On Fri, May 17, 2013 at 4:31 AM, Chow Loong Jin hyper...@debian.org wrote:
On 17/05/2013 01:01, Pau Garcia i Quiles wrote:
Patch releases are NOT available as zip files and the list of
wrongdoings is long:
- Patch releases are only available from the git repository
Josselin Mouette j...@debian.org writes:
Le jeudi 16 mai 2013 à 17:35 -0700, Russ Allbery a écrit :
I have a C shared library that takes a pointer to an opaque struct as
the first argument to most of its API calls. The internal layout of
that opaque struct is changing (to add new members).
Le 16/05/2013 18:37, Russ Allbery a écrit :
You could, in theory, switch to DNSSEC, but now you're just replacing
one CA cartel with another.
Except that with DNSSEC (and DANE), the number of people you have to
trust is much smaller.
Right, it depends on what your risk model is. If
On Monday 13 May 2013 11:26 PM, Thomas Goirand wrote:
On 05/13/2013 03:06 PM, Ritesh Raj Sarraf wrote:
1) Duplicate bug reports: There are high possibilities that we could see
a sudden increase in the number of bug reports, many duplicates. This is
something I'm not sure how we want to
Le 16/05/2013 20:40, Russ Allbery a écrit :
What am I missing?
I suppose one thing that I could be missing is that, with a certificate,
you have no privacy controls over what metadata you release. Whatever you
put in the certificate is visible to anyone who looks at the certificate.
(Well,
On Mon, 13 May 2013 02:31:02 +0200, m...@linux.it (Marco d'Itri) wrote:
Maybe kfreebsd will do, but as I explained at FOSDEM I plan to make udev
depend on either upstart or systemd.
I would rather not be the one who will choose which one of them, so
I hope that we will get to a consensus about
Hi,
On Fri, 17 May 2013, Ritesh Raj Sarraf wrote:
That is a good point. Thanks Thomas. We could submit apport reports with
the tag Apport and instruct reportbug to forward the report to
pack...@qa.debian.org.
This way we avoid the flood of bug reports in general while at the same
time the
Hi.
Philip Hands p...@hands.com writes:
Do you have any thoughts on how that compares with using
BrowserID/Persona? I'd got the impression that BrowserID has been put
together learning from mistakes of OpenID WebID, but perhaps I'm just
swallowing their marketing.
AFAIU, I guess that,
Quoting Stéphane Glondu (2013-05-17 08:14:13)
Le 16/05/2013 18:37, Russ Allbery a écrit :
You could, in theory, switch to DNSSEC, but now you're just
replacing one CA cartel with another.
Except that with DNSSEC (and DANE), the number of people you have
to trust is much smaller.
Hi.
Sorry to be a bit late in the discussion.
Russ Allbery r...@debian.org writes:
I'd never heard of WebID before this thread, but looking briefly at the
spec, I share Daniel's concerns. I don't see how this eliminates reliance
on the normal CAs. You still have to do certificate
Russ Allbery r...@debian.org writes:
Jonas Smedegaard d...@jones.dk writes:
Quoting Russ Allbery (2013-05-16 18:37:06)
but it's not clear to me why we'd bother as opposed to just issuing
client X.509 certificates with the metadata already included.
Because the very separation of
Hi again.
Russ Allbery r...@debian.org writes:
I can understand why you may want to externalize the metadata if you have
no control over the certificate creation process and therefore can't put
metadata directly in it. I don't understand what you gain (other than
complexity) by
Le vendredi 17 mai 2013 07:17:48, Guillem Jover a écrit :
(…) I agree dlopen()ing shared libraries in general should not
be supported (I'd even go further and say this should be outright
banned, given the pain it causes, and optional library support should
always be implemented by loading a
Hi again.
