Bug#252738: w3m-img: works for me with 0.5.1-1, but docs still missing

2005-03-08 Thread Jochen Hein
Package: w3m-img Version: 0.5.1-1 Followup-For: Bug #252738 I just tried a fresh install of w3m and w3m-img and get images inline. Anyway, at first I've been as confused as the original reporter. -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (500, 'testing')

Bug#303894: fbiterm crashes with Segmentation Fault when using less UTF-8-demo.txt

2005-04-09 Thread Jochen Hein
Package: fbiterm Version: 0.5-3.2 Severity: normal The demo file starts with: , | UTF-8 encoded sample plain-text file | | | Markus Kuhn [maks kun] [EMAIL PROTECTED] 2002-07-25 ` I'll attach the file. The system is an uptodate sarge. Jochen -- System Information: Debian Release:

Bug#304020: jfbterm: Please compile with --enable-direct-color

2005-04-10 Thread Jochen Hein
Package: jfbterm Version: 0.4.7-2.0 Severity: wishlist I'm running jfbterm with radeonfb which uses directcolor for my resolution/depth. jfbterm as compiled for Debian prints unknown framebuffer and stops. Using --enable-direct-color works for me, so I like to see it compiled that way. --

Bug#307696: udev doesn't fill values in syslog

2005-05-04 Thread Jochen Hein
Package: udev Version: 0.056-2 Severity: minor From my syslog: May 4 20:59:51 hermes udev[10015]: configured rule in '/etc/udev/rules.d/z_hal-plugdev.rules[2]' applied, 'sda' becomes '%k' May 4 20:59:51 hermes udev[10015]: creating device node '/dev/sda' May 4 20:59:52 hermes udev[10055]:

Bug#830905: openconnect: Please enable GSSAPI support

2016-07-12 Thread Jochen Hein
Package: openconnect Version: 7.06-2 Severity: wishlist Dear Maintainer, I'm running a FreeIPA server in my local network and use Kerberos/GSSAPI for most authentication purposes. Openconnect as compiled for Debian right now does not include support for GSSAPI. I've compiled a local package

Bug#856307: krb5-user: kinit fails for OTP user when using kdc discovery via DNS

2017-02-27 Thread Jochen Hein
Package: krb5-user Version: 1.15-1 Severity: normal Dear Maintainer, I'm running two IPA servers for authentication and have enrolled a Debian/testing host as a client in my IPA domain. Authentication with kinit as normal user (password only) works fine [redacted/shortened log]: Passwort for

Bug#856307: krb5-user: kinit fails for OTP user when using kdc discovery via DNS

2017-02-27 Thread Jochen Hein
Sam Hartman writes: > Do you have _kerberos._tcp DNS entries along with the _kerberos._udp > entries? Yes, I do have them - they were created when I installed my IPA domain. > Does that help if not? Yes, that seems to work. Hm, my CentOS machine worked with these entries,

Bug#856307: krb5-user: kinit fails for OTP user when using kdc discovery via DNS

2017-02-27 Thread Jochen Hein
Oh, and kinit with _udp entries worked fine in stable with krb5-user 1.12.1+dfsg-19+deb8u2. And now seems to work without them too. Jochen -- The only problem with troubleshooting is that the trouble shoots back.

Bug#856307: krb5-user: kinit fails for OTP user when using kdc discovery via DNS

2017-02-27 Thread Jochen Hein
Sam Hartman writes: > So, your experience is that with _kerberos._tcp entries but no > _kerberos._udp entries it works. Yes. > However, with _kerberos._udp and _kerberos._tcp entries both, it fails? Yes, it fails (in Testing, but not in Stable) > However, if adding the

Bug#843203: python-kdcproxy: Please add README to binary packages

2016-11-04 Thread Jochen Hein
Package: python-kdcproxy Version: 0.3.2-3 Severity: wishlist Dear Maintainer, in the binary package is no documentation - a look at github and I see that the README is well written and describes how to configure apache to use python-kdcproxy. I'd like to have the README packaged - my first look

