Re: opinions of snappy packages

2016-06-23 Thread Marco d'Itri
On Jun 22, Lars Wirzenius  wrote:

> Given that snapd therefore seems to be, in practice, only usable by
> Canonical's server, shouldn't the package be in contrib instead of
> main?
No: this was discussed the first time ~15 years ago IIRC for ICQ 
clients, and I do not think that anything has changed since then.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#827978: ITP: libfastahack -- library for indexing and sequence extraction from FASTA files

2016-06-23 Thread Andreas Tille
Package: wnpp
Severity: wishlist
Owner: Andreas Tille 

* Package name: libfastahack
  Version : 0.0+20160309
  Upstream Author : Erik Garrison 
* URL : https://github.com/ekg/fastahack
* License : GPL
  Programming Lang: C++
  Description : library for indexing and sequence extraction from FASTA 
files
 fastahack is a small application for indexing and extracting sequences and
 subsequences from FASTA files.  The included Fasta.cpp library provides a FASTA
 reader and indexer that can be embedded into applications which would benefit
 from directly reading subsequences from FASTA files.  The library automatically
 handles index file generation and use.
 .
 Features:
  * FASTA index (.fai) generation for FASTA files
  * Sequence extraction
  * Subsequence extraction
  * Sequence statistics (currently only entropy is provided)
 .
 Sequence and subsequence extraction use fseek64 to provide fastest-possible
 extraction without RAM-intensive file loading operations.  This makes fastahack
 a useful tool for bioinformaticists who need to quickly extract many
 subsequences from a reference FASTA sequence.


Remark: This package is a (pre-)pre-condition for some Debian Med target
software (freebayes).  It will be maintained at
https://anonscm.debian.org/git/debian-med/libfastahack.git



Bug#827988: ITP: apertium-eu-en -- Apertium translation data for the Basque-English pair

2016-06-23 Thread Kartik Mistry
Package: wnpp
Severity: wishlist
Owner: Kartik Mistry 

* Package name: apertium-eu-en
  Version : 0.3.1
  Upstream Author : 2008, Prompsit Language Engineering
2005-2008, Universitat d'Alacant (Transducens group)
2005-2007, IXA research group / IXA ikerkuntza taldea
2005-2007, TALP research group, Universitat Politècnica de 
Catalunya
* URL : http://www.apertium.org/
* License : GPL-2
  Programming Lang: 
  Description : Apertium translation data for the Basque-English pair

Data package providing Apertium language resources for translating
between the Basque and English languages.

 - why is this package useful/relevant? is it a dependency for
   another package? do you use it? if there are other packages
   providing similar functionality, how does it compare?

 A: Apertium Machine Translation data package for Basque-English language pair.

 - how do you plan to maintain it? inside a packaging team
   (check list at https://wiki.debian.org/Teams)? are you
   looking for co-maintainers? do you need a sponsor?

 A: debian-science team + upstream support.

-- 
Kartik Mistry | IRC: kart_
{0x1f1f, kartikm}.wordpress.com


signature.asc
Description: PGP signature


Bug#827992: ITP: phipack -- PHI test and other tests of recombination

2016-06-23 Thread Andreas Tille
Package: wnpp
Severity: wishlist
Owner: Andreas Tille 

* Package name: phipack
  Version : 0.0.20160614
  Upstream Author : David Bryant 
* URL : 
http://www.maths.otago.ac.nz/~dbryant/software/PhiPack.tar.gz
* License : LGPL
  Programming Lang: C
  Description : PHI test and other tests of recombination
 The PhiPack software package implements a few tests for recombination
 and can produce refined incompatibility matrices as well. Specifically,
 PHIPack implements the 'Pairwise Homoplasy Index', Maximum Chi2 and the
 'Neighbour Similarity Score'. The program Phi can be run to produce a
 p-value of recombination within a data set and the program profile can
 be run to determine regions exhibiting strongest evidence mosaicism.


Remark: This package is a precondition for a Debian Med package (parsnp)
and will be maintained by the Debian Med team at
   https://anonscm.debian.org/git/debian-med/phipack.git



Re: Keysigning via Video Conferencing

2016-06-23 Thread Nikolaus Rath
On Jun 23 2016, Ben Finney  wrote:
> Nikolaus Rath  writes:
>
>> But how is your policy preventing this?
>
> If you're looking for claims of “This policy will absolutely guarantee
> the malicious behaviour is impossible”, of course that's not a
> believable claim and I don't expect anyone to seriously propose that. So
> I don't know what you're fishing for.

