Bug#309904: Exciting new bittorrent version 4.1.0 beta available

2005-05-20 Thread sacrificial-spam-address
Package: bittorrent Version: 3.4.2-3 Severity: wishlist The trackerless support is very interesting. A proper experimental package would be a Very Nice Thing. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#310009: hat-gch6 is uninstallable

2005-05-20 Thread sacrificial-spam-address
Package: hat-ghc6 Version: 2.02-12 The hat-ghc6 in unstable is uninstallable: The following packages have unmet dependencies: hat-ghc6: Depends: ghc6 ( 6.2.2+) but 6.4-3 is to be installed E: Broken packages I presume it just needs a rebuild... -- To UNSUBSCRIBE, email to [EMAIL PROTECTED]

Bug#332912: update-alternatives man page links are broken

2005-10-09 Thread sacrificial-spam-address
Package: xterm Version: 6.8.2.dfsg.1-8 The various man pages (xterm, uxterm, lxterm, koi8xterm) are installed as .1x.gz, but the postinst script sets up links to .1.gz, which dangle. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#384654: cupsys 1.2.3-1 seems to work, thanks!

2006-09-16 Thread sacrificial-spam-address
I figured after all the complaining, some praise was in order... * 62_classes_crash: fix incorrect code. old code returned an error even if user use the correct class configuration. (closes: #380663, #384654) It seems to work fine, thanks! -- To UNSUBSCRIBE, email to [EMAIL

Bug#394785: Error: Error in configuration file /etc/dovecot/dovecot.conf line 640: Unexpected '}'

2006-10-22 Thread sacrificial-spam-address
Package: dovecot-common Version: 1.0.rc10-1 Severity: brown-paper-bag ;-) There's an close brace in the protocol lda whose opening mate is commented out. This causes doevecot not to start. The fix is obvious. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe.

Bug#397182: adjtimex enhancement: using ntp.drift

2006-11-05 Thread sacrificial-spam-address
Package: adjtimex Version: 1.21.1-1 Severity: wishlist Tags: patch Just for fun, I came up with the following, which may be useful to someone else. The 1 / is in there to discard fractional digits. You can substitute backquotes `...` for $(...) for portability to older shells.

Bug#211714: closed by Pierre Habouzit [EMAIL PROTECTED] (Bug#211714: fixed in apt-listchanges 2.66)

2006-10-02 Thread sacrificial-spam-address
* Use 8bit encoding for the mails, so that they are greppable again (Closes: 211714) Thank you very much! Greatly appreciated! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#390789: apache2.2-common_2.2.3-1 postinst error

2006-10-02 Thread sacrificial-spam-address
Package: apache2.2-common Version: 2.2.3-1 This is AMD64, if it matters. I got some annoying errors trying to remove apache2-common: Removing apache2-common ... Stopping apache 2.0 web server...grep: /etc/apache2/conf.d/[^.#]*: No such file or directory apache2: Syntax error on line 116 of

Bug#390798: backuppc_2.1.2-5 has problems with apache 2.2

2006-10-02 Thread sacrificial-spam-address
Package: backuppc Version: 2.1.2-5 combined with Package: apache2 Version: 2.2.3-1 Starting web server (apache2)...Syntax error on line 9 of /etc/backuppc/apache.conf: Invalid command 'AuthGroupFile', perhaps misspelled or defined by a module not included in the server configuration failed!

Bug#390798: Followup: got it working

2006-10-03 Thread sacrificial-spam-address
I needed to add LoadModule auth_basic_module /usr/lib/apache2/modules/mod_auth_basic.so LoadModule authz_groupfile_module /usr/lib/apache2/modules/mod_authz_groupfile.so LoadModule authn_file_module /usr/lib/apache2/modules/mod_authn_file.so LoadModule authz_user_module

Bug#390893: The apache2-common removal workaround

2006-10-03 Thread sacrificial-spam-address
Oh, I'm sorry it wasn't obvious. The problem is that 1) apache2-common's prerm runs /etc/init.d/apache2 stop, which 2) runs /usr/sbin/apache2 -t, which 3) parses the config files, and does a full apache setup, which 4) tries to load all the modules, but 5) apache2-mpm-prefork has already been

Bug#381791: ntp-4.2.2 FTBFS due to BITS_PER_LONG use in sys/timex.h

2006-08-06 Thread sacrificial-spam-address
Package: linux-kernel-headers Version: 2.6.17.7-1 I presume sys/timex.h is supposed to be #includeable from user space. gcc -std=gnu99 -DHAVE_CONFIG_H -I. -I. -I.. -I../include -I/usr/include -g -fno-strict-aliasing -O2 -Wall -Wcast-qual -Wmissing-prototypes -Wpointer-arith -Wshadow

Bug#382311: grepping of ntp.conf gets refclocks, misses peers

2006-08-10 Thread sacrificial-spam-address
Package: ntpdate Version: 4.2.2+dfsg-2.1 The relevant lines from my ntp.conf file: peer 192.35.100.1 key 101 minpoll 4 iburst server 127.127.29.0 minpoll 1 maxpoll 4 iburst Result in ntpdate trying uselessly to sync up to 127.127.29.0 while failing to query the perfectly good server at

