Re: Need for launchpad

2006-01-07 Thread Loïc Minier
On Fri, Jan 06, 2006, Frans Jessop wrote:
> Ubuntu's launchpad is amazing.  Do you think it would be helpful if all 
> DD's worked through it on their projects?  Wouldn't that keep things more 
> organized and efficient?  Or perhaps Debian could build its own version of 
> launchpad which is better.  Again, I think it would do a good job keeping 
> everything organized an efficient.

 In my experience of last week, some parts are still buggy;  the
 software needs to mature a bit.  I dream of the day I'll see patches
 from Fedora or Ubuntu one click away from the list of bugs of Debian
 packages.

 (I don't think the "non-free" argument is here of importance
 considering it's a web service, in the same way as Google or
 buildd.net.  I shall get flamed for these remarks.)

-- 
Loïc Minier <[EMAIL PROTECTED]>
Current Earth status:   NOT DESTROYED


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: APT public key updates?

2006-01-07 Thread Paul TBBle Hampson
On Fri, Jan 06, 2006 at 08:21:14AM -0500, Joey Hess wrote:
> Anthony Towns wrote:
>> Oh, the explanation for current practice is that if the key doesn't
>> change in practice, apps that look at the keys won't cope well with the
>> key changing, and when that becomes important, such as in the event of
>> a compromise, we'll have major difficulties in coping.

> In that case I suggest you rotate it every month for a few cycles.

> BTW, has anyone thought about what will happen when we have a stable
> release that has the 200n key in it and 200n+1 rolls around[1]? Will stable
> even be installable anymore? How will the updated key be pushed out to
> stable quickly enough? Will we have to rebuild CDs and obsolete all the
> old ones then too? Is the current scheme of having overlapping
> signatures for 1 month long enough, given that stable users might well
> only update their machines quarterly or so?

We're already doing security rX updates to Sarge anyway, surely we just
need to synchronise the key rollover with those releases? And maybe an
rX release if the current archive key becomes compromised?

And yes, this means old rX release CD images are obsoleted. >_<

Maybe the one-true-stable-key idea is the way to go after all...

Or maybe an option to apt-key that auto-traces from the key on the CD to
the current key, in a sort of certificate chain thingy... But that just
reeks of "places to break the chain of trust".

-- 
---
Paul "TBBle" Hampson, MCSE
8th year CompSci/Asian Studies student, ANU
The Boss, Bubblesworth Pty Ltd (ABN: 51 095 284 361)
[EMAIL PROTECTED]

"No survivors? Then where do the stories come from I wonder?"
-- Capt. Jack Sparrow, "Pirates of the Caribbean"

License: http://creativecommons.org/licenses/by/2.1/au/
---


pgpIXxXSFa03Y.pgp
Description: PGP signature


Re: APT public key updates?

2006-01-07 Thread Steve Langasek
On Sat, Jan 07, 2006 at 09:14:50PM +1100, Paul TBBle Hampson wrote:
> We're already doing security rX updates to Sarge anyway, surely we just
> need to synchronise the key rollover with those releases? And maybe an
> rX release if the current archive key becomes compromised?

This is inconsistent with Debian's past policies wrt stable releases,
namely, that it should be possible for a user to skip all point releases and
security updates (at the peril of their system's security...) and still be
able to upgrade when a new stable release comes out.  This is necessary if
we're to accomodate the many Debian deployments which don't have a reliable
network connection and are only updated when a new stable release is
published.  Please keep this use case in mind while designing solutions for
the apt key update problem.

Cheers,
-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Re: APT public key updates?

2006-01-07 Thread martin f krafft
also sprach Steve Langasek <[EMAIL PROTECTED]> [2006.01.07.1132 +0100]:
> This is inconsistent with Debian's past policies wrt stable releases,
> namely, that it should be possible for a user to skip all point releases and
> security updates (at the peril of their system's security...) and still be
> able to upgrade when a new stable release comes out.  This is necessary if
> we're to accomodate the many Debian deployments which don't have a reliable
> network connection and are only updated when a new stable release is
> published.  Please keep this use case in mind while designing solutions for
> the apt key update problem.

