Package: logcheck
Version: 1.2.54
When Postfix is configured to listen on port tcp/587 by uncommenting the
"submission" line in the postfix master.cf, logcheck does not ignore the
anvil statistics log entries - attached is a patch from the current SVN
trunk.
Index: rulefiles/linux/ignore.d.server/
Here is an example of the event entries that prompted me to edit my
postfix ignore, after I enabled postfix to listen to the submission port
(tcp/587):
System Events
=-=-=-=-=-=-=
Mar 3 13:31:27 aesop postfix/anvil[16286]: statistics: max connection
rate 1/60s for (submission:69.153.32.239) at Ma
On 12/30/2013 08:16 AM, Santiago Garcia Mantinan wrote:
After adding ca-certificates-java I found that a locally installed ca
(/usr/local/share/ca-certificates/whatever.crt) was not being added to the
java keystore,
--> .crt
The only way I got it added to the java certs was by removing all t
On 12/30/2013 09:10 AM, Michael Shuler wrote:
On 12/30/2013 08:16 AM, Santiago Garcia Mantinan wrote:
After adding ca-certificates-java I found that a locally installed ca
(/usr/local/share/ca-certificates/whatever.crt) was not being added to
the
java keystore,
--> .crt
The only way I
This has all sorts of problems.
1) incomplete source and debian packaging (symlinked to nowhere)
2) native package (version 1.0.1 and debian/ dir should be separate from
upstream source)
--
Kind regards,
Michael
mshuler@mana:~/tmp/build$ dget -xu
http://mentors.debian.net/debian/pool/main/d/db
I just wanted to include a reply on this bug that I have been reading
the responses as they have been posted. I appreciate the feedback and
I'm still pretty torn, to be honest.
#1 - Debian does not distribute CAcert's web site code, so while the
question about its quality is technically irrel
I just wanted to include a reply on this bug that I have been reading
the responses as they have been posted. I appreciate the feedback and
I'm still pretty torn, to be honest.
#1 - Debian does not distribute CAcert's web site code, so while the
question about its quality is technically irrel
On 12/06/2013 06:21 PM, Daniel Kahn Gillmor wrote:
can we ship CAs marked as "disabled" by default?
I think this would prove to be a rather severe disservice to Debian
users, making all SSL connections fail for all software that is or
depends on one of the reverse dependencies of ca-certifica
On 12/06/2013 08:18 PM, Daniel Kahn Gillmor wrote:
On 12/06/2013 08:11 PM, Michael Shuler wrote:
On 12/06/2013 06:21 PM, Daniel Kahn Gillmor wrote:
can we ship CAs marked as "disabled" by default?
I think this would prove to be a rather severe disservice to Debian
users, maki
On 12/16/2013 04:37 PM, Christoph Lechleitner wrote:
Why is the ca-certificates package not in the list of security relevant
packages?
The Debian Security team does place some importance on keeping
ca-certificates updated, as can be seen in various uploads over the
years, however, as per rele
On 12/16/2013 06:27 PM, Christoph Lechleitner wrote:
Regarding our business model: Using Debian on those customer systems
was not our choice, it was the customer's. But we recommended it
Debian is a great choice :)
My comment was about the decision to remain on oldstable for such a long
time
Control: tags -1 patch
On 10/22/2013 10:39 AM, Vaclav Ovsik wrote:
> Is it possible to add sort after find, so the order will be deterministic?
>
> --- /usr/sbin/update-ca-certificates~ 2013-10-22 17:36:21.953351000 +0200
> +++ /usr/sbin/update-ca-certificates2013-10-22 17:36:42.685350998 +
Hello Michal,
This bug report needs some additional information from you. Please,
read my 9/26/2013 reply [0] and and reply to the bug to see if we can
figure out how we can help solve your problem.
[0] http://bugs.debian.org/724674#10
--
Kind regards,
Michael
--
To UNSUBSCRIBE, email to de
OP's email still bounces..
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Hi,
Your package is built as a native Debian package, version 1.0.1 (doesn't
contain a Debian build version, i.e.: 1.0.1-1). This is the first thing
to work on.