Bug#382635: /etc/cron.daily/logrotate is looking in the wrong place

2006-08-12 Thread sacrificial-spam-address
Package: logrotate Version: 3.7.1-3 .. for syslogd's pid. It's checking /var/log/syslog.pid, when /etc/init.d/sysklogd puts it in /var/run/syslog.pid. This also causes /etc/cron.daily/logrotate to exit with status 1, which was helpful in this case, but might not be in general. -- To

Bug#382812: It would be nice to have a 64-bit install-mbr binary

2006-08-13 Thread sacrificial-spam-address
Package: mbr Version: 1.1.8-1 Severity: wishlist I've been avoiding installing 1.1.8-1 because it wants to pull in libc6-i386, which is several megabytes of crap I don't need. So I created the following patch to build a 64-bit install-mbr binary. It also fixes a few compile warnings. (The = to

Bug#223683: preconfiguring is unhappy when /tmp is noexec

2008-02-17 Thread sacrificial-spam-address
Package: debconf Version: 1.5.19 Just a me, too note to keep the bug fresh. Just to make life a little bit more difficult for canned exploits on a web server, I've tried to eliminate directories where daemon users have both write and exec ability. In particular, /tmp is mounted noexec. That,

Bug#466447: qmail-local maildir delivery race condition

2008-02-18 Thread sacrificial-spam-address
Package: qmail-src Version: 1.03-45 Severity: important I just started getting MANY complaints about duplicate e-mail delivery from IMAP users. Upon investigation, it turns out that Dan Bernstein doesn't obey his own rules about manipulating Maildirs. To be precise, qmail-local was doing: 8945

Bug#462075: strace of --chuid failing

2008-01-22 Thread sacrificial-spam-address
Package: dpkg Version: 1.14.16.1 Architecture: i386 Here's (the tail of) an strace of a failed operation. It's trying to change to 126:126, but because it's changing the group *after* changing the user, it no longer has permission to. Most annoying. 11528 getuid32()= 0

Bug#310519: Minor mistake in debian/control.m4 (and 1.2.0 building hints!)

2005-05-23 Thread sacrificial-spam-address
Package: subversion Version: 1.1.4-2 Severity: minor While attempting to build a bleeding-edge subversion package with the 1.2.0 tarball and python2.4 (I don't have python2.3-dev installed), I discovered that the autogenerated control file contained an unexpected blank line: Package:

Bug#307842: ntpd (-simple) gets SIGSEGV on startup [[SOLVED]]

2005-05-05 Thread sacrificial-spam-address
Package: ntp-simple Version: 1:4.2.0a+stable-8 Severity: minor [[ SOLVED: still submitted in case it helps anyone else. The problem was a combination of a 127.127.1.0 refclock and the loopback interface not being configured due to not having uncommented the line in

Bug#435300: gnuplot-nox_4.2.0-4 depends on libasound?

2007-07-30 Thread sacrificial-spam-address
Package: gnuplot-nox Version: 4.2.0-4 Severity: minor The latest gnuplot-nox, due to the addition of wxt terminal support, wants to suck in an unreasonable number of dependencies via libwxgtk2.6-0. This is annoying when generating statistics graphs on small headless router boxes. Exactly why

Bug#435223: mount_2.13~rc2-3: but I don't want a portmap daemon!

2007-07-30 Thread sacrificial-spam-address
Package: mount Version: 2.13~rc2-3 I had gone and prepared a detailed bug report, but stopped to check for an existing report, and it's all already been said. So I'll just compress all that to Me, too. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble?

Bug#444584: 0.99.80~rc2-1 depends on a whole pile of GTK libraries

2007-09-29 Thread sacrificial-spam-address
Package: alsaplayer-common Version: 0.99.80~rc2-1 The previous version: Version: 0.99.79-3+b1 Depends: libc6 (= 2.6-1), libflac8, libgcc1 (= 1:4.2-20070516), libid3tag0 (= 0.15.1b), libmad0 (= 0.15.1b), libmikmod2 (= 3.1.10), libogg0 (= 1.1.3), libsndfile1, libstdc++6 (= 4.2-20070516),

Bug#445449: rkhunter spurious warnings

2007-10-05 Thread sacrificial-spam-address
Package: rkhunter Version: 1.3.0-1 * A normal install of sash will, if sash/create_sashroot is true, produce the warning [17:03:50] Checking for root equivalent (UID 0) accounts [ Warning ] [17:03:50] Warning: Account 'sashroot' is root equivalent (UID = 0) * udev produces some warnings

Bug#445512: [PATCH] 64-bit prelink -v output is ugly

2007-10-06 Thread sacrificial-spam-address
Package: prelink Version: 0.0.20061201-1 Severity: minor prelink -v on a 32-bit machine produces 78-column-wide output. %-60s %08x-%08x. On a 64-bit machine, that grows by 16 characters, causing ugly line wraps on the console and suchlike. On a typical x86-64 install using a 40-bit virtual

