On 15/05/2010 03:12, Joey Hess wrote:
Vincent Danjean wrote:
I'm happy with this move. However, there is still an interaction with ssh
to deal with:
vdanj...@eyak:~$ chmod -Rv g+w .ssh/authorized_keys
vdanj...@eyak:~$ ssh localhost
vdanj...@localhost's password:
And, in /var/log/auth.log:
Quoting Russ Allbery (r...@debian.org):
you must not understand how user-private groups work at all
Well I guess I do,...
Given your complaints, actually, you don't appear to.
Is there a mail in this thread that would explain all this?
From your own words, it seems that most negative
]] Christoph Anton Mitterer
| Judging from the changelog of portmap, there's been a *lot* of discussion
| and angst over this decision over the years, and it wasn't one that was
| made easily. I think you're overstating this a bit as an example of a bad
| direction.
|
| Yes,.. but why
Christian PERRIER bubu...@debian.org wrote:
Quoting Russ Allbery (r...@debian.org):
you must not understand how user-private groups work at all
Well I guess I do,...
Given your complaints, actually, you don't appear to.
[...]
Is there a mail in this thread that would explain all this?
You need to explain clearly how the umask of 0002 is insecure. If you
have members in your user private group, then your group isn't private,
is it? UPG is designed to NOT have anyone else in your group except you.
So, adding the write bit on the group mode does not affect security in
the
Santiago Vila sanv...@unex.es wrote:
[...]
Problems like that are expected to happen, and I think we should be
ready to fix them as they are found, so that the umask setting can
really be a choice of the system admin, not an imposition of certain
key programs who do not work well enough on
Hi, All
Recently, code.google.com changed the download page link format.
As a result, the old debian/watch file in packages whose upstream source code
hosted on code.google.com did work anymore.
Take the ibus project for example:
$ cat ibus/debian/watch
version=3
* Asias He asias.he...@gmail.com, 2010-05-15, 17:16:
Recently, code.google.com changed the download page link format.
As a result, the old debian/watch file in packages whose upstream source code
hosted on code.google.com did work anymore.
[...]
The new download page contain the detail link,
Hi,
On Sat, May 15, 2010 at 05:16:08PM +0800, Asias He wrote:
Hi, All
Recently, code.google.com changed the download page link format.
As a result, the old debian/watch file in packages whose upstream source code
hosted on code.google.com did work anymore.
Take the ibus project for
On Thu, May 13, 2010 at 06:39:46PM +0200, Tollef Fog Heen wrote:
]] Salvo Tomaselli
| On Thursday 13 May 2010 17:54:04 Tollef Fog Heen wrote:
| Because it does not handle non-default values. This is just like an
| application that didn't handle IFS or PATH being different from its
|
On Fri, 2010-05-14 at 22:22 -0700, Russ Allbery wrote:
These are really odd complaints to bring against Debian given that these
are not Debian issues. Firefox, for example, works exactly the same way
everywhere. What do you want Debian to do, write our own web browser?
There are limits to
On Sat, 2010-05-15 at 09:04 +0200, Tollef Fog Heen wrote:
You can make that argument for just about all the daemons that are
shipped in the distro.
Yes :)
Should ssh not start by default or just listen
to localhost for instance?
Personally,... I'd prefer the listen to localhost only (per
On Sat, 2010-05-15 at 10:04 +0200, Andreas Metzler wrote:
#2 UPG with umask 022 is useless.
Why is it?
It makes that every user has its own group, and that other users can be
added to it.
This alone doesn't have any effect of course, as such added users have
read rights anyway.
But now it's easy
Package: release-notes
Severity: whishlist
Tags: squeeze
X-Debbugs-CC: debian-devel@lists.debian.org
On Sat,15.May.10, 08:41:29, Christian PERRIER wrote:
More generally speaking, this umask change probably deserves to be
mentioned in the Release Notesalong with a good rationale about
* Christoph Anton Mitterer cales...@scientia.net [100515 12:53]:
If regular users can add other people to groups on your system, you have
way more serious security problems than user-private groups, and those
security problems are not created by Debian.
Of course I talk about having this
On Sat,15.May.10, 13:03:16, Christoph Anton Mitterer wrote:
On Sat, 2010-05-15 at 10:04 +0200, Andreas Metzler wrote:
#2 UPG with umask 022 is useless.
Why is it?
It makes that every user has its own group, and that other users can be
added to it.
