Re: Bug#215205: language-chooser: Language order shouldn't be alphabetical

2003-10-13 Thread Paul Hampson
On Sun, Oct 12, 2003 at 08:17:06PM -0500, Steve Langasek wrote:
> On Sun, Oct 12, 2003 at 02:32:39PM +0100, Dale Amon wrote:
> > On Sun, Oct 12, 2003 at 01:56:46PM +0200, Goswin von Brederlow wrote:
> > > Dale Amon <[EMAIL PROTECTED]> writes:
> > > And if I'm a german living in america?
> 
> > Then you'd go to the normal alphabetical listing just
> > as you would have to now, while 99% of the users in
> > that TZ had the right language as one of the first
> > couple choices.
> 
> And what language will you use to ask the user to indicate their
> timezone?

ASCII-art world map?

-- 
---
Paul "TBBle" Hampson, MCSE
6th year CompSci/Asian Studies student, ANU
The Boss, Bubblesworth Pty Ltd (ABN: 51 095 284 361)
[EMAIL PROTECTED]

"If they leave no survivors, where do the stories come from?"
-- Capt. Jack Sparrow, "Pirates of the Cariibiean"

This email is licensed to the recipient for non-commercial
use, duplication and distribution.
---


signature.asc
Description: Digital signature


Anyone interested in libical?

2003-10-13 Thread Martin Michlmayr
Is anyone interested in adopting libical?  It has been orphaned for
193 days (#187030).  I wouldn't mind removing it, but mozilla
build-depends on it (perhaps this can be changed, tho?).


Description: Development environment for libical
 Libical is an  Open  Source  implementation  of  the  IETF's iCalendar
 Calendaring and Scheduling protocols. (RFC 2445, 2446,  and  2447).  It
 parses iCal components and  provides  a  C  API  for  manipulating the
 component properties, parameters, and subcomponents.


-- 
Martin Michlmayr
[EMAIL PROTECTED]




Re: Bug#215103: ITP: gmasqdialer -- gtk/gnome client for masqdialer server

2003-10-13 Thread David B Harris
On Mon, 13 Oct 2003 00:02:47 -0400
Joe Drew <[EMAIL PROTECTED]> wrote:
> David B Harris wrote:
> 
> > As much as you may dislike it, people care about toolkit. I don't
> > understand the witch-hunt to remove references to such things.
> 
> Short description is a limited resource. By all means, put GTK or GNOME 
> in the long description if it is deemed necessary; apt searches will 
> still find what you're looking for.

Obviously if the short description is too long, something needs to go -
and in that case, certainly not mentioning the toolkit is reasonable.
However, in this particular case ("gtk/gnome client for masqdialer
server", but really "gnome client for masqdialer" since the "gtk" is
assumed when talking about GNOME) is 35 characters long.

If you think 35 characters is too long, feel free to start filing
thousands and thousands of bugs on all the other packages, suggesting
that they remove little bits and pieces.


pgpJg5QyDch8o.pgp
Description: PGP signature


Re: Bug#215103: ITP: gmasqdialer -- gtk/gnome client for masqdialer server

2003-10-13 Thread David B Harris
On Mon, 13 Oct 2003 01:44:57 -0400
David B Harris <[EMAIL PROTECTED]> wrote:
> Obviously if the short description is too long, something needs to go -
> and in that case, certainly not mentioning the toolkit is reasonable.
> However, in this particular case ("gtk/gnome client for masqdialer
> server", but really "gnome client for masqdialer" since the "gtk" is
> assumed when talking about GNOME) is 35 characters long.
> 
> If you think 35 characters is too long, feel free to start filing
> thousands and thousands of bugs on all the other packages, suggesting
> that they remove little bits and pieces.

(And if you don't, please don't bother people about it - instead file a
bug on Policy asking for the short description guidelines to
specifically say "do not mention the application's toolkit".)


pgpbH15Uf0TrV.pgp
Description: PGP signature


Re: Anyone interested in libical?

2003-10-13 Thread Norbert Tretkowski
* Martin Michlmayr wrote:
> Is anyone interested in adopting libical?  It has been orphaned for
> 193 days (#187030). I wouldn't mind removing it, but mozilla
> build-depends on it (perhaps this can be changed, tho?).

Mozilla builds fine without libical.

-- 
 - nobse




Re: 2.5 IPsec kernel patch: orphaning the grsecurity patch

2003-10-13 Thread Matthias Urlichs
Hi, martin f krafft wrote:

> Herbert gets to pollute the kernel-source all he wants because
> apparently noone gives a flying food.

Disagree. Some people, myself among them, have stated their unhappiness.

To me personally, though, it doesn't matter that much. I'd rather spend
the time on gettng 2.6 release-ready.

-- 
Matthias Urlichs   |   {M:U} IT Design @ m-u-it.de   |  [EMAIL PROTECTED]
Disclaimer: The quote was selected randomly. Really. | http://smurf.noris.de
 - -
"I'm a creationist; I refuse to believe that I could have evolved from man."




Re: Packaging sysfsutils: static library?

2003-10-13 Thread Martin Pitt
Hi!

On 2003-10-13  1:45 +0200, Marco d'Itri wrote:
> BTW, I may have been missing something as I did not read the beginning
> of this thread, but I don't see the point of packaging sysfsutils:

It is a separate upstream package.

> as it's part of the udev source package 

Well, they copied the library to udev because the upstream package
does not provide a shared library yet. But the utilities (lsusb and
sysfstool) and its documentation aren't part of udev. Maybe these two
upstream packages will be merged in the future.

> (which I ITP'ed some weeks ago) 

Am I missing something? bugs.d.o/wnpp does not contain the word
'udev' and only once 'sysfs' (#215257, the ITP I'm talking about). I
also cannot find your name in wnpp.

> it will be uploaded to the archive by me when it will be actually
> useful for something.

In the meantime I also prepared a package, including manpages and
everything, since it is useful already  in the sense that it fulfills
its intended meaning (although I won't let it go into sarge). What a
timing :-/ 

I still would be interested in it, but if you already have a package,
then I won't stand in the way (although, to be honest, I feel a little
bit fooled). But please tell other people about your intents by filing
a proper ITP the next time! In the time I created the package I could
as well have fixed some other bugs.

Okay, maybe we could merge the efforts. IMHO it does not make much
sense to have a separate package with lsusb and systool, they could be
integrated into the udev package. I can send you all the additional
stuff (library documentation, userspace tools and manpages) for
inclusion) if you really want to merge the upstream packages.

Martin
-- 
Martin Pitt
home:  www.piware.de
eMail: [EMAIL PROTECTED]




Re: recent spam to this list

2003-10-13 Thread Andreas Metzler
Julian Mehnle <[EMAIL PROTECTED]> wrote:
> Andreas Metzler wrote:
>> Julian Mehnle <[EMAIL PROTECTED]> wrote:
>> > It's about forging an e-mail sender's identity.  By preventing the
>> > unauthorized use of domains as the sender domain of e-mails, most of
>> > the practiced cases of identity forgery are prevented. [...]

>> If I send an e-mail over mail.nusrf.at with envelope-from
>> [EMAIL PROTECTED] I am _not_ forging anything or making
>> "unauthorized use of domains"

> Yes, you are.  The envelope-from address is not a reply-to address,
> it's a sender address.  If you are sending from mail.nusrf.at, you
> are not sending from logic.univie.ac.at.  So you should not specify
> <[EMAIL PROTECTED]> as the envelope-from address, or you'd
> be forging it.

No, I am just specifying where I want bounces to go to.

  MAIL FROM: [SP  ] 

   This command tells the SMTP-receiver that a new mail transaction is
   starting and to reset all its state tables and buffers, including any
   recipients or mail data.  The  portion of the first or
   only argument contains the source mailbox (between "<" and ">"
   brackets), which can be used to report errors.

That is practically all there is in rfc2821 about this issue.
  cu andreas




Bug#213822: ST Online Antivirus MAIL - pocitacovy virus detekovany! / computer virus detected!

2003-10-13 Thread RAV AntiVirus


--
 ST Online Antivirus MAIL
 vysledky AV testu
--

--
 ST Online Antivirus MAIL
 AV tests resuluts
--

ST Online Antivirus MAIL detekoval v mailovej sprave adresovanej do Vasej 
e-mailovej schranky pocitacovy virus.
Odosielatel (sender):   [EMAIL PROTECTED]
Predmet e-mailu (subject):  Newest Net Pack
Nazov infikovanej prilohy (file name):  (part0004:q988765.exe)
Nazov virusu (virus name):  Win32/[EMAIL PROTECTED]

The file (part0004:q988765.exe) attached to mail (with subject:Newest Net Pack) 
sent by [EMAIL PROTECTED]
to  is infected with virus: Win32/[EMAIL PROTECTED]

Subor nebolo mozne vyliecit.

Cannot clean this file.

Subor bol uspesne vymazany.

The file was successfully deleted.

---
Toto je kopia hlavicky E-mailu:
Received: from nqegip (telecom-213-200-84.telecom.sk [213.81.200.84])
 by smtp2.stonline.sk (STOnline ESMTP Server)
 with SMTP id <[EMAIL PROTECTED]>; Mon,
 13 Oct 2003 10:10:36 +0200 (MEST)


---
this is a copy of the e-mail header:
Received: from nqegip (telecom-213-200-84.telecom.sk [213.81.200.84])
 by smtp2.stonline.sk (STOnline ESMTP Server)
 with SMTP id <[EMAIL PROTECTED]>; Mon,
 13 Oct 2003 10:10:36 +0200 (MEST)


RAV AntiVirus for Linux i386 version: 8.4.2 (snapshot-20030212)

Scan engine 8.11 for i386.
Last update: Thu, 09 Oct 2003 02:30:25 +02
Scanning for 83249 malwares (viruses, trojans and worms).

Tento e-mail bol skontrolovany sluzbou ST Online Antivirus MAIL

This e-mail has been scanned by ST Online Antivirus MAIL.





Bug#215522: ITP: aspell-pt-br -- The Brazilian Portuguese dictionary for GNU Aspell

2003-10-13 Thread Rafael Laboissiere
Package: wnpp
Version: unavailable; reported 2003-10-13
Severity: wishlist


* Package name: aspell-pt-br
  Version : 
  Upstream Author : 
* URL : http://people.debian.org/~rafael/br.ispell
* License : GPL
  Description : The Brazilian Portuguese dictionary for GNU Aspell

Actually, aspell-pt-br does not represent a new source package, but rather
the result of the reorganization of two other packages: aspell-pt and
br.ispell.  I thought, though, that it would be better to have this
reorganization registered somewhere in the Debian BTS, hence this "ITP"
announcement.

