Petter Reinholdtsen p...@hungry.com writes:
I am bothered by URL: http://bugs.debian.org/56 , and the fact
that apt(-get,itude) do not work with Squid as a proxy. I would very
much like to have apt work out of the box with Squid in Squeeze. To
fix it one can either change Squid to work
On 16/05/10 at 23:06 +0200, Raphael Hertzog wrote:
Receive Ubuntu bugs by mail via PTS
---
It is now possible to subscribe to Ubuntu bugmail for the packages you
care about, without having to use Launchpad (and subscribe on a
per-package basis there). This
Santiago Vila sanv...@unex.es writes:
In either case, if we plan to set default umask in /etc/login.defs or
/etc/login.defs is not read when I login to openssh server and it has
UseLogin set to false. If I enable UseLogin then X11 forwarding
stops working [1]. To me it seems that login.defs can
On Sun, 16 May 2010 18:18:14 -0400, Felipe Sateler fsate...@gmail.com
wrote:
Is there a reason to support non-UPG systems?
Not to force users to use anything that they don't want?
btw: While I stopped at some point commenting that issue, when I realised
that general security concerns were
On Saturday 15 May 2010 12:09:47 David Weinehall wrote:
Last time I checked, /usr/bin is also part of default $PATH...
Tricky, it becomes part of it later, not from the beginning.
But that wasn't the point. The point was that if an admin changes something to
a non-standard behavior, then has to
On Mon, 17 May 2010 00:12:56 -0400, Micah Anderson mi...@riseup.net
wrote:
Can you clarify what you mean by standardised technology? I work on
the monkeysphere project, and from my point of view, I'd have to
disagree with you, but I may not understand what you mean.
What I mean was simply
Hi,
On Montag, 17. Mai 2010, Christoph Anton Mitterer wrote:
May I suggest the following:
how about you file bugs _with patches_? Talk is cheap.
cheers,
Holger
signature.asc
Description: This is a digitally signed message part.
Package: openssh-server
Version: 1:5.5p1-3
Severity: important
Hi,
Base-files package just switched to umask 002 by default for new install
(see #248140 and discussion in d-devel). However, with this setup,
openssh-server babdly behave. It is similar to #314347 that was opened
for
On 16/05/2010 16:46, Aaron Toponce wrote:
On 05/15/2010 12:16 AM, Vincent Danjean wrote:
Somethink is wrong here. Should 314347 be reopened ?
Agreed. It's not working as it should. Running openssh-client version
1:5.5p1-3, and setting the write bit on my private group seems to keep
the
On Mon, 17 May 2010 10:31:44 +0200, Holger Levsen hol...@layer-acht.org
wrote:
how about you file bugs _with patches_? Talk is cheap.
Well the only patches I could write with pure conscience would be:
- change umask from 022 or 002 to either 027 (or 077).
- disable UPGs altogether, as I feel that
On Montag, 17. Mai 2010, Christoph Anton Mitterer wrote:
But I guess non of them wouldn't be received enthusiastically, would they?
you suggested something else in your previous mail...
signature.asc
Description: This is a digitally signed message part.
Package: wnpp
Severity: wishlist
Owner: Fladischer Michael fladischermich...@fladi.at
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
* Package name: django-reversion
Version : 1.2.1
Upstream Author : David Hall da...@etianen.com
* URL :
On Thu, May 13, 2010 at 11:48:19AM +0200, Santiago Vila wrote:
Will be done in base-files 5.4.
I think that this change was done prematurely. There is still the
issue of a Debian system running in a non-UPG environment. And so far
I haven't seen a resolution for this point in the discussion.
On Mon, May 17, 2010 at 10:22 AM, Christoph Anton Mitterer
cales...@scientia.net wrote:
On Sun, 16 May 2010 18:18:14 -0400, Felipe Sateler fsate...@gmail.com
wrote:
Is there a reason to support non-UPG systems?
Not to force users to use anything that they don't want?
btw: While I stopped at
On Fri, 14 May 2010 11:30:17 +0200, Scott James Remnant
sc...@netsplit.com wrote:
What is so bad about init scripts? Where am I supposed to put my init
script magic[1] in an upstart scenario?
