y the URL and
ST> the picture in the middle, and write the new QR code with the picture?
netpbm or gimp or the like along with the existing qr software should be
enough. so deb almost certainly does have sufficient tools to round-trip
them along with an edit to the url.
-JimC
--
James Cloos OpenPGP: 0x997A9F17ED7DAEA6
(1) is the only thing I've ever used to look inside a deb(5) file.
-JimC
--
James Cloos OpenPGP: 0x997A9F17ED7DAEA6
is fine.
-JimC
--
James Cloos OpenPGP: 0x997A9F17ED7DAEA6
that was
done a fresh install would fail due to unmatched dependencies.
Beyond those details my memory of it is too fuzzy.
-JimC
--
James Cloos OpenPGP: 0x997A9F17ED7DAEA6
The points I made at the end of my last note about methods which might
avoid such things in the future remain on point.
-JimC
--
James Cloos OpenPGP: 0x997A9F17ED7DAEA6
e effect that new versions of the
dependencies would have on their other reverse-dependencies?)
Guaranteeing that certbot and python-acme updates will not require new
dependencies probably would help on that front.
-JimC
--
James Cloos OpenPGP: 0x997A9F17ED7DAEA6
ie-apache
The jessie and jessie-backports releases of certbot have not, in
general, been usable. There have been usable windows, but it has not
been continuous.
Forcing stretch uses into a similar situation would be counter-productive.
-JimC
--
James Cloos OpenPGP: 0x997A9F17ED7DAEA6
Is anyone keeping track of when the various packages which depend on
openssl expect to upload versions compiled against 1.1?
I'd like to take advantage of x25519 and chacha20-poly1305 for various
tls-using servers...
-JimC
--
James Cloos OpenPGP: 0x997A9F17ED7DAEA6
ult whenever it sees /proc/vz.
This would be similar to the libc6-i686:i386, libc-xen and libc-pic
packages (and any others that I missed).
Given that it is already done for xen guests, it shouldn't be an issue
also to do so for openvz guests.
[Appologies for being slow to respond; 4.4-rc4 proved much less stable
than rc3 on my workstation.]
-JimC
--
James Cloos OpenPGP: 0x997A9F17ED7DAEA6
drop them if libc6 is held on 2.19.
Is there another option to avoid the breakage?
-JimC
--
James Cloos OpenPGP: 0x997A9F17ED7DAEA6
shared, yes?
(Containers and the like might prevent that, but otherwise...)
-JimC
--
James Cloos OpenPGP: 0x997A9F17ED7DAEA6
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
l as its own
sfd format, so onecan argue that it is close enough to preferred src
format.
So it seems they are already dfsg-free, even without a dfsg-free release
of adfko, yes?
Or did I miss something which fontforge and/or fonttools cannot yet
accomplish?
-JimC
--
James Cloos OpenPGP: 0
essure from the larger code segments overwhelms any benefit
from reduced prediction pressure.
They may exist. But I didn't find any.
I only tested (or could test) on my K10.
-JimC
--
James Cloos OpenPGP: 0x997A9F17ED7DAEA6
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
d -ftree-partial-pre -ftree-vectorize
-fpredictive-commoning -fvect-cost-model -frename-registers
-floop-interchange -floop-strip-mine -floop-block
The last three (-floop-*) apply only when the graphite extensions are
compiled into gcc (as I do). They are no-ops otherwise.
Empirically, on x86_64 at le
27;s README.Debian,
and probably in the image's metadata.
-JimC
--
James Cloos OpenPGP: 0x997A9F17ED7DAEA6
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/m3ha4v3sld@carbon.jhcloos.org
both devs
packaging 'ware which wants verified dns lookups and those reading
though package deps. (Where deps includes recommends and suggests.)
And a local /verifier/ is generally a more important requirement
than just a local resolver.
-JimC
--
James Cloos OpenPGP: 1024D/ED7
tls-devel about it.
And one to postfix-devel suggesting that if the tls nego fails just
after offering a client cert, that it retry w/o the client cert.
I've worked around the problem locally by offering a different cert
when sending mail.
-JimC
--
James Cloos OpenPGP: 1024D/ED7DAEA
referenced URI is that gnutls refuses to tolerate
a less secure DH key size. Here, gnutls refuses to tolerate a less
secure hash algorithm.
It should be possible to use smtp_tls_policy_maps to disable sending a
client cert for the affected host(s).
-JimC
--
James Cloos OpenPGP: 1024D/E
r it on a cloud server with debugging turned up and
get a more detailed debug log.
Which release does buxtehude run? Wheezy?
-JimC
--
James Cloos OpenPGP: 1024D/ED7DAEA6
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/m3txhp4xtl@carbon.jhcloos.org
deb's ca,
and -- according to their certs -- hang out with Luggage et alia. :)
-JimC
--
James Cloos OpenPGP: 1024D/ED7DAEA6
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/m3zjrh4z90@carbon.jhcloos.org
os.com", Issuer "CA Cert Signing Authority" (not verified))
by bendel.debian.org (Postfix) with ESMTPS id 026175B
for ; Thu, 12 Sep 2013 00:15:39 + (UTC)
Some verify it.
Buxtehude is the first so far to drop the socket as soon as it sees it.
-JimC
--
James Cloos Op
e tls handshake still fails, but postfix continues on w/o tls.
(It is /oportunistic/ tls, in that case.)
This seems to be an openssl vs exim issue.
I'm sending this here to confirm whether the @deb MXs work
-JimC
--
James Cloos OpenPGP: 1024D/ED7DAEA6
--
To UNSUBSCRIBE, email
Humble suggestion:
Sort the bug list (sort -k2 would be great) to make it easier to read
through the list and to find packages which might interest one.
It is a very useful report; a sort by package name would make it better.
-JimC
--
James Cloos OpenPGP: 1024D/ED7DAEA6
--
To
909 all helper programs for debian/rules
-JimC
--
James Cloos OpenPGP: 1024D/ED7DAEA6
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/m361z8dfdr@carbon.jhcloos.org
net-dns/dnssec-root package which
installs /etc/dnssec/root-anchors.txt and .xml. That would be
a good precedent to follow.
-JimC
--
James Cloos OpenPGP: 1024D/ED7DAEA6
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Troubl
s in /etc/insserv/overrides/ for just this use case.
Good to know,
Thanks.
-JimC
--
James Cloos OpenPGP: 1024D/ED7DAEA6
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.
cause something is installed
doesn't mean one wants it always to run.)
-JimC
--
James Cloos OpenPGP: 1024D/ED7DAEA6
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: htt
efore the checksums are calculated. Ie, the package manager has to do it.
-JimC
--
James Cloos OpenPGP: 1024D/ED7DAEA6
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/m3sjixb6yp@carbon.jhcloos.org
28 matches
Mail list logo