Here is the tale: I was once the maintainer of the ibrazilian package, which
is now maintained by Carlos Laviola.  I decided to re-adopt it and when I
compiled the last (beta) version of the br.ispell source package, I noticed
that an aspell word list was generated, which is better than that shipped
with the aspell-pt package.

In order to have the word list in br.ispell superseding the one in
aspell-pt, the development of these two source packages must be coordinated.
I approached Brian Nelson (the maintainer of aspell-pt) and he offered the
package to me.

I prepared an apt-getable repository for the new packages at:

http://people.debian.org/~rafael/br.ispell

The name of the package was chosen following the language code pt_BR. The
name aspell-br would be not appropriate, since br is the code for the Breton
language (spoken in Britany, France).

If there are no objections, I will soon upload the packages to unstable.  

-- System Information:
Debian Release: testing/unstable
Architecture: i386
Kernel: Linux laboiss0 2.4.19-686 #1 Mon Nov 18 23:59:03 EST 2002 i686
Locale: LANG=en_US, LC_CTYPE=en_US






Re: recent spam to this list

2003-10-13 Thread Riku Voipio
On Mon, Oct 13, 2003 at 12:34:46AM +0200, Tollef Fog Heen wrote:
> * Riku Voipio 
 
> I have mail-followup-set for a reason.  In addition, it is normal
> policy on Debian lists not to Cc people unless explicitly requested.

Hmm. my mutt setup appears to be b0rken then. sorry about that.
need to look that.

> I don't want my bounces to go to the wrong place.  I don't have root
> at all the places I send mail from, nor do I trust all those who have
> root there.  So, I don't want my mail bounced to the wrong place.

So then use a envelope-from from a domain you trust? You said that you
use a specific relay to relay your mail already, so you could setup
your domain (raw.no) so that only that specific IP is allowed 
to send mail to the world using raw.no domain?

You can still put your university address in the "From: " field like 
you do right now.

> | Second hint: If you insist on your right to forge your email address, 
> | anyone else can forge your address as well. Is that a right you really
> | need?
 
> Uhm, how would you forge your own mail address?  It's like forging
> your own signature, something which is, by definition not possible:

To quote dark: A bad analogy is like an leaky screwdriver.

If you have two IP's, one at home ISP and another at work, and
you send packets from your home IP using the work IP, you are
forging the sender IP, even if you happen to be affiliated with both
IP's.

> No, I can't.  I don't control the DNS of my University, a few of my
> ISPs and so on.  Nor do I control Debian's DNS.

And you don't need to, unless you want to send your bounces to your
university or debian servers. Why would you want to do that?

One could also argue, that since the university/debian owns the domain,
they can setup whatever policy they want on what IP's can send mail 
in the name of their domain. Lots of opposers seem to assume that 
domain owners will immediately apply an policy that will force 
senders to use their mail relays for outgoing mail, without 
consulting their users first.

> | The antipathy against the a POSSIBILITY of a domain owner to restrict
> | sending mail in name of his own domain to few IP's is what is silly,
> | not the proposal...
 
> It's the wrong solution.

And what is the right solution? One that even the blondes using hotmail
can use? Just accept it as fact of life that viruses and spam use every
now and then your domains?

-- 
Riku Voipio|[EMAIL PROTECTED] |
kirkkonummentie 33 |+358 40 8476974  --+--
02140 Espoo|   |
dark> A bad analogy is like leaky screwdriver  |




Fwd: Re: Anyone interested in libical?

2003-10-13 Thread Sebastian Ley
Am Mo, den 13.10.2003 schrieb Martin Michlmayr um 07:37:
> Is anyone interested in adopting libical?  It has been orphaned for
> 193 days (#187030).  I wouldn't mind removing it, but mozilla
> build-depends on it (perhaps this can be changed, tho?).

I had a look at it, but upstream seems to be not very active. There are
some major problems with it (frequently changing API/ABI without any
proper versioning scheme) and since I do not want to do upstream work I
dismissed the idea of maintaining it.

Sebastian

-- 
PGP-Key: http://www.mmweg.rwth-aachen.de/~sebastian.ley/public.key
Fingerprint: A46A 753F AEDC 2C01 BE6E  F6DB 97E0 3309 9FD6 E3E6





faster boot

2003-10-13 Thread Andrea Mennucc
hello
there has been a lot of interest lately on tecniques to obtain a faster 
boot; for example

http://www-106.ibm.com/developerworks/linux/library/l-boot.html
http://www.fefe.de/minit/
http://www.ussg.iu.edu/hypermail/linux/kernel/0204.0/0674.html
http://www.atnf.csiro.au/people/rgooch/linux/boot-scripts/
I would be delighted to have a faster boot: my boot times (excluding 
BIOS) are 60sec-90sec (using the ditributed kernel by Herbert XU), and 
this is very long (particularly for my Freevo-box)

is anyone trying to implement the above in Debian?
is anyone interested?
a.



Re: Which packages will hold up the release?

2003-10-13 Thread Björn Stenberg
Colin Watson wrote:
> In the first example, the fact that foo depends on bar while
> simultaneously conflicting with the version of bar in the suite you're
> looking at is the thing that's bad, because it means foo can't be
> installed. The second example is OK, even though foo and bar can't be
> installed simultaneously; in an ideal world we might check that one of
> them is Priority: extra, but there's a bit too much other stuff going on
> for this to be feasible right now.

Thank you.

> These examples are a bit contrived, but there are certainly real cases
> in the archive.

My script currently only finds one:

- jpilot-backup depends on jpilot >= 0.99.4-1 but testing has 0.99.2-2
- jpilot-backup conflicts with jpilot << 0.99.4-1 but testing has 0.99.2-2

If you know of other cases, I'd appreciate a note so I can examine why my 
script doesn't find them.

-- 
Björn




Re: faster boot

2003-10-13 Thread Henrique de Moraes Holschuh
On Mon, 13 Oct 2003, Andrea Mennucc wrote:
> there has been a lot of interest lately on tecniques to obtain a faster 
> boot; for example
> 
> http://www-106.ibm.com/developerworks/linux/library/l-boot.html
> http://www.fefe.de/minit/
> http://www.ussg.iu.edu/hypermail/linux/kernel/0204.0/0674.html
> http://www.atnf.csiro.au/people/rgooch/linux/boot-scripts/
> 
> I would be delighted to have a faster boot: my boot times (excluding 
> BIOS) are 60sec-90sec (using the ditributed kernel by Herbert XU), and 
> this is very long (particularly for my Freevo-box)
> 
> is anyone trying to implement the above in Debian?
> is anyone interested?

I was doing so, along with Doug... but I have been quite out of time to play
with it lately.

However, if you read the paper in http://people.d.o/~hmh, and implement the
demultiplexer, we could probably modify one of the above methods to work
well, while we implement ours...

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh




Re: faster boot

2003-10-13 Thread Guus Sliepen
On Mon, Oct 13, 2003 at 12:05:24PM +0200, Andrea Mennucc wrote:

> I would be delighted to have a faster boot: my boot times (excluding 
> BIOS) are 60sec-90sec (using the ditributed kernel by Herbert XU), and 
> this is very long (particularly for my Freevo-box)
> 
> is anyone trying to implement the above in Debian?
> is anyone interested?

I just hacked /etc/init.d/rcS to start services with the same number
after the "S" in parallel, you can find it here:

http://sliepen.eu.org/~guus/parallel-rcS

- It works without problems, nothing seems to have failed.
- I don't see much of a difference (but then again, I have a fast
  computer).
- Unfortunately starting in the background means output of scripts gets lost.

-- 
Met vriendelijke groet / with kind regards,
Guus Sliepen <[EMAIL PROTECTED]>


signature.asc
Description: Digital signature


Re: Help needed: builds eating all memory

2003-10-13 Thread Andreas Rottmann
Adam Majer <[EMAIL PROTECTED]> writes:

> On Sat, Oct 11, 2003 at 04:00:34PM +0200, Sam Hocevar wrote:
>>My openvrml packages have been failing to build on arm [1], mips [2]
>> and mipsel [3] for some time. From the build logs, it looks like g++ is
>> eating all the memory and the OOM killer kills it.
>> 
>>What can I do? Ask the buildd admins to add more swap? I would be
>> happy to cross-compile the packages (they don't require any arch-specific
>> bootstrapping) but I don't have enough hard drive space to build a cross-
>> compiler.
>
> Whatabout removing the -O2 switch? It can save some compilation time and
> memory for very large files..
>
For very large files, it saves not some, but a lot of memory in my
experience for gcc 3.3 -- compiling a ~140K lines generated C file
with -O2 even caused my 396MB machine to trash heavily, while -O0 and
gcc 3.2 -O2 were ok...

Andy
-- 
Andreas Rottmann | [EMAIL PROTECTED]  | [EMAIL PROTECTED] | [EMAIL 
PROTECTED]
http://www.8ung.at/rotty | GnuPG Key: http://www.8ung.at/rotty/gpg.asc
Fingerprint  | DFB4 4EB4 78A4 5EEE 6219  F228 F92F CFC5 01FD 5B62

This reality is really just a fucked-up dream -- Papa Roach




Bug#215556: ITP: gsysutils -- Set of utilities useful to system administrators

2003-10-13 Thread Robert Millan
Package: wnpp
Severity: wishlist

* Package name: gsysutils
* URL : http://savannah.gnu.org/projects/sysutils
* License : GPL
  Description : Set of utilities useful to system administrators

GNU Sysutils is intended to compliment coreutils. These utilities are ones that
are either primarily useful to system administrators, or would need to be
installed by a system administrator to be useful (Usually because they require
extra priviledges in order to function)

Some of these utils superceed existing implementations in Debian, I'll take
care to rename them (i.e, add "g" prefix as usual) when that happens.

Btw, "sysutils" is taken, so I take "gsysutils". Does someone prefer
"gnu-sysutils"?

Jeff:
  - Don't worry, I'll use CDBS.
  - I ack this is _your_ package, but I want it packaged right now. You'll be
in Uploaders in first upload, feel free to put yourself as Maintainer when
you like.

-- System Information:
Debian Release: testing/unstable
Architecture: i386
Kernel: Linux aragorn 2.2.25 #1 Fri Jun 20 19:28:33 EST 2003 i686
Locale: LANG=C, LC_CTYPE=C


-- 
Robert Millan

"[..] but the delight and pride of Aule is in the deed of making, and in the
thing made, and neither in possession nor in his own mastery; wherefore he
gives and hoards not, and is free from care, passing ever on to some new work."