Upstart job configs go in /etc/init
And I can do arbitrary things there, just as with an init script?
On Mon, May 17, 2010 at 13:04:17 (CEST), Marc Haber wrote:
On Fri, 14 May 2010 11:30:17 +0200, Scott James Remnant
sc...@netsplit.com wrote:
What is so bad about init scripts? Where am I supposed to put my init
script magic[1] in an upstart scenario?
Upstart job configs go in /etc/init
On Mon, May 17, 2010 at 12:26 PM, Harald Braumann ha...@unheit.net wrote:
On Thu, May 13, 2010 at 11:48:19AM +0200, Santiago Vila wrote:
Will be done in base-files 5.4.
I think that this change was done prematurely. There is still the
issue of a Debian system running in a non-UPG
On Mon, May 17, 2010 at 01:04:22PM +0200, Bastien ROUCARIES wrote:
On Mon, May 17, 2010 at 12:26 PM, Harald Braumann ha...@unheit.net wrote:
On Thu, May 13, 2010 at 11:48:19AM +0200, Santiago Vila wrote:
Will be done in base-files 5.4.
I think that this change was done prematurely.
On Mon, 17 May 2010, Timo Juhani Lindfors wrote:
Santiago Vila sanv...@unex.es writes:
In either case, if we plan to set default umask in /etc/login.defs or
/etc/login.defs is not read when I login to openssh server and it has
UseLogin set to false. If I enable UseLogin then X11 forwarding
Santiago Vila sanv...@unex.es writes:
Ok, what about PAM?
UsePAM no is the default in openssh. I do not know if this is just
to reduce the attack surface.
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact
On Mon, May 17, 2010 at 13:26:04 (CEST), Mike Hommey wrote:
I believe the pam umask module is the way to go according to
http://www.kernel.org/pub/linux/libs/pam/Linux-PAM-html/sag-pam_umask.html
[opition] usergroups
If the user is not root, and the user ID is equal to the group ID,
On Mon, May 17, 2010 at 2:22 PM, Santiago Vila sanv...@unex.es wrote:
On Mon, 17 May 2010, Timo Juhani Lindfors wrote:
Santiago Vila sanv...@unex.es writes:
In either case, if we plan to set default umask in /etc/login.defs or
/etc/login.defs is not read when I login to openssh server and
On Mon, May 17, 2010 at 02:55:20PM +0200, Reinhard Tartler wrote:
And it was said in this thread that UID == GID is not always true with
UPG. You only need to create a group for that to become false for users
you would create afterwards.
I'd say if Debian's idea of UPG doesn't match
On 05/17/2010 07:00 AM, Mike Hommey wrote:
There is no such thing as Debian's idea of UPG. There is simply the fact
that when you create a user with UPG, it uses the first uid and the
first gid available. It can happen that they don't match, in the
scenario I gave above. This applies to any
Package: wnpp
Severity: wishlist
Owner: Jonas Smedegaard d...@jones.dk
* Package name: radicale
Version : 0.2
Upstream Author : Guillaume Ayoub guillaume.ay...@kozea.fr
* URL : http://radicale.org/
* License : GPL-3+
Programming Lang: Python
Description
On Mon, 17 May 2010 08:25:50 +, Christoph Anton Mitterer
cales...@scientia.net wrote:
On Mon, 17 May 2010 00:12:56 -0400, Micah Anderson mi...@riseup.net
wrote:
Can you clarify what you mean by standardised technology? I work on
the monkeysphere project, and from my point of view, I'd
On Mon, 17 May 2010, Timo Juhani Lindfors wrote:
Santiago Vila sanv...@unex.es writes:
Ok, what about PAM?
UsePAM no is the default in openssh. I do not know if this is just
to reduce the attack surface.
Grr. We are supposed to be system integrators, but how can we do that
if some parts
On 2010-05-17, Timo Juhani Lindfors timo.lindf...@iki.fi wrote:
Santiago Vila sanv...@unex.es writes:
Ok, what about PAM?