Builds OK in a sid cowbuilder.
More TODO: :)
mshuler@mana:~/tmp/build$ lintian -I --pedantic fatcat_1.0.1_amd64.changes
I: fatcat so
Hi again,
Some other things I noticed:
- no source code Copyright in d/copyright (only lists debian/*)
- is the source code to build the docs/ image files available?
- no d/watch file
- no Homepage: entry in d/control
- no Vcs-*: entries in d/control
--
Kind regards,
Michael
--
To UNSUBSCRIBE
Control: forwarded -1 https://bugzilla.mozilla.org/show_bug.cgi?id=994033
On 04/09/2014 08:07 AM, Klemens Baum wrote:
Following the OpenSSL CVE-2014-0160 "Heartbleed" vulnerability [1,2],
any certificate that was used with an vulnerable version of OpenSSL (I
read somewhere 1/3 of the web) should
Thanks for the patch, Laurent.
--
Michael
Control: notfound -1 20140325
Control: tag -1 unreproducible
You probably need to follow the positivessl installation documentation
[0] and include the intermediate CA certificate file(s) in your web
server configuration. The various Comodo root CA certificates are
already in ca-certificates. Once
g
their own audit guidelines, that would be a fantastic indicator that
the project is viable and trustworthy by their own standards. I would
enjoy reading about this and consider our options. If CAcert is
included in the Mozilla certdata.txt, it will be included in Debian
ASAP, as this is our current
I unarchived and reopened #687693, then merged #741561-#687693. That
didn't seem to do what I thought. Apologies if I goofed that up, as it
seems #741561 no longer appears on the open bugs page for the package. I
had thought they would both appear as open bugs. If someone has the
proper merge f
On 04/01/2014 04:52 PM, Kurt Roeckx wrote:
It seems that you revered the removal of some certificates.
However they did not get installed again. It seems they were
excluded in /etc/ca-certificates.conf for some reason, and
so not added again.
Is this between 20140223 -> 20140325? Yes, Mozilla
ww.cacert.org/policy/RootDistributionLicense.php
https://bugs.debian.org/718434
https://bugs.debian.org/741561
--
Kind regards,
Michael Shuler
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
On 04/02/2014 12:27 AM, Filipus Klutiero wrote:
I rarely see multiple NEWS entries from packages which I never directly
interact with. ca-certificates is one package I never had to install,
remove, upgrade, downgrade, fix, or even learn about, yet it has 17
entries in 10 years. In fact, ca-certif
Thanks for the suggestions, Filipus - I appreciate your time :)
--
Michael
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Control: severity -1 normal
Control: tags -1 + moreinfo
On 04/04/2014 05:17 PM, Weilu Jia wrote:
GTE_CyberTrust_Global_Root is missing from the package and is causing
ssl certificate verification to fail.
Certificate verification fails because file is missing:
optix2000@rumia ~/Downloads/ca-ce
On 03/13/2014 05:18 PM, Klaus Ethgen wrote:
The severity is critical as it breaks several unrelated packages
Please, be specific about the stated several packages.
--
Kind regards,
Michael
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe".
On 03/14/2014 04:40 AM, Klaus Ethgen wrote:
Am Fr den 14. Mär 2014 um 0:41 schrieb Michael Shuler:
On 03/13/2014 05:18 PM, Klaus Ethgen wrote:
The severity is critical as it breaks several unrelated packages
Please, be specific about the stated several packages.
- - mutt: Asking to prove
Thanks for including your thoughts.
On 03/14/2014 01:25 PM, Wolfgang Walter wrote:
And why valicert's certificates have been removed though they are still in
iceweasel?
Valicert as well as several other 1024-bit CA certificates were removed
from Mozilla.
https://bugzilla.mozilla.org/show_bu
On 01/15/2013 07:35 PM, Christoph Anton Mitterer wrote:
> In some... development branch or so... Mozilla has removed apparently
> _all_ Turktrust certs, at least for now.
