Bug#495111: uswsusp: Whitelist entry for MSI Wind

2008-08-14 Thread Peter Lebbing
-100 sys_version = Ver.001 bios_version = 4.6.3 By the way; my current kernel is home-compiled. But s2ram worked fine with the stock Debian kernel as well. Unfortunately, some other things didn't. That's why you'll see a custom kernel in the reportbug output below. Greets, Peter Lebbing

Bug#486347: gcc-4.3: Superfluous warning when -std=c99/gnu99 and noreturn on main()

2008-06-15 Thread Peter Lebbing
library ii libmpfr1ldbl 2.3.1.dfsg.1-2 multiple precision floating-point Thanks for your time, Peter Lebbing. - -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (900, 'testing'), (100, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.24-1

Bug#486347: gcc-4.3: Superfluous warning when -std=c99/gnu99 and noreturn on main()

2008-06-15 Thread Peter Lebbing
Bastian Blank wrote: Well, main returns always in a hosted environment. The bug reporter of bug #141015 used exit() on all occasions, I thought that didn't count as a return? (just curiosity) I think the noreturn attribute is quite overkill for normal computers though, this in contrast to

Bug#618887: dirvish: Alias to / interpeted as no alias

2011-03-19 Thread Peter Lebbing
Package: dirvish Version: 1.2.1-1.1 Severity: normal Tags: patch When having a line in the vault config like: tree: /root/backupmnt/ / It behaves like tree: /root/backupmnt/ The alias to / is ignored. This means that a file at the root of the transfer named test, ends up in the index named

Bug#627312: iproute: tc -pretty prints sport/dport swapped

2011-05-19 Thread Peter Lebbing
Package: iproute Version: 20110107-2 Severity: normal If you request pretty-printed filters with tc -p, it will print sport for a match on the /destination/ port, and dport for a match on the /source/ port. To reproduce: 1) Create a classful qdisc supporting filters, so the next command gets

Bug#627312: iproute: tc -pretty prints sport/dport swapped

2011-05-19 Thread Peter Lebbing
Hello! That's a very quick reply, thanks! On 19/05/11 17:05, Andreas Henriksson wrote: I'm unfortunately quite busy right now. Since this clearly isn't anything debian specific, it would be nice if you could discuss this with upstream directly (Try Stephen Hemminger at Vyatta and the

Bug#595670: Bug has been fixed for a while

2013-01-29 Thread Peter Lebbing
src selection for IPv6 has worked for me on wheezy/testing since at least the 21st of August 2012. I remember reading something, probably in a changelog, and thinking Hey, did they fix that? and being very happy when it indeed worked for me. I can't remember more specific details like version

Bug#675942: {fq_,}codel will be in wheezy; tc support needed?

2013-01-30 Thread Peter Lebbing
Hello, As Ben Hutchings wrote in this[1] blog post, {fq_,}codel will be in wheezy (which is great news!). Is it part of the plans that a codel-aware tc will also be in wheezy? Thanks for your work, Peter.

Bug#674467: opus: Please add multiarch support.

2013-09-26 Thread Peter Lebbing
Ron wrote: I mean really, people who can't figure out how to fix this for themselves really shouldn't be using m-a on sid, or sid, at all. People who think sending hundreds of *insistent me-toos* about transition issues in a development release is the way to fix things *ought to have a good

Bug#674467: opus: Please add multiarch support.

2013-09-14 Thread Peter Lebbing
Package: src:opus Followup-For: Bug #674467 I wrote mainly to help Lucio and others building this. But I really want to add my Me too, because this is a real pain with i386 audio dependencies! Dear Ron, please don't stay silent on this issue. It has been going on for a very long time now! The

Bug#772854: signing-party: QR code: too small quiet zone on large QR code

2014-12-11 Thread Peter Lebbing
Package: signing-party Version: 1.1.11-1 Severity: normal Dear Maintainer, When generating paper slips with gpg-key2latex and specifying a somewhat large QR code, the generated QR code does not have the 4 module wide quiet zone that is required by the QR specification (specifically I'm looking

Bug#772854: signing-party: QR code: too small quiet zone on large QR code

2014-12-11 Thread Peter Lebbing
By the way, currently the QR code has a (L)ow error correction level. You can raise that to a (M)edium error correction level without the QR code getting any larger (the size of the fingerprint is fixed, so this will generally be true for an OPENPGP4FPR: URI). qrencode accepts an argument -lM to