As I said in my other email, I am wondering if the extra burden is worth
the gain in security. If everyone were to follow this procedure then the
bar to becoming a Debian developer would be raised significantly.

It seems to me that malicious activities are made a little harder, but
for a well-meaning contributor it becomes a lot harder to get
signatures.

> What *is* claimed, by my reading, is that there is significantly more
> reason to be confident in an identity that is stable over multiple
> meetings, in the same social circles, with consequential social bonds
> and interactions.

Indeed, but I'm wondering why no one even seemes to consider if this
gain in security is worth its price.

Best,
-Nikolaus


-- 
GPG encrypted emails preferred. Key id: 0xD113FCAC3C4E599F
Fingerprint: ED31 791B 2C5C 1613 AF38 8B8A D113 FCAC 3C4E 599F

 »Time flies like an arrow, fruit flies like a Banana.«



Re: Keysigning via Video Conferencing

2016-06-23 Thread Lars Wirzenius
On Thu, Jun 23, 2016 at 09:23:07AM -0700, Nikolaus Rath wrote:
> As I said in my other email, I am wondering if the extra burden is worth
> the gain in security.

Is there an extra burden? Seems to me that it'd happen naturally if
you contribute to Debian and as part of that interact with other
Debian people.

-- 
Schrödinger's backup hypothesis: the condition of any backup is
undefined until a restore is attempted. -- andrewsh


signature.asc
Description: PGP signature


Re: Vcs-* and shared repos

2016-06-23 Thread Jonas Smedegaard
Quoting Lars Wirzenius (2016-05-26 08:08:35)
> On Wed, May 25, 2016 at 10:09:47PM +0200, Stefano Zacchiroli wrote:
>> By also considering the fact that the "-d DIR" solution does not 
>> prevent to add a "-l" in the future, I think minimality wins here 
>> (hence my "Yay" to your proposal in separate mail). YMMV.
>
> My only concern here is the introduction of yet more ad hoc, custom 
> syntax into Debian data files. It's already annoying to parse such 
> files, and every addition makes things more annoying. I dream of an 
> alternative universe where Debian standardised on something like YAML 
> or JSON for its data files. RFC822 style files weren't a bad choice, 
> but I find them to be insufficiently extensible without pain.
>
> But in this reality, we've made our choice and we'll have to stick 
> with it, so go for it.

I just noticed that SPDX - whom we already align with for naming of 
license shortnames - in their specifications include VCS URL format 
which covers paths and tags:

> To specify a sub-path to a file or directory inside a repository use 
> the "#" delimiter:
> PackageDownloadLocation: git://git.myproject.org/MyProject#src/somefile.c
> PackageDownloadLocation: 
> git+https://git.myproject.org/MyProject#src/Class.java
> To specify branch names, a commit hash or a tag name, use the "@" 
> delimiter:
> PackageDownloadLocation: git://git.myproject.org/MyProject.git@master
> PackageDownloadLocation: git+https://git.myproject.org/MyProject.git@v1.0
> PackageDownloadLocation: 
> git://git.myproject.org/MyProject.git@da39a3ee5e6b4b0d3255bfef95601890afd80709
> Sub-paths and branch names or commit hash can be combined too:
> PackageDownloadLocation: 
> git+https://git.myproject.org/MyProject.git@master#/src/MyClass.cpp
> PackageDownloadLocation: 
> git+https://git.myproject.org/MyProject@da39a3ee5e6b4b0d3255bfef95601890afd80709#lib/variable.rb

Found in section 3.7.5 of SPDX 2.0 PDF, located at
http://spdx.org/SPDX-specifications/spdx-version-2.0

 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private


signature.asc
Description: signature


Re: Keysigning via Video Conferencing

2016-06-23 Thread Jakub Wilk

* Nikolaus Rath , 2016-06-23, 09:23:
I am wondering if the extra burden is worth the gain in security. If 
everyone were to follow this procedure then the bar to becoming a 
Debian developer would be raised significantly.


As as data point, if everybody[0]'s key signing policy had been that 
establishing "social bonds" was a prerequisite, I would have almost 
certainly never become a DD.



[0] And by "everybody" I mean that one developer that happened to live 
in the same big city as me.


--
Jakub Wilk



Re: Keysigning via Video Conferencing

2016-06-23 Thread Peter Colberg
On Thu, Jun 23, 2016 at 07:30:42PM +0200, Jakub Wilk wrote:
> As as data point, if everybody[0]'s key signing policy had been that
> establishing "social bonds" was a prerequisite, I would have almost
> certainly never become a DD.