This alone doesn't have any effect of
On Sat, 2010-05-15 at 14:16 +0300, Andrei Popescu wrote:
for regular users
Would have to double check it,... but doesn't the current change also
affect root?
Cheers,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
On Sat, 2010-05-15 at 13:22 +0200, Bernhard R. Link wrote:
Sorry, adding one user to the group of another is almost as stupid as
adding a script in /etc/cron.daily writeable by some user.
If the user who owns the group allows it? What else should I do in your
opinion?
Cheers,
Chris.
On Sat, 2010-05-15 at 14:23 +0300, Andrei Popescu wrote:
Why is an own group needed for this? Can't the admin just create groups
as needed where both users shall belong?
Well but that's always possible isn't it? So one could drop the concept
of UPGs completely...
Cheers,
Chris.
smime.p7s
Package: wnpp
Severity: wishlist
Owner: Asias He asias.he...@gmail.com
* Package name: ibus-table-xingyin
Version : ibus-table-xingyin-1.3.0.20100512
* URL : http://code.google.com/p/ibus/
* License : GPLv3
Programming Lang: Python
Description : provide
On 15.05.2010 12:53, Christoph Anton Mitterer wrote:
udisks should have probably not exported the dm-crypt keys to normal
users, but it did.
And why do you think this is a Debian specific problem is completely beyond me.
This was an upstream bug, found by a fellow DD, and the quickly
Package: wnpp
Severity: wishlist
Owner: Asias He asias.he...@gmail.com
* Package name: ibus-table-cangcan
Version : ibus-table-cangcan-1.3.0.20100512
* URL : http://code.google.com/p/ibus/
* License : GPLv3
Programming Lang: Python
Description : provide
* Christoph Anton Mitterer cales...@scientia.net [100515 13:29]:
On Sat, 2010-05-15 at 13:22 +0200, Bernhard R. Link wrote:
Sorry, adding one user to the group of another is almost as stupid as
adding a script in /etc/cron.daily writeable by some user.
If the user who owns the group allows
Hi Andrei,
On Samstag, 15. Mai 2010, Andrei Popescu wrote:
Suggested text:
Thanks for that!
I have one small addition...:
This change can however create security and/or privacy issues if the
system administrator is not aware of it and adds users to the private
group of another user. Also,
On Sat, 2010-05-15 at 13:22 +0200, Michael Biebl wrote:
And why do you think this is a Debian specific problem is completely beyond
me.
This was an upstream bug, found by a fellow DD, and the quickly communicated
to
upstream and fixed there.
I honestly don't see how you can blame Debian
On Sat, 2010-05-15 at 13:45 +0200, Holger Levsen wrote:
This paragraph should be accompanied by something like:
Instead of adding users to other users private groups (which has issues as
explained above) it is recommend to create dedicated groups for these users
for collaboration.
Perhaps
On Sat,15.May.10, 13:30:14, Christoph Anton Mitterer wrote:
On Sat, 2010-05-15 at 14:23 +0300, Andrei Popescu wrote:
Why is an own group needed for this? Can't the admin just create groups
as needed where both users shall belong?
Well but that's always possible isn't it? So one could drop
On Saturday 15 May 2010 13:50:50 Christoph Anton Mitterer wrote:
On Sat, 2010-05-15 at 13:45 +0200, Holger Levsen wrote:
This paragraph should be accompanied by something like:
Instead of adding users to other users private groups (which has issues
as explained above) it is recommend to
On Saturday 15 May 2010 13:47:43 Christoph Anton Mitterer wrote:
On Sat, 2010-05-15 at 13:22 +0200, Michael Biebl wrote:
It just shows how such stuff can completely undermine security, and one
even haven't thought that this would possible.
This applies to any change you make to a piece of
On Sat, May 15, 2010 at 5:48 PM, Osamu Aoki os...@debian.org wrote:
Hi,
I guess we need to generarize situation on sf.net to other popular
download sites. This data is used mainly by uscan program.
Yes.
When the watch file has an URL matching with the Perl regexp
^http://sf\.net/;, the
On 15.05.2010 08:24, Russ Allbery wrote:
Christoph Anton Mitterer cales...@scientia.net writes:
And personally, I really do _not_ trust some of the CAs which are
included/enabled per default.