 -- J.R.R.T, Ainulindale (Silmarillion)




Re: Bug#215556: ITP: gsysutils -- Set of utilities useful to system administrators

2003-10-13 Thread Andreas Metzler
On Mon, Oct 13, 2003 at 01:45:07PM +, Robert Millan wrote:
> GNU Sysutils is intended to compliment coreutils. These utilities
> are ones that are either primarily useful to system administrators,
> or would need to be installed by a system administrator to be useful
> (Usually because they require extra priviledges in order to
> function)
> 
> Some of these utils superceed existing implementations in Debian, I'll take
> care to rename them (i.e, add "g" prefix as usual) when that happens.
> 
> Btw, "sysutils" is taken, so I take "gsysutils". Does someone prefer
> "gnu-sysutils"?

I would, as I associate gsomething with a Gnome-frontend for something
(e.g gsudo), but I don't claim that is common conception.

BTW is the this project actually alive? There was only activity in CVS
from 2003-03-28 (project founded) to 2003-04-16.
  cu andreas




Bug#213822: ST Online Antivirus MAIL - pocitacovy virus detekovany! / computer virus detected!

2003-10-13 Thread RAV AntiVirus


--
 ST Online Antivirus MAIL
 vysledky AV testu
--

--
 ST Online Antivirus MAIL
 AV tests resuluts
--

ST Online Antivirus MAIL detekoval v mailovej sprave adresovanej do Vasej 
e-mailovej schranky pocitacovy virus.
Odosielatel (sender):   [EMAIL PROTECTED]
Predmet e-mailu (subject):  Message
Nazov infikovanej prilohy (file name):  (part:)->(IFRAME)
Nazov virusu (virus name):  HTML/IFrame_Exploit*.

The file (part:)->(IFRAME) attached to mail (with subject:Message) sent 
by [EMAIL PROTECTED]
to  is infected with virus: HTML/IFrame_Exploit*

Subor nebolo mozne vyliecit.

Cannot clean this file.

Subor bol uspesne vymazany.

The file was successfully deleted.

ST Online Antivirus MAIL detekoval v mailovej sprave adresovanej do Vasej 
e-mailovej schranky pocitacovy virus.
Odosielatel (sender):   [EMAIL PROTECTED]
Predmet e-mailu (subject):  Message
Nazov infikovanej prilohy (file name):  (part0001:buxmaqx.exe)
Nazov virusu (virus name):  Win32/[EMAIL PROTECTED]

The file (part0001:buxmaqx.exe) attached to mail (with subject:Message) sent by 
[EMAIL PROTECTED]
to  is infected with virus: Win32/[EMAIL PROTECTED]

Subor nebolo mozne vyliecit.

Cannot clean this file.

Subor bol uspesne vymazany.

The file was successfully deleted.

---
Toto je kopia hlavicky E-mailu:
Received: from zpcafavm (infovek2-vs-213-81-217-49.telecom.sk [213.81.217.49])
 by smtp2.stonline.sk (STOnline ESMTP Server)
 with SMTP id <[EMAIL PROTECTED]>; Mon,
 13 Oct 2003 14:28:25 +0200 (MEST)


---
this is a copy of the e-mail header:
Received: from zpcafavm (infovek2-vs-213-81-217-49.telecom.sk [213.81.217.49])
 by smtp2.stonline.sk (STOnline ESMTP Server)
 with SMTP id <[EMAIL PROTECTED]>; Mon,
 13 Oct 2003 14:28:25 +0200 (MEST)


RAV AntiVirus for Linux i386 version: 8.4.2 (snapshot-20030212)

Scan engine 8.11 for i386.
Last update: Thu, 09 Oct 2003 02:30:25 +02
Scanning for 83249 malwares (viruses, trojans and worms).

Tento e-mail bol skontrolovany sluzbou ST Online Antivirus MAIL

This e-mail has been scanned by ST Online Antivirus MAIL.





Bug#213822: ST Online Antivirus MAIL - pocitacovy virus detekovany! / computer virus detected!

2003-10-13 Thread RAV AntiVirus


--
 ST Online Antivirus MAIL
 vysledky AV testu
--

--
 ST Online Antivirus MAIL
 AV tests resuluts
--

ST Online Antivirus MAIL detekoval v mailovej sprave adresovanej do Vasej 
e-mailovej schranky pocitacovy virus.
Odosielatel (sender):   [EMAIL PROTECTED]
Predmet e-mailu (subject):  Latest Internet Patch
Nazov infikovanej prilohy (file name):  (part0004:Patch8865.exe)
Nazov virusu (virus name):  Win32/[EMAIL PROTECTED]

The file (part0004:Patch8865.exe) attached to mail (with subject:Latest 
Internet Patch) sent by [EMAIL PROTECTED]
to  is infected with virus: Win32/[EMAIL PROTECTED]

Subor nebolo mozne vyliecit.

Cannot clean this file.

Subor bol uspesne vymazany.

The file was successfully deleted.

---
Toto je kopia hlavicky E-mailu:
Received: from uggtpdf (infovek2-vs-213-81-217-49.telecom.sk [213.81.217.49])
 by smtp2.stonline.sk (STOnline ESMTP Server)
 with SMTP id <[EMAIL PROTECTED]>; Mon,
 13 Oct 2003 14:26:18 +0200 (MEST)


---
this is a copy of the e-mail header:
Received: from uggtpdf (infovek2-vs-213-81-217-49.telecom.sk [213.81.217.49])
 by smtp2.stonline.sk (STOnline ESMTP Server)
 with SMTP id <[EMAIL PROTECTED]>; Mon,
 13 Oct 2003 14:26:18 +0200 (MEST)


RAV AntiVirus for Linux i386 version: 8.4.2 (snapshot-20030212)

Scan engine 8.11 for i386.
Last update: Thu, 09 Oct 2003 02:30:25 +02
Scanning for 83249 malwares (viruses, trojans and worms).

Tento e-mail bol skontrolovany sluzbou ST Online Antivirus MAIL

This e-mail has been scanned by ST Online Antivirus MAIL.





RE: recent spam to this list

2003-10-13 Thread Julian Mehnle
Andreas Metzler wrote:
> Julian Mehnle <[EMAIL PROTECTED]> wrote:
> > Andreas Metzler wrote:
> > > If I send an e-mail over mail.nusrf.at with envelope-from
> > > [EMAIL PROTECTED] I am _not_ forging anything or making
> > > "unauthorized use of domains"
> > 
> > Yes, you are.  The envelope-from address is not a reply-to address,
> > it's a sender address.  If you are sending from mail.nusrf.at, you
> > are not sending from logic.univie.ac.at.  So you should not specify
> > <[EMAIL PROTECTED]> as the envelope-from address, or you'd
> > be forging it.
> 
> No, I am just specifying where I want bounces to go to.
> 
>   MAIL FROM: [SP  ] 
> 
>This command tells the SMTP-receiver that a new mail transaction is
>starting and to reset all its state tables and buffers, including any
>recipients or mail data.  The  portion of the first or
>only argument contains the source mailbox (between "<" and ">"
>brackets), which can be used to report errors.

There you have it.  It's the "source mailbox", and while it can be used to 
report errors, it can *not only* be used to report errors.  I'm relieved that 
the RFC doesn't contradict my common sense understanding of a "sender address".




Re: APT: Errors when replacing syslog by syslog-ng

2003-10-13 Thread Josip Rodin
On Sun, Oct 12, 2003 at 04:54:07PM +0200, Frans Pop wrote:
> I just got the following messages replacing syslog by syslog-ng from dselect 
> (Woody).
> Should this be reported as a bug? Against which package (syslog, syslog-ng, 
> apt)?
> 
> The following packages will be REMOVED:
>   sysklogd
> The following NEW packages will be installed:
>   syslog-ng
> 0 packages upgraded, 1 newly installed, 1 to remove and 0  not upgraded.
> Need to get 198kB of archives. After unpacking 217kB will be used.
> Do you want to continue? [Y/n]
> Get:1 http://security.debian.org stable/updates/main syslog-ng 1.5.15-1.1 
> [155kB]
> Fetched 155kB in 5s (31.0kB/s)
> Preconfiguring packages ...
> dpkg: sysklogd: dependency problems, but removing anyway as you request:
>  klogd depends on sysklogd | system-log-daemon; however:
>   Package sysklogd is to be removed.
>   Package system-log-daemon is not installed.
>   Package sysklogd which provides system-log-daemon is to be removed.
>  anacron depends on sysklogd | system-log-daemon; however:
>   Package sysklogd is to be removed.
>   Package system-log-daemon is not installed.
>   Package sysklogd which provides system-log-daemon is to be removed.
>  klogd depends on sysklogd | system-log-daemon; however:
>   Package sysklogd is to be removed.
>   Package system-log-daemon is not installed.
>   Package sysklogd which provides system-log-daemon is to be removed.
>  anacron depends on sysklogd | system-log-daemon; however:
>   Package sysklogd is to be removed.
>   Package system-log-daemon is not installed.
>   Package sysklogd which provides system-log-daemon is to be removed.
> (Reading database ... 59235 files and directories currently installed.)
> Removing sysklogd ...
> Stopping system log daemon: syslogd.
> (Reading database ... 59222 files and directories currently installed.)
> Preparing to replace nfs-common 1:1.0-2woody1 (using 
> .../nfs-common_1%3a1.0-2woody1_i386.deb) ...
> Unpacking syslog-ng (from .../syslog-ng_1.5.15-1.1_i386.deb) ...
> Setting up syslog-ng (1.5.15-1.1) ...
> Starting system logging: syslog-ng.
> Stopping system logging: syslog-ng.
> Starting system logging: syslog-ng.

Given that it finished successfully, there's no bug as far as apt is
concerned. See, dpkg isn't too happy when you remove one package from a
dependency chain, but this is exactly what apt needs to do before putting in
another package in its place. So apt tells dpkg to proceed nevertheless,
but dpkg still reports it just in case.

The doubled restart, on the other hand, is something you should ask the
syslog-ng maintainer about.

-- 
 2. That which causes joy or happiness.




Re: recent spam to this list

2003-10-13 Thread Andreas Metzler
On Mon, Oct 13, 2003 at 02:47:44PM +0200, Julian Mehnle wrote:
> Andreas Metzler wrote:
>> Julian Mehnle <[EMAIL PROTECTED]> wrote:
>>> Andreas Metzler wrote:
 If I send an e-mail over mail.nusrf.at with envelope-from
 [EMAIL PROTECTED] I am _not_ forging anything or making
 "unauthorized use of domains"

>>> Yes, you are.  The envelope-from address is not a reply-to address,
>>> it's a sender address.  If you are sending from mail.nusrf.at, you
>>> are not sending from logic.univie.ac.at.  So you should not specify
>>> <[EMAIL PROTECTED]> as the envelope-from address, or you'd
>>> be forging it.
 
