Re: projectb users - we want you
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I'm not a DD so I can't add myself to the list; I'd like to see better support for importing dsc files and binaries into the archive (aka to importing an existing archives (import-archive now works though after I gave it a lobotomy). Database wise, the only thing I could see being a worthwhile improvement to whats already there would maybe be moving the bug closed lists to the database so they can be queried without having to go parsing through text files. That being said, that improvement probably would only affect Debian itself, and very few dak/projectb users. Michael -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: http://getfiregpg.org iEYEARECAAYFAkihSYMACgkQpblTBJ2i2puKxACeOdvLRWO/xmhMOINRnlpjk8ja tekAn0AblyCJ4JX+NBBuahMebKXkYBff =SoLc -END PGP SIGNATURE- On Mon, Aug 11, 2008 at 5:38 PM, Cameron Dale <[EMAIL PROTECTED]> wrote: > On Wed, Aug 6, 2008 at 12:13 PM, Joerg Jaspert <[EMAIL PROTECTED]> wrote: >> Please login to merkel and add yourself to ~joerg/projectb.users (the >> file is mode 666, so everyone with login is able to do it). > > Done. I'm surprised at the few entries after almost a week. Is no one > using projectb, or is everyone busy at debconf? > >> Also, as a user, or potential user, of that database - feel free to let >> us know what other data you would like to see in it. We might actually >> put it into the database then. (It has to be related to the archive in >> some way, so we wont randomly list, eg., bug data or something, but one >> example would be adding the descriptions or so). > > I'd like to have access to all of the hashes of the files, SHA1 in > particular, instead of just the MD5. > > Also, there's some information available in the archive that doesn't > seem to be available in projectb, but that it would be nice to have. > The suite_architectures table is incomplete (only listing unstable, > experimental, sarge-r0, and etch-m68k). And there also isn't a way to > determine the codenames from the suite names without looking in the > Release files. > > Thanks, > Cameron > > > -- > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED] > > -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#494796: ITP: life -- LIbrary for the Finite Element method
Package: wnpp Severity: wishlist X-Debbugs-CC: debian-devel@lists.debian.org --- Please fill out the fields below. --- Package name: life Version: 0.9.8 Upstream Author: Christophe Prud'homme <[EMAIL PROTECTED]> URL: http://www.prudhomm.org/life License: LGPL Description: LIbrary for the Finite Element method Life is a C++ library for partial differential equation solves using generalized Galerkin methods i.e. fem, hp/fem, spectral methods. The main features are: o handles 1D, 2D and 3D geometries o supports various geometric entities: simplices and hypercubes o supports various polynomial families: Lagrange, Legendre, Dubiner o supports from low to high order approximations in space, time and geometry o provides functional mathematical concepts : operators, function spaces, elements of function spaces... o provides a Domain Specific Embedded Language (DSEL) in C++ for variational formulations, integration and projection A version of the Debian files is already available on the pkg-scicomp svn repository. C. -- Debian Developer Annecy - Grenoble Scientific computing related software -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages
On Tue, Aug 12, 2008 at 10:38:07AM +0400, Dmitry E. Oboukhov wrote: SM> A while ago, the use of libpam-tmpdir was suggested in order to mitigate SM> some of these attacks. It would be nice to see it in use by default, some SM> day. SM> Obviously there will always be some programs that don't look at the SM> TMPDIR environment variable and directly use /tmp. write file to /tmp/filename == write file to $TMPDIR/filename both cases are security holes if TMPDIR=/tmp :) The idea behind libpam-tmpdir is that it creates a subdirectory of /tmp that is only accessible by that user, and then sets TMPDIR and other variables to that. Hence, it doesn't matter nearly as much if you create a non-random filename, because nobody but you can access it. -- brian m. carlson / brian with sandals: Houston, Texas, US +1 713 440 7475 | http://crustytoothpaste.ath.cx/~bmc | My opinion only troff on top of XML: http://crustytoothpaste.ath.cx/~bmc/code/thwack OpenPGP: RSA v4 4096b 88AC E9B2 9196 305B A994 7552 F1BA 225C 0223 B187 signature.asc Description: Digital signature
Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages
>>> A while ago, the use of libpam-tmpdir was suggested in order to mitigate >>> some of these attacks. It would be nice to see it in use by default, some >>> day. >> >>> Obviously there will always be some programs that don't look at the >>> TMPDIR environment variable and directly use /tmp. >> write file to /tmp/filename == write file to $TMPDIR/filename >> both cases are security holes if TMPDIR=/tmp :) > The idea behind libpam-tmpdir is that it creates a subdirectory of /tmp > that is only accessible by that user, and then sets TMPDIR and other > variables to that. Hence, it doesn't matter nearly as much if you > create a non-random filename, because nobody but you can access it. Yes, but scripts must use $TMPDIR instead '/tmp' or mktemp/tempfile utils :) -- ... mpd playing: U.D.O. - Midnight Mover . ''`. Dmitry E. Oboukhov : :’ : [EMAIL PROTECTED] `. `~’ GPGKey: 1024D / F8E26537 2006-11-21 `- 1B23 D4F8 8EC0 D902 0555 E438 AB8C 00CF F8E2 6537 signature.asc Description: Digital signature
Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages
The script in attach looks through a mirror of a specified distributive and makes a search of '>\s*/tmp/' and 'tee [^|]*/tmp/' constructions. It finds less errors then I've found earlier however the results of its work are more accurate. The script looks through all the files of packages marked as executable. That is even if the script is in /usr/share/doc and is marked as executable it will be tested nevertheless. The full viewing of a mirror takes a few hours. Later I shall publish the reports on lenny (already attached) and etch. :) attaches: report of lenny: http://uvw.ru/report.lenny.txt script: http://uvw.ru/find_the_bug2.sh Somebody may rewrite 'check' section of script ;) short report of lenny: Package: aegis Version: 4.24-3 /usr/share/doc/aegis/examples/remind/bng_dvlpd.sh /usr/share/doc/aegis/examples/remind/bng_rvwd.sh /usr/share/doc/aegis/examples/remind/awt_dvlp.sh /usr/share/doc/aegis/examples/remind/awt_intgrtn.sh Package: aegis-web Version: 4.24-3 /usr/lib/cgi-bin/aegis.cgi Package: ampache Version: 3.4.1-1 /usr/share/ampache/www/locale/base/gather-messages.sh Package: apertium Version: 3.0.7+1-1+b1 /usr/bin/apertium-gen-deformat /usr/bin/apertium-gen-reformat /usr/bin/apertium Package: aptoncd Version: 0.1-1.1 /usr/share/aptoncd/xmlfile.py Package: ara-byte Version: 1.0.25 /usr/bin/ara Package: arb-common Version: 0.0.20071207.1-4 /usr/lib/arb/SH/arb_fastdnaml /usr/lib/arb/SH/dszmconnect.pl Package: audiolink Version: 0.05-1 /usr/bin/audiolink Package: aview Version: 1.3.0rc1-8 /usr/bin/asciiview Package: bacula-common Version: 2.4.2-1 /usr/share/doc/bacula-common/examples/autochangers/mtx-changer.Adic-Scala= r-24 Package: bash-doc Version: 3.2-4 /usr/share/doc/bash/examples/misc/aliasconv.sh /usr/share/doc/bash/examples/misc/aliasconv.bash /usr/share/doc/bash/examples/misc/cshtobash Package: bk2site Version: 1:1.1.9-3.1 /usr/lib/cgi-bin/bk2site/redirect.pl Package: bulmages-servers Version: 0.11.1-2 /usr/share/bulmages/examples/scripts/actualizabulmacont /usr/share/bulmages/examples/scripts/installbulmages-db /usr/share/bulmages/examples/scripts/creabulmafact /usr/share/bulmages/examples/scripts/creabulmacont /usr/share/bulmages/examples/scripts/actualizabulmafact Package: caudium Version: 3:1.4.12-11 /usr/share/caudium/configvar Package: cdcontrol Version: 1.90-1.1 /usr/lib/cdcontrol/writtercontrol Package: cdrw-taper Version: 0.4-2 /usr/sbin/amlabel-cdrw Package: citadel-server Version: 7.37-1 /usr/lib/citadel-server/migrate_aliases.sh Package: cman Version: 2.20080629-1 /usr/sbin/fence_egenera Package: cmus Version: 2.2.0-1+b1 /usr/share/doc/cmus/examples/cmus-status-display Package: convirt Version: 0.8.2-3 /usr/share/convirt/image_store/_template_/provision.sh /usr/share/convirt/image_store/Linux_CD_Install/provision.sh /usr/share/convirt/image_store/Fedora_PV_Install/provision.sh /usr/share/convirt/image_store/CentOS_PV_Install/provision.sh /usr/share/convirt/image_store/common/provision.sh /usr/share/convirt/image_store/example/provision.sh /usr/share/convirt/image_store/Windows_CD_Install/provision.sh Package: crossfire-maps Version: 1.11.0-1 /usr/share/games/crossfire/maps/Info/combine.pl Package: ctn Version: 3.0.6-12 /usr/share/doc/ctn/examples/add-accession-numbers Package: cups Version: 1.3.7-9 /usr/share/doc/cups/examples/pstopdf Package: datafreedom-perl Version: 0.1.7-1 /usr/bin/dfxml-invoice Package: decompyle Version: 2.3.2-4+b1 /usr/bin/decompyle Package: dhis-server Version: 5.3-1 /usr/lib/dhis-server/dhis-dummy-log-engine Package: digitaldj Version: 0.7.5-6+b1 /usr/share/digitaldj/fest.pl Package: dist Version: 1:3.5-17-1 /usr/bin/patcil /usr/bin/patdiff Package: docvert Version: 3.4-4 /usr/share/docvert/core/lib/pyodconverter/test-pipe-to-pyodconverter.org.= sh Package: dpkg-cross Version: 2.3.0 /usr/share/dpkg-cross/bin/gccross Package: dtc-common Version: 0.29.6-1 /usr/share/dtc/admin/accesslog.php /usr/share/dtc/admin/sa-wrapper Package: emacs-jabber Version: 0.7.91-1 /usr/lib/emacsen-common/packages/install/emacs-jabber Package: emacspeak Version: 26.0-3 /usr/share/emacs/site-lisp/emacspeak/etc/extract-table.pl Package: feta Version: 1.4.16 /usr/share/feta/plugins/to-upgrade Package: firehol Version: 1.256-4 /sbin/firehol Package: fml Version: 4.0.3.dfsg-2 /usr/share/fml/libexec/mead.pl Package: freeradius-dialupadmin Version: 2.0.4+dfsg-4 /usr/share/freeradius-dialupadmin/bin/backup_radacct /usr/
Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages
Dmitry E. Oboukhov wrote: A while ago, the use of libpam-tmpdir was suggested in order to mitigate some of these attacks. It would be nice to see it in use by default, some day. Obviously there will always be some programs that don't look at the TMPDIR environment variable and directly use /tmp. >>> write file to /tmp/filename == write file to $TMPDIR/filename >>> both cases are security holes if TMPDIR=/tmp :) > >> The idea behind libpam-tmpdir is that it creates a subdirectory of /tmp >> that is only accessible by that user, and then sets TMPDIR and other >> variables to that. Hence, it doesn't matter nearly as much if you >> create a non-random filename, because nobody but you can access it. > > Yes, but > scripts must use $TMPDIR instead '/tmp' or mktemp/tempfile utils :) tempfile uses $TMPDIR by default :) -- Eugene V. Lyubimkin aka JackYF, Ukrainian C++ developer. signature.asc Description: OpenPGP digital signature
Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages
EVL>>> The idea behind libpam-tmpdir is that it creates a subdirectory of /tmp EVL>>> that is only accessible by that user, and then sets TMPDIR and other EVL>>> variables to that. Hence, it doesn't matter nearly as much if you EVL>>> create a non-random filename, because nobody but you can access it. EVL>> EVL>> Yes, but EVL>> scripts must use $TMPDIR instead '/tmp' or mktemp/tempfile utils :) EVL> tempfile uses $TMPDIR by default :) sorry, scripts must use $TMPDIR or _must_ _use_ mktemp/tempfile ;) -- ... mpd playing: U.D.O. - Animal House . ''`. Dmitry E. Oboukhov : :’ : [EMAIL PROTECTED] `. `~’ GPGKey: 1024D / F8E26537 2006-11-21 `- 1B23 D4F8 8EC0 D902 0555 E438 AB8C 00CF F8E2 6537 signature.asc Description: Digital signature
Re: Can a package modify slapd.conf in its maintainer script?
[Soren Hansen] > On Mon, Aug 11, 2008 at 08:48:29AM +0200, Petter Reinholdtsen wrote: >> I really wish there was some organized way for packages to >> automatically add schemas and settings to the OpenLDAP server >> configuration, at install time. > > The new cn=config backend in recent OpenLDAP versions provide > exactly this sort of thing (also for remote slapd instances, I > believe). This sound very interesting, and the web pages I find about it indicate that it definitely would solve part of our OpenLDAP configuration issues. Is it possible to enable it automatically in slapd at install time? Happy hacking, -- Petter Reinholdtsen -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Can a package modify slapd.conf in its maintainer script?