Russ Allbery r...@debian.org writes:
Jonas Smedegaard d...@jones.dk writes:
Quoting Russ Allbery (2013-05-16 19:57:59)
Sure, but if you have control over the server certificate and are tying
the server certificate to the user certificate via some mechanism like
Monkeysphere, why
On 17/05/2013 13:17, Guillem Jover wrote:
Yeah that should be the case, the dynamic linker should not be
loading the same SONAME multiple times, so there should be no race
here, and I agree dlopen()ing shared libraries in general should not
be supported (I'd even go further and say this should
Quoting Russ Allbery (2013-05-16 22:24:34)
Jonas Smedegaard d...@jones.dk writes:
Quoting Russ Allbery (2013-05-16 19:57:59)
Sure, but if you have control over the server certificate and are
tying the server certificate to the user certificate via some
mechanism like Monkeysphere, why
Hi again.
Just in case it helps a bit more, let me forward you this message from
Andrei Sambra, a Debian user and WebID working group member (who's also
the developer of MyProfile, a killer demo service of WebID at [1]
- project/code at [0]).
Andrei read the thread an wanted to provide some
On Monday 13 May 2013 11:14:07 Ansgar Burchardt wrote:
There have been previous discussions how to fix this[2]. The dpkg
maintainers would like to treat changelogs and copyright files as
metadata and move them out of /usr/share/doc[3].
[2]
On 17/05/13 10:43, Chow Loong Jin wrote:
On 17/05/2013 13:17, Guillem Jover wrote:
I agree dlopen()ing shared libraries in general should not be
supported (I'd even go further and say this should be outright
banned, given the pain it causes, and optional library support
should always be
Hi Marc,
On Freitag, 17. Mai 2013, Marc Haber wrote:
We're going to have a TC decision or a GR about this anyway.
why do you think so?
cheers,
Holger
signature.asc
Description: This is a digitally signed message part.
Le vendredi 17 mai 2013 13:40:13, Dominique Dumont a écrit :
This may be a dumb question, but looking at this example of different
binNMU changelogs [1], I wonder what is the point of having a log specific
to each build system ...
In other word, can't we have a binNMU log generated by
On 2013-05-17, Simon McVittie s...@debian.org wrote:
dlopen()'d. However, GNU/anything and Windows (and also Mac OS, I
think) are among the platforms where either works, so in practice most
You can't link plugins on windows, I'm told.
/Sune
--
To UNSUBSCRIBE, email to
Le 17/05/2013 13:50, Simon McVittie a écrit :
According to libtool documentation, on some platforms this distinction
is really significant, and real shared libraries can't be
dlopen()'d. However, GNU/anything and Windows (and also Mac OS, I
think) are among the platforms where either works, so
Le 17/05/2013 14:18, Sune Vuorela a écrit :
On 2013-05-17, Simon McVittie s...@debian.org wrote:
dlopen()'d. However, GNU/anything and Windows (and also Mac OS, I
think) are among the platforms where either works, so in practice most
You can't link plugins on windows, I'm told.
Indeed. Some
On 2013-05-07 14:23:47 +, Thorsten Glaser wrote:
Shells suitable for /bin/sh are currently bash, dash, mksh.
I forgot about that (partly because of workarounds), but due to the
SIGINT problem, I think that *currently*, among these 3 shells, bash
is the most suitable one, and mksh is a bit
On Fri, May 17, 2013 at 14:14:20 +0200, Thomas Preud'homme wrote:
Also, it wouldn't help for the case of a binNMU on a subset of all arches
since only some of them would have the entry. The solution proposed by ansgar
cover this case.