[citation needed] ;-)
We usually stick to released versions of code. I have not seen any
further movement in the discussion
On 01/19/2013 10:41 AM, Guillem Jover wrote:
> As discussed in 537051 the NMU introduced an unneeded and confusing
> usage of interest-noawait, and the accompanying Pre-Depends on dpkg.
> The attached patch removes these.
Thanks for the patch. I'll get this tested out as soon as I can and get
an
provides serious/important fixes
that correct squeeze -> wheezy upgrades using the triggers provided by
ca-certificates (>=20121114), as well as a fix test for dpkg-query in
postinst and correcting library path for softokn3pkg and nsspkg.
Thank you!
- --
Kind regards,
Michael Shuler
-BEG
Dear release team,
When allowing ca-certificates[-java] to migrate to wheezy, please, allow
them together so they are installable:
Package: ca-certificates
Version: 20130119
Breaks: ca-certificates-java (<< 20121112+nmu1)
-
Package: ca-certificates-java
Version: 20121112+nmu1
Depends: ca-cert
On 01/21/2013 11:58 AM, Andreas Beckmann wrote:
>> When allowing ca-certificates[-java] to migrate to wheezy, please, allow
>> them together so they are installable:
>
> If dependencies are set up correctly, britney won't migrate only half of
> the packages if that leads to an uninstallable state.
Control: tags -1 pending
Hello,
The decision was made by the Mozilla CA team [0] to remove the recently
added new CA for "TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı",
while leaving the two older Turktrust CA certificates enabled in
certdata.txt version 1.87. ca-certificates_20121105 includ
Control: severity -1 serious
Control: tags -1 pending
(Setting to serious, due to policy violation)
After reading the -legal thread, comments above, the CAcert mailing list
thread, the Fedora explanation, and carefully reading the licensing
myself, the cautious side of me says the right thing to
On 11/03/2012 08:15 PM, Steve Langasek wrote:
> On Sat, Nov 03, 2012 at 03:28:08PM -0500, Michael Shuler wrote:
>> After reading the -legal thread, comments above, the CAcert mailing list
>> thread, the Fedora explanation, and carefully reading the licensing
>> myself, the cau
I meant to include a note that I'm fine with not removing CAcert from
ca-certificates, as long as there is consensus with a) include the
license in d/copyright, or b) ignore it (for now). We can work on this
after wheezy, when we can add another package, if that is what we need
to do. Sorry if th
ying to think like
an attorney, and a good laugh helps, too.
I really appreciate your insight, Steve.
--
Warm regards,
Michael Shuler
signature.asc
Description: OpenPGP digital signature
as separate files, as opposed to the
current concatenation into cacert.org.crt.
See openssl bug #642314 for details
- --
Michael Shuler
- -- System Information:
Debian Release: wheezy/sid
APT prefers testing
APT policy: (900, 'testing')
Architecture: amd64 (x86_64)
Kernel: Lin
Control: tags -1 pending
Double-checking cert hashes:
Before (ver. 20120623):
$ ls -l /etc/ssl/certs/|grep cacert.org
lrwxrwxrwx 1 root root 14 Nov 4 16:58 590d426f.0 -> cacert.org.pem
lrwxrwxrwx 1 root root 14 Nov 4 16:58 5ed36f99.0 -> cacert.org.pem
lrwxrwxrwx 1 root root 14 Nov
Control: tags -1 - pending + patch
Setting to patch for some advice..
- 20090708 removed cacert.org/root.crt and cacert.org/class3.crt
(deprecated in 20080809)
- 20080809 concatenated both CACert Class 1 and Class 3 certificates
into cacert.org.pem for certificate chaining, deprecating the indivi
test available mozilla CA bundle for Wheezy.
unblock ca-certificates/20121105
- --
Kind regards,
Michael Shuler
- -- System Information:
Debian Release: wheezy/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'unstable')
Architecture: amd64 (x86_64)
Kernel
On 11/10/2012 12:23 PM, intrigeri wrote:
> Michael Shuler wrote (10 Nov 2012 17:52:41 GMT) :
>> unblock ca-certificates/20121105
>
> There are multiple instances of:
>
>> -CKA_TRUST_SERVER_AUTH CK_TRUST CKT_NSS_TRUST_UNKNOWN
>> +CKA_TRUST_SERVER_AUTH CK_TRUST CK
quot;
+ "Trustis FPS Root CA"
Or should I patch out these changes from mozilla/certdata.txt and re-upload?