On Tue, Aug 12, 2008 at 05:21:26PM +0200, Petter Reinholdtsen wrote: > [Soren Hansen] > > On Mon, Aug 11, 2008 at 08:48:29AM +0200, Petter Reinholdtsen wrote: > >> I really wish there was some organized way for packages to > >> automatically add schemas and settings to the OpenLDAP server > >> configuration, at install time. > > The new cn=config backend in recent OpenLDAP versions provide > > exactly this sort of thing (also for remote slapd instances, I > > believe). > This sound very interesting, and the web pages I find about it > indicate that it definitely would solve part of our OpenLDAP > configuration issues. Is it possible to enable it automatically in > slapd at install time? It is possible; I'm currently awaiting feedback from the OpenLDAP comaintainers before we enable it. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. Ubuntu Developerhttp://www.debian.org/ [EMAIL PROTECTED] [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Can a package modify slapd.conf in its maintainer script?
On Tue, Aug 12, 2008 at 12:35:30PM -0300, Steve Langasek wrote: > It is possible; I'm currently awaiting feedback from the OpenLDAP > comaintainers before we enable it. You know that parts of the config settings are only supported in the legacy-format? Is there documentation how to import new schemas in the new config tree? Also modification are only supported via the ldap protocol, who say that root may authenticate at all? Bastian -- We do not colonize. We conquer. We rule. There is no other way for us. -- Rojan, "By Any Other Name", stardate 4657.5 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#494863: ITP: transset-df -- manager for on-the-fly transparency changing in X
Package: wnpp Severity: wishlist Owner: Daniel Moerner <[EMAIL PROTECTED]> Package name: transset-df Version : 6 Upstream Author : Daniel Forchheimer <[EMAIL PROTECTED]> URL : http://www.forchheimer.se/transset-df/ License : 'Use however you want. I can't stop you': public domain parts. Copyright 1993, 1998 The Open Group Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. [...] Programming Lang: C Description : manager for on-the-fly transparency changing in X transset-df is a program that allows the user to change window transparencies on the fly. Supported methods include using window manager hotkeys, 'select by pointing' without actually clicking a window, and selecting by name and window id. transset-df is a modified version of xorg's transset and requires compositing to function. It is meant to allow a windowmanger-independent way to support transparency. I have been in contact with the upstream developer, who has expressed interest in bringing transset-df into debian. Unlike transset, it has had releases in 2005, 2006, and 2007, and is still being slowly developed upstream. The developer is willing to explicitly provide a better license if the public domain parts license is deemed unacceptable for Debian. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages
report for etch: http://uvw.ru/report.etch.txt 107 packages :( On 18:23 Tue 12 Aug , Dmitry E. Oboukhov wrote: TDEO> The script in attach looks through a mirror of a specified distributive TDEO> and makes a search of '>\s*/tmp/' and 'tee [^|]*/tmp/' constructions. TDEO> It finds less errors then I've found earlier however the results of its TDEO> work are more accurate. TDEO> The script looks through all the files of packages marked as executable. TDEO> That is even if the script is in /usr/share/doc and is marked as TDEO> executable it will be tested nevertheless. TDEO> The full viewing of a mirror takes a few hours. TDEO> Later I shall publish the reports on lenny (already attached) and etch. TDEO> :) TDEO> attaches: TDEO> report of lenny: http://uvw.ru/report.lenny.txt TDEO> script: http://uvw.ru/find_the_bug2.sh -- ... mpd is off . ''`. Dmitry E. Oboukhov : :’ : [EMAIL PROTECTED] `. `~’ GPGKey: 1024D / F8E26537 2006-11-21 `- 1B23 D4F8 8EC0 D902 0555 E438 AB8C 00CF F8E2 6537 signature.asc Description: Digital signature
Bug#494868: ITP: python-keyczar -- cryptographic toolkit for python