I would like to add another data point as a recent DM. The union of
the DDs I have worked with and the DDs that were kind enough to meet
with me for key signing on their travel through my city is an empty
set. I think that Gunnar’s policy is perfectly fine. At the same time
I am glad that there are DDs who allow the Debian community to be an
open system.

I am considering to participate in a DebConf eventually (since I have
read so many positive posts about the experience), but to me it is
important to get work done in Debian first and see whether I am in it
for the long run, before spending time and resources on travel to a
potentially faraway destination.

Peter


signature.asc
Description: PGP signature


Re: Keysigning via Video Conferencing

2016-06-23 Thread Peter Colberg
On Thu, Jun 23, 2016 at 02:39:52PM -0400, Peter Colberg wrote:
> The union of the DDs I have worked with and the DDs that were kind
> enough to meet with me for key signing on their travel through my
> city is an empty set.

How embarrassing: I meant the intersection, of course.

Peter


signature.asc
Description: PGP signature


Neomutt packages available

2016-06-23 Thread Elimar Riesebieter
Hi all,

I am pleased to announce the availability of neomutt [0] packages for
Debian. Hints for installation you'll find at [1].

I've packaged neomutt for Debian. A Debian ITP [2] is filed. The
binaries are build in a sid environment. The sources are fetched
from [3]. The neomutt branch is used. I'll update packages as
needed. Please test the packages and let me know of any further
glitches you find. If you want, you can open an issue on [3]. The
Debian Bug Tracking System is not involved as the package isn't
uploaded yet, but will be soon.

Thanks in advance for your cooperation

Elimar

[0] http://www.neomutt.org/
[1] http://www.lxtec.de/debarchiv
[2] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=825821
[3] https://github.com/neomutt/neomutt

-- 
  The path to source is always uphill!
-unknown-



Re: Keysigning via Video Conferencing

2016-06-23 Thread Michael Lustfield
On Thu, Jun 23, 2016 at 9:28 AM, Lars Wirzenius  wrote:

> On Thu, Jun 23, 2016 at 09:23:07AM -0700, Nikolaus Rath wrote:
> > As I said in my other email, I am wondering if the extra burden is worth
> > the gain in security.
>
> Is there an extra burden? Seems to me that it'd happen naturally if
> you contribute to Debian and as part of that interact with other
> Debian people.
>

I would consider this an extra burden, yes. I've been playing with Linux
for over a decade, have many DD's that know me by IRC handle, email
address, and nothing else; a face to face meeting has never happened
organically. The one time in my life I found a DD to sign my key, I had to
schedule a time where work conveniently had me within an hour drive (one
way) of that person. I would, personally, consider having an established
relationship with someone you can recognize the face of because of
face-to-face meetings as a bonus. It would allow you to feel comfortable
verifying identity over a video conference. Just a bonus, though, I
wouldn't ever make that my requirement.

What is it we're really trying to protect against? Signing a key doesn't
mean you trust that person's work, it means you trust that person is who
they say they are. We want to prevent an evil doer from getting a key into
the keyring by pretending to be someone else. We have a completely
different process for establishing trust of a persons work and that's all
outlined in the DM/DD application process. Our face-to-face meeting and
chat is a way to see if their government says they are who they claim to be.

Obviously, documents can be forged. You can ask what forms of ID they'll be
bringing and use the search-o-matic to figure out signs of a counterfeit,
but almost nobody is going to have the equipment to fully check every type
of ID. Verifying a legal identity by means that are good enough for other
organizations is only the first step in our identification process. Next
up, we take the piece of paper home and start our own extended verification
process (typos, existing work, etc.) followed by sending that encrypted
signature back to the user via email (an address you should have verified
has no typos) where the user needs to decrypt with their private key.

I believe there's a document out there called Trusting Trust which
discusses drawing a line between what is and is not practical. We trust C
developers to not create bugs that introduce authentication back-doors
during future builds. Why? Because, even if we /could/ read through the C
source and review everything that's changing, we're still not going to
catch everything for the same reason that bugs exist in the first place.
Heck, we can't keep bugs out of our applications written in C even assuming
C itself is entirely bug free.

The point I'm attempting to make is that it's not practical to check every
anti-forgery feature of every document. It's not (always) practical to
verify an identity based on a long history of in-person interactions.
Meeting someone, checking the features that don't require special
equipment, having a chat with them, verifying no typos exist, and looking
at existing work signed by that key, and sending an encrypted signature to
that address is what we have decided is practical.

