-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Mon, 10 Mar 2003 20:32:42 +0100
Source: quintuple-agent
Binary: quintuple-agent
Architecture: source i386
Version: 1.0.4
Distribution: unstable
Urgency: low
Maintainer: Robert Bihlmeyer [EMAIL PROTECTED]
Changed-By: Robert Bihlmeyer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Sun, 23 Feb 2003 19:14:28 +0100
Source: freenet
Binary: freenet
Architecture: source all
Version: 0.5.0.7+20021120-4
Distribution: unstable
Urgency: medium
Maintainer: Robert Bihlmeyer [EMAIL PROTECTED]
Changed-By: Robert Bihlmeyer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Mon, 3 Feb 2003 23:48:45 +0100
Source: freenet
Binary: freenet
Architecture: source all
Version: 0.5.0.7+20021120-3
Distribution: unstable
Urgency: low
Maintainer: Robert Bihlmeyer [EMAIL PROTECTED]
Changed-By: Robert Bihlmeyer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Thu, 26 Dec 2002 17:55:58 +0100
Source: valgrind
Binary: valgrind
Architecture: source i386
Version: 1.0.4-2.1
Distribution: unstable
Urgency: low
Maintainer: Cyrille Chepelov [EMAIL PROTECTED]
Changed-By: Robert Bihlmeyer [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Sun, 22 Dec 2002 15:10:45 +0100
Source: freenet-unstable
Binary: freenet-unstable
Architecture: source all
Version: 0.6+20021221-1
Distribution: unstable
Urgency: low
Maintainer: Robert Bihlmeyer [EMAIL PROTECTED]
Changed-By: Robert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Sun, 8 Dec 2002 15:17:45 +0100
Source: freenet-unstable
Binary: freenet-unstable
Architecture: source all
Version: 0.6+20021208-1
Distribution: unstable
Urgency: low
Maintainer: Robert Bihlmeyer [EMAIL PROTECTED]
Changed-By: Robert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Sun, 24 Nov 2002 23:10:42 +0100
Source: freenet
Binary: freenet
Architecture: source all
Version: 0.5.0.7+20021120-1
Distribution: unstable
Urgency: low
Maintainer: Robert Bihlmeyer [EMAIL PROTECTED]
Changed-By: Robert Bihlmeyer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Mon, 25 Nov 2002 23:22:34 +0100
Source: exult
Binary: exult exult-studio
Architecture: source i386
Version: 1.00-2
Distribution: unstable
Urgency: low
Maintainer: Robert Bihlmeyer [EMAIL PROTECTED]
Changed-By: Robert Bihlmeyer [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Sun, 24 Nov 2002 13:17:38 +0100
Source: exult
Binary: exult exult-studio
Architecture: source i386
Version: 1.00-1
Distribution: unstable
Urgency: low
Maintainer: Robert Bihlmeyer [EMAIL PROTECTED]
Changed-By: Robert Bihlmeyer [EMAIL
Architecture: source i386
Version: 0.7.15.20020816-1.1
Distribution: unstable
Urgency: low
Maintainer: Zdenek Kabelac [EMAIL PROTECTED]
Changed-By: Robert Bihlmeyer [EMAIL PROTECTED]
Description:
avifile-mad-plugin - MAD - MPEG audio plugin
avifile-mjpeg-plugin - MJPEG video plugin
avifile-player - Video
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Sun, 27 Oct 2002 08:56:31 +0100
Source: inform
Binary: inform-docs inform
Architecture: source i386 all
Version: 6.21-2.2
Distribution: unstable
Urgency: low
Maintainer: Mark Baker [EMAIL PROTECTED]
Changed-By: Robert Bihlmeyer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Sat, 12 Oct 2002 23:08:17 +0200
Source: freenet-unstable
Binary: freenet-unstable
Architecture: source all
Version: 0.4.3+20021012-1
Distribution: unstable
Urgency: low
Maintainer: Robert Bihlmeyer [EMAIL PROTECTED]
Changed
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Sun, 6 Oct 2002 12:28:10 +0200
Source: freenet-unstable
Binary: freenet-unstable
Architecture: source all
Version: 0.4.3+20021003-1
Distribution: unstable
Urgency: low
Maintainer: Robert Bihlmeyer [EMAIL PROTECTED]
Changed
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Sun, 6 Oct 2002 18:29:14 +0200
Source: freenet-unstable
Binary: freenet-unstable
Architecture: source all
Version: 0.4.3+20021006-1
Distribution: unstable
Urgency: low
Maintainer: Robert Bihlmeyer [EMAIL PROTECTED]
Changed
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Sun, 8 Sep 2002 18:05:09 +0200
