitrary content.
The way that the debian dspam package is installed is a pretty good
strategy for using it as a spam
Package: cryptsetup
Version: 2:1.0.3-1
Severity: normal
Tags: patch
On a system with a simple cryptoroot setup, the cryptroot initramfs
hook script fails to generate a proper initramfs if no options are
specified in /etc/crypttab for the root block device.
For example, consider the following
On June 4, [EMAIL PROTECTED] said:
I've committed a fix to cryptsetup SVN. It will be included in the next
upload.
Great, thanks!
i'm also attaching a patch for
/usr/share/initramfs/scripts/local-top/cryptroot which should properly
handle missing (i.e. default) arguments for a standard
Package: initramfs-tools
Version: 0.60
Severity: normal
i have a system where the root block device is a LUKS device on top of
a logical volume:
[0 [EMAIL PROTECTED] ~]# lvs
LV VG Attr LSize Origin Snap% Move Log Copy%
rt squeak0 -wi-ao 500.00M
(hi again, David!)
On June 6, [EMAIL PROTECTED] said:
On Mon, Jun 05, 2006 at 05:05:15PM -0400, Daniel Kahn Gillmor wrote:
[0 [EMAIL PROTECTED] ~]# cat /proc/cmdline
root=/dev/mapper/croot ro
this is obviously wrong,
current cryptsetup scripts expect the cryptoroot to be set
Package: libpam-p11
Version: 0.1.2-2
Severity: minor
i'm using libpam-p11 with the openct framework. when i try to log in
at the console (via login), i get an odd error message (the line after
the login: prompt shows up in red):
Debian GNU/Linux testing/unstable squeak tty1
squeak login:
Package: bash
Version: 3.1-4
Severity: normal
i'm experimenting with the DEBUG trap. There has been a regression
since sarge's bash version in how it interacts with bash's job list.
It appears that in bash 3.1.14, bash overwrites each job's title
string with the contents of the DEBUG trap
This looks like it's fixed in etch already:
[0 [EMAIL PROTECTED] ~]$ grep DEBUG /etc/bash_completion
[ -n ${BASH_COMPLETION_DEBUG:-} ] set -v || set +v
[0 [EMAIL PROTECTED] ~]$ dpkg -l bash
Desired=Unknown/Install/Remove/Purge/Hold
|
Package: acl
Version: 2.2.37-1
Severity: normal
Tags: patch
when getfacl is run on a non-existant file, it segfaults because it
passes a NULL string to ftw().
the attached patch fixes things for me.
--dkg
-- System Information:
Debian Release: testing/unstable
APT prefers testing
Actually, this *is* currently documented in mount(8) in etch
(2.12r-8), though it is not in sarge (2.12p-4sarge1):
[0 [EMAIL PROTECTED] ~]$ man 8 mount | grep -C1 -i acl
Reformatting mount(8), please wait...
acl / noacl
Support POSIX Access Control Lists (or not).
[0 [EMAIL
i appreciate why this was fixed, but it seems like it's still a bit
buggy because there are now two different dependencies on libsvn0 for
subversion. From a mixed etch/sid system:
[0 [EMAIL PROTECTED] ~]$ apt-cache show subversion | grep ^Depend
Depends: libsvn0 (= 1.3.2-5+b1), libapr0 (=
Can you give some documentation of this behavior? Steps to reproduce?
What configuration are you running dspam in? is it an LMTP
pass-through? Where are you placing the DSPAM signature? if the
DSPAM signature is in the body, that would be a good reason to include
an extra newline, yes?
Does
Package: dspam
Version: 3.6.8-2
Severity: important
dspam can violate the LMTP protocol on delivery by producing lines
longer than 1000 characters. It can do this even if it is fed proper,
LMTP-compliant data as input.
I have a dspam setup listening on a unix socket via LMTP, and
delivering
Package: dspam
Version: 3.6.8-2
Severity: important
Sorry to be reporting another problem without a fix yet:
i have a system running dspam 3.6.8 in daemon mode, listening on a
local UNIX socket via LMTP, feeding to clamav, and delivering to
another UNIX socket via LMTP.