Is this not why we require DD signatures in the first place? We're trusting
that all DD's have put in enough effort to ensure the identity of every key
they've signed. Kinda like being an op in a #debian* IRC channel; you're
automatically held to a higher standard when accepting the role. I feel
like the established policies do a good job of meeting in the middle of the
two extremes that have been discussed. We're trusting all DD's to follow
the policies that have been decided on as the practical line. If a few DD's
choose to adhere to a higher standard, so-be-it, but a lower standard
should be avoided. I know DD's that trust something signed with my key is
me. None of them will sign my key because they've never met me. It would be
concerning if they were willing to because it reduces the overall integrity
of the Debian project.

Somewhere, I saw it mentioned that you should be able to verify based on
history only and their legal name doesn't matter. I don't entirely
disagree. The chances of the NSA building a super computer to contribute to
Debian, become a DD, and add backdoors into unwatched packages are pretty
low. However, this does create hurdles for someone that has left the
project under poor circumstances to build a new identity that they use to
harm the project. It's also comforting to imagine every DD/DM is real
person, just like the rest of us, and is the person they claim to be.


tl;dr -- +1 existing policies :)


Re: Keysigning via Video Conferencing

2016-06-23 Thread Nikolaus Rath
On Jun 23 2016, Lars Wirzenius  wrote:
> On Thu, Jun 23, 2016 at 09:23:07AM -0700, Nikolaus Rath wrote:
>> As I said in my other email, I am wondering if the extra burden is worth
>> the gain in security.
>
> Is there an extra burden? Seems to me that it'd happen naturally if
> you contribute to Debian and as part of that interact with other
> Debian people.

No. At least my interactions with other Debian contributors have
exclusively been online - with the exception of brief meetings for key
signing purposes.


Best,
-Nikolaus

-- 
GPG encrypted emails preferred. Key id: 0xD113FCAC3C4E599F
Fingerprint: ED31 791B 2C5C 1613 AF38 8B8A D113 FCAC 3C4E 599F

 »Time flies like an arrow, fruit flies like a Banana.«



Re: Keysigning via Video Conferencing

2016-06-23 Thread Jonas Smedegaard
Quoting Peter Colberg (2016-06-23 20:39:52)
> On Thu, Jun 23, 2016 at 07:30:42PM +0200, Jakub Wilk wrote:
>> As as data point, if everybody[0]'s key signing policy had been that 
>> establishing "social bonds" was a prerequisite, I would have almost 
>> certainly never become a DD.
>
> I would like to add another data point as a recent DM. The union of 
> the DDs I have worked with and the DDs that were kind enough to meet 
> with me for key signing on their travel through my city is an empty 
> set. I think that Gunnar’s policy is perfectly fine. At the same time 
> I am glad that there are DDs who allow the Debian community to be an 
> open system.
>
> I am considering to participate in a DebConf eventually (since I have 
> read so many positive posts about the experience), but to me it is 
> important to get work done in Debian first and see whether I am in it 
> for the long run, before spending time and resources on travel to a 
> potentially faraway destination.

I sign keys by a similar policy as Gunnar, it seems.  But I do sign also 
people I have not met before...

The logic I use is that I should be able to re-identify later.  If I 
meet the person later I might have forgotten their name (I easily do) 
but if they remind me and tie it to something we talked about or did 
together, I should go "Ahhh!" rather than "hmmm".

It is a balancing act.  Easiest is to only trust your mother and very 
close friends through many years, but you also want to expand the web of 
trust (and maybe also social circles, but that is a _different_ matter).

I think what can help here is expiry time on signatures: If my gut 
feeling says that the person I've discussed perl with for an hour does 
not really etch into my brain that efficiently, and I worry if we bump 
into each other, say 3 years from now, then I would've forgotten who it 
is.  What I then do is sign but with an expiry of the key of 1-2 years.

Expiry on signatures is relatively new to me, however, so I welcome 
input on how that is sensible or not.  And also on how to eventually 
extend the lifespan.
 