As JoeyH suggests on http://wiki.debian.org/SecureApt,
a debian-archive-key package, which contains all keys up until the
current one, would do. Then, whenever a new key comes along, a new
package is distributed via security.d.o.

If we do this, I strongly suggest to move to one-key-per-release
cycles. There is no reason to have a new key each January. As
a matter of fact, if etch comes out in Decembre 2006, the archive keys it
distributes will be usable only for a little more than a month.

-- 
Please do not send copies of list mail to me; I read the list!
 
 .''`. martin f. krafft <[EMAIL PROTECTED]>
: :'  :proud Debian developer and author: http://debiansystem.info
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Invalid/expired PGP (sub)keys? Use subkeys.pgp.net as keyserver!
 
"never try to explain computers to a layman.
 it's easier to explain sex to a virgin."
-- robert heinlein
 
(note, however, that virgins tend to know a lot about computers.)


signature.asc
Description: Digital signature (GPG/PGP)


Re: gconf transition

2006-01-07 Thread Linas Zvirblis

Alejandro Bonilla wrote:


I just upgraded Sid and rebooted, after that, logging into Gnome told me if I
wanted to migrate to a Single file that will give me better performance, so of
course I said yes. It logged me off and everytime that I need to log back in,
it kicks me out.

I don't have any special scripts, I just use some PAM for the FingerPrint
reader. Still, ignoring the fingerprint authentication, it fails.

[errors]

Which package gets the bug report?


Well, it does say it will break some things (did not break anything for 
me though), so I am sure developers are well aware. If you are not 
terribly concerned about loosing some of your settings, I suggest you 
delete your .gconf and let it be regenerated.


By the way, you are much more likely to receive answers to such 
questions if you post in debian-user.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Need for launchpad

2006-01-07 Thread Christian Perrier
Quoting Loïc Minier ([EMAIL PROTECTED]):

>  (I don't think the "non-free" argument is here of importance
>  considering it's a web service, in the same way as Google or
>  buildd.net.  I shall get flamed for these remarks.)


As long as Debian doesn't want to build its own launchpad, sure.

But the non freeness prevents us building such infrastructure on our
ownn machines. This is especially true for Rosetta, the i18n
infrastructure even though many translators would really love having
a Rosetta-style infrastructure for Debian work.

This topic will be discussed and probably worked on during the i18n
Extremadura meeting we will have in September:
http://wiki.debian.org/WorkSessionExtremadura2006i18n



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: APT public key updates?

2006-01-07 Thread Bernd Eckenfels
Paul TBBle Hampson <[EMAIL PROTECTED]> wrote:
> Maybe the one-true-stable-key idea is the way to go after all...

One key by distribution?

Gruss
Bernd


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Request for Replacement Packager for Ampache

2006-01-07 Thread Adrian von Bidder
On Friday 06 January 2006 19.47, Karl Vollmer wrote:
> Hello All,
>
>   I apologize if this is the incorrect list to use for this purpose,
> however a few months back I posted an ITP as I thought I would
> actually have time to package up Ampache (http://www.ampache.org)
> However that hasn't happened.

What you should do is resend this message to the ITP and retitle the ITP to 
RFP (request for package) when you think it's worth it.

I think someobdy wrote some script that weeds out very old ITP and RFP bugs 
every once in a while, so you don't have to worry aobut leaving cruft lying 
around - when nobody reacts to that RFP after some time (what? 1 year?) it 
will be removed.

cheers
-- vbi

-- 
Beware of the FUD - know your enemies. This week
* Patent Law, and how it is currently abused. *
http://fortytwo.ch/opinion


pgprHjcp80E7q.pgp
Description: PGP signature


Re: APT public key updates?

2006-01-07 Thread Florian Weimer
* Bernd Eckenfels:

> Paul TBBle Hampson <[EMAIL PROTECTED]> wrote:
>> Maybe the one-true-stable-key idea is the way to go after all...
>
> One key by distribution?

If this means one key per suite (sarge, etch, ...), and no yearly key
rollover, I agree. 8-)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: ITP vexim2

2006-01-07 Thread Adrian von Bidder
Daniel:
> is there anybody - preferred German speakers - who is willing and able
> to package this OR to give assistance to me (i would try packaging when
> there is somone helping me)???