Bug#418440: /usr/bin/basename: invalid option -- e

2007-10-06 Thread sacrificial-spam-address
Just to confirm that this bug still exists... 09:57 Checking cron entries... /usr/bin/basename: invalid option -- e Try `/usr/bin/basename --help' for more information. 09:57 Checking 'inetd' configuration... basename is from coreutils_5.97-5.4 $ /usr/bin/basename --help Usage:

Bug#418440: /usr/bin/basename: invalid option -- e

2007-10-06 Thread sacrificial-spam-address
On Sat, Oct 06, 2007 at 10:25:09AM -0400, [EMAIL PROTECTED] com wrote: Just to confirm that this bug still exists... It looks like you have some crontab entries which trigger this bug, could you please run=20 sh -x /usr/lib/tiger/scripts/check_crontabs 21=20 And send me the output?

Bug#404956: ip rule flush semantics change...

2006-12-29 Thread sacrificial-spam-address
Package: iproute Version: 20061002-3 I recently discovered (by locking myself out of a remote server :-() that the semantics of ip rule flush were recently changed to include deleting the default rule pointing at the main routing table. This is perhaps more of a documentation problem than

Bug#421235: Warning in debian_running_as_debiantor leads to assert fail

2007-04-27 Thread sacrificial-spam-address
Package: tor Version: 0.1.2.13-1 I have tor running in a minimal chroot jail. Since it doesn't have a copy of /etc/passwd in there, the getpwuid(uid) call in debian/patches/06_add_compile_time_defaults.dpatch:debian_running_as_debiantor fails. This leads to a -1 return value from

Bug#381145: Bug reconfirmed in 1.2.11-3

2007-07-15 Thread sacrificial-spam-address
In response to the e-mail request, I temporarily removed the workaround mentioned above and re-tested (echo hello world | lpr -pprinter) from a Solaris box. I can confirm that the problem is still present in cupsys-bsd_1.2.11-3. Test on printers: Printer hp Info HP LaserJet 4300dtnsl Location

Bug#381145: Bug reconfirmed in 1.2.11-3

2007-07-17 Thread sacrificial-spam-address
How is your LPR configuration on Solaris? Don't you forget to add :sh to your printcap? There is no /etc/printcap in Solaris. There is an /etc/printers.conf with a similar syntax, but there is no documented :sh: option, and lpset won't let me add one, but I can edit one in by hand:

Bug#361355: gnome_segv2 segfaults when using Solaris 2.7 X server

2007-04-17 Thread sacrificial-spam-address
Does this crash still happen with libgnomeui 2.18? Yes. You get an infinite loop of blank windows popping up and: gnome_segv: /home/dajobe/dev/debian/cairo/libcairo-1.4.4/src/cairo-image-surface.c:199: _cairo_format_from_pixman_format: Assertion `NOT_REACHED' failed. Error: Cairo 1.4.4 does

Bug#330190: mbr not compiled for AMD64

2005-09-26 Thread sacrificial-spam-address
Package: mbr Version: 1.1.5-2 The only problem is the harness directory, which uses vm86 to operate a test harness for simulating the operation of the MBR. AMD64 in long mode doesn't support VM86 mode, so the vm86() syscamm isn't even available and even compiling the harness driver fails.

Bug#319518: qmail-local Maildir delivery is buggy

2005-07-22 Thread sacrificial-spam-address
Package: qmail-src Version: 1.03-38 Recent versions of dovecot are *very* fast at pulling mail messages out of the new/ directory of a maildir. (Maybe they're using dnotify/inotify?) Anyway, qmail-local.c contains the code: if (link(fntmptph,fnnewtph) == -1) goto fail; if ((fd =

Bug#320276: Chase 0.5.2-1 sepends on unavailable libgc1

2005-07-27 Thread sacrificial-spam-address
Package: chase Version: 0.5.2-1 The great C++ ABI transition has taken us to libgc1c2. chase is actually unaffected; it only uses C calls, so the existing binary works fine with the new library. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact

Bug#320621: libdjvulibre1 3.5.14-6 changes soname without warning

2005-07-30 Thread sacrificial-spam-address
Package: libdjvulibre1 Version: 3.5.14-6 Severity: serious Any number of packages that link to /usr/lib/libdjvulibre.so.14 (I hit evince 0.3.0-2 first) break horribly when libdjvulibre.so.15 is installed ahead. I'm not sure how this should be handled, but neither the changelog nor the version

Bug#323084: smpeg-xmms 0.3.5-5 depends on unavailable libsmpeg0

2005-08-14 Thread sacrificial-spam-address
Package: smpeg-xmms Version: 0.3.5-5 Severity: important The great library ABI transition. It needs to be bumped to libsmpeg0c2. Thanks. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#323086: lyx-qt 1.3.4-2 depends on unavailable libaiksaurus0c102