No it doesn't. dpkg will still refuse to install a m-a
Le vendredi 17 mai 2013 15:36:02, Julien Cristau a écrit :
On Fri, May 17, 2013 at 14:14:20 +0200, Thomas Preud'homme wrote:
Also, it wouldn't help for the case of a binNMU on a subset of all arches
since only some of them would have the entry. The solution proposed by
ansgar cover this
On 17/05/2013 19:50, Simon McVittie wrote:
On 17/05/13 10:43, Chow Loong Jin wrote:
On 17/05/2013 13:17, Guillem Jover wrote:
I agree dlopen()ing shared libraries in general should not be
supported (I'd even go further and say this should be outright
banned, given the pain it causes, and
Package: wnpp
Severity: wishlist
Owner: Jonathan Wiltshire j...@tiger-computing.co.uk
* Package name: unittest-xml-reporting
Version : 1.4.3
Upstream Author : Daniel Fernandes Martins
* URL : https://pypi.python.org/pypi/unittest-xml-reporting
* License :
Le 17/05/2013 15:45, Chow Loong Jin a écrit :
But how do you load a plugin without using dlopen()?
[...]
Okay, so real shared libraries can't be dlopen()'d on some systems, and
plugins
still have to be dlopen()'d. That doesn't answer my question, really.
It kind of does, actually :-) You
Stéphane Glondu glo...@debian.org writes:
Le 16/05/2013 18:37, Russ Allbery a écrit :
Right, it depends on what your risk model is. If you're defending
against incompetence and/or commercial greed overriding security
practices, DNSSEC looks a lot more appealing than the CA cartel, since
ober...@debian.org writes:
Russ Allbery r...@debian.org writes:
I'd never heard of WebID before this thread, but looking briefly at the
spec, I share Daniel's concerns. I don't see how this eliminates
reliance on the normal CAs. You still have to do certificate
validation to be able to
Le 17/05/2013 17:43, Russ Allbery a écrit :
[...]
4. Hijack that metadata identity request so that it goes to their server
instead of mine. This can be done in any number of ways (DNS cache
poisoning, compromise of www.eyrie.org, compromise of my account on
www.eyrie.org, TCP active
Stéphane Glondu glo...@debian.org writes:
Le 17/05/2013 17:43, Russ Allbery a écrit :
[...]
4. Hijack that metadata identity request so that it goes to their server
instead of mine. This can be done in any number of ways (DNS cache
poisoning, compromise of www.eyrie.org, compromise of
Hi.
Russ Allbery r...@debian.org writes:
ober...@debian.org writes:
I'm not sure I understand all aspects of the recent evolutions of the
WebID auth protocols nor the big picture, but my understanding is that
to auth to a server using a WebID (i.e. a URI pointing to a RDF document
which
On Thu, May 16, 2013 at 01:10:06PM +0200, Goswin von Brederlow wrote:
On Tue, May 14, 2013 at 12:21:33PM -0500, Steve Langasek wrote:
On Tue, May 14, 2013 at 10:03:34AM -0700, Russ Allbery wrote:
I think that, to convince people that flexibility won't cause stability
and complexity
On 17/05/13 17:36, Olivier Berger wrote:
The only way to prevent this attack in WebID that I see is to either do
leap-of-faith permanent caching [...] or
to secure the connection to my identity URI.
I wonder how OpenID, for instance, is supposed to resist to such
attacks, in comparison...
Olivier Berger olivier.ber...@it-sudparis.eu writes:
Russ Allbery r...@debian.org writes:
ober...@debian.org writes:
I'm not sure I understand all aspects of the recent evolutions of the
WebID auth protocols nor the big picture, but my understanding is that
to auth to a server using a WebID
Simon McVittie s...@debian.org writes:
By way of context, OpenID originated on Livejournal as a way to have
federation between blogging platforms (e.g. other sites running the
Livejournal codebase). At the time, https was considered sufficiently
expensive that LJ didn't even use it to secure
On 05/14/2013 09:40 AM, Goswin von Brederlow wrote:
Could you build a 32bit only, a 64bit only and a 32+64bit wine, run
make install for each case and generate a file list for each?
Including file output so it shows what is 32bit and what 64bit in
the mixed case.
I have these file lists now,
On Fri, May 17, 2013 at 07:12:26PM -0400, The Wanderer wrote:
I can already say that it won't be binary identical to the 64+32 build,
because even the 64-bit standalone build isn't binary identical to the
64-bit side of a combined build (even though they're configured the
exact same way). I'm
Andrei POPESCU wrote:
Andreas Beckmann wrote:
now might be the right time to start a discussion about release goals
for jessie.