>> No, I am just specifying where I want bounces to go to.
 
>>   MAIL FROM: [SP  ] 
 
>>This command tells the SMTP-receiver that a new mail transaction is
>>starting and to reset all its state tables and buffers, including any
>>recipients or mail data.  The  portion of the first or
>>only argument contains the source mailbox (between "<" and ">"
>>brackets), which can be used to report errors.
 
> There you have it.  It's the "source mailbox", and while it can be
> used to report errors, it can *not only* be used to report errors.
> I'm relieved that the RFC doesn't contradict my common sense
> understanding of a "sender address".

I does not confirm it.

There is no such thing as "the domain part of the 
should/has to/must be identical to the domain name of the machine the
mail was written on originally", it just states that 
can be used to report errors to.
  cu andreas




RE: recent spam to this list

2003-10-13 Thread Julian Mehnle
Andreas Metzler wrote:
> On Mon, Oct 13, 2003 at 02:47:44PM +0200, Julian Mehnle wrote:
> > There you have it.  It's the "source mailbox", and while it can be
> > used to report errors, it can *not only* be used to report errors.
> > I'm relieved that the RFC doesn't contradict my common sense
> > understanding of a "sender address".
> 
> I does not confirm it.

Confirm what?  My common sense understanding of a sender address?  Hopefully 
RFCs wouldn't have to define *everything* they relate to, since common sense 
already defines a lot of it.

Don't you agree on my understanding of a sender address (or source mailbox) 
being the address (or source mailbox) the sender sends from?  If so, please 
state it explicitly, so I have something I can argue against. :-)

> There is no such thing as "the domain part of the 
> should/has to/must be identical to the domain name of the machine the
> mail was written on originally", it just states that 
> can be used to report errors to.

RFC 2821 may not state that.  So the cited proposals (like SPF, etc.) were 
created as proposed amendments to RFC 2821, and *they* do demand that -- for 
domains that have been configured that way, not for other domains.  So where do 
you see a problem?




Re: Packaging sysfsutils: static library?

2003-10-13 Thread Marco d'Itri
On Oct 13, Martin Pitt <[EMAIL PROTECTED]> wrote:

 >> BTW, I may have been missing something as I did not read the beginning
 >> of this thread, but I don't see the point of packaging sysfsutils:
 >It is a separate upstream package.
Then feel free to package it, as long as I keep udev I don't mind. :-)

Back to the topic, I think you should discuss with the upstream author
the reasons for having no shared library. If he is only waiting for a
stable ABI then I think you should really keep the library static.

 >> (which I ITP'ed some weeks ago) 
 >Am I missing something? bugs.d.o/wnpp does not contain the word
 >'udev' and only once 'sysfs' (#215257, the ITP I'm talking about). I
Probably I only sent mail to debian-devel, I was expecting to upload it
sooner.

-- 
ciao, |
Marco | [2365 acrToiAT0AyME]




Re: recent spam to this list

2003-10-13 Thread Michael Poole
Julian Mehnle writes:

> Don't you agree on my understanding of a sender address (or source
> mailbox) being the address (or source mailbox) the sender sends
> from?  If so, please state it explicitly, so I have something I can
> argue against. :-)

Mail is not sent from any particular address at all; it is sent by a
person or program.  It is delivered to one or more addresses.  The
From: address and SMTP and envelope sender addresses are for human
understanding and status reporting.

Forgery generally means to create written authorization that shows
false provenance.  A user who indicates status messages should go to
his own address is not forging that address, even if it is not an
obvious address given the user's hostname.

It probably is useful to perform checks on those addresses, to verify
that the administrator of the domain allows the sender to claim an
identity under the domain.  If such an authorization check fails,
forgery is just one possible explanation.

Michael




reiser on /, fsck and ro: bug?

2003-10-13 Thread A Mennucc
hello
I have set up a box that uses reiserfs as the root filesystem
I have noticed 3 facts that seem to be bugs (but I could not tell for sure)
1-
I use a stock kernel by Herbert XU, which uses initrd; when initrd's 
/sbin/init is run, eventually it mounts the root from the hard disk, and 
it always mounts it read-only, without checking if the kernel option  
'ro' was given: is this a bug? what package's bug?

2-
Then /sbin/init is executed from the hard disk, and this calls all 
/etc/rcS.d/* that do an fsck on /

When this happens, though, fsck.reiserfs says: "filesystem is mounted 
read-only: skipping journal replay": so it seems that the journal will 
never be replyed, even if the filesystem is dirty (I am not  sure that 
this is the case, but I am not willing of doing extensive testing on 
this issue).
This is the opposite of what fsck.ext3 would do: AFAIK it does a journal 
replay and a fsck ONLY IF the root is mounted read-only.

3-
Then, fsck.reiserfs does a fsck of the disk. Regardless of it being 
dirty or not (that is, ignoring the absence of the '-f' flag). This is 
another difference with fsck.ext{2,3}. This is a minor bug, but annoying 
(it wastes time).

---
problem 2 is the most worrisome.
What is the right boot configuration to avoid it? should I mount /  as 
read-write?

But (if this is the case) then this cannot be used as a general solution 
:  ext2 and ext3 cannot be fsck-ed if rw

the problem is also worrisome since debian-installer will be able to 
install Debian with a reiserfs  partition

a.



Re: [debian-devel] Re: APT: Errors when replacing syslog by syslog-ng

2003-10-13 Thread Magosányi Árpád
Hi!

The doubled restart of syslog-ng is already reported as bug #204631
Will try to sort out RSN.

A levelezőm azt hiszi, hogy Josip Rodin a következőeket írta:
> On Sun, Oct 12, 2003 at 04:54:07PM +0200, Frans Pop wrote:
> > I just got the following messages replacing syslog by syslog-ng from 
> > dselect 
> > (Woody).
> > Should this be reported as a bug? Against which package (syslog, syslog-ng, 
> > apt)?
[]
> >   Package sysklogd is to be removed.
> >   Package system-log-daemon is not installed.
> >   Package sysklogd which provides system-log-daemon is to be removed.
[]
> > Unpacking syslog-ng (from .../syslog-ng_1.5.15-1.1_i386.deb) ...
> > Setting up syslog-ng (1.5.15-1.1) ...
> > Starting system logging: syslog-ng.
> > Stopping system logging: syslog-ng.
> > Starting system logging: syslog-ng.
> 
> Given that it finished successfully, there's no bug as far as apt is
> concerned. See, dpkg isn't too happy when you remove one package from a
[]
> The doubled restart, on the other hand, is something you should ask the
> syslog-ng maintainer about.

-- 
GNU GPL: csak tiszta forrásból




RE: recent spam to this list

2003-10-13 Thread Julian Mehnle
Michael Poole wrote:
> Julian Mehnle writes:
> > Don't you agree on my understanding of a sender address (or source
> > mailbox) being the address (or source mailbox) the sender sends
> > from?  If so, please state it explicitly, so I have something I can
> > argue against. :-)
> 
> Mail is not sent from any particular address at all; it is sent by a
> person or program.  It is delivered to one or more addresses.  The
> From: address and SMTP and envelope sender addresses are for human
> understanding and status reporting.

It does very well make sense to specify a "sender address" for an e-mail, and 
that's exactly what the SMTP "MAIL FROM" command AKA envelope-from (and the 
"Sender:" header) is meant to be.  Even RFCs (2)821 and (2)822 articulate it 
that way.  Nowhere do these RFCs state that the envelope-from can or should be 
used for status reporting *only*, do they?

> Forgery generally means to create written authorization that shows
> false provenance.

No.  You can also forge paintings as well as originator address specifications 
and other information.  Call it counterfeiting, but essentially it's the same 
thing.

> A user who indicates status messages should go to his own address is
> not forging that address, even if it is not an obvious address given
> the user's hostname.

Agreed, but a user indicating a "MAIL FROM: <[EMAIL PROTECTED]>" while sending 
from a host in the "bar.org" domain is forging the "MAIL FROM" address.

> It probably is useful to perform checks on those addresses, to verify
> that the administrator of the domain allows the sender to claim an
> identity under the domain.  If such an authorization check fails,
> forgery is just one possible explanation.

Generally true, but in part it depends on how you define "forgery".




Re: recent spam to this list

2003-10-13 Thread John Hasler
Julian Mehnle writes:
> It does very well make sense to specify a "sender address" for an e-mail,
> and that's exactly what the SMTP "MAIL FROM" command AKA envelope-from
> (and the "Sender:" header) is meant to be.  Even RFCs (2)821 and (2)822
> articulate it that way.  Nowhere do these RFCs state that the
> envelope-from can or should be used for status reporting *only*, do they?

If I go to Eau Claire and drop a letter in a letter box am I required to
put the address of the box on the letter?  Am I forging if I put my Elmwood
address on it instead?  How about if I go into a library in Eau Claire and
send an email?  Why should I not put my Elmwood address on it?  Of what
possible use to anyone would the address of the machine I sent it from be?
-- 
John Hasler
[EMAIL PROTECTED] (John Hasler)
Dancing Horse Hill
Elmwood, WI




Re: recent spam to this list

2003-10-13 Thread Michael Poole
Julian Mehnle writes:

> Michael Poole wrote:
>> Mail is not sent from any particular address at all; it is sent by a
>> person or program.  It is delivered to one or more addresses.  The
>> From: address and SMTP and envelope sender addresses are for human
>> understanding and status reporting.
>
> It does very well make sense to specify a "sender address" for an
> e-mail, and that's exactly what the SMTP "MAIL FROM" command AKA
> envelope-from (and the "Sender:" header) is meant to be.  Even RFCs
> (2)821 and (2)822 articulate it that way.  Nowhere do these RFCs
> state that the envelope-from can or should be used for status
> reporting *only*, do they?

In that context, I think the reasonable interpretation for "sender
address" is one that will reach the sender.  There need not be a
unique valid "sender address" for any person, any role, any host, or
any combination of those three -- unless the relevant administrators
dictate it.  I contend that a from or sender address is forged *only*
if that address reaches neither the actual originator nor anyone who
delegated that identity to the actual originator.

A valid sender may be rejected if they are acting contrary to how
their administrator desires them to act -- specifically, if they send
email with that address through unauthorized servers.  That is a
failed authorization check, not a failed forgery check, since you
do not know whether the sender is or is not the proper person.