Hi Daniel!

An 'ITP' is supposed to be filed in the Debian bug tracking system.  Best 
just use the 'reportbug' command, like 'reportbug wnpp' and follow the 
instructions on how to properly do this.

cheers
-- vbi

-- 
Love may laugh at locksmiths, but he has a profound respect for money bags.
-- Sidney Paternoster, "The Folly of the Wise"


pgpaoiWeDCFYy.pgp
Description: PGP signature


Bug#346373: ITP: tioga -- tioga : a powerful plotting system in ruby

2006-01-07 Thread Vincent Fourmond
Package: wnpp
Severity: wishlist
Owner: Vincent Fourmond <[EMAIL PROTECTED]>


* Package name: tioga
  Version : 1.0.i
  Upstream Author : Bill Paxton (email omitted)
* URL : http://theory.kitp.ucsb.edu/~paxton/tioga.html
* License : LGPL
  Description : tioga : a powerful plotting system in ruby


  Tioga is a ruby library providing a way to make high quality graphes. Native 
output format is PDF, 
processing text using pdflatex. It can be used to plot functions and any kind 
of scientific data.

  Tioga is quite easy to use and very easy to script, for repetitive plottings, 
or for making animated 
plots.

PS: the packaging is actually nearly done ;-)

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.14
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) (ignored: LC_ALL set to C)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: gconf transition

2006-01-07 Thread Loïc Minier
Hi,

On Fri, Jan 06, 2006, Alejandro Bonilla wrote:
> /usr/lib/libgconf2-4/gconf-sanity-check-2: error while loading shared
> libraries: libpangocairo-1.0.so.0: cannot open shared object file: No such
> file or dir
> gconf-sanity-check-2 did not pass, logging back out

 I've filed a serious bug on gconf for now, but this might not be a
 _gconf_ bug.  Thanks for your report,
-- 
Loïc Minier <[EMAIL PROTECTED]>


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: gconf transition

2006-01-07 Thread Josselin Mouette
Le vendredi 06 janvier 2006 à 14:28 -0600, Alejandro Bonilla a écrit :
> Hi,
> 
> I just upgraded Sid and rebooted, after that, logging into Gnome told me if I
> wanted to migrate to a Single file that will give me better performance, so of
> course I said yes. It logged me off and everytime that I need to log back in,
> it kicks me out.

In fact it has nothing to do with the schema migration.

> /usr/lib/libgconf2-4/gconf-sanity-check-2: error while loading shared
> libraries: libpangocairo-1.0.so.0: cannot open shared object file: No such
> file or dir

Ladies and gentlemen, this is a perfect example of why linking indirect
dependencies is a very bad thing. Let me explain.

Of all binaries shipped with GConf, gconf-sanity-check is the only one
using GTK+. The only application using gconf-sanity-check is
gnome-session. On first sight, it looks safe to exclude
gconf-sanity-check for the computation of gconf dependencies, as
gnome-session will always require libgtk2.0-0, and gconf-sanity-check
isn't susceptible to use any symbols that could be added to GTK+.

Now, let's have a look at gconf-sanity-check:
  NEEDED  libgtk-x11-2.0.so.0
  NEEDED  libgdk-x11-2.0.so.0
  NEEDED  libXrandr.so.2
  NEEDED  libXi.so.6
  NEEDED  libXinerama.so.1
  NEEDED  libXext.so.6
  NEEDED  libatk-1.0.so.0
  NEEDED  libgdk_pixbuf-2.0.so.0
  NEEDED  libpangocairo-1.0.so.0
  NEEDED  libpangoft2-1.0.so.0
  NEEDED  libXcursor.so.1
  NEEDED  libpango-1.0.so.0
  NEEDED  libcairo.so.2
  NEEDED  libpng12.so.0
  NEEDED  libfontconfig.so.1
  NEEDED  libfreetype.so.6
  NEEDED  libXrender.so.1
  NEEDED  libX11.so.6
  NEEDED  libxml2.so.2
  NEEDED  libz.so.1
  NEEDED  libgconf-2.so.4
  NEEDED  libORBit-2.so.0
  NEEDED  libpopt.so.0
  NEEDED  libgobject-2.0.so.0
  NEEDED  libm.so.6
  NEEDED  libgmodule-2.0.so.0
  NEEDED  libdl.so.2
  NEEDED  libgthread-2.0.so.0
  NEEDED  libpthread.so.0
  NEEDED  libglib-2.0.so.0
  NEEDED  libc.so.6

The only libraries from which it actually uses symbols are libgconf2,
libgtk-x11, libglib and libc.