Bug#772857: signing-party: gpg-key2latex prints cESC on each fingerprint slip

2014-12-11 Thread Peter Lebbing
On Thu, 11 Dec 2014 14:02:32 -0500 Brian Minton br...@minton.name wrote: When viewed with xpdf I saw cESC (without the quotes) at the top right corner of each slip. These are the key capabilities, meaning: c - Certify on primary key E - Key is encryption capable S - Key can sign data C - Key

Bug#782507: libxrender1: i386/amd64 packages not co-installable

2015-04-13 Thread Peter Lebbing
Package: libxrender1 Version: 1:0.9.7-1+deb7u1+b1 Severity: important Dear Maintainer, While trying to install version 1:0.9.7-1+deb7u1+b1 from wheezy-security for both amd64 and i386 on a multiarch machine, I got the following problem: - 8 8

Bug#782505: libxrender1: dist-upgrade breaks on multiarch due to conflict on

2015-04-13 Thread Peter Lebbing
Package: libxrender1 Version: 1:0.9.7-1+deb7u1+b1 Followup-For: Bug #782505 I reported the bug in parallel with this bug report, and the reports got merged. In my bug report, I indicated a temporary measure to actually install the new version with its security fix, but now that the bugs are

Bug#788704: gnutls28: VIA PadLock accelerated AES-CBC segfaults

2015-06-18 Thread Peter Lebbing
As indicated by Nikos Mavrogiannopoulos on the gnutls-devel mailing list[1], this problem had been fixed upstream in 3.3.12. I had completely forgotten to check upstream for fixes. My suggested patch is almost exactly the same as commit 023156a from the GnuTLS Git[2]. I'd like to suggest

Bug#788704: gnutls28: VIA PadLock accelerated AES-CBC segfaults

2015-06-20 Thread Peter Lebbing
Hello Andreas, On 20/06/15 14:07, Andreas Metzler wrote: Would you mind testing the code I intend to try to get into stable? I tested the binaries (gnutls-bin, libgnutls-deb0-28) and they work in all AES modes, 128 or 256 bits, CBC and GCM. I used gnutls-cli to connect both to the SMTP server

Bug#788704: gnutls28: VIA PadLock accelerated AES-CBC segfaults

2015-06-14 Thread Peter Lebbing
Source: gnutls28 Version: 3.3.8-6+deb8u1 Severity: normal Tags: patch Dear Maintainer, After upgrading a server with a VIA C3 (Nehemiah) processor to jessie, exim4 started to crash on pretty much every connection that negotiated AES-128-CBC or AES-256-CBC on TLS:

Bug#852318: lightning: Fake mtime in packaged files

2017-01-23 Thread Peter Lebbing
Package: lightning Version: 1:45.6.0-3 Severity: normal Dear maintainer, Some packaged files have fake, constant modification times, as can for instance be seen here: ll --full-time usr/lib/lightning/ total 40 -rw-r--r-- 1 peter peter 563 2010-01-01 01:00:00.0 +0100 app.ini drwxr-xr-x

Bug#852318: lightning: Fake mtime in packaged files

2017-01-28 Thread Peter Lebbing
Hello Carsten, On 28/01/17 17:15, Carsten Schoenert wrote: > we didn't ever have done some patching here. I did a quick search on the > upstream sources and found mozilla bug 1277976 which introduces this > change. While this sure is the change that made the mtime problem manifest with

Bug#852318: lightning: Fake mtime in packaged files

2017-01-29 Thread Peter Lebbing
On 28/01/17 20:42, Carsten Schoenert wrote: > then I don't understand your first email. Do I need to clarify more or did my follow-up mail already do that? > So I have currently no clue where the timestamps with *.0 are > coming from. Maybe I'm nitpicking, maybe I'm pointing out

Bug#844631: Seem like Chromium issue 664177

2016-12-09 Thread Peter Lebbing
I presume this is Chromium issue 664177 [1], which in Ubuntu is tracked as bug 1641380. It would appear a simple rebuild of the package is a stop-gap measure that helps, since it is a 10 week timebomb that start ticking on build time. HTH, Peter. [1]