[snip]
> Agreed, but a user indicating a "MAIL FROM: <[EMAIL PROTECTED]>" while
> sending from a host in the "bar.org" domain is forging the "MAIL
> FROM" address.

That is what I disagree with.  You have given no clear argument for
that claim -- or even a definition of what 'a host in the "bar.org"
domain' means.  I assume you mean that the IP resolves using DNS PTR
records to a host matching either *.bar.org or bar.org, and that the
hostname has a DNS A record that points back to the IP.

Forged emails generally have that domain mismatch, but some valid
emails share it.  For example, my host is "in" the troilus.org domain,
and about half of my mail uses the address I send this email from.
Most of the rest uses another address, and the remainder is from a
third.  The latter two refer unambiguously to me and eventually end up
in the same mailbox as the rest of my mail, so I do not see why using
them in MAIL FROM: should be considered forgery.

On the other hand, it is possible for a user to forge an envelope
sender to make himself look like another user "in" the same domain.
Your naive detection scheme for forgery fails to detect this.

>> It probably is useful to perform checks on those addresses, to verify
>> that the administrator of the domain allows the sender to claim an
>> identity under the domain.  If such an authorization check fails,
>> forgery is just one possible explanation.

> Generally true, but in part it depends on how you define "forgery".

Without getting into a debate over semantics, it seems that you define
"forgery" in a counter-intuitive way by ignoring ways that real people
use protocols: specifically, arguing that SMTP forgery is defined by
hostnames rather than user identity.

Michael




RE: recent spam to this list

2003-10-13 Thread Julian Mehnle
John Hasler wrote:
> Julian Mehnle writes:
> > It does very well make sense to specify a "sender address" for an
> > e-mail, and that's exactly what the SMTP "MAIL FROM" command AKA
> > envelope-from (and the "Sender:" header) is meant to be.  Even RFCs
> > (2)821 and (2)822 articulate it that way.  Nowhere do these RFCs state
> > that the envelope-from can or should be used for status reporting
> > *only*, do they? 
> 
> If I go to Eau Claire and drop a letter in a letter box am I required to
> put the address of the box on the letter?

No, but this again is one of these broken "e-mail vs. real world" analogies.  
You can't receive mail through such a letter box, but a sender address is 
inherently meant to be a valid address through which you can be contacted 
(among other criteria).

Sender address forgery is not a serious problem with snail mail, but it is with 
e-mail.  And with e-mail, it is possible to do things that are hardly possible 
with snail mail, e.g. checking the authenticity of the sender address.  An 
e-mail's sender address domain should (in this regard) better be compared to 
the stamp of the post office where the letter was accepted.

> How about if I go into a library in Eau Claire and send an email?  Why
> should I not put my Elmwood address on it?

You may put your Elmwood address into the From: or Reply-To: fields, but should 
not specify it as the envelope-from.

> Of what possible use to anyone would the address of the machine I sent
> it from be?

If the sender address (envelope-from) of an e-mail was unforgeable (for a given 
domain), the sender would be guaranteed to have an account at this domain (and 
be it only to *send* mail), and any abuse could be reliably traced back to the 
sender's account (not just to the sending host).  That's what address forgers 
fear.




Re: recent spam to this list

2003-10-13 Thread John Hasler
Julian Mehnle writes:
> No, but this again is one of these broken "e-mail vs. real world"
> analogies.  You can't receive mail through such a letter box, but a
> sender address is inherently meant to be a valid address through which
> you can be contacted (among other criteria).

I can no more be contacted via the machine in that library than I can via
the letterbox.  I go in there, spend five minutes sending an email and
leave, expecting any replies or bounces to go to my real address.  If my
message is bounced to that box or a reply sent there it will vanish without
a trace.
-- 
John Hasler
[EMAIL PROTECTED] (John Hasler)
Dancing Horse Hill
Elmwood, WI




Re: Re: APT: Errors when replacing syslog by syslog-ng

2003-10-13 Thread Frans Pop
>> dpkg: sysklogd: dependency problems, but removing anyway as you request:
>>  klogd depends on sysklogd | system-log-daemon; however:
>>   Package sysklogd is to be removed.
>>   Package system-log-daemon is not installed.
>>   Package sysklogd which provides system-log-daemon is to be removed.
>>  anacron depends on sysklogd | system-log-daemon; however:
>>   Package sysklogd is to be removed.
>>   Package system-log-daemon is not installed.
>>   Package sysklogd which provides system-log-daemon is to be removed.
>>  klogd depends on sysklogd | system-log-daemon; however:
>>   Package sysklogd is to be removed.
>>   Package system-log-daemon is not installed.
>>   Package sysklogd which provides system-log-daemon is to be removed.
>>  anacron depends on sysklogd | system-log-daemon; however:
>>   Package sysklogd is to be removed.
>>   Package system-log-daemon is not installed.
>>   Package sysklogd which provides system-log-daemon is to be removed.
>
>Given that it finished successfully, there's no bug as far as apt is
>concerned. See, dpkg isn't too happy when you remove one package from a
>dependency chain, but this is exactly what apt needs to do before putting in
>another package in its place. So apt tells dpkg to proceed nevertheless,
>but dpkg still reports it just in case.

OK, but why are there _two_ identical messages for both klogd and anacron?




RE: recent spam to this list

2003-10-13 Thread Julian Mehnle
John Hasler wrote:
> Julian Mehnle writes:
> > No, but this again is one of these broken "e-mail vs. real world"
> > analogies.  You can't receive mail through such a letter box, but a
> > sender address is inherently meant to be a valid address through which
> > you can be contacted (among other criteria).
> 
> I can no more be contacted via the machine in that library than I can via
> the letterbox.  I go in there, spend five minutes sending an email and
> leave, expecting any replies or bounces to go to my real address.  If my
> message is bounced to that box or a reply sent there it will vanish
> without a trace.

Then it's up to the library to decide whether to offer this feature 
(envelope-from forgery, or call it envelope-from pretendery) or protect its 
domain from unauthorized use in envelope-froms.  Of course the latter option 
implies restrictions for users like you, but the library is not at all required 
to implement these restrictions for its domain.

I still don't understant why so many people object against the cited 
proposals...  The implementation on the sending side (i.e. the DNS 
configuration) is entirely optional.




trust

2003-10-13 Thread Kolapo Omidire



I am Mr. Kolapo Omidire,company secretary/Manager, internal and
external services of COMMERCIAL BANK OF AFRICA.I was the accounts officer of
late Mr. Alan   a national of your country, who used to work with The
Nigerian Mining Corporation(NMC) here in Nigeria who was banking with 
our bank.

On the 21st of April 2000, my client, his wife and their only son
were involved in a car accident along sagbama express road.
All occupants of the vehicle unfortunately lost their lives. Since then
I have made several enquiries to your embassy to locate any of my
clients extended relatives this has also proved unsuccessful.

After these several unsuccessful attempts, I decided to track his last
name over the Internet,to locate any member of his family hence I 
contacted you. I have contacted you to assist in repatriating the assets and 
Capital valued at USD21.5million left behind by my client before they get 
confiscated or declared unserviceable by the share holders of this bank ,so 
that they can share his funds as dividends amongst themselves.

The Bank has issued me a notice to provide the next-of-kin or have the 
account confiscated within the next fourteen official working days, because as 
at the time of his demise I was his accounts officer(although i have since been 
promoted to my present position-- company sec.) and ever since I have been 
unsuccessful in locating the relatives for over 2years now. I seek your consent 
therefore to present you as the next of kin to the deceased since you have the 
same last names and from same country so that the proceeds of this account can 
be paid to you. Therefore, on receipt of your positive response, we shall then
discuss modalities for transfer. We shall also discuss what I get as my 
share.

I have all necessary formation and legal documents needed to back you 
up for the claims. All I require from you is your honest cooperation to enable 
us see this transaction through. I gurantee that this will be executed
under a legitimate arrangement that will protect you and me from any 
breach of the law, both locally and internationally.

I await hearing from you soon.

Best regards,
Mr. Kolapo Omidire. DO SEND YOUR RESPONSE ALSO TO [EMAIL PROTECTED]


 




Uploader field in debian/control?

2003-10-13 Thread Magosányi Árpád
Hi!

In the policy manual there is no mention ofthe Uploader field of
debian/control. (version 3.6.1.0)

In the developers' reference I read:

* Add the co-maintainer's correct maintainer name and address to the
Uploaders field in the global part of the debian/control file

It seemed to me that only the fields explicitly mentioned and those
starting with X should be in the control files, but I cannot find
it explicitly stated.

Did I miss something?

-- 
GNU GPL: csak tiszta forrásból




Re: Packaging sysfsutils: static library?

2003-10-13 Thread Martin Pitt
Hi!

On 2003-10-13 15:26 +0200, Marco d'Itri wrote:
>  >It is a separate upstream package.
> Then feel free to package it, as long as I keep udev I don't mind. :-)

Okay :-) We only have to get the dependencies right, as long as
libsysfs provides only a shared lib, udev should build-depend on it. I
will contact you when I switch to a shared library. Agreed?

> Back to the topic, I think you should discuss with the upstream author
> the reasons for having no shared library. If he is only waiting for a
> stable ABI then I think you should really keep the library static.

I sent a mail to upstream two days ago, but didn't receive an answer
yet. I will wait with uploading (or rather, looking for a sponsor)
until I get an answer or run out of patience (maybe after a week of
silence).

Have a nice day!

Martin

BTW: No need to CC me, I'm subscribed (see mail-followup-to).

-- 
Martin Pitt
home:  www.piware.de
eMail: [EMAIL PROTECTED]




Re: Hardcoding of .la file paths in .la files

2003-10-13 Thread Josselin Mouette
Le dim 12/10/2003 à 03:31, Steve Langasek a écrit :
> If I was comfortable that .la files were completely dispensable on
> GNU/Linux systems, I wouldn't hesitate to do that, but I'm not.  They
> *do* provide additional information that's useful to people linking
> applications statically; and while we never (rarely) use the static libs
> ourselves, policy does require us to ship them in packages, so it makes
> sense to also provide the additional glue information in the .la's
> whenever possible.  When it causes problems for shared libs, though, I
> think it's clear which should take precedence.