Having done business with several of them, I don't trust any commercial
CA. This is a way more
Le samedi 15 mai 2010 à 13:26:29 (+0200), Christoph Anton Mitterer a écrit :
Date: Sat, 15 May 2010 13:26:29 +0200
From: Christoph Anton Mitterer cales...@scientia.net
To: 581...@bugs.debian.org
Cc: debian-devel@lists.debian.org
Subject: Re: Bug#581729: [SQUEEZE] Document the umask change for
On Sat,15.May.10, 13:26:29, Christoph Anton Mitterer wrote:
On Sat, 2010-05-15 at 14:16 +0300, Andrei Popescu wrote:
for regular users
Would have to double check it,... but doesn't the current change also
affect root?
By default:
# grep umask .bashrc
umask 022
#
Regards,
Andrei
--
On Sat, May 15, 2010 at 8:34 PM, Eray Aslan eray.as...@caf.com.tr wrote:
Amen. PKI is a naive design and for all intents and purposes will
remain a pipe-dream. All security relationships that is worth anything
is bilateral and no trusted third party is willing to accept enough risk
to
On Sat, May 15, 2010 at 12:53:30PM +0200, Christoph Anton Mitterer wrote:
On Fri, 2010-05-14 at 22:22 -0700, Russ Allbery wrote:
These are really odd complaints to bring against Debian given that these
are not Debian issues. Firefox, for example, works exactly the same way
everywhere.
Le samedi 15 mai 2010 à 15:59:40 (+0300), Andrei Popescu a écrit :
Date: Sat, 15 May 2010 15:59:40 +0300
From: Andrei Popescu andreimpope...@gmail.com
To: debian-devel@lists.debian.org
Cc: 581...@bugs.debian.org
Subject: Re: Bug#581729: [SQUEEZE] Document the umask change for new
installs
Am Samstag, den 15.05.2010, 17:16 +0800 schrieb Asias He:
Recently, code.google.com changed the download page link format.
As a result, the old debian/watch file in packages whose upstream source code
hosted on code.google.com did work anymore.
Take the ibus project for example:
$ cat
On 05/15/2010 05:26 AM, Christoph Anton Mitterer wrote:
On Sat, 2010-05-15 at 14:16 +0300, Andrei Popescu wrote:
for regular users
Would have to double check it,... but doesn't the current change also
affect root?
This does, but root is also in his own UPG. If you add any user to the
root
On Sat, 2010-05-15 at 15:59 +0300, Andrei Popescu wrote:
By default:
# grep umask .bashrc
umask 022
#
Not in the most recent version of base-files, which does not update most
of it files.
Cheers,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
On Sat, 2010-05-15 at 21:01 +0800, Paul Wise wrote:
You might be interested in monkeysphere
...and in RFC 5081
I haven't had a detailed look on monkeyspehre so far, but it seemed at a
first glance, that it does not use standardised technology, does it?
Cheers,
Chris.
smime.p7s
Description:
On 05/15/2010 05:50 AM, Christoph Anton Mitterer wrote:
On Sat, 2010-05-15 at 13:45 +0200, Holger Levsen wrote:
This paragraph should be accompanied by something like:
Instead of adding users to other users private groups (which has issues as
explained above) it is recommend to create
Package: wnpp
Severity: wishlist
Owner: Tobias Grimm et...@debian.org
X-Debbugs-CC: debian-devel@lists.debian.org
Package name: libfakefs-ruby
Version: 0.2.1
Upstream Author: Chris Wanstrath ch...@ozmm.org
URL: http://github.com/defunkt/fakefs
License: MIT
On 05/15/2010 02:00 AM, Robert Klotzner wrote:
Also as far as I understood from a previous post, this change will only
affect
new installations, not existing ones. So even if a user misunderstood the
concept and added other users to his private group, this change does not
affect
him.
On Sat, May 15, 2010 at 9:27 PM, Daniel Leidert
daniel.leidert.s...@gmx.net wrote:
The URL at http://code.google.com/p/ibus/downloads/list itself tells you
everything you need: the version number. And you have a static download
location. So what you need to do is to rewrite the download URL to
Le Sat, May 15, 2010 at 02:16:43PM +0300, Andrei Popescu a écrit :
The default 'umask' for new installs is changed
===
Starting with base-files version 5.4 the default umask for new installs
is 0002 instead of 0022 for regular users (system users,
Le Thu, May 13, 2010 at 11:48:19AM +0200, Santiago Vila a écrit :
Yes, I think this change is important enough to be documented in
release notes. You might want to mention the possible gotchas, like,
for example, performing scp -p from a system with umask 002 to a
system without UPG when
Package: wnpp
Severity: wishlist
Owner: Clément Mondon clement.mon...@gmail.com
* Package name: myscreen
Version : 0.7
Upstream Author : Clément Mondon clement.mon...@gmail.com
* URL : http://www.clement-mondon.fr/myscreen
* License : GPL
Programming Lang: C
]] Christoph Anton Mitterer
(Please respect my mail-followup-to, there's no need to Cc me on lists
which I read. It'd also make your mails more readable if you leave a
blank line between what you quote and your reply.)
