Thanks, Salvatore.
It took a while to get that version installed with no internet on that
kernel, but I got there.
It has fixed the issue. So, I assume that version will roll into future
Stable releases.
Regards, Pete
> Yeah, sorry, there should be --export.
>
Great!
gpg --no-default-keyring --export --keyring /etc/apt/trusted.gpg >
/etc/apt/trusted.gpg.new
fixed the problem. I now need to decide whether I should nuke and pave.
The only question that remains is: how did this happen? There must be an
issue lu
> That's your problem. Run
>
> gpg --no-default-keyring --keyring /etc/apt/trusted.gpg >
> /etc/apt/trusted.gpg.new
> mv /etc/apt/trusted.gpg.new /etc/apt/trusted.gpg
>
> To convert the keybox file back to a key ring.
>
>
The gpg command hangs. If I issue it without the pipe I get:
gpg: Go ah
> ... In the gmail web UI,
> you click on the three dots and then move your cursor to the position
> where you want to start writing (I actually forgot to add this to the
> previous email...).
>
OK. I'm not a fan of a UI where the same element does very different
things. In the past there was a
5-24 20:21:01.468603835 +1000
Modify: 2017-05-29 17:45:53.533125958 +1000
Change: 2017-05-29 17:45:53.533125958 +1000
Birth: -
So, it doesn't look like the issue?
Thanks, Pete
On 26 May 2017 at 19:51, Julian Andres Klode wrote:
> On Fri, May 26, 2017 at 06:21:23PM +1000, Peter Miller
m. I understand I am using Testing, but there
must be a way out of here.
Regards, Pete Miller
On 25 May 2017 at 21:33, Julian Andres Klode wrote:
> On Thu, May 25, 2017 at 08:23:34PM +1000, Peter Miller wrote:
> > Julian,
> >
> > There is no such thing as perfect security. I was
deal with legal property ownership, so I
appreciate matching effort to risk.
Thanks, Pete
On 25 May 2017 at 19:00, Julian Andres Klode wrote:
> On Thu, May 25, 2017 at 06:49:31PM +1000, Peter Miller wrote:
> > David,
> >
> > Thanks for your time on this. I am surprised that th
David,
Thanks for your time on this. I am surprised that the answer to this issue
is a re-install: it's only the keys that are corrupt somehow, and I am
surprised there is not a simple way to fix this. I have an unusual setup
with a mirrored ZFS pool as my home directory, so I'm a little
apprehens
Julian,
I thought doing one update might fix the issue, since nothing else was
working, hence --allow-unauthenticated.
I did not install or update anything in /etc/apt/trusted.gpg.d, or anywhere
else similar, so how did it get corrupted? Is there a source issue? Are
there automated checks after d
bably doesn't have /proc
mounted. I will add a check for this in the test.
--
Peter Miller
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
On Sat, 2012-03-03 at 13:17 +, Neil Williams wrote:
> Having a test suite which is dependent on the architecture-dependent
> configuration of the running kernel is going to be permanently
> problematic in a Debian buildd infrastructure...
As I learn of these issues I fix them, to the extent t
fixed in version 0.24
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
eful information in the mount table,
or not.
> How exactly do you manage to build this on your own but make it fail
> on most other machines?
Because each Linux architecture, as seen from the perspective of this
library, is actually different. I am not intentionally "making it
fail&q
On Wed, 2009-06-10 at 08:27 +1000, Peter Miller wrote:
> On Tue, 2009-06-09 at 14:24 +0200, Christoph Berg wrote:
>
> > This is not your key.
On further checking, I'm not sure what you are telling me.
That key is what gpg --armor --export D0EDB64D reports,
and D0EDB64D is most
gpg --armor --export D0EDB64D > D0EDB64D.pub
That is definitely my public key.
--
Regards
Peter Miller
/\/\*http://miller.emu.id.au/pmiller/
PGP public key ID: 1024D/D0EDB64D
fingerprint = AD0A C5DF C426 4F03 5D53 2BDB 18D8 A4E2 D0ED B64D
See http://www.keyserver.net or any PGP keys
--
Regards
Peter Miller
/\/\*http://miller.emu.id.au/pmiller/
PGP public key ID: 1024D/D0EDB64D
fingerprint = AD0A C5DF C426 4F03 5D53 2BDB 18D8 A4E2 D0ED B64D
See http://www.keyserver.net or any PGP keyserver for public key.
Comment: Add Peter Miller as a Debian Maintainer
Date: Tue
Package: debian-maintainers
Version: 1.54ubuntu1
Severity: normal
new DM application for Peter Miller
-- System Information:
Debian Release: 5.0
APT prefers jaunty-updates
APT policy: (500, 'jaunty-updates'), (500, 'jaunty-security'), (500,
'jaunty-backports')
likely alternatives in error messages. Fuzzy
comparisons for byte arrays, wide character strings, and
multi-byte character strings are also available. In addition,
there are integer alternatives for systems with slow floating
point emulation.
--
Regards
Peter Miller
Peter Miller <[EMAIL PROTECTED]>
License: LGPL
Packages built on Ubuntu Intrepid: http://libexplain.sourceforge.net/
Regards
Peter Miller <[EMAIL PROTECTED]>
/\/\*http://miller.emu.id.au/pmiller/
PGP public key ID: 1024D/D0EDB64D
fingerprint = AD0A C5DF C426 4F03 5D53 2BDB 18
s being built via
aegis, or packages being build outside Aegis' control? Either way, what
files are involved?
> A patch is below.
Thanks. It will be in the 4.22 release.
--
Regards
Peter Miller <[EMAIL PROTECTED]>
/\/\*http://www.canb.auug.org.au/~millerp/
PGP publ
20 matches
Mail list logo