UsePAM no is the default in openssh. I do not know if this is just
to reduce the attack surface.
While that's true it's not the case for Debian openssh, its postinst adds
I have never rejected any SELinux patches for Upstart; I have simply
never been *sent* any.
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=543420#10
This pretty much proves my point. I was never sent these patches,
instead Debian kept them to itself and never attempted to get them
* Reinhard Tartler siret...@debian.org [100517 08:56]:
Let's have a look at the source. Note that options-usergroups is set
iff the option usergroups is used.
,[modules/pam_umask/pam_umask.c]
| /* Set the process nice, ulimit, and umask from the
|password file entry. */
| static
On 5/17/2010 7:34 AM, Marvin Renich wrote:
This looks like a bug in pam_umask. UPG has never guaranteed uid=gid.
I'll file a bug.
While the numerical ID might not match, the names should:
id -gn should equal id -un
After all, that is part of the definition of the UPG setup.
--
. O . O .
On Mon, 10 May 2010, Aaron Toponce wrote:
I guess I'm more or less curious why we're still using this outdated
umask value with UPG. What would it take for Debian to update our
default umask to match the UPG scheme? Is this doable for Sqeeze? Are
there reasons for not making the switch?
The
* Peter Palfrader wea...@debian.org [100517 16:41]:
The main problem with a default 002 umask, IMHO, is that as soon as you
copy your files from a host with 002 and usergroups to one without, or
untar a tarball created on a 002 host with usergroups on a system where
you don't have a usergroup,
On Mon, May 17, 2010 at 01:04:22PM +0200, Bastien ROUCARIES wrote:
On Mon, May 17, 2010 at 12:26 PM, Harald Braumann ha...@unheit.net wrote:
On Thu, May 13, 2010 at 11:48:19AM +0200, Santiago Vila wrote:
Will be done in base-files 5.4.
I think that this change was done prematurely.
On 05/17/2010 10:02 AM, Harald Braumann wrote:
- you could have a UPG system but a mismatch of IDs - wrong umask
ID numbers, yes. ID names, no. If the user name maches the group name,
IE: aaron = aaron, then the user matches the private group. If the match
is not made, then umask 0022 should be
On Mon, 2010-05-17 at 09:40 -0400, micah anderson wrote:
RFC 5081 is still quite a while off from widespread adoption. When it is
more widely adopted, we will be in a much better situation, until then
the monkeysphere is operating as an interim translation step (keeping
the on-the-wire
On Mon, May 17, 2010 at 10:14:28AM -0600, Aaron Toponce wrote:
On 05/17/2010 10:02 AM, Harald Braumann wrote:
- you could have a UPG system but a mismatch of IDs - wrong umask
ID numbers, yes. ID names, no. If the user name maches the group name,
IE: aaron = aaron, then the user matches the
On 05/17/2010 10:49 AM, Harald Braumann wrote:
On Mon, May 17, 2010 at 10:14:28AM -0600, Aaron Toponce wrote:
On 05/17/2010 10:02 AM, Harald Braumann wrote:
- you could have a UPG system but a mismatch of IDs - wrong umask
ID numbers, yes. ID names, no. If the user name maches the group name,
As far as I understood,... you guys are already starting to patch
unrelated software just to make UPG work (see
#581919).
Even the title of that bug, bad ownership or modes... is
ridiculous... and proves what I've predicted before, namely that these
changes will compromise security (such a patch
On 05/17/2010 11:10 AM, Christoph Anton Mitterer wrote:
As far as I understood,... you guys are already starting to patch
unrelated software just to make UPG work (see
#581919).
Even the title of that bug, bad ownership or modes... is
ridiculous... and proves what I've predicted before,
On Mon, May 17, 2010 at 11:04:58AM -0600, Aaron Toponce wrote:
If you're using a non-UPG system, then you don't care. Debian is
UPG-based, so your argument is invalid.
So you propose that Debian should be restricted to work in pure UPG
environments. Then there is no need to detect the
On Mon, 2010-05-17 at 11:23 -0600, Aaron Toponce wrote:
You haven't shown any implementation that security will be compromised
in any way. You just keep throwing it around, which isn't doing anything
for the discussion.