Bug#830905: openconnect: proposed patch to control

2016-11-21 Thread Jochen Hein
Mike Miller <mtmil...@debian.org> writes: > On Sat, Oct 15, 2016 at 22:05:02 +0200, Jochen Hein wrote: >> @@ -46,6 +47,7 @@ >> Multi-Arch: same >> Depends: libgnutls28-dev, >> liboath-dev, >> + libkrb5-dev, >>

Bug#830905: openconnect: proposed patch to control

2016-10-15 Thread Jochen Hein
Package: openconnect Version: 7.06-2 Followup-For: Bug #830905 Dear Maintainer, I think the attached patch should work. Can you apply it or comment what should be needed? Thanks for your work Jochen --- openconnect-7.06/debian/control.orig 2015-05-25 23:26:22.0 +0200 +++

Bug#856307: krb5-user: kinit fails for OTP user when using kdc discovery via DNS

2017-04-17 Thread Jochen Hein
Package: krb5-user Followup-For: Bug #856307 Dear Maintainer, I see that in the meantime krb5-1.15.1 has been releases upstream. My guess would be, that we can't get the fix/upstream release in the (now frozen) stretch release. Do you think it would be possible to get 1.15.1 in a point release

Bug#856307: krb5-user: kinit fails for OTP user when using kdc discovery via DNS

2017-04-17 Thread Jochen Hein
Sam Hartman writes: > It's almost certainly impossible to get 1.15.1 into a point release of > stretch. That's also my guess. > When you filed this bug as normal rather than important, I assumed you > were saying that when you considered the severity it really met the >

Bug#856307: krb5-user: kinit fails for OTP user when using kdc discovery via DNS

2017-03-01 Thread Jochen Hein
Hello Greg, > Upstream fix: > https://github.com/krb5/krb5/commit/bc7594058011c2f9711f24af4fa15a421a8d5b62 I've recompiled the Debian package with your patch and can confirm that it works for me. Thanks for the quick fix. > This bug will also be fixed in the krb5 1.15.1 and krb5 1.14.5 patch

Bug#884490: krb5: new upstream release 1.16 available

2017-12-15 Thread Jochen Hein
Source: krb5 Severity: wishlist Dear Maintainer, There is a new upstream available at http://web.mit.edu/kerberos/dist/#krb5-1.16 I'd like to see it packaged, so it might be included in Buster and the next Ubuntu LTS. Thanks! Jochen -- System Information: Debian Release: 9.3 APT prefers

Bug#891410: upstream work is already in progress

2018-06-24 Thread Jochen Hein
Hello, please have a look at https://github.com/latchset/clevis/pull/35 I've used the scripts from https://github.com/latchset/clevis/pull/18, where I added my comments/diff for Debian. I guess that the updated pull request is a better start now. Hope this helps. Jochen -- This space is

Bug#902447: clevis-udisks2: /usr/lib/x86_64-linux-gnu/clevis-luks-udisks2 is not setuid/setgid

2018-06-26 Thread Jochen Hein
Package: clevis-udisks2 Severity: normal Dear Maintainer, [I'm running my tests on Ubuntu 18.04, but I'm pretty sure it hits Debian too] I'm playing with clevis and encrypted disks and tried to automatically decrypt an USB stick - which did not work.

Bug#891410: upstream work is already in progress

2018-07-02 Thread Jochen Hein
Christoph Biedl writes: > Thanks for reminding me, it's on radar - but given the discussion hasn't > been finished yet I'd prefer to wait until this is part of another > clevis release. If you'd like to have it cherry-picked so people can > start playing with it, let me know. I've no idea when

Bug#887937: krb5-user: Should krb5-user depend on/recommend krb5-k5tls?

2018-01-21 Thread Jochen Hein
Package: krb5-user Version: 1.15-1.2 Severity: wishlist Dear Maintainer, * What led up to the situation? I'm running a road warrior setup and authenticate via KDCProxy. If the package krb5-ktls is not installed authentication fails: # KRB5_TRACE=/dev/stderr kinit admin [12904]

Bug#502292: Please consider including cache option to fix nfs4 problems

2018-01-03 Thread Jochen Hein
Source: nfs-utils Followup-For: Bug #502292 This report is now almost 10 years old - I'd suggest to close the bug with WONTFIX. The original reporter used libnss-ldap to access the user directory, which doesn't do caching of results as far as I know. Even changing

Bug#856328: Fixed upstream in release 2.2.1

2018-01-03 Thread Jochen Hein
This seems to be fixed upstream: http://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=907426b00bdcd69d9a56ac1870990e8ae8c6fe9f -- This space is intentionally left blank.