All this additional information can be provided as well by pkg-config,
which is much more flexible and doesn't cause random breakages.
-- 
 .''`.   Josselin Mouette/\./\
: :' :   [EMAIL PROTECTED]
`. `'[EMAIL PROTECTED]
  `-  Debian GNU/Linux -- The power of freedom


signature.asc
Description: Ceci est une partie de message	=?ISO-8859-1?Q?num=E9riquement?= =?ISO-8859-1?Q?_sign=E9e=2E?=


Re: Hardcoding of .la file paths in .la files

2003-10-13 Thread Steve Langasek
On Mon, Oct 13, 2003 at 09:02:06PM +0200, Josselin Mouette wrote:
> Le dim 12/10/2003 à 03:31, Steve Langasek a écrit :
> > If I was comfortable that .la files were completely dispensable on
> > GNU/Linux systems, I wouldn't hesitate to do that, but I'm not.  They
> > *do* provide additional information that's useful to people linking
> > applications statically; and while we never (rarely) use the static libs
> > ourselves, policy does require us to ship them in packages, so it makes
> > sense to also provide the additional glue information in the .la's
> > whenever possible.  When it causes problems for shared libs, though, I
> > think it's clear which should take precedence.
> 
> All this additional information can be provided as well by pkg-config,
> which is much more flexible and doesn't cause random breakages.

$ pkg-config libgnomecanvas-2.0 --libs
-Wl,--export-dynamic -lgnomecanvas-2 -lart_lgpl_2 -lpangoft2-1.0 -lgtk-x11-2.0 
-lgdk-x11-2.0 -latk-1.0 -lgdk_pixbuf-2.0 -lm -lpangoxft-1.0 -lpangox-1.0 
-lpango-1.0 -lgobject-2.0 -lgmodule-2.0 -ldl -lglib-2.0  
$

Hmm, nope, pkg-config can at least cause one of the most popular forms
of libtool breakage, which is that applications will be linked
unnecessarily against indirect library dependencies, making ABI
transitions much more difficult than they should be.

It also doesn't even provide a complete list of all the indirect library
dependencies, so this pkg-config line will even fail on platforms where
libtool will succeed.  (E.g., try to statically link a binary using the
above list without having to append '-lX11'.)  And if you use the
pkg-config output as input for a libtool-using application, you'll get
double the pleasure.

-- 
Steve Langasek
postmodern programmer


signature.asc
Description: Digital signature


Re: Simplicity Pattern Co. AutoReply

2003-10-13 Thread Robert Bulick



Hello,
 
I purchased "NEW LOOK HIS & HERS" Pattern # 
6307.  The front pattern piece for all of the fronts for the tops was 
missing.  I'm going to Wal Mart to get another one, but thought I should 
let you know what happened.
 
Thank you,
 
Cindy Bulick
 
 


Re: Hardcoding of .la file paths in .la files

2003-10-13 Thread Josselin Mouette
Le lun 13/10/2003 à 21:36, Steve Langasek a écrit :
> > All this additional information can be provided as well by pkg-config,
> > which is much more flexible and doesn't cause random breakages.
> 
> $ pkg-config libgnomecanvas-2.0 --libs
> -Wl,--export-dynamic -lgnomecanvas-2 -lart_lgpl_2 -lpangoft2-1.0 
> -lgtk-x11-2.0 -lgdk-x11-2.0 -latk-1.0 -lgdk_pixbuf-2.0 -lm -lpangoxft-1.0 
> -lpangox-1.0 -lpango-1.0 -lgobject-2.0 -lgmodule-2.0 -ldl -lglib-2.0  
> $

This looks like a broken .pc file.

> It also doesn't even provide a complete list of all the indirect library
> dependencies, so this pkg-config line will even fail on platforms where
> libtool will succeed.  (E.g., try to statically link a binary using the
> above list without having to append '-lX11'.)  And if you use the
> pkg-config output as input for a libtool-using application, you'll get
> double the pleasure.

You're right as for static linking, I thought pkg-config supported
--static while it doesn't. Well, maybe it is better that way; I
personally feel we should deprecate the whole static linking stuff.
-- 
 .''`.   Josselin Mouette/\./\
: :' :   [EMAIL PROTECTED]
`. `'[EMAIL PROTECTED]
  `-  Debian GNU/Linux -- The power of freedom


signature.asc
Description: Ceci est une partie de message	=?ISO-8859-1?Q?num=E9riquement?= =?ISO-8859-1?Q?_sign=E9e=2E?=


Re: recent spam to this list

2003-10-13 Thread Joel Baker
On Mon, Oct 13, 2003 at 08:06:33PM +0200, Julian Mehnle wrote:
> John Hasler wrote:
> > Julian Mehnle writes:
> > > No, but this again is one of these broken "e-mail vs. real world"
> > > analogies.  You can't receive mail through such a letter box, but a
> > > sender address is inherently meant to be a valid address through which
> > > you can be contacted (among other criteria).
> > 
> > I can no more be contacted via the machine in that library than I can via
> > the letterbox.  I go in there, spend five minutes sending an email and
> > leave, expecting any replies or bounces to go to my real address.  If my
> > message is bounced to that box or a reply sent there it will vanish
> > without a trace.
> 
> Then it's up to the library to decide whether to offer this feature
> (envelope-from forgery, or call it envelope-from pretendery) or protect
> its domain from unauthorized use in envelope-froms. Of course the latter
> option implies restrictions for users like you, but the library is not at
> all required to implement these restrictions for its domain.
>
> I still don't understant why so many people object against the cited
> proposals... The implementation on the sending side (i.e. the DNS
> configuration) is entirely optional.

Probably because systems which expect it and don't see it will do something
such as give the message a positive SpamAssassin score. Of course, if
you're going to do something that happens to look like what a lot of
spammers do, you should probably expect that, just like it's not wise
(anymore) to put a lot of !s in your subject, or to use a known open relay,
even if you have absolute permission to use it for legitimate email...

Really, this just isn't that difficult a concept, even if it doesn't map
directly to real world mail. Your identity, as given in various places, is
multi-part; both a user part, *and* a domain part. The owners of the domain
part are free to set any policy they wish (including "we don't care"),
regarding the behavior of people who wish to claim association with them
(perhaps the cloest analogy would be fufilling any requirements for using,
say, the official Debian name).

In fact, the debian.org domain is a very good example. The policies say
that you shouldn't use it for a variety of purposes; they could (though
I don't think they *should*) also say "due to problems with forged email
claiming to be from Debian, all Debian-official email must relay through
the following servers: ".

For Debian, which has little interest in running relay servers, highly
technical users, and a relatively small problem with spam claiming to be
from the domain, in general, it isn't worth the annoyance to the users
(IMO). For a University, who are very liability-shy, who mostly have users
using a single system, and who already run significant outbound relays for
most of their users... it may be much more of a win.

It's just (another) tool for enforcing policy, like everything in layers
1-7; it can help make certain policies practical, but it cannot decide when
or where to make those policies the case. If you don't like the policy
someone implements with it, you can complain to them - maybe they'll
listen, maybe not. For a lot of us who've been dealing with the load on
mailservers for years, I'm sorry, but your individual desire to be able to
send mail from anywhere on the planet, claiming to be anyone on the planet,
does not (in my policy decisions) outweight my desire to get fewer spams
every day.

If adding .1 to your SA score for lacking a repudiation protocol, and 3
(or 5, or whatever) for claiming to be from a domain that denies that it
origionates mail to the rest of the world from your IP, is enough to help
me sort through my mailbox - so be it. If it isn't, I won't use it, and you
have nothing to worry about.

However, arguments about 'it will make my life harder' apply just as well
to things like open relays, and they are the heart of a large number of
anti-spam lists, since there is a very high correlation between having it
open, and origionating large amounts of spam. Nearly 100%, in fact. If
lacking a domain-authorized relay point comes to eventually have the same
statistics, you'd better bet that you'll have the same sorts of penalties
in spamfilters.
-- 
Joel Baker <[EMAIL PROTECTED]>,''`.
Debian GNU NetBSD/i386 porter: :' :
 `. `'
   `-


pgpMt0YodGu7F.pgp
Description: PGP signature


Re: Hardcoding of .la file paths in .la files

2003-10-13 Thread Steve Langasek
On Mon, Oct 13, 2003 at 09:44:47PM +0200, Josselin Mouette wrote:
> Le lun 13/10/2003 à 21:36, Steve Langasek a écrit :
> > > All this additional information can be provided as well by pkg-config,
> > > which is much more flexible and doesn't cause random breakages.

> > $ pkg-config libgnomecanvas-2.0 --libs
> > -Wl,--export-dynamic -lgnomecanvas-2 -lart_lgpl_2 -lpangoft2-1.0 
> > -lgtk-x11-2.0 -lgdk-x11-2.0 -latk-1.0 -lgdk_pixbuf-2.0 -lm -lpangoxft-1.0 
> > -lpangox-1.0 -lpango-1.0 -lgobject-2.0 -lgmodule-2.0 -ldl -lglib-2.0  
> > $

> This looks like a broken .pc file.

> > It also doesn't even provide a complete list of all the indirect library
> > dependencies, so this pkg-config line will even fail on platforms where
> > libtool will succeed.  (E.g., try to statically link a binary using the
> > above list without having to append '-lX11'.)  And if you use the
> > pkg-config output as input for a libtool-using application, you'll get
> > double the pleasure.

> You're right as for static linking, I thought pkg-config supported
> --static while it doesn't. Well, maybe it is better that way; I
> personally feel we should deprecate the whole static linking stuff.

In which case, we could easily fix all libtool installations by simply
removing the .la files altogether, and we'll never have any more
problems with mislinked dynamic executables or libraries.

But if we're going to do that, then most of the available pkg-config
settings are *still* wrong; in the above instance, the correct answer
for dynamic linking is '-Wl,--export-dynamic -lgnomecanvas-2', and lose
the other 50 entries on that line.

Both of these tools are designed primarily to solve problems that do not
affect stock Debian packages.  We are not part of their target userbase,
and as such, the tools are suboptimal for what we're trying to achieve.

-- 
Steve Langasek
postmodern programmer


pgplkLF0iQm8T.pgp
Description: PGP signature


Re: gltron maintainer MIA

2003-10-13 Thread Ben Armstrong
Ari,

On Mon, Oct 13, 2003 at 02:17:43PM +1000, Martin Michlmayr wrote:
> * Ari Pollak <[EMAIL PROTECTED]> [2003-10-12 17:14]:
> > It seems that the Debian gltron maintainer, Gregory J. Oschwald, has
> > been MIA for at least a year now. I can't find him anywhere in the
> > developers DB, and haven't seen any recent mail activity at all on
> > either bugs or mailing lists. I'd like to hijack this
> 
> That's why the package was orphaned in April (Bug #190816).  Ben
> Armstrong wanted to adopt it, but obviously never did.  I assume you
> can just take it, but I'm copying Ben to this mail.