Uhm, no!
If you need to change for example ssh, to allow an
On 05/17/2010 11:46 AM, Christoph Anton Mitterer wrote:
If you need to change for example ssh, to allow an authorized_keys file
or perhaps even things like ~/.ssh/id_rsa to be group-readable and/or
writable you actively compromise security, at least for those systems
which do not use (for
On Mon, May 17, 2010 at 07:10:14PM +0200, Christoph Anton Mitterer wrote:
As far as I understood,... you guys are already starting to patch
unrelated software just to make UPG work (see
#581919).
Even the title of that bug, bad ownership or modes... is
ridiculous... and proves what I've
On Mon, 2010-05-17 at 11:50 -0600, Aaron Toponce wrote:
How does this compromise security when you're the only member of your
private group?
And if you are not?
Why should you? Well someone simply might not want to use UPG? Or might
use the users or staff group?
Or do we now basically force
* Petter Reinholdtsen:
I am bothered by URL: http://bugs.debian.org/56 , and the fact
that apt(-get,itude) do not work with Squid as a proxy. I would very
much like to have apt work out of the box with Squid in Squeeze. To
fix it one can either change Squid to work with pipelining the
]] Christoph Anton Mitterer
| On Mon, 2010-05-17 at 11:50 -0600, Aaron Toponce wrote:
| How does this compromise security when you're the only member of your
| private group?
| And if you are not?
Then you have a misconfigured system where security might be
compromised. If it's intentional,
Hi all,
I would like to adopt package libnjb5, which is up for adoption due to
its maintainer being MIA.
However, I'm not a DD or a DM. I've been contributing work to Debian
for a few months now as a member of the testing security team, but my
work is unimportant - I simply sort CVE's and file
Untitled Document MR® TAS Hebbecker Antec
Workhorse TUF Atlas Ranar
Walz-Schenk Anatol HIX CAPS
MHM Pannon Hopkins Lawson
Melhora na Qualidade da Impressão - A prancha para Bolso de Tote Bag pode ser
usada para inserir em espaços apertados como o bolso lateral de um pequeno tote
bag. O
* Aaron Toponce aaron.topo...@gmail.com [100517 13:05]:
On 05/17/2010 10:49 AM, Harald Braumann wrote:
from pam_umask's description of the usergroups option:
If the user is not root, and the user ID is equal to the group ID, *and*
the username is the same as primary group name, the umask
Due to the widespread usage of intercepting proxies, its very hard, if
not impossible, to determine if a proxy is in use. Its unwise, at
best, to assume that no proxy configured == no proxy processing your
traffic :(.
-Rob
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with
Package: wnpp
Severity: wishlist
Owner: Sune Vuorela report...@pusling.com
* Package name: synaptiks
Version : 0.4.0
Upstream Author : Sebastian Wiesner basti.wies...@gmx.net
* URL :
http://kde-apps.org/content/show.php/synaptiks?content=114270
* License :
* Robert Collins robe...@robertcollins.net [100517 17:42]:
Due to the widespread usage of intercepting proxies, its very hard, if
not impossible, to determine if a proxy is in use. Its unwise, at
best, to assume that no proxy configured == no proxy processing your
traffic :(.
-Rob
IANADD,
Given that pipelining is broken by design, that the HTTP WG has
increased the number of concurrent connections that are recommended,
and removed the upper limit - no. I don't think that disabling
pipelining hurts anyone - just use a couple more concurrent
connections.
-Rob
--
To UNSUBSCRIBE,
http://www.srware.net/en/software_srware_iron_chrome_vs_iron.php
This should become a full open source project with a community behind
it. With Mozilla disregarding H.264, the community needs a full
browser capable of H.264 video playback without the privacy issues of
Chrome.