2005-08-14 Thread sacrificial-spam-address
Package: lyx-qt Version: 1.3.4-2 Severity: important The great library ABI transition. It needs to be bumped to libaiksaurus-1.2-0. Thanks. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#323088: xmms-modplug 2.05-8 depends on unavailable libmodplug0

2005-08-14 Thread sacrificial-spam-address
Package: xmms-modplug Version: 2.05-8 Severity: important The great library ABI transition. It needs to be bumped to libmodplug0c2. Thanks. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#323089: easytag 1.99.7-1 depends on unavailable libid3-3.8.3

2005-08-14 Thread sacrificial-spam-address
Package: easytag Version: 1.99.7-1 Severity: important The great library ABI transition. It needs to be bumped to libid3-3.8.3c2. Thanks. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#323162: mysql-server-4.1 conflicts with mysql-server 4.1.13a-1

2005-08-15 Thread sacrificial-spam-address
Package: mysql-server-4.1 Version: 4.1.13a-1 Trying to install mysql-server_4.1.13a-1 is quite paradoxical, as it manages, via mysql-server-4.1, to conflict with itself. I think the right fix is to add a version dependency to the conflict in mysql-server-4.1, so I'm submitting the bug here. But

Bug#323162: mysql-server-4.1 conflicts with mysql-server 4.1.13a-1

2005-08-15 Thread sacrificial-spam-address
Hello anonymous user ;-) Sorry; I'm scrupulous about keeping my main e-mail address off of publicly trollable archives, and I can either use an obvious alias or make up a plausible one. I'm never sure which is more polite. This is more or less intended. mysql-server (4.0.x) is now obsolete.

Bug#323084: smpeg-xmms 0.3.5-5 depends on unavailable libsmpeg0

2005-08-15 Thread sacrificial-spam-address
No, only libsmpeg0 should exist. My problem is that I don't have an operational Debian machine with my private key on it. I'll see if I can rectify that today, and revert the NMU. Thanks! You might want to send a heads-up to the maintainers of packages that have been polluted with the

Bug#314741: hugs -98 accepts (*2+1); Report section 3.5 says it shouldn't

2005-06-18 Thread sacrificial-spam-address
Package: hugs Version: 98.200503.08-1 While having fun exploring the language, I discovered something unexpected: Hugs interprets (*2+1) as as (*(2+1)), in contravention of http://www.haskell.org/onlinereport/exps.html#sect3.5 # Syntactic precedence rules apply to sections as follows. (op e) is

Bug#315169: gnome-session hangs for 120 seconds on login

2005-06-20 Thread sacrificial-spam-address
Package: gnome-session Version: 2.10.0-4 Since upgrading to 2.10.0-4, I've had a long timeout on the default gnome login. It hangs after with the splash screen up, after displaying the icon and text for metacity window manager, but I don't know if that means that metacity is the problem, or if

Bug#315169: Blowing away .gnome2/session seems to help

2005-06-20 Thread sacrificial-spam-address
I created a brand new user, tried logging in: no delay. I copied all the newly created files to the hanging account's .gnome2 directory (bub didn't delete any other files already there): delay. I deleted the session manager entry from .gnome2/session: delay I deleted .gnome2/session entirely:

Bug#315169: Blowing away .gnome2/session seems to help

2005-06-21 Thread sacrificial-spam-address
Could you send us that .gnome2/session file? Er, sorry... I forgot to save a copy while blowing it away. I got the idea when I saw that the new test user's .gnome2 directory didn't *have* a session file, so obviously it wasn't essential. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a

Bug#315590: PDF file that crashes evince 0.3.0-2

2005-06-23 Thread sacrificial-spam-address
Package: evince Version: 0.3.0-2 To reproduce: - Download and unzip ftp://60.248.88.208/RaidCards/Documents/Manual_Spec/Manual_02182005.zip (This is the areaca.com.tw ftp site; I have no idea why they prefer to use a numeric IP address.) - Try to execute evince Manual_02182005.pdf - Observe

Bug#317735: libautotrace3 needs rebuild with libplot2c2

2005-07-10 Thread sacrificial-spam-address
Package: libautotrace3 Version: 0.31.1-8 No biggie, it's just not installable now that the big GCC 4.0 migration has begin. Looking at the dependency list, you're probably waiting until all the other libraries get upgraded, but I figured I'd create a bug for it anyway. Thanks! -- To

Bug#317841: aptitude is being really slow.