--
Kind regards,
Michael Shuler
signature.asc
Description: OpenPGP digital signature
On 11/04/2012 06:18 PM, Michael Shuler wrote:
> If we attempt to leave cacert.org.pem around, we disrupt the hashes to
> the individual files. The openssl maintainers wish us to go back to the
> split files, so they can remove a faulty patch. I'll need to touch base
> with this
Similar to the removal of $CERTBUNDLE prior to calling c_rehash in
sbin/update-ca-certificates (see http://bugs.debian.org/cgi-bin/643667),
we could (using vars, etc. - this is just an idea):
diff --git a/sbin/update-ca-certificates b/sbin/update-ca-certificates
index 5375950..72acc5a 100755
--- a
merge 690204 537051
thanks
Same errors in the attached log during a squeeze to wheezy dist-upgrade.
However, immediately following the dist-upgrade, re-running
'update-ca-certificates --fresh' completes successfully and sets up the
java keystore properly.
In all cases, the end of the ca-certifica
On 11/14/2012 06:12 PM, intrigeri wrote:
> Michael Shuler wrote (11 Nov 2012 20:59:10 GMT) :
>> In parsing certdata.txt for the ca-certificates package, neither of
>> these flags are used when the CA trust database is created, so both
>> CKT_NSS_MUST_VERIFY_TRUST and CKT_NS
On 11/15/2012 08:46 AM, Michael Shuler wrote:
> On 11/14/2012 06:12 PM, intrigeri wrote:
>> I think it would be even better to replace "clean up" with some
>> version of "parsing certdata.txt for the ca-certificates package,
>> neither of these flags are used w
On 11/16/2012 01:03 AM, Guillem Jover wrote:
> The debconf.org certifcate is named just ca.crt [0], which ends up
> being symlinked from /etc/ssl/certs/ as ca.pem. Please, rename the
> filename to denote it's coming from Debconf CA, and to avoid using
> such a generic and confusing name, in the sam
as
removed from the archive post-squeeze, and if it may be suitable for
debian in the future.
[0] http://packages.debian.org/search?keywords=mailscanner
[1] http://packages.qa.debian.org/m/mailscanner.html
[2]
http://bugs.debian.org/cgi-bin/pkgreport.cgi?archive=both;src=mailscanner
--
Kind regards,
"true" perhaps?
--
Kind regards,
Michael Shuler
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
tags 624182 + moreinfo
thanks
Torsten,
Is this actually still an issue? I see that the java keystore is
getting fully updated with -f/--fresh when I was testing. Thanks!
--
Kind regards,
Michael
mshuler@mana:~$ sudo update-ca-certificates
Updating certificates in /etc/ssl/certs... 0 added,
sing
this publicly. I can understand your feelings on the topic. How do you
feel about the sneaky nature of the apparently multiple Verisign
compromise disclosures, and the subsequent lack of public discussion -
should we also remove their CAs?
--
Kind regards,
Michael Shuler
signature.asc
Description: OpenPGP digital signature
tags 660002 pending
thanks
On 02/15/2012 11:21 AM, Michał Kułach wrote:
> Please add attached Polish debconf translation.
Pending next upload:
http://anonscm.debian.org/gitweb/?p=collab-maint/ca-certificates.git;a=commit;h=926dd57f44e37eade9a6789c82ebeae7b42a52d0
Thank you!