It runs fine under
dspam appears to add a trailing newline to the message body as it
passes through dspam's LMTP processing, regardless of the location of
the dspam signature.
It may also do this in non-LMTP cases, but i have not had a chance to
test any other cases.
I first saw this problem mentioned as debian
It turns out that this behavior is only triggered when
signatureLocation=message. You can see jonz's suggestion for a
workaround here:
http://thread.gmane.org/gmane.mail.spam.dspam.devel/2539/focus=2546
So it's possible to avoid this bug by setting
signatureLocation=headers in
according to FHS 2.3 [0]:
The contents of the root filesystem must be adequate to boot,
restore, recover, and/or repair the system.
if LVM is needed in the boot, /var is a separate partition, and LVM
cannot operate without its cache, archives, and backups, it would seem
that LVM must store
I'm just playing around with expect and dejagnu for the first time, so
forgive me if i get this wrong. I'm running a mostly-etch system
right now, trying to rebuild GNU mailutils, and make check chokes up
seriously due to attempted SIGSEGV trapping. Applying Matthias
Klose's patch lets me get on
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
After much futzing around, i tried upgrading dejagnu to the latest
version in sid (i'm running a mixed etch/sid system), and the problem
appears to have been resolved with the upgrade.
That is, dejagnu's runtest in the latest version appears to avoid
without specifying what chronological sort you are interested in, it's
hard to know what you want. I can imagine several chronological
orderings:
sort by time of screen session invocation
sort by last activity in any window of screen session
sort by last activity in current window of screen
I can't reproduce this either on a mixed etch/sid system, and the
version of screen i'm invoking appears to have the same md5sum as your
own. Perhaps it's your shell that's having trouble?
[0 [EMAIL PROTECTED] tmp.uoBpY12621]$ cat .screenrc-debian
shell -/bin/bash
[0 [EMAIL PROTECTED]
Package: matrixssl
Severity: wishlist
According to http://matrixssl.org/news.html, matrixssl 1.8.1 is
available, apparently with the following SHA1 sum:
SHA-1 (matrixssl-1-8-1-open.tar.gz) 8a493377a621bdc78fe74ccc3e2440b1de038beb
Thanks for packaging this for debian.
--dkg
-- System
I'm seeing the same problem: upgrading to the security release
4.5.3-6.1sarge1 broke my drupal installation because of this missing
semicolon.
Here's the diff in unified-diff format:
--- /usr/share/drupal/includes/file.inc~2006-07-17 09:43:29.0
-0400
+++
Package: resolvconf
Version: 1.35
Severity: wishlist
Tags: patch
Hello again--
the /etc/resolvconf/update.d/dnscache script currently finds and
resets any forwarding dnscache instance managed by daemontools.
Gerrit Pape's runit package is a service supervision suite that is a
workalike
are offered, we ask the dnscache instances to fall
# back to the root nameservers listed in /etc/dnsroots.global
#
# Licensed under the GNU GPL. See /usr/share/doc/resolvconf/copyright.
#
# Written by Daniel Kahn Gillmor [EMAIL PROTECTED]
# based on other scripts by Thomas Hood
set -e
PATH=/sbin
nameservers listed in /etc/dnsroots.global
#
# Licensed under the GNU GPL. See /usr/share/doc/resolvconf/copyright.
#
# Written by Daniel Kahn Gillmor [EMAIL PROTECTED]
# based on other scripts by Thomas Hood
set -e
PATH=/sbin:/bin:/usr/sbin:/usr/bin
[ -x /usr/bin/dnscache ] || exit 0
[ -x /lib/resolvconf
Package: vm
Version: 7.19-9
Severity: wishlist
Many modern mail systems use SSL or TLS. however, vm cannot connect
via ssl without /usr/bin/stunnel being available. Therefore, i think
vm should either Recommend: or Suggest: stunnel.