Be my guest.  I had no end of grief with it and gave up.  Also, my son 
*loves* gltron and will be very happy to see bugfixes and new releases.

Ben
--
 ,-.  nSLUGhttp://www.nslug.ns.ca   [EMAIL PROTECTED]
 \`'  Debian   http://www.debian.org[EMAIL PROTECTED]
  `  [ gpg 395C F3A4 35D3 D247 1387 2D9E 5A94 F3CA 0B27 13C8 ]
 [ pgp 7F DA 09 4B BA 2C 0D E0 1B B1 31 ED C6 A9 39 4F ]




Re: gltron maintainer MIA

2003-10-13 Thread Ari Pollak
Thanks. Sorry for the short notice, I hadn't realized how
outdated gltron and the ITAs were until I started getting
comments from friends like "gentoo has newer games" and "gltron
is so old." Needless to say, it was rather embarassing,
especially since the sarge release is tentatively December 1st
at the very earliest.

On Mon, Oct 13, 2003 at 05:02:46PM -0300, Ben Armstrong wrote:
> Ari,
> 
> Be my guest.  I had no end of grief with it and gave up.  Also, my son 
> *loves* gltron and will be very happy to see bugfixes and new releases.




Re: Uploader field in debian/control?

2003-10-13 Thread Andreas Metzler
Magosányi Árpád <[EMAIL PROTECTED]> wrote:
> In the policy manual there is no mention of the Uploader field of
> debian/control. (version 3.6.1.0)

> In the developers' reference I read:

> * Add the co-maintainer's correct maintainer name and address to the
> Uploaders field in the global part of the debian/control file

> It seemed to me that only the fields explicitly mentioned and those
> starting with X should be in the control files, but I cannot find
> it explicitly stated.

> Did I miss something?

| Additional user-defined fields may be added to the source package
| control file. Such fields will be ignored, and not copied to (for
| example) binary or source package control files or upload control
| files.

You only need the X-stuff if the "unsupported field" should end up in
the package control files. However Uploaders ends up in the dsc file
and is not unsupported. Afaict you are right, I'll try to come up with
a patch.
   cu andreas
-- 
Hey, da ist ein Ballonautomat auf der Toilette!
Unofficial _Debian-packages_ of latest unstable _tin_
http://www.logic.univie.ac.at/~ametzler/debian/tin-snapshot/




Re: recent spam to this list

2003-10-13 Thread John Hasler
Joel Baker writes:
> I'm sorry, but your individual desire to be able to send mail from
> anywhere on the planet, claiming to be anyone on the planet...

What makes you think I want to claim to be "anyone on the planet"?
I have a valid domain and I want replies and bounces to go to it.

> If adding .1 to your SA score for lacking a repudiation protocol, and 3
> (or 5, or whatever) for claiming to be from a domain that denies that it
> origionates mail to the rest of the world from your IP...

I have no IP.  Outgoing mail from home goes via my ISP's smarthost.
Incoming mail goes to his POP server.

> If lacking a domain-authorized relay point comes to eventually have the
> same statistics, you'd better bet that you'll have the same sorts of
> penalties in spamfilters.

What do you mean by "a domain-authorized relay point"?  It was my
understanding that the idea behind SPF was that I would list in the DNS for
my domain the IPs that were authorized to send mail claiming to be from my
domain.  That would be fine with me, but I evidently misunderstood.
-- 
John Hasler
[EMAIL PROTECTED] (John Hasler)
Dancing Horse Hill
Elmwood, WI




Re: language-chooser: Language order shouldn't be alphabetical

2003-10-13 Thread Javier Fernández-Sanguino Peña
On Sat, Oct 11, 2003 at 11:32:33PM +0100, Jochen Voss wrote:
> 
> > Also, how do you display the names of the continents so that all of your
> > non-English-speaking users can understand them? :)
> I did not try a fresh install of Debian for a long time.  How
> do we display the language names now so that all of your
> non-English-speaking users can understand them?  Would the
(...)

With a proper map. Make it point & click. That's by far the "easiest" way 
to make the user choose it. That has the caveat that the d-i has to support 
graphics (unless somedoby makes a really good ASCII map).

Regards

Javi


pgpwbuBUY6JGh.pgp
Description: PGP signature


RE: recent spam to this list

2003-10-13 Thread Julian Mehnle
John Hasler wrote:
> Joel Baker writes:
> > If adding .1 to your SA score for lacking a repudiation protocol, and
> > 3 (or 5, or whatever) for claiming to be from a domain that denies
> > that it origionates mail to the rest of the world from your IP...
> 
> I have no IP.  Outgoing mail from home goes via my ISP's smarthost.
> Incoming mail goes to his POP server.

Consider your ISP's smarthost's IP address "your IP".  It makes no difference.

> > If lacking a domain-authorized relay point comes to eventually have
> > the same statistics, you'd better bet that you'll have the same sorts
> > of penalties in spamfilters.
> 
> What do you mean by "a domain-authorized relay point"?  It was my
> understanding that the idea behind SPF was that I would list in the DNS
> for my domain the IPs that were authorized to send mail claiming to
> be from my domain.  That would be fine with me, but I evidently
> misunderstood.

No, you understood it correctly.  That's exactly the point.




Re: recent spam to this list

2003-10-13 Thread Joel Baker
On Mon, Oct 13, 2003 at 04:26:35PM -0500, John Hasler wrote:
> Joel Baker writes:
> > I'm sorry, but your individual desire to be able to send mail from
> > anywhere on the planet, claiming to be anyone on the planet...
> 
> What makes you think I want to claim to be "anyone on the planet"?
> I have a valid domain and I want replies and bounces to go to it.

If you're doing what these proposals are meant to block - that is, sending
email from a random IP on the internet without cryptographic authentication
data at the protocol level - then you can claim to be "[EMAIL PROTECTED]"
just as easily as you can claim to be your legitimate email. Opening up the
ability to do it for legitimate uses opens up the ability to use it for
illegitimate ones, as well - and this has a proven (and high) cost.


> > If adding .1 to your SA score for lacking a repudiation protocol, and 3
> > (or 5, or whatever) for claiming to be from a domain that denies that it
> > origionates mail to the rest of the world from your IP...
> 
> I have no IP.  Outgoing mail from home goes via my ISP's smarthost.
> Incoming mail goes to his POP server.

I'm going to gloss over the utter mistake of your first statement (unless
you happen to connect to your mail server over SNA, IPX, or some stranger
option), and point out that the second statement automatically removes
you - entirely - from the issue at hand. If you're sending your email to
your ISP's smarthost, then *it*, not *you*, are what talks to the remote
mailserver - and, as such, it's IP (not yours) is what will be checked.
So, unless your ISP pulls a boneheaded misconfiguration, either there will
be no published policy (that is, anyone can send), or the policy will list
that smarthost as authorized.

> > If lacking a domain-authorized relay point comes to eventually have the
> > same statistics, you'd better bet that you'll have the same sorts of
> > penalties in spamfilters.
> 
> What do you mean by "a domain-authorized relay point"?  It was my
> understanding that the idea behind SPF was that I would list in the DNS for
> my domain the IPs that were authorized to send mail claiming to be from my
> domain.  That would be fine with me, but I evidently misunderstood.

Understand that there are five normal situations that cover pretty much all
non-pathological sources of email on the Internet today:

1) Private mailserver run by a business, co-op, or highly technical single
user (enterprise servers).

2) ISP mailservers (just what they sound like)

3) Normal end-users relaying through their connection ISP (Joe Dialup)

4) Normal end-users relaying through their home ISP, organization, or
business (The Road Warrior)

5) Normal end-users delivering directly.

Class #1 is generally a "business" account of some sort; it costs more than
$19.95/mo, and is expected to be able to send and receive email directly,
as a rule. Also, as a rule, they can control their own DNS (either by
running a server, or by having update control from whomever they pay to do
hosting for their domain).

Class #2 is fairly obvious, though the line between "normal business" and
"ISP" can blur somewhat if your business has an IT department serving tens
of thousands of users. They almost certain run their own DNS servers, and
can afford someone compentant to run them.

These two classes have a strong business case for needing to send their
own email rather than let an ISP handle it for them; they frequently
have access through more than one ISP, and can easily (and legitimately)
generate hundreds of thousands of emails an hour, which would put an
excessive load on the mailservers of an ISP for one customer, if so.

Classes 3 appears to be your situation; both this, and class 4, are removed
entirely from the question of SPF/RMX/etc, because they relay through their
ISP's smarthost (and thus, that smarthost is what will be checked for being
allowed to send to a remote site).

Class 5 are the people who regularly used to use open relays (instead of
smarthosting), and who now want to be able to send emails directly (without
having to smarthost). They are the only ones such proposals hamper in any
significant way.

Your understand above is correct - note that you would list your *ISP's*
mailservers (probably the same smarthost you send to as their customer,
but possibly others; they would be able to tell you which ones) for your
domain, since that's where mail is expected to come from. In fact, if you
have something spiffy like Dynamic DNS updates arranged, you can even send
directly from your current IP, by updating the DNS to say "This dynamic IP
I got is authorized to send email for my domain". What you *won't* be able
to do, if the proposals are widely adopted, is to send email claiming to be
from "[EMAIL PROTECTED]", unless one of the following things is true:

1) The DNS for turkey.com has no published policy (entries in the DNS for
whatever protocol is adopted, saying "only these mailservers can send").
Lacking a polic

Re: Anyone interested in libical?

2003-10-13 Thread Simon Richter
Hi,

> > Is anyone interested in adopting libical?  It has been orphaned for
> > 193 days (#187030). I wouldn't mind removing it, but mozilla
> > build-depends on it (perhaps this can be changed, tho?).

> Mozilla builds fine without libical.

What does happen, then? Will it still be able to read iCalendar events?

   Simon

-- 
GPG Fingerprint: 040E B5F7 84F1 4FBC CEAD  ADC6 18A0 CC8D 5706 A4B4




Re: faster boot

2003-10-13 Thread Joe Drew
On Mon, 2003-10-13 at 06:57, Henrique de Moraes Holschuh wrote:
> However, if you read the paper in http://people.d.o/~hmh, and implement the
> demultiplexer, we could probably modify one of the above methods to work
> well, while we implement ours...

After hearing your talk about init systems at debconf and reading your
paper, I switched an embedded machine from using busybox init to
simpleinit from util-linux, which supports 'need', 'provide', etc. It
reduced the 70s boot time by approximately 10s.