--
Kind regards,
Mi
==> PROCESS 69.93.127.10:53 0,IQUERY,0,0,1,0,0,0,NOERROR,0,0,0,0 . IN A
Net::DNS::Header::data: no such method at
/usr/share/perl5/Net/DNS/Fingerprint.pm line 669
$
--
Kind regards,
Michael Shuler
-- System Information:
Debian Release: wheezy/sid
APT prefers unstable
APT policy: (900, '
On 07/03/2012 01:01 PM, Thorsten Alteholz wrote:
> I am using a fresh Sid VM and unfortunately get the following output:
What version of libnet-dns-perl on that Sid VM? I run Sid and this
appears to be the issue. With the version in testing (0.66-2+b2) fpdns
works - with the version in Sid (0.68
Thanks for the bug report, Andreas. I'll get this updated and tested as
soon as I can.
Kind regards,
Michael Shuler
signature.asc
Description: OpenPGP digital signature
f/confmodule; then
. /usr/share/debconf/confmodule
(master)mshuler@mana:~/repos/git/ca-certificates$
--
In looking at #316521, I can understand this might be the problem. I'll
test out what happens with no explicit rmdir's in postinst and let dpkg
deal with the content
edful. Or you could pull ca-certificates_20120721 from my
repository and report back that it passes, perhaps?
http://www.pbandjelly.org/debian/ca-certificates_20120721_all.deb
--
Kind regards,
Michael Shuler
diff --git a/debian/changelog b/debian/changelog
index 7736538..89d7d03 100644
--
On 07/29/2012 07:53 AM, Kurt Roeckx wrote:
> On Thu, Sep 22, 2011 at 10:15:50AM +0200, Loïc Minier wrote:
>> Just thought of another minor issue with the new c_rehash handling
>> multiple certs in the same file: when a piece of software follows the
>> hashed symlink, the certificate it's looking
;ll be shipping the
> md2 ones by mistake.
We strive to properly ship each trusted CA in the mozilla certdata.txt,
so I agree and will work on correcting this. Thanks for the report :)
--
Kind regards,
Michael Shuler
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.
ance without
> going into too many details about what justification should or shouldn't
> be required for using UTF-8.
Agreed. As one of the concerned package maintainers, I think this sounds
fine.
--
Kind regards,
Michael Shuler
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
be added to the /etc/logrotate.d/munin (munin-node,
perhaps, too) sections to prevent the log loss? (or should this be a
separate bug report?)
Thanks!
--
Kind regards,
Michael Shuler
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe&
On 04/08/2013 07:14 AM, Michael Shuler wrote:
> it appears that I am missing several minutes of log lines between the
> end of munin-graph.log.1.gz and the beginning of munin-graph.log.
Clarification: it appears that I'm missing most of the log line entries
of one graph run (not seve
should be in the list of
Recommends for munin-plugins-core.
- --
Kind regards,
Michael Shuler
- -- System Information:
Debian Release: 7.0
APT prefers testing
APT policy: (900, 'testing'), (400, 'unstable'), (300, 'experimental')
Architecture: amd64 (x86_64)
Fo
void log data loss, at the cost of
a bit of disk space.
- --
Kind regards,
Michael Shuler
- -- System Information:
Debian Release: 7.0
APT prefers testing
APT policy: (900, 'testing'), (400, 'unstable'), (300, 'experimental')
Architecture: amd64 (x86_64)
Fore
Using the steps to reproduce, I successfully get audio playback with
chromium_26.0.1410.43-1 without any issues at all.
> Kernel: Linux 2.6.32-5-amd64 (SMP w/4 CPU cores)
hmm.. I'm using 3.2.0-4-amd64 (3.2.41-2). Relevant?
--
Kind regards,
Michael
--
To UNSUBSCRIBE, email to debian-bugs-di
On 11/29/2012 10:48 AM, Don Armstrong wrote:
> I've actually tested this, and it hasn't been a problem. I suppose the
> only way you could get it to be one is if you were manually using
> dpkg. If that's really the case, then it basically means that no
> package in wheezy can use the noawait trigge
Upgrading these packages require adding i386 as an installable
architecture for multiarch, however, this upgrade is now highly
invasive.. I have not gone down the path of debugging all the
dependencies pulled in, but this makes me a bit sad, as many irrelevant
(to me) i386 libs are installed, which
Now that I look a bit closer, it appears that ia32-libs_20120926 was a
monolithic package that included most of the now separate library files.