 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private


signature.asc
Description: signature


Re: Keysigning via Video Conferencing

2016-06-23 Thread Lars Wirzenius
On Thu, Jun 23, 2016 at 12:52:35PM -0700, Nikolaus Rath wrote:
> On Jun 23 2016, Lars Wirzenius  wrote:
> > On Thu, Jun 23, 2016 at 09:23:07AM -0700, Nikolaus Rath wrote:
> >> As I said in my other email, I am wondering if the extra burden is worth
> >> the gain in security.
> >
> > Is there an extra burden? Seems to me that it'd happen naturally if
> > you contribute to Debian and as part of that interact with other
> > Debian people.
> 
> No. At least my interactions with other Debian contributors have
> exclusively been online - with the exception of brief meetings for key
> signing purposes.

Why do you bring up in-person meetings all the time? I never suggested
they're necessary.

But never mind. You keep doing things as you have, and I'll keep doing
what I have.

-- 
Schrödinger's backup hypothesis: the condition of any backup is
undefined until a restore is attempted. -- andrewsh


signature.asc
Description: PGP signature


Re: Keysigning via Video Conferencing

2016-06-23 Thread Jonas Smedegaard
Quoting Michael Lustfield (2016-06-23 21:27:15)
> Somewhere, I saw it mentioned that you should be able to verify based 
> on history only and their legal name doesn't matter. I don't entirely 
> disagree. The chances of the NSA building a super computer to 
> contribute to Debian, become a DD, and add backdoors into unwatched 
> packages are pretty low. However, this does create hurdles for someone 
> that has left the project under poor circumstances to build a new 
> identity that they use to harm the project. It's also comforting to 
> imagine every DD/DM is real person, just like the rest of us, and is 
> the person they claim to be.

Beare not to confuse matters:

PGP signing do *not* imply judgement of social intent or coding skills!

PGP signing is *only* about identification.

Only when reliable identification is established can we on top of that - 
but _separately_ from the identification, do e.g. endorsements.

When I sign keys of others, I insist on spending time with them first, 
but only to try memorize them for a later "lineup", not to judge their 
skills or attitude or political agenda.  I would sing the key of a 
complete lunatic, if only I felt confident that I could reasonably 
reliably identify that person again later.


 - Jonas

P.S. Probably not a _complete_ lunatic: If I get the impression that the 
person is incapable of handling PGP signing properly, then I will also 
not sign: If e.g. they handle their secret material too sloppily then 
others might too easily get hold of it and impersonate as them, 
effectively leading me unable to re-identify later (I would fail at 
recognizing the impersonator!).

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private


signature.asc
Description: signature


Re: Keysigning via Video Conferencing

2016-06-23 Thread james

Hello Everyone,

Sorry to interject in this matter however it is beginning to become 
repetitive. PGP Key Signing for New Members is purely an identification 
process, to prove that you are who you say you are. This provides the 
Debian Foundation with the assurance that you can be trusted monitoring 
their infrastructure, uploading packages and performing other roles 
throughout the foundation. Therefore providing proof that you have the 
skills to become a Debian Developer is obsolete in this part of the 
process.


If a Debian Developer is to sign your key, they will need to be familiar 
with you, have formal identification (not just photographs) and also 
have the ability to provide proof, if asked that you are who you claim 
to be. The process will not go any other way and you can't attempt to 
circumnavigate the inevitable fact that you cannot have your key signed 
online. Try to find a Debian Developer close to your location, 
preferably someone familiar with you and begin to converse and identify 
yourself. I myself are a New Member hoping to become a Debian Developer 
however I will follow the correct procedures to ensure I am correctly 
identified.


This conversation should be brought to a climax at this point 
considering we have established that you will need to find a Debian 
Developer to identify yourself, as opposed to looking online for a 
Debian Developer who is a willing party (All of which will deny your 
request). Again, find a DD who is close to you and if you can't, look 
slightly further away. This process is well documented on the Debian 
Developer/New Member forums and information pages and in addition, the 
Front Desk will check your application and signed keys with the DD's who 
signed your keys to ensure the process has been completed correctly.


I must apologise and this may be frustrating for you however I don't see 
any exceptions that can be made to aid this issue, I hope you 
understand. Sorry for the inconvenience this may cause, also if you 
believe that anything in this email is incorrect, my apologies. Thanks 
for reading. Have a nice day!


Thanks in advance,

James Gallagher



Work-needing packages report for Jun 24, 2016

2016-06-23 Thread wnpp
The following is a listing of packages for which help has been requested
through the WNPP (Work-Needing and Prospective Packages) system in the
last week.

Total number of orphaned packages: 741 (new: 3)
Total number of packages offered up for adoption: 174 (new: 1)
Total number of packages requested help for: 48 (new: 0)

Please refer to http://www.debian.org/devel/wnpp/ for more information.