Now, as the dependencies of libgtk2.0-0 change, when the GTK+ backend
changes, they're still required while not being really needed, but the
program will nevertheless crash upon startup when not finding them.

You can now thank pkg-config and libtool.

I'm going to fix this right away, thanks for the report.

Regards,
-- 
 .''`.   Josselin Mouette/\./\
: :' :   [EMAIL PROTECTED]
`. `'[EMAIL PROTECTED]
  `-  Debian GNU/Linux -- The power of freedom


signature.asc
Description: Ceci est une partie de message	numériquement signée


Re: [no subject]

2006-01-07 Thread Josselin Mouette
Le vendredi 06 janvier 2006 à 15:11 -0500, Gillings, Marcus a écrit :
> Hello, 
>  
> My name is Marcus Gillings.  There was an email sent from me
> on your website.  Can you please delete it and the contents in it,
> please.

No, as explained on http://www.debian.org/MailingLists/ we don't remove
emails from our archives.

Regards,
-- 
 .''`.   Josselin Mouette/\./\
: :' :   [EMAIL PROTECTED]
`. `'[EMAIL PROTECTED]
  `-  Debian GNU/Linux -- The power of freedom


signature.asc
Description: Ceci est une partie de message	numériquement signée


Re: Advices, comments? Bug#345651: passwd package should be essential?

2006-01-07 Thread Andreas Metzler
Christian Perrier <[EMAIL PROTECTED]> wrote:
[...]
> I'm wondering if the passwd package should be essential or not.
[...]
> So, passwd was virtually essential because bash had a
> dependency on it, but now it doesn't anymore.

> So why do I think passwd needs to be essential?

> There are several things in the package that one might
> want to run from one of the maintainer scripts from
> debconf, like useradd, groupadd, userdel, ...
[...]

Actually maintainer script shouldn't run these commands, they should
use (and depend on) adduser.
 cu andreas
-- 
The 'Galactic Cleaning' policy undertaken by Emperor Zhark is a personal
vision of the emperor's, and its inclusion in this work does not constitute
tacit approval by the author or the publisher for any such projects,
howsoever undertaken.(c) Jasper Ffforde


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: APT public key updates?

2006-01-07 Thread Colin Watson
On Thu, Jan 05, 2006 at 04:32:29PM -0800, Matt Zimmerman wrote:
> On Fri, Jan 06, 2006 at 01:22:50AM +0100, Petter Reinholdtsen wrote:
> > [Michael Vogt]
> > > Sorry for the delay. I'm preparing a new upload that adds the 2006
> > > archive key to the default keyring. 
> > 
> > Sounds good.  Will this automatically take care of the key update and
> > make sure no manual intervention is needed to get packages upgraded?
> > 
> > Isn't Ubuntu using the signed apt stuff?  How are they handling the
> > new archive keys?
> 
> Ubuntu's apt package ships only the Ubuntu archive keyring, not the Debian
> archive keyring, so no update is needed when Debian keys change.

That doesn't mean we (Ubuntu) have solved the problem of how to rotate
*our* keys in the event of a key compromise. (To my knowledge, we
haven't.)

-- 
Colin Watson   [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Aptitude question

2006-01-07 Thread Thomas Bushnell BSG
James Vega <[EMAIL PROTECTED]> writes:

> The aptitude in unstable and testing has a feature that lists suggested
> ways to fix broken packages.

Unfortunately, the feature doesn't work very well.

Frequently I say "aptitude remove XXX" and the first several
suggestions that aptitude comes up with is not removing XXX and the
things that depend on it, but rather various contortions of trying to
keep XXX in the system.

Likewise, I have said "aptitude install XXX" and had the first several
suggestions include removals of XXX.