However, I am concerned with the removal of nginx and nginx-full 64-bit
packages to be replaced with nginx-light 32-bit package in the log I
posted above.
On 11/30/2012 04:20 AM, Ansgar Burchardt wrote:
> Maybe the switch from libgd2-noxpm to libgd2-xpm libgd2-xpm:i386 causes
> this? In that case you should be able to install nginx-full again after
> the upgrade.
That is exactly correct. Last night, I installed libgd2-xpm:amd64 which
replaces/remov
Thanks for the additional info!
On 12/04/2012 07:41 AM, Goswin von Brederlow wrote:
> It should be noted that ia32-libs and ia32-libs-gtk now depend on the
> libs they previously contained as binary copies. So while you get many
> new libraries they should basically balance out with the contents
>
e
next dot release.
--
Kind regards,
Michael Shuler
signature.asc
Description: OpenPGP digital signature
On 02/06/2013 01:46 AM, Erwan David wrote:
> java-ca-certificates is not installed, but conf files are still there
> (it surely was installed as a dependency then removed (but not purged)
> when not needed anymore.
>
> nux19222:~ % dpkg -l '*ca-cert*'
> Desired=Unknown/Install/Remove/Purge/Hold
>
On 02/06/2013 01:46 AM, Erwan David wrote:
> Updating certificates in /etc/ssl/certs... 7 added, 0 removed; done.
> Running hooks in /etc/ca-certificates/update.d
> Exception in thread "main" java.lang.NoClassDefFoundError: UpdateCertificates
> Caused by: java.lang.ClassNotFoundException: Updat
file a bug upstream in Mozilla's bugzilla, if
there is evidence that Mozilla needs to be made aware of, or comment on
the existing bugzilla report that was linked.
--
Kind regards,
Michael Shuler
mshuler@mana:~$ w3m -dump
http://www.mozilla.org/projects/security/certs/included/ | grep -i -
I am not a friendica user, but I took a quick look for some feedback on
packaging:
1) successfully builds in a sid cowbuilder - ok.
2) lintian wishlist: font-in-non-font-package
usr/share/friendica/view/theme/vier/font/fontawesome-webfont.ttf - this
should go in a fonts- package and depend on it?
om the concentrator are set up fine, but the static route
for the concentrator IP address was not set, due to the extra data not being
correct for 'ip route add ...'
After the attached sed line fix, I get a static route for the concentrator
again.
Kind regards,
Michael Shuler
-- System
On 09/07/2011 06:49 PM, Raphael Geissert wrote:
> Stefan doesn't seem to be active, at least regarding the adoption of ca-certs.
I have not received a reply from Stefan, either.
> Michael: Thijs and I are interested in maintaining ca-certificates. What were
> your plans regarding its maintenance
On 08/22/2011 10:56 PM, Russ Allbery wrote:
> Charles Plessy writes:
>
>> as per /usr/share/doc/ca-certificates/README.Debian, I am looking for
>> additional signed recommendations for the addition of the Amazon Elastic
>> Computer Cloud (EC2) public certificate to the ca-certificates packages.
>
On 09/16/2011 01:21 AM, Raphael Geissert wrote:
> I don't think that some bits of vcs history should become a blocker. Let's
> better work with what we already have at hand.
This sounds acceptable, but I thought of using snapshot.d.o to see if I
could fill in some history, and I have some time Sa
On 09/16/2011 07:08 AM, Michael Shuler wrote:
> On 09/16/2011 01:21 AM, Raphael Geissert wrote:
> I init'ed collab-maint/ca-certificates, but I would like to see if I can
> at least fill in the release history, as mentioned above.
I pulled all the missing releases from snapshot.d.
es configured by the package. I'll consider whether this bug
should just be closed or if some further escaping is needed after
looking more closely.
--
Kind regards,
Michael Shuler
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Control: severity -1 normal
On 07/27/2013 08:52 PM, Christoph Anton Mitterer wrote:
> Hi.