| On Sat, 2010-05-15 at 09:04 +0200, Tollef Fog Heen wrote:
| You can make
On Sun, 16 May 2010, Charles Plessy wrote:
Also, I have not seen on -devel that the idea of having a different
umask for system and regular users has been implemented in
base-files yet. I propose to not mention this until base-files is
updated to support it.
The file /etc/profile is only
On 05/15/2010 10:47 AM, Santiago Vila wrote:
On Sun, 16 May 2010, Charles Plessy wrote:
Also, I have not seen on -devel that the idea of having a different
umask for system and regular users has been implemented in
base-files yet. I propose to not mention this until base-files is
updated to
On Sat, May 15, 2010 at 17:59:37 (CEST), Clément Mondon wrote:
Package: wnpp
Severity: wishlist
Owner: Clément Mondon clement.mon...@gmail.com
* Package name: myscreen
Version : 0.7
Upstream Author : Clément Mondon clement.mon...@gmail.com
* URL :
On Sun, May 09, 2010 at 03:10:15AM +0200, Marco d'Itri wrote:
On May 07, Julien Cristau jcris...@debian.org wrote:
- a decision to drop kfreebsd as a release architecture
Since 1 and 2 aren't happening, I think we should consider going with
the third option.
Me too, I believe that the
On Sun, May 09, 2010 at 06:09:10PM -0700, Manoj Srivastava wrote:
In speaking with upstart upstream, I understand that the argument against
linking to libselinux is that, as the kernel is neutral wrt the choice of
LSM, the init process should be also. Linking it against libselinux would
[Steve Langasek]
Was this request ever actually made to the kfreebsd porters? I'm not sure
that it was, in which case it's rather unfair to say that they've had enough
time when they were never informed this was a pressing issue.
One request was done last summer, see
URL:
Hi!
Russ Allbery wrote:
The purpose of UPG is not to use the user private group for any sort of
access control. Rather, the point is to put each user in a group where
they're the only member so that they can safely use a default umask of 002
without giving someone else write access to all
On Fri, May 14 2010, Scott James Remnant wrote:
One of my concerns about upstart is that systems that want to
use SELinux and upstart _have_ to also use an initramfs, which is yet
another component of the system that has to be audited. There have
been patches proposed, and semi-rejected b
Christoph Anton Mitterer schrieb:
#2 UPG with umask 022 is useless.
Why is it?
See http://lists.debian.org/debian-devel/2010/05/msg00315.html.
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
On Sat, 15 May 2010, Andreas Metzler wrote:
#4 We cannot reliably detect UPG-setups. (The setting
USERGROUPS=yes/no in /etc/adduser.conf is not relevant, e.g. in a
NIS szenario users are generated on the master system.)
You don't need to detect UPG setups with 100% reliability; you can
Willi Mann foss...@wm1.at writes:
Russ Allbery wrote:
The purpose of UPG is not to use the user private group for any sort of
access control. Rather, the point is to put each user in a group where
they're the only member so that they can safely use a default umask of
002 without giving
On Sat, May 15, 2010 at 02:34:57PM -0700, Russ Allbery wrote:
Willi Mann foss...@wm1.at writes:
Russ Allbery wrote:
The purpose of UPG is not to use the user private group for any sort of
access control. Rather, the point is to put each user in a group where
they're the only member so
Roger Leigh rle...@codelibre.net writes:
On Sat, May 15, 2010 at 02:34:57PM -0700, Russ Allbery wrote:
That's a good idea. I'm not sure if all UNIX group systems allow one
to ask how many users are a member of a particular group, but if
there's a way to ask that question at least in those
Quoth Don Armstrong d...@debian.org, on 2010-05-15 14:40:05 -0700:
You don't need to detect UPG setups with 100% reliability; you can
just do the following:
1. If there a possibility of this being a UPG setup:
2. If this user's group has the same name and GID as the user's name and
UID:
Package: wnpp
Severity: wishlist
X-Debbugs-CC: debian-devel@lists.debian.org,debian-p...@lists.debian.org
* Package name: libcatalystx-leakchecker-perl
Version : 0.06
Upstream Author : Florian Ragwitz r...@debian.org, Tomas Doran
bobtf...@bobtfish.net
* URL :
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 26 Mar 2010 20:49:36 +0200
Source: squishdot
Binary: squishdot
Architecture: source all
Version: 1.5.0-6.1
Distribution: unstable
Urgency: low
Maintainer: Debian Zope team pkg-zope-develop...@lists.alioth.debian.org
Changed-By:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 12 May 2010 00:20:02 +0200
Source: afflib
Binary: libafflib0 libafflib-dev afflib-dbg afflib-tools
Architecture: source amd64