2005-07-11 Thread sacrificial-spam-address
Package: aptitude Version: 0.2.15.9-3 Of late, aptitude has been really sluggish. Inquiring, I tried using strace on it, and found that one cursor-down resulted in over a thousand stat64() calls to /var/lib/apt/lists/*_Packages. For example, 135 stat64() calls to each of the 6 files:

Bug#318211: Needs recompile with libgmp3c2

2005-07-13 Thread sacrificial-spam-address
Package: lsh-utils Version: 2.0.1-4 Assuming it's not a bug that libgmp3 and libgmp3c2 conflict, lsh needs to link to the latter to work in unstable. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#318210: Needs recompile with libgmp3c2

2005-07-13 Thread sacrificial-spam-address
Package: libcln3 Version: 1.1.9-1 Assuming it's not a bug that libgmp3 and libgmp3c2 conflict, libcln3 needs to link to the latter to work in unstable. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#318209: Needs recompile with libgmp3c2

2005-07-13 Thread sacrificial-spam-address
Package: qalc Version: 0.7.2-4 Assuming it's not a bug that libgmp3 and libgmp3c2 conflict, qalc needs to link to the latter to work in unstable. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#318212: Needs recompile with libenchant1c2

2005-07-13 Thread sacrificial-spam-address
Package: abiword Version: 2.2.7-3 Thanks to the GCC 4 transition, a bunch pf packages that link to libaspell15c2 conflict with abiword - libenchant1 - libaspell15 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#362144: x-ttxidfont-conf isn't the problem here

2006-04-16 Thread sacrificial-spam-address
Package: xserver-xorg Version: 1:7.0.11 Architecture: i396 In case anyone else is looking at this bug for ideas... I'm having the same symptoms, but it's not #362296. I had an xorg.conf file that listed /usr/lib/X11/fonts/*, but the fonts moved to /usr/share/fonts/X11/*. The only things in the

Bug#353420: m68k-elf binutils build failure

2006-02-18 Thread sacrificial-spam-address
Package: toolchain-source Version: 3.4-5 On the first file in binutils-m68k-elf-2.15/build/gas/, debuild bombs out with In file included from ./targ-cpu.h:1, from ../../src/gas/config/obj-elf.h:42, from ./obj-format.h:1, from

Bug#358319: BackupPC_dump segfaults when used with rsync 2.6.7-1

2006-03-22 Thread sacrificial-spam-address
Package: backuppc Version: 2.1.2-4 Package: rsync Version: 2.6.7-1 amd64 server, i386 clients. All uniprocessor, Debian unstable. Reverting the clients to rsync 2.6.6-1 solves the problem. Obviously, I'm not sure who's breaking the rules, but BackupPC is crashing while the rsync server on the

Bug#361026: Kernel support check from #360420 breaks working config

2006-04-05 Thread sacrificial-spam-address
Package: nfs-kernel-server Version: 1:1.0.7-7 Severity: Important It checks for the nfsd_version symbol, which my kernel doesn't have, thus refusing to start and causing grief. Commenting out the grep of /proc/kallsyms in /etc/init.d/nfs-kernel-server fixed the problem. Thank you for

Bug#361355: gnome_segv2 segfaults when using Solaris 2.7 X server

2006-04-07 Thread sacrificial-spam-address
Package: libgnomeui-0 Version: 2.14.0-1 I actually noticed this trying to run galeon (which used to work, but I last did it a few months ago), but I noticed that the crash notification program was itself crashing, and figured that would be a better test case. Unfortunately, although only a 16K

Bug#361355: gnome_segv2 segfaults when using Solaris 2.7 X server

2006-04-08 Thread sacrificial-spam-address
I don't remember when we started supporting Solaris... What platform do you really run libgnomeui-0 on? If it's not debian, then use your distribution bug channel to fill bug and not debian's. Eek! I'm sorry I wasn't clear enough. Only the X server is running on Solaris. It's debian$

Bug#370611: SIGSEGV in cupsd 1.2.1-2

2006-06-05 Thread sacrificial-spam-address
Package: cupsys Version: 1.2.1-2 I tried upgrading, and other than the massive config file changes, (WHY does the CUPS documentation have to be SO BAD? Just for example, the Order directive docs say it defined whether Allow or Deny rules are searched first. Fine, but I don't care which is

Bug#370613: Please document the Justification: pseudo-header

2006-06-05 Thread sacrificial-spam-address
Package: bugs.debian.org I just read a discussion of how reportbug mandates a Justification: pseudo-header line for serious bugs. It might be nice to explain the desired format of that line somewhere other than the reportbug source, like http://www.debian.org/Bugs/Developer. In case it helps,

Bug#383363: Default python is now 2.4; imgsizer won't install.

2006-08-16 Thread sacrificial-spam-address
Package: imgsizer Version: 2.7-1 Depends: imagemagick | file, imagemagick | libjpeg-progs, python (= 2.3), python ( 2.4) But the default python in unstable is now 2.4.3-11. Sorry to only ever complain; it just seemed worth a comment. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a

Bug#384654: cupsys 1.2.2-2 breaks printer classes

2006-08-25 Thread sacrificial-spam-address
Package: cupsys Version: 1.2.2-1 Severity: important After an upgrade from 1.2.2-1 to 1.2.2-2, printing stopped working if the destination was a printer class, and error_log filled up with E [25/Aug/2006:17:20:48 +] Class ps hasn't any printers! E [25/Aug/2006:17:20:48 +] Class pcl hasn't