Seems to me that aptitude should assume that the request the user
explicitly made has priority over other things.

Thomas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Aptitude question

2006-01-07 Thread Daniel Burrows
On Sat, Jan 07, 2006 at 12:51:55AM +0100, Jiří Paleček <[EMAIL PROTECTED]> was 
heard to say:
> On Wed, 04 Jan 2006 19:50:14 +0100, Linas Zvirblis <[EMAIL PROTECTED]>  
> wrote:
> 
> >Jiri Palecek wrote:
> >>How does aptitude decide which one to choose? Shouldn't it
> >>prefer to do something that won't break other packages? Or should
> >>it ask the user for help?
> 
> >As for your problem, you must provide way more information than just "it  
> >does not work" in order to get help. There are at least five different  
> >versions of aptitude you could be using on whatever version of Debian  
> >you use. Most of us cannot read minds, especially over the Internet.
> 
> If you had read (at least the written protion of) my mind more carefully,
> you would realize that I have never said "it does not work". I thought it
> more as a feature request (or idea) than bug report. I was asking about
> how is aptitude supposed to solve such situations, beacuse it isn't clear
> if it really should try to guess the correct packages to install.

  The problem is that of the five versions Linas referred to, there are at
least two separate ways of resolving such situations, which are likely to
behave differently in your case.

> Then, try to install "A". This will, in my version of aptitude  
> (0.2.15.9-7),
> breaks package "D". However, the constraints are satisfiable by downgrading
> package "B".

  The version in unstable (0.4.*) can calculate every (interesting) solution
to a given dependency problem [0] and will show as many as you ask for.

> As you had already noted, it greatly depends on the particular system (you
> don't wanna read my /var/lib/dpkg/available and status, do you?). I thought
> it more as an illustrative example.

  Actually, I often end up loading other people's system state files in
the course of bug-hunting.

  Daniel

  [0] alert readers will note that the caveat "if the user waits for a
sufficient amount of time" has to be added here; however, this is typically
much less than one second per solution on my hardware.


signature.asc
Description: Digital signature


Re: APT public key updates?

2006-01-07 Thread Andreas Barth
* Florian Weimer ([EMAIL PROTECTED]) [060106 11:56]:
> * Bernd Eckenfels:
> 
> >> IOW using the old key to sign the new key only requires that the old
> >> key be "good" at one point during the new year, whereas continuing to
> >> use the old key requires that it be "good" all year.
> >
> > Yes, but it breaks a long term usage like web of trust.
> 
> The Debian archive key does not take part in the web of trust.
> Anybody who has passed the OpenPGP NM checks should not sign that key.

I disagree. There are people who have first-hand knowledge that this key
is used for the usage written in the key id, i.e. sign the debian
archive. These people can IMHO sign the key.


Cheers,
Andi
-- 
  http://home.arcor.de/andreas-barth/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: APT public key updates?

2006-01-07 Thread Andreas Barth
* Steve Langasek ([EMAIL PROTECTED]) [060106 13:05]:
> The exposure of the archive key is higher, because it sits on an
> Internet-connected, ssh-accessible server.  Also, you don't have to trust
> AJ's key; in contrast with Florian's assessment of the NM-suitability of the
> three ftpmasters, one ftp assistant, and one RM who have signed this key so
> far :), I would encourage you to log into merkel and verify, directly and
> securely, the key at /org/ftp.debian.org/web/ziyi_key_2006.asc; sign it; and
> upload your signature to the public keyservers as well, if you are satisfied
> that this is the key that is being used on ftp-master.debian.org to sign the
> archive.

I disagree with that - having this key sitting on merkel means nothing.
Checking the configuration on /org/ftp.d.o/katie/katie.conf and the
keyring ziyi uses on ftp-master (i.e. spohr) means something.

Cheers,
Andi
-- 
  http://home.arcor.de/andreas-barth/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Powerfulness (was: tioga : a powerful plotting system in ruby)

2006-01-07 Thread Juergen Salk
* Vincent Fourmond <[EMAIL PROTECTED]> [060107 14:13]:

>   Description : tioga : a powerful plotting system in ruby

First of all: This is not against you, Vincent. :-)

I am just wondering if we shouldn't be more chary of using 
meaningless (or soliciting) phrases like "powerful" in 
package descriptions in general.