The following packages have been orphaned:

   agg (#827993), orphaned today
 Description: AntiGrain Geometry graphical toolkit
 Installations reported by Popcon: 193

   blockfinder (#827652), orphaned 4 days ago
 Description: enumerates network information for countries
 Installations reported by Popcon: 18

   cplay (#827890), orphaned yesterday
 Installations reported by Popcon: 161

738 older packages have been omitted from this listing, see
http://www.debian.org/devel/wnpp/orphaned for a complete list.



The following packages have been given up for adoption:

   pyzor (#827500), offered 6 days ago
 Description: spam-catcher using a collaborative filtering network
 Installations reported by Popcon: 2199

173 older packages have been omitted from this listing, see
http://www.debian.org/devel/wnpp/rfa_bypackage for a complete list.



For the following packages help is requested:

   athcool (#278442), requested 4258 days ago
 Description: Enable powersaving mode for Athlon/Duron processors
 Installations reported by Popcon: 26

   awstats (#755797), requested 701 days ago
 Description: powerful and featureful web server log analyzer
 Installations reported by Popcon: 4172

   balsa (#642906), requested 1733 days ago
 Description: An e-mail client for GNOME
 Reverse Depends: balsa-dbg
 Installations reported by Popcon: 624

   cardstories (#624100), requested 1886 days ago
 Description: Find out a card using a sentence made up by another
   player
 Installations reported by Popcon: 5

   courier (#823807), requested 45 days ago
 Reverse Depends: courier-faxmail courier-filter-perl courier-imap
   courier-imap-ssl courier-ldap courier-mlm courier-mta
   courier-mta-ssl courier-pcp courier-pop (7 more omitted)
 Installations reported by Popcon: 2258

   cups (#532097), requested 2574 days ago
 Description: Common UNIX Printing System
 Reverse Depends: bluez-cups boomaga chromium
   cinnamon-settings-daemon cloudprint cups cups-backend-bjnp
   cups-browsed cups-bsd cups-client (62 more omitted)
 Installations reported by Popcon: 169012

   cyrus-sasl2 (#799864), requested 274 days ago
 Description: authentication abstraction library
 Reverse Depends: 389-ds-base 389-ds-base-libs 389-dsgw adcli
   autofs-ldap cairo-dock-mail-plug-in claws-mail
   claws-mail-acpi-notifier claws-mail-address-keeper
   claws-mail-archiver-plugin (130 more omitted)
 Installations reported by Popcon: 190077

   developers-reference (#759995), requested 663 days ago
 Description: guidelines and information for Debian developers
 Installations reported by Popcon: 19170

   devscripts (#800413), requested 268 days ago
 Description: scripts to make the life of a Debian Package maintainer
   easier
 Reverse Depends: apt-build apt-listdifferences aptfs arriero
   bzr-builddeb customdeb debci debian-builder debmake debpear (28 more
   omitted)
 Installations reported by Popcon: 13075

   ejabberd (#767874), requested 598 days ago
 Description: distributed, fault-tolerant Jabber/XMPP server written
   in Erlang
 Reverse Depends: ejabberd-contrib ejabberd-mod-cron
   ejabberd-mod-log-chat ejabberd-mod-logsession ejabberd-mod-logxml
   ejabberd-mod-message-log ejabberd-mod-muc-log-http
   ejabberd-mod-post-log ejabberd-mod-rest ejabberd-mod-s2s-log (3 more
   omitted)
 Installations reported by Popcon: 759

   fbcat (#565156), requested 2353 days ago
 Description: framebuffer grabber
 Installations reported by Popcon: 214

   fgetty (#823266), requested 52 days ago
 Description: console-only getty & login (issue with nis)
 Installations reported by Popcon: 2113

   freeipmi (#628062), requested 1855 days ago
 Description: GNU implementation of the IPMI protocol
 Reverse Depends: conman freeipmi freeipmi-bmc-watchdog
   freeipmi-ipmidetect freeipmi-ipmiseld freeipmi-tools ipmitool
   libfreeipmi-dev libfreeipmi16 libipmiconsole-dev (7 more omitted)
 Installations reported by Popcon: 6553

   freerdp (#799759), requested 275 days ago
 Description: RDP client for Windows Terminal Services (X11 client)
 Reverse Depends: freerdp-x11 freerdp-x11-dbg libfreerdp-cache1.1
   libfreerdp-client1.1 libfreerdp