Bug#381145: Jobs submitted via port 515 get a banner page despite all efforts

2006-08-02 Thread sacrificial-spam-address
Package: cupsys-bsd Version: 1.2.2-1 I have JobSheets none none set in every printer in /etc/cups/printers.conf and every alias in classes.conf. /usr/share/cups/banners/* all have permissions 000. Cupsd has been restarted a zillion times. Despite this, printing from a Solaris 9 box (echo Hello

Bug#381250: cupsd goes into a busy-loop

2006-08-02 Thread sacrificial-spam-address
Package: cupsys Version: 1.2.2-1 I was just heavily playing with the cups configuration, trying (unsuccessfully) to get it to work with hplip and hp:/ URIs. So I backed everything out, and now find that if I try to use the Modify Printer option on the web interface (https://server:631/), then as

Bug#381252: lpoptions documentation doesn't

2006-08-02 Thread sacrificial-spam-address
Package: cupsys-client Version: 1.2.2-1 The CUPS docs have a very severe case of Microsoft-itis, with lots of friendly words and HTML that fail to actually explain the things they're supposed to be documenting. The lpoptions documentation explains that options are specified as -o option[=value],

Bug#367818: /usr/share/vim/virc symlink is missing

2006-05-18 Thread sacrificial-spam-address
Package: vim Version: 1:6.4-007+1 When invoked as vi, /etc/vim/virc is never invoked. This is because vim is sourcing $VIM/virc, and $VIM is /usr/share/vim, which has symlinks to /etc/vim for vimrc and gvimrc... but not virc. FWIW, I still like to have a vimrc.local for common changes that I

Bug#367818: /usr/share/vim/virc symlink is missing

2006-05-18 Thread sacrificial-spam-address
Package: vim Version: 1:6.4-007+1 Is this the version of vim you have installed? Oops! I was upgrading a couple of machines, and I queried the version on one I hadn't upraded yet. That SHOULD be Version: 1:7.0-017+2 Apologies. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject

Bug#368011: efix segfaults on trivial text file.

2006-05-19 Thread sacrificial-spam-address
Package: efax Version: 1:0.9a-19 Using i386, kernel 2.6.16.5, libc6 2.3.6-7. To reproduce: [1]$ echo Hello, world hello [2]$ efix -vewiaf -itext -otiffg3 hello efix: Fri May 19 03:28:40 2006 efix v 0.3 efix: 28:40 argv[0]=efix efix: 28:40 argv[1]=-vewiaf efix: 28:40 argv[2]=-itext efix: 28:40

Bug#361355: Bug#348109: fixed in cairo 1.6.4-1

2008-04-16 Thread sacrificial-spam-address
Fix confirmed, woot! Thanks! And thanks to the Cairo developers who implemented pseudo-color support! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#475168: certtool --generate-dh-params is ridiculously wasteful of entropy

2008-04-09 Thread sacrificial-spam-address
Package: gnutls-bin Version: 2.2.2-1 /usr/bin/certtool --generate-dh-params --bits 384 performs 25 120-byte reads (3000 bytes, or 24 kbits total) from /dev/urandom, even though its output is only 384 bits, and doesn't even need to be cryptographically secure in the first place. I have gotten

Bug#475194: D-H parameter generation is All Wrong

2008-04-09 Thread sacrificial-spam-address
Package: exim4-base Version: 4.69-2 The entire premise of the script /usr/share/exim4/exim4_refresh_gnutls-params is based on a serious misapprehension of the role of Diffie-Hellman parmeters in performing encryption. Parameters are values that the communicating parties must agree on, but they

Bug#475168: certtool --generate-dh-params is ridiculously wasteful of entropy

2008-04-10 Thread sacrificial-spam-address
Which version of libgcrypt11 do you have installed? linux-gate.so.1 = (0xa7f89000) libgnutls.so.26 = /usr/lib/libgnutls.so.26 (0x41ca2000) libtasn1.so.3 = /usr/lib/libtasn1.so.3 (0x4fab9000) libgcrypt.so.11 = /usr/lib/libgcrypt.so.11 (0x4fb45000) libgpg-error.so.0 = /usr/lib/libgpg-error.so.0

Bug#475194: D-H parameter generation is All Wrong

2008-04-10 Thread sacrificial-spam-address
Marc Haber [EMAIL PROTECTED] wrote: On Wed, Apr 09, 2008 at 10:34:00AM -0400, [EMAIL PROTECTED] wrote: The entire premise of the script /usr/share/exim4/exim4_refresh_gnutls-params is based on a serious misapprehension of the role of Diffie-Hellman parmeters in performing encryption. It is,

Bug#475168: [Pkg-gnutls-maint] Bug#475168: certtool --generate-dh-params is ridiculously wasteful of entropy

2008-04-10 Thread sacrificial-spam-address
Daniel Kahn Gillmor [EMAIL PROTECTED] wrote: I've packaged gnutls 2.3.4 (upstream's current development version) for my own testing, and i see the same behavior described in this ticket using 2.3.4 on a lenny/sid i386 system (see strace and package versions below). So the problem isn't unique