According to their package descriptions, we seem to have exactly
six powerful text editors in Debian. These are elvis, jove,
mined, ne, nedit and zed. Emacs, vim and many others do not
belong to them. Does that mean these are less powerful than the
powerful ones? 

Best regards - Juergen

-- 
GPG A997BA7A | 87FC DA31 5F00 C885 0DC3  E28F BD0D 4B33 A997 BA7A


signature.asc
Description: Digital signature


Bug#346443: ITP: cue2toc -- converts CUE files to cdrdao's TOC format

2006-01-07 Thread Asheesh Laroia
Package: wnpp
Severity: wishlist
Owner: Asheesh Laroia <[EMAIL PROTECTED]>


* Package name: cue2toc
  Version : 0.4
  Upstream Author : Matthias Czapla <[EMAIL PROTECTED]>
* URL : http://cue2toc.sourceforge.net/
* License : GPL
  Description : converts CUE files to cdrdao's TOC format

 cue2toc from http://cue2toc.sourceforge.net/ has features that include support
 for complete set of CUE commands (e.g. catalog number, data and audio tracks,
 ISRC codes, CD-Text,  Pre-/Postgaps (with zero data or data from file),
 subindexes etc.), automatic determination of session type and conversion of
 data files by user configurable commands based on file name extension
 matching.

-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.6.8-2-386
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: APT public key updates?

2006-01-07 Thread Paul TBBle Hampson
On Sat, Jan 07, 2006 at 12:16:36PM +0100, Bernd Eckenfels wrote:
> Paul TBBle Hampson <[EMAIL PROTECTED]> wrote:
>> Maybe the one-true-stable-key idea is the way to go after all...

> One key by distribution?

Well, I meant a different one for each stable, which I guess logically
becomes "yes"...

Although as Steve Langasek has pointed out, the Sarge->Etch upgrade will
be hard unless the etch key becomes available to Sarge users who've not
touched their system since Sarge r0a... I guess this comes down to
making the etch key available in some kind of Sarge-signed repository,
that you have to add as part of the Etch upgrade, and after which
apt-key update will bring you up to Etch key currentness.

Assuming apt-key is supposed to be updating from a file in
debian-keyring, maybe a new dist ("oldstable-upgrade") which really only
contains debian-keyring from (new)stable, but which is signed with the
oldstable key. Then the online upgrade procedure becomes:

Add oldstable-upgrade to your apt-sources
apt-get update
apt-get install -t oldstable-upgrade debian-keyring
apt-key update
apt-get update <== To recheck signatures... I dunno if this is needed?
apt-get dist-upgrade
 ... time passes
echo "Welcome to etch!"

(Or maybe using aptitude, if that's the recommended upgrade method for
Etch as well...)

I dunno exactly how apt-cdrom works, but maybe it could automatically
pick up that an etch CD has both oldstable-upgrade and stable dists, and
therefore the process for CD upgrades becomes:

apt-cdrom
apt-get install -t oldstable-upgrade debian-keyring
apt-key update
apt-get update <== To recheck signatures... I dunno if this is needed?
apt-get dist-upgrade
 ... time passes
echo "Welcome to etch!"

You'll still get complaints during apt-get update the first time, but
the apt-get install at least won't try to reject debian-keyring for
being unsigned, because _it_ is signed with a known signature.

For the intervening time, security updates and rX releases thereof allow
for stable key rollover as needed, either yearly or when compromised.

This way oldstable-upgrade gets rolled-away with the rest of oldstable,
and isn't part of oldstable per se and so doesn't complicate security
updates or whatnot, and is easy to include on the first CD of the new
release for upgraders.

And the (new) stable key is therefore (transitively) signed with the
oldstable key, maintaining the chain of trust, without actually having
to muck about with gpg signatures.

-- 
---
Paul "TBBle" Hampson, MCSE
8th year CompSci/Asian Studies student, ANU
The Boss, Bubblesworth Pty Ltd (ABN: 51 095 284 361)
[EMAIL PROTECTED]

"No survivors? Then where do the stories come from I wonder?"
-- Capt. Jack Sparrow, "Pirates of the Caribbean"

License: http://creativecommons.org/licenses/by/2.1/au/
---


pgpmtyYZ9NeHj.pgp
Description: PGP signature


Re: APT public key updates?