We need to
On Tue, 2010-05-18 at 14:02 +1200, Robert Collins wrote:
Given that pipelining is broken by design, that the HTTP WG has
increased the number of concurrent connections that are recommended,
and removed the upper limit - no. I don't think that disabling
pipelining hurts anyone - just use a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Mon, 17 May 2010 18:06:11 +1200
Source: burgerspace
Binary: burgerspace
Architecture: source amd64
Version: 1.9.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Games Team pkg-games-de...@lists.alioth.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Mon, 17 May 2010 17:37:15 +1200
Source: flatzebra
Binary: libflatzebra-dev libflatzebra-0.1-2
Architecture: source amd64
Version: 0.1.5-1
Distribution: unstable
Urgency: low
Maintainer: Debian Games Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 17 May 2010 00:18:26 -0600
Source: fmit
Binary: fmit
Architecture: source amd64
Version: 0.97.7-3
Distribution: unstable
Urgency: low
Maintainer: John Wright j...@debian.org
Changed-By: John Wright j...@debian.org
Description:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 05 May 2010 10:25:24 +0200
Source: pam-python
Binary: libpam-python
Architecture: source i386
Version: 0.1.1-1
Distribution: unstable
Urgency: low
Maintainer: Russell Stuart russell-deb...@stuart.id.au
Changed-By: Petter
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 05 May 2010 21:53:29 +0200
Source: sssd
Binary: sssd libnss-sss libpam-sss python-sss
Architecture: source i386
Version: 1.0.5-1
Distribution: unstable
Urgency: low
Maintainer: Petter Reinholdtsen p...@debian.org
Changed-By:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 16 May 2010 23:21:31 +0200
Source: gtkhtml3.14
Binary: libgtkhtml3.14-19 libgtkhtml3.14-dev libgtkhtml3.14-dbg
libgtkhtml-editor0 libgtkhtml-editor-common libgtkhtml-editor-dev
Architecture: source all amd64
Version: 3.30.1-2
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 16 May 2010 22:30:03 +0300
Source: kde4libs
Binary: libkdecore5 libkdeui5 libkpty4 libkdesu5 libkjsapi4 libkjsembed4
libkio5 libkntlm4 libsolid4 libkde3support4 libkfile4 libknewstuff2-4
libknewstuff3-4 libkparts4 libkutils4
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 16 May 2010 23:59:49 +0300
Source: kdenetwork
Binary: kdenetwork kdenetwork-filesharing kget libkopete4 kopete libkopete-dev
kppp krdc krfb kdenetwork-dbg kde-zeroconf
Architecture: all amd64 source
Version: 4:4.4.3-2
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 14 May 2010 09:32:56 +0100
Source: docky
Binary: docky python-docky
Architecture: source all
Version: 2.0.3.1-2
Distribution: unstable
Urgency: low
Maintainer: Debian CLI Applications Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 23 Apr 2010 10:59:16 +0200
Source: mason
Binary: mason
Architecture: source all
Version: 1.0.0-12
Distribution: unstable
Urgency: low
Maintainer: Thomas Scheffczyk thomas.scheffc...@uni-mainz.de
Changed-By: Thomas Scheffczyk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 17 May 2010 9:01:49 +0200
Source: orpie
Binary: orpie
Architecture: source amd64
Version: 1.5.1-8
Distribution: unstable
Urgency: low
Maintainer: Uwe Steinmann ste...@debian.org
Changed-By: Uwe Steinmann ste...@debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 17 May 2010 12:21:11 +0200
Source: awesome-extra
Binary: awesome-extra
Architecture: source all
Version: 2010051701
Distribution: unstable
Urgency: low
Maintainer: Julien Danjou a...@debian.org
Changed-By: Julien Danjou
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 17 May 2010 12:17:40 +0200
Source: kmidimon
Binary: kmidimon
Architecture: source i386
Version: 0.7.3-2
Distribution: unstable
Urgency: low
Maintainer: Debian Multimedia Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 17 May 2010 12:17:56 +0200
Source: minbif
Binary: minbif-common minbif minbif-webcam minbif-dbg
Architecture: source i386
Version: 1:1.0.3-1
Distribution: unstable
Urgency: low