Bug#844631: Ahh it's a Disaster

2016-12-13 Thread Peter Lebbing
On 13/12/16 12:36, bob wrote: > What else can we who no-longer have a Windows partition do? Isn't it enough to install 55.0.2883.75-1~deb8u1 from jessie-security? >From the Debian changelog: > chromium-browser (55.0.2883.75-1~deb8u1) jessie-security; urgency=medium > > [...] > -

Bug#877074: u-boot-exynos: Default environment for Odroid XU3 has wrong console var

2017-09-28 Thread Peter Lebbing
On 28/09/17 20:17, Vagrant Cascadian wrote: > Will apply it to the next upload. Ah, great, thanks! Cheers, Peter. -- I use the GNU Privacy Guard (GnuPG) in combination with Enigmail. You can send me encrypted mail if you want some privacy. My key is available at

Bug#877074: u-boot-exynos: Default environment for Odroid XU3 has wrong console var

2017-09-28 Thread Peter Lebbing
Package: u-boot-exynos Version: 2017.09+dfsg1-1 Severity: normal Tags: patch The odroid-xu3 platform passes a wrong "console" argument on the kernel commandline: console=console=ttySAC2,115200n8 >From the source, it's clear where this comes from: include/configs/odroid_xu3.h: #define

Bug#890408: dirvish: last character gobbled when tree alias is used

2018-02-14 Thread Peter Lebbing
Package: dirvish Version: 1.2.1-1.3 Severity: normal -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Dear maintainer, The "tree" configuration option accepts an "alias" which causes the index of all files in a vault to have a different path. There is a bug in an old bugfix which causes

Bug#903163: ITP: gpg-encrypted-root -- Encrypt root volumes with an OpenPGP smartcard

2018-08-01 Thread Peter Lebbing
Hi Guilhem and others, On Mon, 30 Jul 2018 04:16:23 +0800 Guilhem Moulin wrote: > * Copying not only the (encrypted) key file and the public keyring, >but also the private-keys-v1.d directory, sounds very odd to me. >What is the rationale for doing so? First, a new GnuPG --homedir

Bug#903163: ITP: gpg-encrypted-root -- Encrypt root volumes with an OpenPGP smartcard

2018-08-01 Thread Peter Lebbing
By the way, I think it would be much cooler if GnuPG used pinentry-curses or pinentry-tty, rather than the current /lib/cryptsetup/askpass and --pinentry-mode loopback. That would also gracefully ask for the smartcard to be inserted if it were forgotten or the wrong one was inserted, and prompt

Bug#903163: Adding OpenPGP smartcard support to LUKS

2018-11-08 Thread Peter Lebbing
On 08/11/2018 02:07, Guilhem Moulin wrote: > However that doesn't happen currently because I'm really worried about > copying real private key material to the initramfs along with the stubs; > GnuPG upstream was asked about a documented API to retrieve the stubs > but hasn't answered yet AFAIK.

Bug#903163: gpg-encrypted-root -- Encrypt root volumes with an OpenPGP smartcard

2018-09-24 Thread Peter Lebbing
On 24/09/2018 11:42, Guilhem Moulin wrote: > Sure, me too :-) But I'm afraid of ending up in a situation similar to > caff(1)'s, where in order to avoid maintaining two sets of conf files > some users end up symlinking them (or blindly copying them). I hadn't > thought of scdaemon.conf, but at

Bug#903163: gpg-encrypted-root -- Encrypt root volumes with an OpenPGP smartcard

2018-09-23 Thread Peter Lebbing
On 23/09/2018 17:02, Guilhem Moulin wrote: > I was thinking about something like that, and that's why I was referring > to by “the complexity is not worth it IMHO”. `--list-secret-keys` > implicitly launches gpg-agent(1) for that homedir, which will need to be > shut down afterwards (unless it

Bug#903163: gpg-encrypted-root -- Encrypt root volumes with an OpenPGP smartcard

2018-09-23 Thread Peter Lebbing
On 23/09/2018 13:32, Peter Lebbing wrote: > How about copying the whole homedir without random_seed, but first > checking to make sure there are only smartcard keys as private keys? However, we should specifically exclude openpgp-revocs.d as well. The whole "is the hom