How about setting default umask for users (uid = 1000) to 002?
+1. It would be a useful default.
Bob
signature.asc
Description: Digital signature
On Thu, May 16, 2013 at 5:52 AM, Neil McGovern wrote:
On Thu, May 16, 2013 at 12:29:11AM +0200, Kurt Roeckx wrote:
Some upstreams have a testing branch of there software and a
release branch. It's sometimes useful to have people test the
version in from the testing branch, and having it
On 2013-05-16 at 14:12:33, Daniel Kahn Gillmor wrote:
It looks to me like BrowserID/Persona will only work in web browsers
with a functional javascript stack (and eventually, with a functional
javascript crypto stack). The client authentication happens inside the
TLS layer, over the HTTP
On 2013-05-17 at 10:08:20, Olivier Berger wrote:
AFAIU, I guess that, at least from the user-friendliness POV, the main
perceptible difference, is :
- OpenID uses a URL as a person's identifier : may or not be easily
copied/remembered/dictated
- WebID uses a URL too, same problems (there
Le Fri, May 17, 2013 at 08:29:42PM -0600, Bob Proulx a écrit :
Andrei POPESCU wrote:
Andreas Beckmann wrote:
now might be the right time to start a discussion about release goals
for jessie.
How about setting default umask for users (uid = 1000) to 002?
+1. It would be a useful
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 15 May 2013 16:59:13 +0200
Source: cgsi-gsoap
Binary: libcgsi-gsoap1 libcgsi-gsoap-dev
Architecture: source amd64
Version: 1.3.5-2
Distribution: unstable
Urgency: low
Maintainer: Mattias Ellert mattias.ell...@fysast.uu.se
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 17 May 2013 08:51:40 +0200
Source: xmp
Binary: xmp-common xmp xmp-audacious
Architecture: source all amd64
Version: 3.4.0-3
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group packa...@qa.debian.org
Changed-By:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Tue, 14 May 2013 16:05:24 +0200
Source: camlzip
Binary: libzip-ocaml libzip-ocaml-dev
Architecture: source i386
Version: 1.05-1
Distribution: unstable
Urgency: low
Maintainer: Debian OCaml Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 10:35:34 +0200
Source: evolution
Binary: evolution libevolution evolution-common evolution-dev evolution-dbg
evolution-plugins evolution-plugins-experimental
Architecture: source all amd64
Version: 3.8.2-1
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 16 May 2013 14:14:58 +
Source: horizon
Binary: python-django-horizon openstack-dashboard openstack-dashboard-apache
Architecture: source all
Version: 2013.1.1-1
Distribution: unstable
Urgency: low
Maintainer: PKG OpenStack
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Tue, 07 May 2013 15:59:53 +0200
Source: libdivecomputer
Binary: libdivecomputer-dev libdivecomputer0
Architecture: source amd64
Version: 0.4.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian running development group
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 17 May 2013 10:38:30 +0200
Source: libgusb
Binary: libgusb-dev libgusb-doc libgusb2 gir1.2-gusb-1.0
Architecture: source amd64 all
Version: 0.1.6-2
Distribution: unstable
Urgency: low
Maintainer: Michal Čihař ni...@debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 10:21:57 +0200
Source: r-cran-plotrix
Binary: r-cran-plotrix
Architecture: source all
Version: 3.4-7-1
Distribution: unstable
Urgency: low
Maintainer: Debian Science Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 08:09:11 +
Source: swift-plugin-s3
Binary: swift-plugin-s3
Architecture: source all
Version: 1.7-2
Distribution: unstable
Urgency: low
Maintainer: PKG OpenStack openstack-de...@lists.alioth.debian.org
Changed-By:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 16 May 2013 22:45:51 +0200
Source: epson-inkjet-printer-escpr