Version: 3.5.12-1
Distribution: unstable
Urgency: low
Maintainer: Debian Forensics
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 14 May 2010 23:45:26 +0300
Source: agenda.app
Binary: agenda.app
Architecture: source i386
Version: 0.41-1
Distribution: unstable
Urgency: low
Maintainer: Debian GNUstep maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sat, 15 May 2010 09:44:10 +0200
Source: glib2.0
Binary: libglib2.0-0 libglib2.0-udeb libglib2.0-bin libglib2.0-dev
libglib2.0-0-dbg libglib2.0-data libglib2.0-doc libgio-fam libglib2.0-0-refdbg
Architecture: source all amd64
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sat, 15 May 2010 00:06:59 +0300
Source: gnustep-netclasses
Binary: libnetclasses-dev libnetclasses0
Architecture: source i386
Version: 1.06.dfsg-4
Distribution: unstable
Urgency: low
Maintainer: Debian GNUstep maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sat, 15 May 2010 10:00:57 +0200
Source: gst-plugins-ugly0.10
Binary: gstreamer0.10-plugins-ugly-doc gstreamer0.10-plugins-ugly
gstreamer0.10-plugins-ugly-dbg
Architecture: source all amd64
Version: 0.10.14.2-1
Distribution:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sat, 15 May 2010 11:26:17 +0530
Source: latex-sanskrit
Binary: latex-sanskrit
Architecture: source amd64
Version: 2.2-7
Distribution: unstable
Urgency: low
Maintainer: Debian-IN Team debian-in-work...@lists.alioth.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 13 May 2010 12:17:35 -0500
Source: libcue
Binary: libcue1 libcue-dev
Architecture: source amd64
Version: 1.4.0-1
Distribution: unstable
Urgency: low
Maintainer: Taylor LeMasurier-Wren ripps...@gmail.com
Changed-By: Taylor
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sat, 15 May 2010 08:04:47 +0300
Source: pantomime1.2
Binary: libpantomime1.2 libpantomime1.2-dev
Architecture: source i386
Version: 1.2.0~pre3+snap20071004+dfsg-2
Distribution: unstable
Urgency: low
Maintainer: Debian GNUstep
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 25 Apr 2010 12:52:36 +0300
Source: fsprotect
Binary: fsprotect
Architecture: source all
Version: 1.0.5
Distribution: unstable
Urgency: low
Maintainer: Stefanos Harhalakis v...@v13.gr
Changed-By: Stefanos Harhalakis v...@v13.gr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 15 May 2010 11:50:16 +0200
Source: xserver-xorg-video-mach64
Binary: xserver-xorg-video-mach64 xserver-xorg-video-mach64-dbg
Architecture: source amd64
Version: 6.8.2-3
Distribution: unstable
Urgency: medium
Maintainer: Debian
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 14 May 2010 22:21:32 +0200
Source: icedove
Binary: icedove icedove-dev icedove-dbg
Architecture: source i386
Version: 3.0.4-3
Distribution: unstable
Urgency: low
Maintainer: Alexander Sack a...@debian.org
Changed-By: Christoph
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 15 May 2010 12:04:08 +0200
Source: xserver-xorg-video-nouveau
Binary: xserver-xorg-video-nouveau xserver-xorg-video-nouveau-dbg
Architecture: source amd64
Version: 1:0.0.15+git20100329+7858345-4
Distribution: unstable
Urgency:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 10 May 2010 16:38:29 +0200
Source: tryton-client
Binary: tryton-client
Architecture: source all
Version: 1.6.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Tryton Maintainers try...@lists.debian-maintainers.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 12 May 2010 12:49:13 +0200
Source: tryton-modules-account
Binary: tryton-modules-account
Architecture: source all
Version: 1.6.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Tryton Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 13 May 2010 11:35:07 +0200
Source: tryton-modules-account-be
Binary: tryton-modules-account-be
Architecture: source all
Version: 1.6.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Tryton Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 13 May 2010 11:37:55 +0200
Source: tryton-modules-account-de-skr03
Binary: tryton-modules-account-de-skr03
Architecture: source all
Version: 1.6.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Tryton Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 13 May 2010 11:44:42 +0200
Source: tryton-modules-account-invoice
Binary: tryton-modules-account-invoice
Architecture: source all
Version: 1.6.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Tryton Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 13 May 2010 20:50:42 +0200
Source: tryton-modules-account-invoice-history
Binary: tryton-modules-account-invoice-history
Architecture: source all
Version: 1.6.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Tryton
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 13 May 2010 20:54:15 +0200