Thanks for maintaining VM,
--dkg
-- System
retitle 359078 linux kernel 2.6.16+ needs lvm 2.02 or it will hang on lvremove
thanks
I can confirm that this is an issue. I'm seeing it on a sarge machine
running kernel 2.6.16-2-686 from backports.org, and a simple lvremove
of a snapshot volume never returns...
Meanwhile, load on the system
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi Micah--
On August 2, [EMAIL PROTECTED] said:
However, there is no doc/relay.txt to be found (not in dspam-doc
package either).
Thanks for catching this. i've just committed a change to the
pkg-dspam SVN to put this file into dspam-doc, so
Package: dspam
Severity: normal
Tags: patch
When dspam is configured with a global shared user in addition to
individual dspam learners, it occasionally classifies the message one
way but writes the headers the other.
I brought this up on the dspam development list a while back in hopes
of
Package: spell
Severity: wishlist
According to its description, aspell is a drop-in replacement for
ispell. It would be good if spell could support aspell as a backend
in addition to (or as a replacement for) ispell. This would change
the dependencies for spell to ispell | aspell, which would
prompt, type cd x and hit tab. you will get a
segmentation fault:
[0 [EMAIL PROTECTED] tmp.UoUsZ25790]$ cat example EOF
From - Fri Jul 21 09:35:47 2006
Subject: example simple mbox
From: Daniel Kahn Gillmor [EMAIL PROTECTED]
To: Daniel Kahn Gillmor [EMAIL PROTECTED]
Date: Fri, 21 Jul 2006 14:40
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
hi there--
i've run into this problem (or something very similar) with the
version of gdm in ubuntu 5.10 (gdm 2.8.0.5-0ubuntu1). my
/etc/nsswitch.conf uses ldap compat, and i've removed nscd entirely.
i'm not using LDAP for PAM at all (preferring
Gerrit Pape has packaged djbdns and daemontools, and they're now in
unstable, as of 2008-02-27:
http://packages.qa.debian.org/djbdns
http://packages.qa.debian.org/daemontools
Thanks, Gerrit!
--dkg
(Maybe #466552 can be closed now?)
pgpMp7nHW4pvG.pgp
Description: PGP signature
Package: reprepro
Version: 3.3.2-1
Severity: normal
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
In trying to install a package in a self-maintained repository, i
found that i needed to do an includedsc (why that is might be another
bug, but i'll leave it alone for now).
Here's me trying to do
Package: fakechroot
Version: 2.6-1.3
Severity: important
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I made a simple fakechroot environment including only busybox and
/bin/rm, using these versions:
[0 [EMAIL PROTECTED] ~]$ dpkg -l busybox coreutils
Desired=Unknown/Install/Remove/Purge/Hold
|
Just to follow up about this bug:
I ran into this while trying to use fakechroot to do a debootstrap of
a debian lenny system, which choked on the installation of the bash
package with a message like this:
Setting up bash (3.1dfsg-9) ...
chmod: changing permissions of `/etc/shells.tmp': No such
retitle 473682 fakechroot does not properly wrap *at syscalls (openat,
unlinkat, fstatat, etc)
tags 473682 +patch
thanks
I think i've narrowed down what's happening here.
/bin/rm from coreutils 6.10 appears to use the new fstatat64() and
unlinkat() system calls (they were added to the kernel in
Package: gnupg-agent
Version: 2.0.9-1
Severity: normal
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
it's hard for me to tell if this is a bug or not, given the complete
lack of documentation for the gpgkey2ssh utility (see #380241). But
i'm pretty sure gpgkey2ssh is not supposed to be doing
tags 473841 +patch
thanks
The following patch fixes the problem for RSA keys for me:
--- gnupg2-2.0.9.orig/tools/gpgkey2ssh.c
+++ gnupg2-2.0.9/tools/gpgkey2ssh.c
@@ -272,7 +272,7 @@
{
identifier = ssh-rsa;
ret = key_to_blob (blob, blob_n, identifier,
-
Hey good people--
I got bit by this bug, and fixed it with:
aptitude install db4.6-util db4.5-util
TMPDB=$(mktemp -d)/listchanges.db
db4.6_dump /var/lib/apt/listchanges.db | db4.5_load $TMPDB
ln /var/lib/apt/listchanges.db /var/lib/apt/listchanges.db.old
mv $TMPDB
forwarded 473841 https://bugs.g10code.com/gnupg/issue901
thanks
The DSA key errors appear to be because gpgkey2ssh uses the wrong
label for DSA keys. It should be using ssh-dss instead of
ssh-dsa. The following patch fixes both types of key output for me.