Binary: printer-driver-escpr epson-escpr
Architecture: source amd64 all
Version: 1.2.2-2
Distribution: unstable
Urgency: low
Maintainer: Debian Printing Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 16 May 2013 21:23:51 +1200
Source: gifsicle
Binary: gifsicle
Architecture: source amd64
Version: 1.70-1
Distribution: unstable
Urgency: low
Maintainer: Francois Marier franc...@debian.org
Changed-By: Francois Marier
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 17 May 2013 10:31:13 +0200
Source: liblog-handler-perl
Binary: liblog-handler-perl
Architecture: source all
Version: 0.78-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 17 May 2013 10:10:05 +0200
Source: mesa
Binary: libgl1-mesa-swx11 libgl1-mesa-swx11-dbg libgl1-mesa-swx11-i686
libgl1-mesa-swx11-dev libxatracker1 libxatracker1-dbg libxatracker-dev libgbm1
libgbm1-dbg libgbm-dev
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 17 May 2013 11:21:27 +0200
Source: foo2zjs
Binary: printer-driver-foo2zjs foo2zjs
Architecture: source amd64 all
Version: 20130513dfsg0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Printing Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 10:48:47 +0200
Source: live-installer
Binary: live-installer
Architecture: source i386
Version: 41
Distribution: unstable
Urgency: low
Maintainer: Debian Install System Team debian-b...@lists.debian.org
Changed-By:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 11:39:45 +0200
Source: kbd-chooser
Binary: kbd-chooser
Architecture: source i386
Version: 1.66
Distribution: unstable
Urgency: low
Maintainer: Debian Install System Team debian-b...@lists.debian.org
Changed-By:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 17 May 2013 12:04:13 +0200
Source: libcroco
Binary: libcroco3-dev libcroco3 libcroco-tools
Architecture: source amd64
Version: 0.6.8-2
Distribution: unstable
Urgency: low
Maintainer: Debian GNOME Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 17 May 2013 10:19:41 +0100
Source: telepathy-mission-control-5
Binary: telepathy-mission-control-5 telepathy-mission-control-5-dbg
libmission-control-plugins0 libmission-control-plugins-dev
libmission-control-plugins-doc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 09:39:14 +0200
Source: wordnet
Binary: wordnet wordnet-gui wordnet-dev wordnet-base wordnet-sense-index
wordnet-grind dict-wn goldendict-wordnet
Architecture: source all amd64
Version: 1:3.0-30
Distribution:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 12:06:39 +0200
Source: gtkhtml4.0
Binary: libgtkhtml-4.0-0 libgtkhtml-4.0-dev libgtkhtml-4.0-dbg
libgtkhtml-editor-4.0-0 libgtkhtml-4.0-common libgtkhtml-editor-4.0-dev
Architecture: source all amd64
Version:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 11:54:31 +0200
Source: openvpn
Binary: openvpn
Architecture: source amd64
Version: 2.3.1-1
Distribution: unstable
Urgency: low
Maintainer: Alberto Gonzalez Iniesta a...@inittab.org
Changed-By: Alberto Gonzalez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 16 May 2013 20:56:57 +0100
Source: newt
Binary: libnewt-dev libnewt-pic newt-tcl python-newt python3-newt
python-newt-dbg python3-newt-dbg libnewt0.52 whiptail
Architecture: source i386
Version: 0.52.15-1
Distribution:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 15 May 2013 13:42:49 +0200
Source: libgd2
Binary: libgd-tools libgd-dev libgd3 libgd-dbg libgd2-xpm-dev libgd2-noxpm-dev
Architecture: source amd64 all
Version: 2.1.0~alpha1-2
Distribution: unstable
Urgency: low
Maintainer: GD
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Mon, 13 May 2013 02:42:43 +0200
Source: libgee-0.8
Binary: libgee-0.8-2 libgee-0.8-dev libgee-0.8-2-dbg gir1.2-gee-0.8
Architecture: source amd64
Version: 0.10.1-1