Bug#518254: ganglia-webfrontend: missing README.Debian

2018-11-30 Thread Jochen Hein
Package: ganglia-webfrontend Followup-For: Bug #518254 Dear Maintainer, in the current stable distribution we have: # dpkg -L ganglia-webfrontend | grep README.Debian /usr/share/doc/ganglia-webfrontend/README.Debian I suggest closing this bug. Jochen -- System Information: Debian Release:

Bug#881896: RFP: src -- Simple Revision Control, single-file and single-user version tracking

2018-11-26 Thread Jochen Hein
Chris Lamb writes: > retitle 881896 ITP: src -- Simple Revision Control, single-file and > single-user version tracking ... > Is there a prefix, suffix or even an alternative name that upstream > use to avoid this? On http://www.catb.org/esr/src/ upstream describes it as "Simple Revision

Bug#919062: python-ipalib depends on transitional packages gnupg2 and gnupg-agent

2019-01-12 Thread Jochen Hein
Package: python-ipalib Version: 4.7.1-3 Severity: minor Dear Maintainer, I've just updated an IPA client to buster and installed freeipa-client from SID. After the update I looked for transitional packages and have these: # dpkg -l | grep dummy ii gnupg-agent 2.2.12-1 all GNU

Bug#878066: ganglia-webfrontend: not compatible with PHP 7

2019-01-12 Thread Jochen Hein
Package: ganglia-webfrontend Version: 3.6.1-3 Followup-For: Bug #878066 I've just upgraded my Ganglia server to buster. Another needed patch is https://github.com/ganglia/ganglia-web/commit/13d426bcf66fb0f27d44847154ba2180884edcd6 -- System Information: Debian Release: buster/sid APT prefers

Bug#549655: ganglia-webfrontend: The script pie.php creates wrong pie charts.

2018-12-01 Thread Jochen Hein
Package: ganglia-webfrontend Version: 3.6.1-3 Followup-For: Bug #549655 I've just had a look at the report and could (temporarily) reproduce it. First some hints for a reproducer. In the cluster view we display a heatmap as the default (and no pie chart). We can either set

Bug#878066: ganglia-webfrontend: not compatible with PHP 7

2018-12-01 Thread Jochen Hein
Package: ganglia-webfrontend Version: 3.6.1-3 Followup-For: Bug #878066 Upstream seems to have this fixed with this commit: https://github.com/ganglia/ganglia-web/commit/c5e5831d23c6db0b04a868578680b32cb03ee952#diff-6e9d3d41e5bc04968be8f28e0b6f7a1a - list( $_cluster, $_host ) = split( '/',

Bug#926928: fetchmail: Server CommonName mismatch

2019-04-16 Thread Jochen Hein
Source: fetchmail Followup-For: Bug #926928 I've checked the manpage for fetchmail. There was the following in the stretch package: --sslcommonname (Keyword: sslcommonname; since v6.3.9) Use of this option is discouraged. Before using it, contact

Bug#979973: libpam-yubico: proposed patch to fix #979973

2021-02-20 Thread Jochen Hein
Package: libpam-yubico Followup-For: Bug #979973 Dear Maintainer, I've upgraded one of my systems where I use pam_yubico and hit the problem. I'd like to see the issue fixed for bullseye since it might have security implications or might render people to be unable to login. Please consider the

Bug#979973: libpam-yubico: add missing patch

2021-02-20 Thread Jochen Hein
Package: libpam-yubico Followup-For: Bug #979973 Dear Maintainer, I missed adding the path. Here it is: diff -ur yubico-pam-2.26.orig/debian/changelog yubico-pam-2.26/debian/changelog --- yubico-pam-2.26.orig/debian/changelog 2021-02-21 05:40:48.0 +0100 +++