Regards,
--dkg
---
I've packaged gnutls 2.3.4 (upstream's current development version)
for my own testing, and i see the same behavior described in this
ticket using 2.3.4 on a lenny/sid i386 system (see strace and package
versions below). So the problem isn't unique to the version in lenny.
I'm afraid I don't
tags 475396 +pending
thanks
On Thu 2008-04-10 09:49:16 -0400, Jamie McClelland wrote:
Both fixes seem to be implemented in the svn repository:
http://svn.debian.org/wsvn/resolvconf/resolvconf/trunk/etc/resolvconf/update.d/dnscache?op=diffrev=0sc=1
Thanks for the report. Since the fixes are
Package: runit
Version: 1.8.0-2
Severity: minor
In testing vblade-persist in preparation for a new release in response
to #466376, i uncovered a potentially misleadeing message from
update-service:
If a service directory contains a file named down in it, the service
will *not* be automatically
Package: busybox
Version: 1:1.1.3-5
Severity: important
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
busybox cpio seems to corrupt its memory (maybe with a double free?)
when extracting a hardlink.
Here's a transcript of a simple case to trigger the failure:
0 [EMAIL PROTECTED]:/tmp$ mkdir tt
I like using djbdns with runit instead of daemontools as well.
The technique i've been using is to build a shim package that
Depends: runit, Provides: daemontools, and includes a set of symlinks
and wrapper scripts to emulate most of the missing pieces of
daemontools interface.
This is
retitle 465504 ASCII dump is only visible when terminal is wide enough to see it
severity 465504 minor
thanks
Thanks for the report, A. Costa--
I can reproduce the behavior that you describe, but i think i'd
describe it differently. It seems to me that what's happening is that
the ASCII dump
retitle 466771 busybox cpio: does not unpack hardlinks to empty files
thanks
Testing this out with the new busybox-static 1.9.2-1 from unstable, it
appears that most hardlinks *are* actually unpacked, with the
exception of zero-byte files that are linked to more than once.
[0 [EMAIL PROTECTED]
severity 42158 grave
retitle 42158 pax: hard linked files from cpio archives restored with zero
size (can cause data loss)
thanks
Hi there--
Feels weird touching on an 8-year-old bug, but i've stumbled into a
simple use case for #42158 which i found while reviewing #466771. I'm
upgrading the
Package: debian-policy
Version: 3.7.3.0
Severity: normal
Tags: patch
The scripts section of chapter 10 is somewhat ambiguous about
whether declaring multiple local variables is acceptable or not:
file:///usr/share/doc/debian-policy/policy.html/ch-files.html#s-scripts
For example, is the
Thanks for the quick response, Russ.
On Thu 2008-03-27 16:16:31 -0400, Russ Allbery wrote:
The intention when I originally wrote the text was to not allow declaring
multiple variables with one local line, since at the time I was told that
some shells didn't support this.
I think your first
Package: libpg-perl
Version: 1:2.1.1-2
Severity: minor
Tags: patch
The synopsis from perldoc Pg doesn't work properly, because print
should not be assigned to. Removing the assignment operator (=) makes
it functional but ugly, as it prints the information without newlines
between the rows.