This is potentially an even bigger win on a machine with more than a
RAM-based filesystem.

-- 
Joe Drew <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>

My weblog doesn't detail my personal life: http://me.woot.net




Re: recent spam to this list

2003-10-13 Thread John Hasler
Julian Mehnle writes:
> Consider your ISP's smarthost's IP address "your IP".  It makes no
> difference.

It would if the proposed system was unusable by those of us without static
IPs, which was the impression I was getting.  Evidently that impression was
incorrect: good.

> No, you understood it correctly.  That's exactly the point.

If I can configure my domain with a list of IPs from which mail claiming to
originate from it must come without having a static IP and without the
cooperation of the administrators of those IPs I have exactly what I want.
-- 
John Hasler
[EMAIL PROTECTED] (John Hasler)
Dancing Horse Hill
Elmwood, WI




Re: Bug#215103: ITP: gmasqdialer -- gtk/gnome client for masqdialer server

2003-10-13 Thread Joe Drew
On Mon, 2003-10-13 at 01:47, David B Harris wrote:
> > If you think 35 characters is too long, feel free to start filing
> > thousands and thousands of bugs on all the other packages, suggesting
> > that they remove little bits and pieces.
> 
> (And if you don't, please don't bother people about it - instead file a
> bug on Policy asking for the short description guidelines to
> specifically say "do not mention the application's toolkit".)

I will feel free to comment on ITPs where I feel it's necessary. I
haven't got the time to look through every single package's description,
though I tend to comment on the description of packages I install where
I feel it's necessary.

Dependencies tell you whether a given package runs in a given
environment. The average user does not give a shit whether the program
they are running uses Qt or GTK. (Does your Aunt Tillie reject a Windows
program because it uses the Borland win32 toolkit?) The description
should talk about the capabilities of a package, not its implementation
details. Take these sentences as a set and derive the conclusion, "the
description should not mention toolkits." (At least, for applications.
It's hard for a toolkit to not mention the toolkit.)

A compromise: The fact that the average Debian user might want to know
(in a commonly searchable way) whether a program uses a given toolkit is
reason enough to place it in the long description, along the lines of
"foo is a GNOME application which frobs data especially for Tillie.
[etc]"

-- 
Joe Drew <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>

My weblog doesn't detail my personal life: http://me.woot.net




Re: recent spam to this list

2003-10-13 Thread John Hasler
Joel Baker writes:
> I'm going to gloss over the utter mistake of your first statement

I am on a dialup with a "dynamic" IP number: I am allowed to borrow a
number from my ISP at need.  There is no IP number over which I have any
administrative control.  Thus I have no IP in that I would be unable to
implement any system that required control of "my" IP number.

> 4) Normal end-users relaying through their home ISP, organization, or
> business (The Road Warrior)

My ISP does not permit this.  It is the only one available to me.

> Classes 3 appears to be your situation; both this, and class 4, are
> removed entirely from the question of SPF/RMX/etc, because they relay
> through their ISP's smarthost (and thus, that smarthost is what will be
> checked for being allowed to send to a remote site).

I cannot relay through my ISP's smarthost from outside his system.

> You smarthost your email to a server configured to handle turkey.com
> email, which is presumably listed in the policy, and *it* sends the email
> on to the remote site (which then sees it coming from that server, not
> you, and will accept it as coming from an approved server).

That is how I thought SPF worked.  This would be fine with me.  However,
statements made earlier in this thread seemed to me to imply that the
cooperation of the administrators of domains from which mail would be
originating would be required.  This would be useless to me: I doubt I
could get the cooperation of even my ISP, let alone some hospital or
library.

> If it's a choice between being nice to the people in class 5, and having
> a thousand fewer emails a week to sift through in *my* mailbox, they can
> take a flying leap. None of them are important enough (right now) that I
> want to get their emails *more* than I want to *not* get that many
> spams/broken autoresponders/viruses/etc.

I get several hundred per day, many indicating that some SOB is sending
libelous and obscene spams in my name.  If SPF works as it seems I want it
ASAP.
-- 
John Hasler
[EMAIL PROTECTED] (John Hasler)
Dancing Horse Hill
Elmwood, WI




Re: faster boot

2003-10-13 Thread Miquel van Smoorenburg
In article <[EMAIL PROTECTED]>,
Joe Drew  <[EMAIL PROTECTED]> wrote:
>On Mon, 2003-10-13 at 06:57, Henrique de Moraes Holschuh wrote:
>> However, if you read the paper in http://people.d.o/~hmh, and implement the
>> demultiplexer, we could probably modify one of the above methods to work
>> well, while we implement ours...
>
>After hearing your talk about init systems at debconf and reading your
>paper, I switched an embedded machine from using busybox init to
>simpleinit from util-linux, which supports 'need', 'provide', etc. It
>reduced the 70s boot time by approximately 10s.

Now that sysvinit has been split into 3 packages, it would be possible
to replace one part (sysv-rc) with something that does exactly that.

Mike.
-- 
Never trust a statistic you didn't fake yourself.




Re: APT: Errors when replacing syslog by syslog-ng

2003-10-13 Thread Aaron M. Ucko
Frans Pop <[EMAIL PROTECTED]> writes:

> OK, but why are there _two_ identical messages for both klogd and anacron?

Probably once for the real package "sysklogd" and once for the virtual
package "system-log-daemon", since the dependencies explicitly list both.

-- 
Aaron M. Ucko, KB1CJC (amu at alum.mit.edu, ucko at debian.org)
Finger [EMAIL PROTECTED] (NOT a valid e-mail address) for more info.




Re: Anyone interested in libical?

2003-10-13 Thread Travis Crump
Simon Richter wrote:
Hi,

Is anyone interested in adopting libical?  It has been orphaned for
193 days (#187030). I wouldn't mind removing it, but mozilla
build-depends on it (perhaps this can be changed, tho?).

Mozilla builds fine without libical.

What does happen, then? Will it still be able to read iCalendar events?
   Simon
For my mozilla build at least, libmozical.a is built from modified 
libical sources distributed with mozilla[or at least checked out from 
mozilla cvs, I am not sure if it is included with the normal source 
tarball] and included with the build[assuming you have enabled 
calendar].  I just uninstalled libical and mozilla calendar still seems 
to work fine for me.


pgpgWPUR8aSrl.pgp
Description: PGP signature


Re: recent spam to this list

2003-10-13 Thread Joel Baker
On Mon, Oct 13, 2003 at 06:51:01PM -0500, John Hasler wrote:
> Joel Baker writes:
> > I'm going to gloss over the utter mistake of your first statement
> 
> I am on a dialup with a "dynamic" IP number: I am allowed to borrow a
> number from my ISP at need.  There is no IP number over which I have any
> administrative control.  Thus I have no IP in that I would be unable to
> implement any system that required control of "my" IP number.

This is not a problem with Dynamic DNS updates. Many places do hosting of
DNS domains (only; no web or mail, etc) for absurdly cheap rates ($5/mo in
some cases), and allow either DDNS or an automateable webpage to do updates
with.

> > 4) Normal end-users relaying through their home ISP, organization, or
> > business (The Road Warrior)
> 
> My ISP does not permit this.  It is the only one available to me.

Your ISP probably doesn't permit outbound connections from dialups to port
25 (gee, can't imagine why that might be the case...); it is amazingly rare
to find an ISP that actively blocks VPN, IPSEC, *and* SSH traffic, and is
still in business, however.

Both for bypassing ISP filters, and for security reasons, relaying this way
is fairly standard for the Road Warrior sorts (in no small part because it
also protects the bare passwords that are still mostly used in POP3/IMAP
servers in most situations; yes, I know about IMAP over SSL, but that
doesn't do well when you need to coordinate remote salesdroids with local
management, and they all use Outlook's calendar stuff to handle it).

> > Classes 3 appears to be your situation; both this, and class 4, are
> > removed entirely from the question of SPF/RMX/etc, because they relay
> > through their ISP's smarthost (and thus, that smarthost is what will be
> > checked for being allowed to send to a remote site).
> 
> I cannot relay through my ISP's smarthost from outside his system.

Not at all uncommon, though it might be worth trying to convince them
to allow you to do *authenticated* relay from outside. Oddly enough,
preventing random IPs from relaying is because... spam comes through.

> > You smarthost your email to a server configured to handle turkey.com
> > email, which is presumably listed in the policy, and *it* sends the email
> > on to the remote site (which then sees it coming from that server, not
> > you, and will accept it as coming from an approved server).
> 
> That is how I thought SPF worked.  This would be fine with me.  However,
> statements made earlier in this thread seemed to me to imply that the
> cooperation of the administrators of domains from which mail would be
> originating would be required.  This would be useless to me: I doubt I
> could get the cooperation of even my ISP, let alone some hospital or
> library.

*Mail* has an return path that includes domain names (normally). SMTP
*sessions* have a source IP. All of the protocols I saw obviously listed on
the ASRG page (including at least RMX, SPF, and Vixie's proposal) use the
*claimed* domain (which can be anything), and the *actual* source IP (which
cannot be forged without having access to the routing hardware in between
the machines, at which point you can do damned near anything you want), to
decide whether it's kosher. The library's domain is irrelevant, in this
case, since you're not claiming a return address in the library's domain.

As a real world counterpart: if I sign up for a thousand 'free catalogs',
using the address of my next door neighbor and arch nemesis Fred, he will,
in fact, probably be deluged under a mountain of advertisements for lawn
aeration shoes and crystal healing methods. I can do this from thousands of
miles away, in fact; maybe Fred moved to Texas, and this is my long delayed
revenge. Now, Fred can ask the post office to stop sending them through
(and in fact, they'll probably notice it in the first place) - ISPs do
similar things in a lot of cases, today, for their customers.

The problem is that rather than being a rare incident of juvenile humor or
mild spite, it's a business with a fairly serious amount of money involved.

Now, imagine if the folks giving out catalogs had access to a "no mail"
database in which Fred could (if he wanted to register at all), say that
any attempt to request catalogs that didn't come postmarked by his local
post office should be ignored.

I can still mailbomb George, who hasn't signed up on the list; there may be
ways to send my mail from Fred's local post office (note that the analogy
stretches a bit thin on this point), but I can no longer send email from
Nome, Alaska claiming to be Fred in Texas wanting catalogs.

There are established ways of dealing with folks who are on the road all
the time and legitimately might be anywhere in the world, but still want
to get catalogs sent to their house; before I started mailbombing Fred,
maybe he was fine with just sending them in with no limitations. Now he's
tired of it, and it's less time and effort to deal with the hassle of
updati