Maintainer: Sebastien Delafond s...@debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 17 May 2010 12:17:53 +0200
Source: dictionaries-common
Binary: dictionaries-common dictionaries-common-dev
Architecture: source all
Version: 1.5.5
Distribution: unstable
Urgency: low
Maintainer: Agustin Martin Domingo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 17 May 2010 12:52:06 +0200
Source: evolution-data-server
Binary: evolution-data-server evolution-data-server-common
evolution-data-server-dev evolution-data-server-dbg libedataserver1.2-11
libedataserver1.2-dev
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 17 May 2010 11:48:45 +0200
Source: wordnet
Binary: wordnet wordnet-gui wordnet-dev wordnet-base wordnet-sense-index
wordnet-grind dict-wn goldendict-wordnet
Architecture: source all amd64
Version: 1:3.0-23
Distribution:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Mon, 17 May 2010 14:31:28 +0300
Source: bgoffice-dict-downloader
Binary: bgoffice-dict-downloader
Architecture: source all
Version: 0.06
Distribution: unstable
Urgency: low
Maintainer: Debian Add-ons Bulgaria Project
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sat, 15 May 2010 11:34:44 +
Source: patchage
Binary: patchage
Architecture: source hppa
Version: 0.4.4-1.2
Distribution: unstable
Urgency: low
Maintainer: Paul Brossier p...@debian.org
Changed-By: Luca Falavigna
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 17 May 2010 14:32:55 +0200
Source: giws
Binary: giws giws-doc
Architecture: source all
Version: 1.1.1-1
Distribution: unstable
Urgency: low
Maintainer: Sylvestre Ledru sylves...@debian.org
Changed-By: Sylvestre Ledru
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 17 May 2010 14:22:10 +0200
Source: monkeystudio
Binary: monkeystudio monkeystudio-common monkeystudio-dbg
Architecture: source all amd64
Version: 1.8.4.0-1
Distribution: unstable
Urgency: low
Maintainer: Evgeni Golov
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 17 May 2010 14:40:37 +0300
Source: xmobar
Binary: xmobar
Architecture: source i386
Version: 0.11-1
Distribution: unstable
Urgency: low
Maintainer: Apollon Oikonomopoulos apoi...@gmail.com
Changed-By: Apollon Oikonomopoulos
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 17 May 2010 15:15:59 +0200
Source: nuapplet
Binary: nuapplet
Architecture: source amd64
Version: 2.3.0-1
Distribution: unstable
Urgency: high
Maintainer: Pierre Chifflier pol...@debian.org
Changed-By: Pierre Chifflier
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 17 May 2010 09:29:03 -0400
Source: gramps
Binary: gramps
Architecture: source all
Version: 3.2.3-1
Distribution: unstable
Urgency: low
Maintainer: James A. Treacy tre...@debian.org
Changed-By: James A. Treacy tre...@debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 17 May 2010 15:31:33 +0200
Source: evolution
Binary: evolution libevolution evolution-common evolution-dev evolution-dbg
evolution-plugins evolution-plugins-experimental
Architecture: source all amd64
Version: 2.30.1.2-2
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Mon, 17 May 2010 14:04:56 +0100
Source: gluezilla
Binary: libgluezilla
Architecture: source amd64
Version: 2.6-1
Distribution: experimental
Urgency: low
Maintainer: Debian Mono Group pkg-mono-gr...@lists.alioth.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Mon, 17 May 2010 17:20:32 +0200
Source: libfsobasics
Binary: libfsobasics-dev libfsobasics0 libfsobasics-dbg
Architecture: source i386
Version: 0.9.0+git20100509-2
Distribution: unstable
Urgency: low
Maintainer: Debian
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Mon, 17 May 2010 13:21:22 +0900
Source: libhtml-formfu-perl
Binary: libhtml-formfu-perl
Architecture: source all
Version: 0.07001-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Mon, 17 May 2010 20:06:54 +0900
Source: libmodule-corelist-perl
Binary: libmodule-corelist-perl
Architecture: source all
Version: 2.33-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 14 May 2010 17:26:53 -0400