Bug#475194: D-H parameter generation is All Wrong

2008-04-10 Thread sacrificial-spam-address
I recently administered a stiff flaming to the Debian package maintainers for exim4, and was rebuffed with the observation that the behaviour I was complaing about was recommended by the exim specification, section 39.3. Marc Haber [EMAIL PROTECTED] wrote: On Wed, Apr 09, 2008 at 10:34:00AM

Bug#475194: D-H parameter generation is All Wrong

2008-04-10 Thread sacrificial-spam-address
I recently administered a stiff flaming to the Debian package maintainers for exim4, and was rebuffed with the observation that the behaviour I was complaing about was recommended by the exim specification, section 39.3. Some of the original flame: Marc Haber [EMAIL PROTECTED] wrote: On Wed,

Bug#475168: [Pkg-gnutls-maint] Bug#475168: Bug#475168: certtool --generate-dh-params is ridiculously wasteful of entropy

2008-04-10 Thread sacrificial-spam-address
Marc Haber [EMAIL PROTECTED] wrote: On Thu, Apr 10, 2008 at 12:09:47PM -0400, [EMAIL PROTECTED] wrote: Yes, /dev/urandom is itself a PRNG, That's actually wrong. /dev/urandom will first deplete the kernel entropy pool and will ony fall back to a PRNG when there is no more true entropy

Bug#475168: [Pkg-gnutls-maint] Bug#475168: certtool --generate-dh-params is ridiculously wasteful of entropy

2008-04-11 Thread sacrificial-spam-address
Simon Josefsson [EMAIL PROTECTED] wrote: The Linux RNG have some issues, see http://eprint.iacr.org/2006/086. Libgcrypt's estimates of the quality of the /dev/*random data is pessimistic. That paper deserves a longer reply, but even granting every claim it makes, the only things it complains

Bug#475168: [Pkg-gnutls-maint] Bug#475168: certtool --generate-dh-params is ridiculously wasteful of entropy

2008-04-11 Thread sacrificial-spam-address
Simon Josefsson [EMAIL PROTECTED] wrote: [EMAIL PROTECTED] writes: That paper deserves a longer reply, but even granting every claim it makes, the only things it complains about are forward secrecy (is it feasible to reproduce earlier /dev/*random outputs after capturing the internal state of

Bug#435518: gnuplot-nox dependencies: Me, too

2008-02-23 Thread sacrificial-spam-address
Package: gnuplot-nox Version: 4.2.2-1 Just a nudge to keep the bug current. I have gnuplot-nox frozen at 4.2.0 on my headless boxes to avoid sucking in a ridiculous number of dependencies. Thanks! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact

Bug#467554: find . -type d -print makes excessive stat(2) calls

2008-02-26 Thread sacrificial-spam-address
Package: findutils Version: 4.3.8-3 For example, running that command in the findutils source tree produces the following trace, even though readdir() is returning valid d_type information. (Verified with small handwritten utility.) I haven't dived very deeply into the code, although I do see

Bug#470861: CONFIG_SOFTWARE_SUSPEND is now CONFIG_HIBERNATION

2008-03-13 Thread sacrificial-spam-address
Package: uswsusp Version: 0.6~cvs20070618-1 Severity: minor This makes the installation warning message somewhat less helpful. As of tags/v2.6.23-rc2~168: commit b0cb1a19d05b8ea8611a9ef48a17fe417f1832e6 Author: Rafael J. Wysocki [EMAIL PROTECTED] Date: Sun Jul 29 23:24:36 2007 +0200

Bug#444699: Gnuplot wakes up 100x/second for no good reason.

2008-03-29 Thread sacrificial-spam-address
Package: gnuplot Version: 4.2.2-1 After popping up a plot window (even if the window has been closed), ust sitting there at the prompt, gnuplot is doing an infinite stream of select(1, [0], NULL, NULL, {0, 1}) = 0 (Timeout) Give that it isn't doing anything ELSE, that should have a NULL

Bug#515214: console-setup needs to be taken out and shot.

2009-04-19 Thread sacrificial-spam-address
Package: xserver-xorg Version: 1:7.4+1 Just another voice who doesn't care for the amount of cruft that hal and console-setup drag into my system. The fact that console-setup remaps the console fonts and doesn't even provide a way to set it back to CP437 is particularly egregious. I have, for

Bug#548831: Unmeetable dependency on libmysqlclient15off

2009-09-28 Thread sacrificial-spam-address
Package: snort-common-libraries Version: 2.8.4.1-4 2.8.4.1-3+b1 depended on the new libmysqlclient16, but -4 reverted back to libmysqlclient15off, which has been removed from sid. This makes the package a bit difficult to install... -- To UNSUBSCRIBE, email to