Hi Christoph - thanks for the bug report. I lowered the severity since I
agree that some improvements can be made, but local certificate handling
does work fine. Biggest hint I have is to use 'update-ca-cert
In addition, I had an email conversation (link to thread is escaping me,
at the moment) about removal due to their license statement [0] that
"You are bound by the Root Distribution Licence for any re-distributions
of CAcert's roots." [1].
I was convinced by others that the certificates cannot be
On 07/31/2013 01:55 PM, Michael Shuler wrote:
> In addition, I had an email conversation (link to thread is escaping me,
> at the moment) about removal due to their license statement [0] that
> "You are bound by the Root Distribution Licence for any re-distributions
> of CA
--
Kind regards,
Michael Shuler
signature.asc
Description: OpenPGP digital signature
On 10/02/2013 02:25 PM, Adam D. Barratt wrote:
> On Wed, 2013-10-02 at 10:31 -0500, Michael Shuler wrote:
>> I would enjoy the possibility of getting ifmetric_0.3-2+deb7u1 uploaded
>> for the 7.2 release and the window is getting smaller. I confirmed my
>> sponsor's ava
reassign 609238 debian-reference
retitle 609238 debian-reference: ifmetric typo
tags 609238 patch
thanks
Attached is a patch to correct the typo.
--
Kind regards,
Michael Shuler
Index: asciidoc/05_network.txt
===
--- asciidoc
package: wnpp
severity: normal
Per an email conversation with the current maintainer, I intend to adopt
ifmetric.
On 09/03/2013 04:47 PM, Chris Hanson wrote:
> I would love it if you would take over ifmetric.
--
Kind regards,
Michael Shuler
signature.asc
Description: OpenPGP digi
Control: tags -1 pending
ifmetric now has a collab-maint git repository and some low hanging
fruit committed:
http://anonscm.debian.org/gitweb/?p=collab-maint/ifmetric.git
--
Kind regards,
Michael Shuler
signature.asc
Description: OpenPGP digital signature
src/ifmetric.c for s/Recieved/Received/ typo.
* Add debian/upstream_changelog from homepage News section.
* Add patch to fix "NETLINK: Packet too small or truncated!" error.
Thanks to Benedek László for the patch. Closes: #514197, LP: #896584
--
Kind regards,
Michael Shuler
sign
I meant to include a comment in the original RFS about #661591:
#661591 "packages providing ifupdown scripts must have those scripts
fixed if needed"
I have not fully tested exit codes, but the ifmetric if-up script should
cleanly exit 0 or 1. Once I have tested it out, I will removed ifmetric
f
Control: affects 661591 - ifmetric
I checked that the ifmetric if-up script exits 0 on success and 1 on error.
--
Kind regards,
Michael Shuler
signature.asc
Description: OpenPGP digital signature
On 09/04/2013 10:38 AM, Raphael Geissert wrote:
> On 3 September 2013 08:05, Charles Davis wrote:
>> On behalf of the Wine community, I'd like to request that the USERTrust
>> Group (now COMODO)'s USERFirst Object Root CA (UTN-USERFirst-Object) be
>> added to the ca-certificates collection. This
On 09/14/2013 12:15 PM, Thomas R. Koll wrote:
<..lots!..>
I appreciate you adding some good details and your thoughts to this bug
report, Thomas.
--
Kind regards,
Michael Shuler
signature.asc
Description: OpenPGP digital signature
Upstream commit ea4324b [0] corrects this and is contained in upstream
tag/release 2013.09.15, so the upload of pianobar_2013.09.15 should fix
this issue.
[0] https://github.com/PromyLOPh/pianobar/commit/ea4324
--
Kind regards,
Michael Shuler
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ
On 09/17/2013 10:01 AM, Luke Faraone wrote:
> Is this issue also occurring in wheezy? If so, I could probably update
> it also in the stable release.
I track testing, so cannot confirm, but I imagine so. Pianobar is one
of those packages that changes as the target service API changes, making
it d
1 - 100 of 313 matches
Mail list logo