Source: mdp
Binary: python-mdp
Architecture: source all
Version: 2.6-1
Distribution: unstable
Urgency: low
Maintainer: Yaroslav Halchenko deb...@onerussian.com
Changed-By: Yaroslav Halchenko
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 17 May 2010 16:57:49 +0200
Source: pam-python
Binary: libpam-python
Architecture: source i386
Version: 0.1.1-2
Distribution: unstable
Urgency: low
Maintainer: Russell Stuart russell-deb...@stuart.id.au
Changed-By: Petter
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 16 May 2010 23:15:44 +0200
Source: qbzr
Binary: qbzr
Architecture: source all
Version: 0.18.6-1
Distribution: unstable
Urgency: low
Maintainer: Debian Bazaar Maintainers pkg-bazaar-ma...@lists.alioth.debian.org
Changed-By:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 18 Apr 2010 23:42:13 +0300
Source: qt4-x11
Binary: libqtcore4 libqt4-core libqtgui4 libqt4-gui libqt4-network
libqt4-opengl libqt4-script libqt4-scripttools libqt4-sql libqt4-sql-ibase
libqt4-sql-mysql libqt4-sql-odbc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 13 May 2010 22:13:42 -0400
Source: libaspect-perl
Binary: libaspect-perl
Architecture: source all
Version: 0.45-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group pkg-perl-maintain...@lists.alioth.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 17 May 2010 17:24:01 +0200
Source: libfusioninventory-agent-task-netdiscovery-perl
Binary: libfusioninventory-agent-task-netdiscovery-perl
Architecture: source all
Version: 1.1-1
Distribution: unstable
Urgency: low
Maintainer:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 17 May 2010 22:42:51 +0800
Source: onscripter
Binary: onscripter
Architecture: source i386
Version: 0.0.20100510-1
Distribution: unstable
Urgency: low
Maintainer: Ying-Chun Liu (PaulLiu) paul...@debian.org
Changed-By:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 14 May 2010 10:46:14 +0200
Source: podbrowser
Binary: podbrowser
Architecture: source all
Version: 0.12-2
Distribution: unstable
Urgency: low
Maintainer: Jeffrey Ratcliffe jeffrey.ratcli...@gmail.com
Changed-By: Jeffrey
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Mon, 17 May 2010 11:33:48 -0300
Source: webkit
Binary: libwebkit-1.0-2 libwebkit-dev libwebkit-1.0-common libwebkit-1.0-2-dbg
gir1.0-webkit-1.0
Architecture: source all amd64
Version: 1.2.1-2
Distribution: unstable
Urgency: high
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 15 May 2010 09:42:49 -0400
Source: libasync-interrupt-perl
Binary: libasync-interrupt-perl
Architecture: source i386
Version: 1.05-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Mon, 17 May 2010 17:12:32 +0200
Source: mc
Binary: mc mc-dbg
Architecture: source amd64
Version: 3:4.7.0.5-1
Distribution: unstable
Urgency: low
Maintainer: Debian MC Packaging Group pkg-mc-de...@lists.alioth.debian.org
Changed-By:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 17 May 2010 12:01:02 +0200
Source: plasma-widget-yawp
Binary: plasma-widget-yawp plasma-dataengines-yawp
Architecture: source amd64
Version: 0.3.2-4
Distribution: unstable
Urgency: low
Maintainer: Kai Wasserbäch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 17 May 2010 18:13:34 +0200
Source: screen-message
Binary: sm
Architecture: source amd64
Version: 0.19-1
Distribution: unstable
Urgency: low
Maintainer: Joachim Breitner nome...@debian.org
Changed-By: Joachim Breitner
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 17 May 2010 18:03:52 +0200
Source: arcboot
Binary: arcboot tip22
Architecture: source mips
Version: 0.3.13
Distribution: unstable
Urgency: low
Maintainer: Guido Günther a...@sigxcpu.org
Changed-By: Guido Günther a...@sigxcpu.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 04 Apr 2010 09:10:11 -0300
Source: chaosreader
Binary: chaosreader
Architecture: source all
Version: 0.94-3
Distribution: unstable
Urgency: low
Maintainer: Debian Forensics forensics-de...@lists.alioth.debian.org
Changed-By:
1 - 100 of 149 matches
Mail list logo