Hi, On Mon, May 22, 2023 at 6:49 PM jbra...@dismail.de <jbra...@dismail.de> wrote: > +upgrade to the bleeding edge Debian GNU/Hurd: > + > + $ wget > http://ftp.de.debian.org/debian/pool/main/d/debian-ports-archive-keyring/debian-ports-archive-keyring_2023.02.01_all.deb > + # dpkg -i debian-ports-archive-keyring_2023.02.01_all.deb
Is this secure though? You're fetching a package through unprotected HTTP, then installing it as a trusted keyring. > +modify your /boot/grub/grub.cfg like so: > + > + # multiboot /boot/gnumach-1.8-486.gz root=part:2:device:hd0 > console=com0 > + multiboot /boot/gnumach-1.8-486.gz root=part:2:device:wd0 > console=com0 noide But /boot/grub/grub.cfg is going to be rebuilt next time you update your kernel image (or something) and dpkg runs update-grub2 / grub2-mkconfig. Instead, add GRUB_CMDLINE_GNUMACH="noide" to /etc/default/grub, run update-grub2 yourself, and make sure that it does generate "noide" in /boot/grub/grub.cfg. Sergey