Hi,

On Mon, May 22, 2023 at 6:49 PM jbra...@dismail.de <jbra...@dismail.de> wrote:
> +upgrade to the bleeding edge Debian GNU/Hurd:
> +
> +     $ wget 
> http://ftp.de.debian.org/debian/pool/main/d/debian-ports-archive-keyring/debian-ports-archive-keyring_2023.02.01_all.deb
> +     # dpkg -i debian-ports-archive-keyring_2023.02.01_all.deb

Is this secure though? You're fetching a package through unprotected
HTTP, then installing it as a trusted keyring.

> +modify your /boot/grub/grub.cfg like so:
> +
> +    #  multiboot       /boot/gnumach-1.8-486.gz root=part:2:device:hd0 
> console=com0
> +       multiboot       /boot/gnumach-1.8-486.gz root=part:2:device:wd0 
> console=com0 noide

But /boot/grub/grub.cfg is going to be rebuilt next time you update
your kernel image (or something) and dpkg runs update-grub2 /
grub2-mkconfig.

Instead, add GRUB_CMDLINE_GNUMACH="noide" to /etc/default/grub, run
update-grub2 yourself, and make sure that it does generate "noide" in
/boot/grub/grub.cfg.

Sergey

Reply via email to