The
this is just a note that i've mailed Joao roughly about this issue
weekly for the last six weeks (since March 8) and haven't gotten a
response. since firegpg is no longer in debian, i'm planning on filing
an ITP to effectively take over the package (and push it through NEW
again) sometime in the
tags 525680 +pending
thanks
On 04/26/2009 11:10 AM, Peter Eisentraut wrote:
Here is a patch to support the status action in the init script.
Thanks, Peter. This is applied, and should be part of 1.44, when that
version is released.
For future reference, LSB 3.0.0 mandates the status action
tags 525681 +pending
thanks
On 04/26/2009 11:12 AM, Peter Eisentraut wrote:
In the init script under restart,
enable_updates || log_action_end_msg_and_exit 1 could not enabling updates
should be changed to
enable_updates || log_action_end_msg_and_exit 1 could not enable updates
I'm seeing the same behavior reported in #524760: i need to explicitly
add nfsvers=2 to my mount options from a sid client running nfs-common
1:1.1.6-1 to a server running lenny's nfs-user-server 2.2beta47-25.
otherwise, the mount fails with this message (and with return code 32:
0 clam:/etc#
On 09/20/2009 07:13 PM, Joey Hess wrote:
ARM hardware certianly has floating point hardware, and with EABI
binaries can be built that use it on the otherwise softfloat system.
But different ARM systems have different FPUs, and so it would be very
hard to get coverage for all/most of them.
i'm also seeing the concern raised by dylan thurston in debian bug
#547466 -- the ruler along the left-hand edge of inkscape's main window
is extremely skinny when visible (note: i'd call this the vertical
ruler, not the horizontal ruler, as dylan does, but i understand the
reasoning for calling
Package: libvorbisidec-dev
On armel, when i build ivorbisfile_example.c against the stock
libvorbisidec package, it triggers a series of CPU alignment faults, and
consequently produces bad data.
Interestingly, this seems to be because gcc is happy to align an array
of chars on an odd address
Package: libc6
Version: 2.9-25
Severity: normal
I'm running alsaplayer on an armel platform, using the -text frontend
and the -alsa output. I've configured my armel machine to send a SIGBUS
to any process which makes an alignment error by doing this:
echo 5 /proc/cpu/alignment
when i launch
found 548842 2.10.1-0exp1
thanks
On 09/28/2009 11:34 PM, Daniel Kahn Gillmor wrote:
Version: 2.9-25
I tried upgrading libc6 on the machine that was experiencing
this, and it didn't improve.
I'm still seeing the alignment error during the dynamic
linking step when i launch alsaplayer using
A few more things that are missing (i just ran into this while trying to
convert some private scripts from imagemagick to
graphicsmagick-imagemagick-compat:
graphicsmagick-imagemagick-compat does not know about the Alpha channel
-- it knows about Opacity, but the convert wrapper apparently isn't
Package: ncmpc
Version: 0.17-1
Severity: minor
My mpd daemon is running on a machine named igor. If i do:
ncmpc --host igor
then the status line of ncmpc says (for the first second or two):
Connected to igor
But if i do:
MPD_HOST=igor ncmpc
then the status line of ncmpc says (for the
tags 605901 +security
thanks
the fact that gobby stores logs in ~/.infinote-records is also
problematic from a security perspective, because most users' default
umask is 022, and the library apparently makes no attempt to make the
logs themselves more hidden. So the default mode is to leak
Package: arora
Version: 0.10.2-1
Severity: normal
In arora, going Back doesn't seem update the URL in the address bar.
Steps to reproduce:
0) go to a web page that has an outbound link (e.g. http://google.com/)
1) click on a link in that page (e.g. follow the Privacy link to
Package: libio-socket-ssl-perl
Version: 1.34-1
Severity: normal
Tags: patch , security
Using IO::Socket::SSL, if i set verify_mode to 0x03 (verify peer, fail
verification if no peer certificate exists), these requests are
removed unless i also supply either ca_file or ca_path.