Package: wnpp Severity: wishlist Owner: Eric Evans <[EMAIL PROTECTED]> * Package name: python-keyczar Version : 05b Upstream Author : Arkajit Dey <[EMAIL PROTECTED]> * URL : http://code.google.com/p/keyczar/ * License : Apache 2.0 Programming Lang: Python Description : cryptographic toolkit for Python Keyczar is a cryptographic toolkit designed to make it easier and safer for developers to use cryptography in their applications. Keyczar supports authentication and encryption with both symmetric and asymmetric keys. Some features of Keyczar include: * A simple API * Key rotation and versioning * Safe default algorithms, modes, and key lengths * Automated generation initialization vectors and ciphertext signatures The long description is pretty much copy and paste from the project website and will require some additional work. Suggestions are welcome. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing') Architecture: i386 (i686) -- Eric Evans [EMAIL PROTECTED] signature.asc Description: Digital signature
Re: feature: to add explanations of recommendations and suggestions dependencies
* Shachar Or [Sun, 10 Aug 2008 18:36:35 +0300]: > I am not suggesting this data will be put in with the package's description, Why not? I think (briefly) explaining some of the most relevant recommends and suggests is a perfect use of the description space. And if more verbosity is needed, that information should go into the README.Debian file in my opinion. Cheers, -- Adeodato Simó dato at net.com.org.es Debian Developer adeodato at debian.org Testing can show the presence of bugs, but not their absence. -- Dijkstra -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Bug#494863: ITP: transset-df -- manager for on-the-fly transparency changing in X
On Tue, Aug 12, 2008 at 3:07 PM, Daniel Moerner <[EMAIL PROTECTED]> wrote: > transset-df is a modified version of xorg's transset and requires compositing > to function. Might be a good idea to encourage transset-df upstream to join the upstream xorg project and commit his changes there. -- bye, pabs http://wiki.debian.org/PaulWise -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
DebianPython/NewPolicy
Seems this wasn't strictly necessary according to pythonsupport's docs: *** You don't need X[BS]-Python-Version fields. You don't need *** *** debian/pycompat. You don't need to call dh_python after*** *** dh_pysupport. Just remove all of these.*** However python-central still uses them. So the DebianPython policy should be updated accordingly. See: http://wiki.debian.org/DebianPython/NewPolicy Sincerely, Henrik. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages
Dmitry E. Oboukhov wrote: > EVL>>> The idea behind libpam-tmpdir is that it creates a subdirectory of /tmp > EVL>>> that is only accessible by that user, and then sets TMPDIR and other > EVL>>> variables to that. Hence, it doesn't matter nearly as much if you > EVL>>> create a non-random filename, because nobody but you can access it. > EVL>> > EVL>> Yes, but > EVL>> scripts must use $TMPDIR instead '/tmp' or mktemp/tempfile utils :) > EVL> tempfile uses $TMPDIR by default :) > > sorry, > scripts must use $TMPDIR or _must_ _use_ mktemp/tempfile ;) Why use $TMPDIR at all? $TMPDIR may not be set (libpam-tmp may not be installed[1]), so you have to test for it. If the test fails, you have to fall back to mktemp or tempfile. As mktemp and tempfile are both essential[2], they can be relied upon. If $TMPDIR is set, it may be set to something bad, like /tmp. You can be left with the exact same problem you are trying to solve. Both mktemp and tempfile support $TMPDIR, and will fall back gracefully if $TMPDIR does not exist in the environment. My impression is that mktemp or tempfile should be used, and ignore TMPDIR anyway. If you really need a directory to write lots of files to, mktemp -d is there for you. Is there any scenario where using mktemp or tempfile fails, and sing $TMPDIR succeeds? [1] % aptitude search libpam-tmp p libpam-tmpdir - automatic per-user temporary directories [2] % aptitude show $(dpkg -S $(which mktemp tempfile) | sed 's/:.*//') | grep -E '^(Pa|E)' Package: mktemp Essential: yes Package: debianutils Essential: yes [3] I liked [2] too much to remove it. Sorry. -- John H. Robinson, IV [EMAIL PROTECTED] http WARNING: I cannot be held responsible for the above, sbih.org ( )(:[ as apparently my cats have learned how to type. spiders.html -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: feature: to add explanations of recommendations and suggestions dependencies