Source: freenet-unstable
Binary: freenet-unstable
Architecture: source all
Version: 0.4.3+20020908-1
Distribution: unstable
Urgency: low
Maintainer: Robert Bihlmeyer [EMAIL PROTECTED]
Changed
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 23 Aug 2002 23:53:36 -0400
Source: frost
Binary: frost
Architecture: source all
Version: 0+cvs20020821-1
Distribution: unstable
Urgency: low
Maintainer: Steven Barker [EMAIL PROTECTED]
Changed-By: Robert Bihlmeyer [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Mon, 2 Sep 2002 22:34:37 +0200
Source: exult
Binary: exult exult-studio
Architecture: source i386
Version: 0.99.1rc2-2
Distribution: unstable
Urgency: low
Maintainer: Robert Bihlmeyer [EMAIL PROTECTED]
Changed-By: Robert Bihlmeyer
[please CC me on replies]
Hi,
recently, the debian-devel-changes list is missing more .changes
messages than usual. I first suspected a local config change as the
culprit, but
URL:http://lists.debian.org/debian-devel-changes/2002/debian-devel-changes-200201/maillist.html
doesn't list what I
Oliver Elphick olly@lfix.co.uk writes:
The upstream developers are not friendly to non-portable features; I
might be able to get it added under a config option.
Thought so. My selling point is that this feature is completely
optional: if it is compiled in, you're allowed to use a new authtype
Oliver Elphick olly@lfix.co.uk writes:
It is indeed the case that ident is needed to allow local access without
a password. I understand that this presents a small security risk on the
server.
I think README.Debian or somesuch should tell why ident is necessary,
and perhaps also how one can
Nicolás Lichtmaier [EMAIL PROTECTED] writes:
All packages can run things as root. Even the most simple game.
Doing clandestine things in a install-script is harder than in a
binary.
--
Robbe
First I'd like to know what dialup includes means for you.
Ian Jackson [EMAIL PROTECTED] writes:
It does seem that some people do find it beneficial to send mail
direct from their dialups (static or dynamic). I don't understand why
they think this is a good idea,
There are apparently a
Anthony Towns aj@azure.humbug.org.au writes:
On Sun, Apr 02, 2000 at 07:44:56PM +0200, Robert Bihlmeyer wrote:
Note that *any* keys that your agent holds can be snarfed by the
admin(s) of any hosts where you ssh-in with agent forwarding enabled.
As I understand it, you can't actually
revocation-signature. This new signature tells
that this key is no longer trusted. Example:
$ gpg --check-sigs testkey
pub 1024D/36FF3F58 1999-07-24 Robert Bihlmeyer (Testkey - do not use)
rev! E6583EFB 2000-03-31 Robert Bihlmeyer [EMAIL PROTECTED]
sig! 36FF3F58 1999-07-24 Robert
Marcus Brinkmann [EMAIL PROTECTED] writes:
Yes, but you have not the right (what loaded words!) to close the bug
reports. Feel free to ignore them, but don't close them without a better
reason.
If communication with the reporter is necessary to fix the bug, and
this communication is broken
Anthony Towns aj@azure.humbug.org.au writes:
There is an existing single-point vulnerability in *every*
mirror. Compromise the mirror and you can compromise every single Debian
user who upgrades from that mirror. You don't even have to try touching
anything at *.debian.org.
Yes, and I'd very
Julian Gilbey [EMAIL PROTECTED] writes:
On my home machine, I have an identity in .ssh/identity.pub.
I copied that into .ssh/authorized_keys on master (possibly using the
LDAP system).
I *also* copied it into .ssh/authorized_keys on my home machine.
That extra copy on my home machine
Craig Sanders [EMAIL PROTECTED] writes:
most of the recent spam would have been blocked by using MAPS RSS
(relays.mail-abuse.org), though...and not by MAPS DUL.
IMO, we should use both. individually they are quite effective in
blocking spam, but they are even better when used together.
Hamish Moffatt [EMAIL PROTECTED] writes:
On Thu, Mar 30, 2000 at 01:12:10PM +0200, Robert Bihlmeyer wrote:
Before all useful points are lost in the flamage, may I suggest that a
X-Filtered-By: DUL
or similar header be added to all list mail?