Source: tryton-modules-account-invoice-line-standalone
Binary: tryton-modules-account-invoice-line-standalone
Architecture: source all
Version: 1.6.0-1
Distribution: unstable
Urgency: low
Maintainer:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 13 May 2010 11:47:38 +0200
Source: tryton-modules-account-product
Binary: tryton-modules-account-product
Architecture: source all
Version: 1.6.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Tryton Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 13 May 2010 11:50:21 +0200
Source: tryton-modules-account-statement
Binary: tryton-modules-account-statement
Architecture: source all
Version: 1.6.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Tryton Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 13 May 2010 11:53:13 +0200
Source: tryton-modules-analytic-account
Binary: tryton-modules-analytic-account
Architecture: source all
Version: 1.6.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Tryton Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 13 May 2010 20:56:02 +0200
Source: tryton-modules-analytic-invoice
Binary: tryton-modules-analytic-invoice
Architecture: source all
Version: 1:1.6.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Tryton Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 13 May 2010 21:08:46 +0200
Source: tryton-modules-analytic-sale
Binary: tryton-modules-analytic-sale
Architecture: source all
Version: 1.6.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Tryton Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 10 May 2010 17:04:38 +0200
Source: tryton-modules-calendar
Binary: tryton-modules-calendar
Architecture: source all
Version: 1.6.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Tryton Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 13 May 2010 11:55:28 +0200
Source: tryton-modules-calendar-classification
Binary: tryton-modules-calendar-classification
Architecture: source all
Version: 1.6.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Tryton
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 10 May 2010 17:38:00 +0200
Source: tryton-modules-calendar-scheduling
Binary: tryton-modules-calendar-scheduling
Architecture: source all
Version: 1.6.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Tryton Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 13 May 2010 12:00:13 +0200
Source: tryton-modules-calendar-todo
Binary: tryton-modules-calendar-todo
Architecture: source all
Version: 1.6.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Tryton Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 12 May 2010 13:46:40 +0200
Source: tryton-modules-company
Binary: tryton-modules-company
Architecture: source all
Version: 1.6.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Tryton Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 15 May 2010 12:13:14 +0200
Source: xserver-xorg-video-r128
Binary: xserver-xorg-video-r128 xserver-xorg-video-r128-dbg
Architecture: source amd64
Version: 6.8.1-3
Distribution: unstable
Urgency: medium
Maintainer: Debian X
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Format: 1.8
Date: Sat, 15 May 2010 12:17:36 +0200
Source: lash
Binary: liblash-dev lashd lash-bin liblash2 lash-doc python-lash
Architecture: source all amd64
Version: 0.5.4.0-2
Distribution: unstable
Urgency: low
Maintainer: Debian Multimedia
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sat, 15 May 2010 11:23:18 +0100
Source: libhildonhelp
Binary: libhildonhelp-dev libhildonhelp0 libhildonhelp0-dbg
Architecture: source i386
Version: 2.0.5.debian.5-1
Distribution: unstable
Urgency: low
Maintainer: Debian Maemo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 13 May 2010 21:52:42 +0200
Source: tryton-meta
Binary: tryton-modules-all
Architecture: source all
Version: 12
Distribution: unstable
Urgency: low
Maintainer: Debian Tryton Maintainers try...@lists.debian-maintainers.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 12 May 2010 13:31:29 +0200
Source: tryton-modules-company-work-time
Binary: tryton-modules-company-work-time
Architecture: source all
Version: 1.6.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Tryton Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 10 May 2010 23:43:01 +0200
Source: tryton-modules-country
Binary: tryton-modules-country
Architecture: source all
Version: 1.6.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Tryton Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 10 May 2010 23:51:09 +0200
Source: tryton-modules-currency
Binary: tryton-modules-currency
Architecture: source all
Version: 1.6.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Tryton Maintainers
1 - 100 of 191 matches
Mail list logo