Distribution: unstable
Urgency: low
Maintainer: Maintainers of Vala
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 15 May 2013 10:34:58 +0200
Source: dcmtk
Binary: dcmtk libdcmtk3 libdcmtk3-dev dcmtk-www dcmtk-doc libdcmtk3-dbg
Architecture: source amd64 all
Version: 3.6.1~20121102-1
Distribution: experimental
Urgency: low
Maintainer: Debian
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 01 Apr 2013 19:20:55 +0200
Source: vdr-plugin-xineliboutput
Binary: vdr-plugin-xineliboutput vdr-plugin-xineliboutput-dbg
libxineliboutput-fbfe libxineliboutput-fbfe-dbg libxineliboutput-sxfe
libxineliboutput-sxfe-dbg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 16 May 2013 20:45:52 +0200
Source: zathura-extras
Binary: zathura-djvu zathura-ps zathura-cb
Architecture: source amd64
Version: 0.2-3
Distribution: experimental
Urgency: low
Maintainer: Sebastian Ramacher sramac...@debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 12:58:52 +0200
Source: libbluedevil
Binary: libbluedevil-dev libbluedevil1
Architecture: source amd64
Version: 1.9.3-1
Distribution: unstable
Urgency: low
Maintainer: Debian KDE Extras Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 17 May 2013 12:44:10 +0200
Source: libtext-autoformat-perl
Binary: libtext-autoformat-perl
Architecture: source all
Version: 1.669003-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 12:35:10 +0200
Source: cdebconf-terminal
Binary: cdebconf-gtk-terminal cdebconf-newt-terminal
Architecture: source i386
Version: 0.20
Distribution: unstable
Urgency: low
Maintainer: Debian Install System Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 17 May 2013 13:21:34 +0200
Source: libtest-class-perl
Binary: libtest-class-perl
Architecture: source all
Version: 0.39-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 17 May 2013 13:39:56 +0200
Source: libtap-formatter-html-perl
Binary: libtap-formatter-html-perl
Architecture: source all
Version: 0.11+dfsg-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 17 May 2013 12:43:08 +0100
Source: mklibs
Binary: mklibs mklibs-copy
Architecture: source all i386
Version: 0.1.37
Distribution: unstable
Urgency: low
Maintainer: Debian Install System Team debian-b...@lists.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 13:42:08 +0200
Source: r-cran-spc
Binary: r-cran-spc
Architecture: source amd64
Version: 1:0.4.2-1
Distribution: unstable
Urgency: low
Maintainer: Debian Science Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 14:05:21 +0200
Source: bluedevil
Binary: bluedevil
Architecture: source amd64
Version: 1.3.1-1
Distribution: unstable
Urgency: low
Maintainer: Debian KDE Extras Team pkg-kde-ext...@lists.alioth.debian.org
Changed-By:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 17 May 2013 13:02:41 +0100
Source: os-prober
Binary: os-prober-udeb os-prober
Architecture: source i386
Version: 1.60
Distribution: unstable
Urgency: low
Maintainer: Debian Install System Team debian-b...@lists.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 13:54:08 +0200
Source: r-cran-teachingdemos
Binary: r-cran-teachingdemos
Architecture: source all
Version: 2.9-1
Distribution: unstable
Urgency: low
Maintainer: Debian Science Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 14:10:42 +0200
Source: alsa-utils
Binary: alsa-utils alsa-utils-udeb
Architecture: source amd64
Version: 1.0.27-3
Distribution: unstable
Urgency: low
Maintainer: Debian ALSA Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 17 May 2013 14:15:18 +0200
Source: gtk+2.0
Binary: libgtk2.0-0 libgtk2.0-0-udeb libgtk2.0-common libgtk2.0-bin
libgtk2.0-dev libgtk2.0-0-dbg libgtk2.0-doc gtk2.0-examples gtk2-engines-pixbuf
gir1.2-gtk-2.0 libgail18
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 14:40:59 +0200