Le Mon, Aug 11, 2008 at 07:02:02PM -0400, Felipe Sateler a écrit : > Goswin von Brederlow wrote: > > Could they be added as XB-Comment:? I use XS-Comment and it appears in the > dsc, > I don't know if XB-* appear in the deb or elsewhere. Hi Felipe, The answer is only in the sources for the moment. http://git.debian.org/?p=dpkg/dpkg.git;a=blob;f=scripts/dpkg-gencontrol.pl;h=219b4ffacd7af3e5ee051444c49f99ff61b3ce19;hb=HEAD http://git.debian.org/?p=dpkg/dpkg.git;a=blob;f=scripts/dpkg-genchanges.pl;h=a59918f55aa72b3e204aa21f0df1bbb516300768;hb=HEAD http://git.debian.org/?p=dpkg/dpkg.git;a=blob;f=scripts/dpkg-source.pl;h=4c9f00630bbcc7fe3b8a94ff1a76fc06be90c9e0;hb=HEAD As I do not know if all the combinations allowed by the regular expressions in the above scripts are intended for use, I fail to propose a good enough documentation patch to the dpkg team. If anybody is more inspired, feel free to send your contribution to the following bug: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476335 Have a nice day, -- Charles Plessy Debian Med packaging team, Tsurumi, Kanagawa, Japan -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: feature: to add explanations of recommendations and suggestions dependencies
Charles Plessy wrote: > Le Mon, Aug 11, 2008 at 07:02:02PM -0400, Felipe Sateler a écrit : >> Goswin von Brederlow wrote: >> >> Could they be added as XB-Comment:? I use XS-Comment and it appears in the >> dsc, I don't know if XB-* appear in the deb or elsewhere. > > Hi Felipe, > > The answer is only in the sources for the moment. A quick test shows that XB-Comment: something shows as Comment: something in the deb. However, this doesn't mean that it will show up in apt-cache show. It would depend on how the Packages file is created. -- Felipe Sateler -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: feature: to add explanations of recommendations and suggestions dependencies
On Tuesday 12 August 2008 22:57, Adeodato Simó wrote: > * Shachar Or [Sun, 10 Aug 2008 18:36:35 +0300]: > > I am not suggesting this data will be put in with the package's > > description, > > Why not? I think (briefly) explaining some of the most relevant > recommends and suggests is a perfect use of the description space. And > if more verbosity is needed, that information should go into the > README.Debian file in my opinion. Of course that while there aren't data 'fields' for this purpose it would be best that maintainers put this in the description. I'm suggesting that there be fields for this purpose, specifically - a reason behind each recommend/sugggest. This would make it possible for tools to fetch this information specifically, for tools to display this information in specific locations and perhaps for the system to 'know' for what reason(s) a package is installed. > > Cheers, -- Shachar Or | שחר אור http://ox.freeallweb.org/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#494928: ITP: sflphone -- SIP and IAX2 compatible VoIP phone
Package: wnpp Severity: wishlist Owner: Francois Marier <[EMAIL PROTECTED]> * Package name: sflphone Version : 0.9.1 Upstream Author : Savoir-faire Linux <[EMAIL PROTECTED]> * URL : http://www.sflphone.org * License : GPL Programming Lang: C++ Description : SIP and IAX2 compatible VoIP phone SFLphone is a SIP/IAX2 compatible softphone for Linux. The SFLphone project's goal is to create a robust enterprise-class desktop phone. While it can serve home users very well, it is designed with a hundred-calls-a-day receptionist in mind. It features a flexible client/server architecture where the GTK client talks to the daemon through DBus and is capable of handling multiple VoIP connections at once. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Can a package modify slapd.conf in its maintainer script?
[Bastian Blank] > You know that parts of the config settings are only supported in the > legacy-format? Nope. What parts is that? > Is there documentation how to import new schemas in the new config > tree? I found http://www.zytrax.com/books/ldap/ch6/slapd-config.html>. > Also modification are only supported via the ldap protocol, who say > that root may authenticate at all? I guess root can use slapadd, but then one need to stop the LDAP server. Happy hacking, -- Petter Reinholdtsen -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages
Some people wrote to me: your script is bad, it detects qemu, but qemu is bugfree. ok, looking qemu: qemu makes mount the directory /tmp/mount.$$. Attacker creates many symlinks /tmp/dir.\d+ -> /etc and if qemu (/usr/sbin/qemu-make-debian-root) starts then /etc goes out from root directory tree. The result: system is unusable. example of script for attacker: perl -e 'symlink("/etc", "/tmp/mount.$_") for ($$ .. $$ + 1)' instead /etc attacker may select any system directory, for example /var, /usr or even /. of course I may be mistaken but I don't use qemu, sorry. -- ... mpd is off . ''`. Dmitry E. Oboukhov : :’ : [EMAIL PROTECTED] `. `~’ GPGKey: 1024D / F8E26537 2006-11-21 `- 1B23 D4F8 8EC0 D902 0555 E438 AB8C 00CF F8E2 6537 signature.asc Description: Digital signature