2006-01-07 Thread Peter Samuelson

[Paul TBBle Hampson]
> Although as Steve Langasek has pointed out, the Sarge->Etch upgrade
> will be hard unless the etch key becomes available to Sarge users
> who've not touched their system since Sarge r0a... I guess this comes
> down to making the etch key available in some kind of Sarge-signed
> repository

Do sarge systems verify the archive key anyway?  I thought apt 0.5.28
didn't.  But for etch moving forward, I like the ideas I've heard so
far about release keys:

1) One key per stable release.  The key is generated a month or so
   before the release, however long is needed to ensure that it be
   shipped in d-i.  This key is then used for the entire length that
   that release is supported (thus the archive is signed by the keys
   from both stable and oldstable) - in practice I guess the overlap
   goes a year or so.

2) The per-release key obviously can't expire exactly when it should,
   since the release cycle isn't completely predictable, to put it
   mildly.  It might be set to live 4 years or so, and can be revoked
   later as "superceded".

3) Separate keys for other archives - all of the above applies to
   security, volatile, and amd64 as well.  (Unless amd64 makes it to
   ftp.debian.org before etch.)


signature.asc
Description: Digital signature


Re: Need for launchpad

2006-01-07 Thread Andrew Suffield
On Fri, Jan 06, 2006 at 03:19:42PM -0500, Frans Jessop wrote:
> Ubuntu's launchpad is amazing.  Do you think it would be helpful if all 
> DD's worked through it on their projects?  Wouldn't that keep things more 
> organized and efficient?  Or perhaps Debian could build its own version of 
> launchpad which is better.  Again, I think it would do a good job keeping 
> everything organized an efficient.

The day when working on Debian requires the use of a web interface
will be the day that I hunt down and painfully kill the person
responsible for doing it.

Removing the ability to manage things from the shell would not be more
organised and efficient unless you're a complete fricking moron who
can't operate a unix host. Which appears to be the target audience of
launchpad.

We're working with the real stuff here, not kids toys. Web interfaces
don't scale to the level at which we have to work *all the time*. Just
ask the BTS admins what happens when somebody scans
http://bugs.debian.org/ to collect data.

Oh, and hey - when SuSE are doing better than you at publishing the
tools they use, it's a hint that maybe you suck.

-- 
  .''`.  ** Debian GNU/Linux ** | Andrew Suffield
 : :' :  http://www.debian.org/ |
 `. `'  |
   `- -><-  |


signature.asc
Description: Digital signature


Re: Powerfulness (was: tioga : a powerful plotting system in ruby)

2006-01-07 Thread Paul Wise
On Sat, 2006-01-07 at 23:52 +0100, Juergen Salk wrote:

> I am just wondering if we shouldn't be more chary of using 
> meaningless (or soliciting) phrases like "powerful" in 
> package descriptions in general.

Sounds like something that should be added to lintian. I suggest filing
a wishlist bug with a patch. I recently made a lintian patch to check
for best-practice homepages in the description field, which was easy,
just modify checks/description and checks/description.desc.

-- 
bye,
pabs

http://wiki.debian.org/PaulWise


signature.asc
Description: This is a digitally signed message part


Re: APT public key updates?

2006-01-07 Thread Bernd Eckenfels
Paul TBBle Hampson <[EMAIL PROTECTED]> wrote:
> Although as Steve Langasek has pointed out, the Sarge->Etch upgrade will
> be hard unless the etch key becomes available to Sarge users who've not
> touched their system since Sarge r0a... I guess this comes down to
> making the etch key available in some kind of Sarge-signed repository,
> that you have to add as part of the Etch upgrade, and after which
> apt-key update will bring you up to Etch key currentness.

I dont see a problem in requiring the user to get the key from the debian
homepage whenever they want to verify a different distribution. What you can
du is to have a Debian CA key, if you want to ship a trust anchor with the
archives, but I dont see a need for it, since you need to verify it with
other means anyway.

Gruss
Bernd


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]