Source: avogadro
Binary: avogadro avogadro-data libavogadro1 libavogadro-dev python-avogadro
Architecture: source amd64 all
Version: 1.0.3-6.1
Distribution: unstable
Urgency: low
Maintainer: Debichem
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 13:34:34 +0200
Source: debootstrap
Binary: debootstrap debootstrap-udeb
Architecture: source all
Version: 1.0.50
Distribution: unstable
Urgency: low
Maintainer: Debian Install System Team debian-b...@lists.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 14:45:41 +0200
Source: fonts-sil-andika
Binary: fonts-sil-andika
Architecture: source all
Version: 1.002-4
Distribution: unstable
Urgency: low
Maintainer: Debian Fonts Task Force
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 15 May 2013 11:08:19 +0200
Source: libpam-abl
Binary: libpam-abl
Architecture: source amd64
Version: 0.5.1~git8f1be9-1
Distribution: unstable
Urgency: low
Maintainer: Alexandre Mestiashvili a...@biotec.tu-dresden.de
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 15 May 2013 12:04:24 +0200
Source: llvm-toolchain-3.2
Binary: clang-3.2 clang-3.2-doc libclang1 libclang1-dbg libclang-dev
libclang-common-dev libllvm3.2 libllvm3.2-dbg llvm-3.2 llvm-3.2-runtime
llvm-3.2-dev
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 30 Apr 2013 11:29:51 +0200
Source: rheolef
Binary: librheolef1 librheolef-dev rheolef-doc rheolef
Architecture: source all amd64
Version: 6.4-1
Distribution: unstable
Urgency: low
Maintainer: Debian Science Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 11:10:05 +0200
Source: totalopenstation
Binary: totalopenstation
Architecture: source all
Version: 0.3-2
Distribution: unstable
Urgency: low
Maintainer: Debian GIS Project pkg-grass-de...@lists.alioth.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 14:36:51 +0200
Source: r-bioc-edger
Binary: r-bioc-edger
Architecture: source amd64
Version: 3.2.3~dfsg-1
Distribution: unstable
Urgency: low
Maintainer: Debian Med Packaging Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 00:52:39 +0200
Source: 3depict
Binary: 3depict
Architecture: source amd64
Version: 0.0.13-1
Distribution: unstable
Urgency: low
Maintainer: Debian Science Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 16 May 2013 16:37:15 +0200
Source: gdb-msp430
Binary: gdb-msp430
Architecture: source amd64
Version: 7.2a~mspgcc-20111205-2
Distribution: unstable
Urgency: medium
Maintainer: Luca Bruno lu...@debian.org
Changed-By: Luca Bruno
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Tue, 16 Apr 2013 17:55:20 +
Source: openstack-meta-packages
Binary: openstack-clients openstack-cloud-services openstack-cloud-identity
openstack-proxy-node openstack-compute-node openstack-toaster
Architecture: source all
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 15:30:24 +0200
Source: r-cran-deal
Binary: r-cran-deal
Architecture: source amd64
Version: 1:1.2-37-1
Distribution: unstable
Urgency: low
Maintainer: Debian Med Packaging Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 15:39:30 +0200
Source: akonadi
Binary: akonadi-server libakonadiprotocolinternals1 libakonadi-dev
akonadi-backend-mysql akonadi-backend-postgresql akonadi-backend-sqlite
akonadi-dbg
Architecture: source amd64 all
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 15:01:41 +
Source: cliff-tablib
Binary: cliff-tablib
Architecture: source all
Version: 1.0-2
Distribution: unstable
Urgency: low
Maintainer: PKG OpenStack openstack-de...@lists.alioth.debian.org
Changed-By:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 17 May 2013 16:09:23 +0200
Source: dichromat
Binary: r-cran-dichromat
Architecture: source all
Version: 2.0.0-2
Distribution: unstable
Urgency: low
Maintainer: Debian Med Packaging Team
1 - 100 of 169 matches
Mail list logo