Bug#549050: cupsd segfaults on SIGHUP

2009-09-30 Thread sacrificial-spam-address
Package: cups Version: 1.4.1-3 Severity: important (The problem appeared with 1.4.1-2.) Platform: AMD Phenom9850 Quad-Core Processor (2500 MHz) Linux 2.6.30-rc5-00065-g437a53d (up 141 days) 8 GB RAM, 64-bit kernel. 32-bit Debian userland. Twice now, cupsd has died at quarter to 6, local time:

Bug#567018: binutils-multiarch needs to divert /usr/bin/elfedit

2010-01-26 Thread sacrificial-spam-address
Package: binutils-multiarch Version: 2.20.51.20100109-2 Installation of binutils fails with dpkg: error processing binutils_2.20.51.20100109-2_i386.deb (--install): trying to overwrite '/usr/bin/elfedit', which is also in package binutils-multiarch 0:2.20.51.20100109-2 Presumably, the fix is a

Bug#563970: /etc/init.d/rpcbind restart doesn't include -w

2010-01-06 Thread sacrificial-spam-address
Package: rpcbind Version: 0.2.0-3 The restart target tries to include -w in the OPTIONS, but when it runs $0 start, the script unconditionally clears the value on startup. I did it using a shell function instead (this is my adapted verrsion of the portmap script, so it includes some extras from

Bug#563971: rpcbind doesn't actually accept the -w option

2010-01-06 Thread sacrificial-spam-address
Package: rpcbind Version: 0.2.0-3 Despite the man page and its own usage message: # rpcbind -w usage: rpcbind [-adhilsw] -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#563971: It's the lack of --enable-warmstarts

2010-01-06 Thread sacrificial-spam-address
rpcbind only enables the -w option if the --enable-warmstarts option is passed to configure, which it doesn't appear to be. The fact that it does not print a useful error message in this case is another error. An untested patch for that is appended. --- rpcbind-0.2.0/src/rpcbind.c 2010-01-06

Bug#565567: snort: -o flag no longer supported, package configuration fails.

2010-01-16 Thread sacrificial-spam-address
Package: snort Version: 2.8.5.2-1 Severity: important The debcnof question about Pass|Alert|Log supplies a -o flag in /etc/snort/snort.debian.conf (via DEBIAN_SNORT_OPTIONS). Snort no longer supports this flag, and will not start if it is provided on the command line. This in turn results in a

Bug#535498: klogd startup hangs forever if /dev/log is missing.

2009-07-02 Thread sacrificial-spam-address
Package: klogd Version: 1.5-5 Owing to an unrelated problem, I ended up booting with a read-only /dev, which resulted in /etc/init.d/sysklogd not creating /dev/log. When that happens, /etc/init.d/klogd never completes. It runs klogd -x, which spawns a child, which tells the parent its pid, then

Bug#536640: Samba 2:3.4.0-1 crashes on startup

2009-07-11 Thread sacrificial-spam-address
Package: samba Version: 2:3.4.0-1 Severity: grave After upgrading a working 3.3.6-1 configuration to 3.4.0-1, smbd started exploding on startup. This is an i386 (32-bit) userland on an AMD quad-processor (Phenom) with a 64-bit kernel. All packages from current debian/unstable. The failure is

Bug#572367: Unsnubbing doesn't seem to work

2010-03-03 Thread sacrificial-spam-address
Package: rtorrent Version: 0.8.6-1 Architecture: i386 Toggling peer snubbing off with * seems to leave that peer permanently choked, even when it wakes up and starts feeding me data. The only way I can find to bring the connection back to life is to kick off the peer and let it reconnect.

Bug#575435: Please package version 3065+ with -l scterc

2010-03-25 Thread sacrificial-spam-address
Package: smartmontools Version: 5.39.1+svn3060-1 Severity: wishlist The ability to query and set the error recovery control parameters is very nice for RAID arrays; as it was introduced in SVN version 3065, it would be nice if you could do another release a few more versions along the SVN

Bug#572367: closed by Marco TĂșlio Gontijo e Silva mar...@debian.org (Bug#572367: fixed in haskell-non-negative 0.0.5.1-1)

2010-03-17 Thread sacrificial-spam-address
This is an automatic notification regarding your Bug report which was filed against the rtorrent package: #572367: Unsnubbing doesn't seem to work It has been closed by Marco T=C3=BAlio Gontijo e Silva mar...@debian.org. Their explanation is attached below along with your original

Bug#561674: Bug fix confirmed

2009-12-26 Thread sacrificial-spam-address
I just wrestled with the same problem. I had just stubbed the test out; thanks for the better fix. A related bug (in the nfs-common package) is that the error message if idmapd is started but nfsv4 support is not enabled is a bit alarming; I spent a while trying to fix it before discovering that

Bug#523627: iptables -S generates deprecated command lines

2009-04-11 Thread sacrificial-spam-address
Package: iptables Version: 1.4.3.1-1 Using an iptables rule like -d ! my.sub.net/24 generates a warning: Using intrapositioned negation (`--option ! this`) is deprecated in favor of extrapositioned (`! --option this`). However, iptables -S produces exactly that form, leading to a lot of

  1   2   3   >