Apparently qmail can't do that out
Michael Meskes [EMAIL PROTECTED] writes:
I usually run my shell with LC_ALL set to de_DE. Calling 'printf %1.1f\n 1'
then gives me 1,0 which is the correct answer under the german locale.
Now I unset LC_ALL to get the command to print 1.0 but wasn't able
to.
printf is a bash builtin. bash
Anthony Towns aj@azure.humbug.org.au writes:
Well, it'd be nice to be able to do so, to verify that a mirror hasn't
been compromised, but no, you're right.
Actually I don't care that much if the mirror is compromised, if it
affects only packages that I don't install. If it affects some of
(I'm also a first-time aptitude user)
Branden Robinson [EMAIL PROTECTED] writes:
(Remark: I think I would find the overloading of the '-' key confusing.
Please consider using a different key for hold operations. 'h' seems
intuitive but might be pressed by novices as an attempt to get help.
Raphael Hertzog [EMAIL PROTECTED] writes:
Yes I know, I should probably extract all the identities from a single
PGP/GPG key and look for all those adresses in the Packages file. Or
something like that.
Hmm, /usr/share/keyrings/debian-keyring.gpg lists 278 identities,
while the Maintainer
Anthony Towns aj@azure.humbug.org.au writes:
The only reason not to trust a key dinstall uses explicitly for signing
Packages is if you believe dinstall is compromised. If you believe that,
then you shouldn't be downloading .deb's *ever*, because you're immediately
running *untrusted* scripts
Taupter [EMAIL PROTECTED] writes:
I was poking update-alternatives, but didn't find a way to point my
default window manager to /usr/local/bin/gnome-session.
FWIW, gnome-session is not a window manager. If you're sure you want
to do that, you could issue:
update-alternatives --install
Taupter [EMAIL PROTECTED] writes:
1. Does Debian install any stuff inside /usr/local ?
That would be a bug. You can make sure with dpkg -S /usr/local (or
dlocate /usr/local if you have the dlocate package)
2. Is secure to the system integrity to _wipe_ /usr/local (no
daemons/services stored
Anthony Towns aj@azure.humbug.org.au writes:
On Sat, Mar 25, 2000 at 11:03:11PM +0100, Robert Bihlmeyer wrote:
Do you want to sign each package entry, or the whole file?
The whole file --- verifying each entry would take at least three minutes
on my hardware, and god knows how long
Chris Frey [EMAIL PROTECTED] writes:
So my question is, what are your thoughts on adding a signature to the
current Packages.gz file, or adding a similar *dsc file for it,
which is then signed?
Do you want to sign each package entry, or the whole file? Whose
signature would be used?
Peter Cordes [EMAIL PROTECTED] writes:
Unless the darkish colours get used as alternate background colours, they
are wasted. There only are 16 colours, so deciding to never use 4
({dark ,}{blue,red}) of them seems like a bad idea. Brightening them up so
they look good on a black background
Robert Woodcock [EMAIL PROTECTED] writes:
Without going in depth as to what traceroute and ping are (a fruitless flame
war)
Facts can not build a flame war. Opinions (about depth or somesuch)
can.
suffice it to say that I disagree with your deeper comment.
Ok.
These 'boundaries' are
Peter Cordes [EMAIL PROTECTED] writes:
In the case of terminal colours, I thought most people really did
use black bg terminals, or at least dark something, like blue. Also,
real VT100s and VT220s have black bg screens with amber text.
There's a precedent for black bg terminals outside of X.
Jacob Kuntz [EMAIL PROTECTED] writes:
traceroute is deeper than ping.
and that changes something? one cannot assume that because someone is not
logged in as root, they are a casual user.
Why not? Non-casual users can start these programs from sbin
nonetheless (see FHS rationale for not
Martin Bialasinski [EMAIL PROTECTED] writes:
So a note that GNOME packages are available from the regular Debian
mirrors would be sufficient, no?
Perhaps linking to an up-to-date list, like
Dylan Paul Thurston [EMAIL PROTECTED] writes:
On Wed, Mar 22, 2000 at 11:52:37AM -0500, Jacob Kuntz wrote:
at the risk of reigniting a flame war, how is traceroute in a different
catagory that ping?
traceroute is deeper than ping. It exposes things that the casual
user neither sees nor
44 matches
Mail list logo