This is
Thanks for forwarding this, Salvatore--
On 12/06/2010 01:55 AM, Salvatore Bonaccorso wrote:
Of the two patches, i prefer no-default-ca-certs.patch.
The documentation makes references to ca/ and certs/my-ca.pem -- if
these are actually used by the tool, then no-default-ca-certs.patch is
Package: oggvideotools
Version: 0.8-1+b1
Severity: normal
on a powerpc machine, oggJoin can't seem to properly detect ogg audio files:
consoleu...@bigpuff:~$ oggSlideshow /usr/share/pixmaps/debian-logo.png
creating video stream for picture /usr/share/pixmaps/debian-logo.png
8.08
Package: oggvideotools
Version: 0.8-1+b1
Severity: minor
oggThumb(1) contains several instances of the word komas. From the
context, i think the intended word is commas.
Regards,
--dkg
-- System Information:
Debian Release: squeeze/sid
APT prefers testing
APT policy: (500,
Package: libio-socket-ssl-perl
Version: 1.35-1
Severity: normal
Tags: patch
if i supply a verify_callback to IO::Socket::SSL, but fail to supply
ca_file or ca_path (and the default ca_file and ca_path locations are
not populated), initialization fails.
This is silly because i'm using my own
Package: libio-socket-ssl-perl
Version: 1.35-1
Severity: normal
Tags: patch
The documentation of the SSL_verify_callback for IO::Socket::SSL seems
to have drifted from its current implementation, and is difficult to
read.
The attached patch fixes both problems.
Regards,
--dkg
-- System
Package: libio-socket-ssl-perl
Version: 1.35-1
Severity: normal
If i supply a verify_callback, i find it gets invoked three times for
a single connection, if the callback is approved each time (if the
callback ever fails, it looks like it shortcuts the repeated verify
attempts). This is
Package: mailman
Severity: normal
Tags: patch
Mailman offers a web interface that relies heavily on cookies.
If the web interface is used via https, those cookies should have the
secure flag set.
Attached is a patch which allows system administrators to indicate
manually whether they would like
On 12/08/2010 04:24 PM, Salvatore Bonaccorso wrote:
- Forwarded message from Steffen Ullrich via RT
bug-io-socket-...@rt.cpan.org -
it's not that simple:
- usually SSL_verify_callback is used together with a valid CA file or
CA path, because one wants to let openssl pre-check the
Package: netcat-openbsd
Version: 1.89-4
Severity: normal
It seems that the behavior of the -q flag for netcat-openbsd is the
exact opposite of the behavior for the same flag in netcat-traditional, despite
the documentation being the same. Here's the documentation:
0 d...@pip:~$ man
Package: ssh-askpass
Version: 1:1.2.4.1-9
Severity: normal
Using openbox, i sometimes mark a window always on top with the
window context menu. According to xprop, this apparently adds the
_NET_WM_STATE_ABOVE flag to the _NET_WM_STATE(ATOM) list.
I believe the same thing is done by lxterm
Package: dovecot-common
Version: 1:1.2.15-3
Severity: normal
It looks like dovecot-common's postinst script creates a new X.509
certificate and places it in /etc/ssl/certs/dovecot.pem. This
certificate is for use as the IMAP or POP server's end entity
certificate.
However, /etc/ssl/certs/ is
Package: xserver-xorg-video-nouveau
Version: 1:0.0.15+git20100329+7858345-5
Severity: normal
if i boot with no xorg.conf on a brand new squeeze install (on powerpc, with a
GeForce2 MX/MX 400 (rev b2))
then i get a 1024x768, 8bpp display because X seems to have fallen back to the
fbdev driver.
On 01/04/2011 03:05 AM, Sven Joachim wrote:
On 2011-01-04 00:50 +0100, Daniel Kahn Gillmor wrote:
I also tried (using no xorg.conf) with linux-image-2.6.37-rc7-powerpc as the
kernel, and with the xorg and drm
components from experimental (including building xserver-xorg-video-nouveau
from
301 - 400 of 4293 matches
Mail list logo