Bug#903163: gpg-encrypted-root -- Encrypt root volumes with an OpenPGP smartcard

2018-09-23 Thread Peter Lebbing
On 23/09/2018 13:32, Peter Lebbing wrote: > How about copying the whole homedir without > random_seed, but first checking to make sure there are only smartcard > keys as private keys? O dear, this might not be enough. The agent can also hold non-OpenPGP keys. SSH keys are an example of

Bug#903163: gpg-encrypted-root -- Encrypt root volumes with an OpenPGP smartcard

2018-09-23 Thread Peter Lebbing
On 23/09/2018 05:58, Guilhem Moulin wrote: > Agreed, and implemented :-) This is awesome! :-) Peter. -- I use the GNU Privacy Guard (GnuPG) in combination with Enigmail. You can send me encrypted mail if you want some privacy. My key is available at

Bug#903163: gpg-encrypted-root -- Encrypt root volumes with an OpenPGP smartcard

2018-09-23 Thread Peter Lebbing
default homedir. Cheers, Peter. -- I use the GNU Privacy Guard (GnuPG) in combination with Enigmail. You can send me encrypted mail if you want some privacy. My key is available at <http://digitalbrains.com/2012/openpgp-key-peter> From 7957c591fccf3d5745bee4507a66b78ff4414a5f Mon Sep 1

Bug#903163: gpg-encrypted-root -- Encrypt root volumes with an OpenPGP smartcard

2018-09-25 Thread Peter Lebbing
On 25/09/2018 02:10, Guilhem Moulin wrote: > Then shouldn't the following be enough, and > save a temporary file? > > `| gpg --no-default-keyring --keyring … --trust-model=always --import` I thought so but was wrong. Without relocating trustdb.gpg to somewhere else, it will lose all

Bug#903163: Adding OpenPGP smartcard support to LUKS

2018-11-25 Thread Peter Lebbing
Hi, On 21/11/2018 17:46, Guilhem Moulin wrote: > Peter last poked Werner on Nov 09 but there wasn't any reply from him. > (At least not on the gnupg-users list.) Nope, no reply, unfortunately. > Hmm on second thought the offer is tempting; if you're also attending > 35c3 then shipping won't

Bug#924129: debian-installer: Kernel for armhf for stretch unbootable

2019-03-09 Thread Peter Lebbing
Package: debian-installer Version: 20170615+deb9u5+b2 Severity: grave Justification: renders package unusable Dear maintainers, Debian kernel bug #922478 renders armhf systems unbootable. This bug was fixed, but the debian-installer images still use (I presume) kernel version 4.9.144-3, the

Bug#890408: dirvish: last character gobbled when tree alias is used

2019-01-24 Thread Peter Lebbing
On 23/01/2019 13:32, Paul Slootman wrote: > This can be solved with a "zero-width negative lookbehind assertion" > (yes I needed the perlre manpage to look that up...). Of course! I didn't know the name by heart either :-), but I knew the concept. It must have slipped my mind at the time. > I'll

Bug#924129: debian-installer: Kernel for armhf for stretch unbootable

2019-03-15 Thread Peter Lebbing
Hello Adam, On 15/03/2019 07:44, Adam D. Barratt wrote: > Feedback would be appreciated I used the following two files to construct an installer SD card:

Bug#923880: ssh: IPQoS defaults change interacts badly with iptables -m tos

2019-08-08 Thread Peter Lebbing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Wed, 6 Mar 2019 18:15:41 +0100 Helmut Grohne wrote: > This suggests that iptables' ECN mask is wrong. It should be using > 0xfc rather than 0x3f. Yes, I'm convinced the mask is wrong. However, fixing that would change the behaviour of already

Bug#923880: ssh: IPQoS defaults change interacts badly with iptables -m tos

2019-08-08 Thread Peter Lebbing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 > We can make it more concrete. Let's create an iptables rule with > numerical values that matches DSCP CS6, which corresponds to IP > Precendence 6, numerical value 0xC0, where in the terms of RFC 1349 bits > 0 and 1 are set in the PRECEDENCE

Bug#978712: libneon27-gnutls: Should not treat missing OCSP stapling as error

2020-12-30 Thread Peter Lebbing
Package: libneon27-gnutls Version: 0.30.2-3 Severity: normal Tags: patch Hello maintainers! Since a little while ago, I could no longer synchronize my laptop with my Radicale server: What happens: --8<---cut here---start->8--- $ syncevolution radicale