On 2/21/2018 8:29 PM, Jude DaShiell wrote:
I found out, those firmware images aren't seeded for very long at all so
effectively go away quickly.
I was mistaken thinking since the file name was on that site it would
have torrent support until either removed or replaced.
The files look the sam
01:35:58
From: john doe
To: debian-accessibility@lists.debian.org
Subject: Re: debian unofficial website hacked
Resent-Date: Fri, 9 Feb 2018 06:36:14 + (UTC)
Resent-From: debian-accessibility@lists.debian.org
On 2/8/2018 9:06 PM, Jude DaShiell wrote:
https://cdimage.debian.org/cdimage/unoff
E80D 6294 BE9B
If it does not work please post the commands used and the output of
those commands.
Note that my mailer might fold this e-mail.
On Thu, 8 Feb 2018, john doe wrote:
Date: Thu, 8 Feb 2018 14:03:40
From: john doe
To: debian-accessibility@lists.debian.org
Subject: Re: debian unoffi
https://cdimage.debian.org/cdimage/unofficial/non-free/cd-including-firmware/buster_di_alpha2/amd64/bt-dvd/
On
Thu, 8 Feb 2018, john doe wrote:
Date: Thu, 8 Feb 2018 14:03:40
From: john doe
To: debian-accessibility@lists.debian.org
Subject: Re: debian unofficial website hacked
Resent-Date
On 2/8/2018 8:03 PM, john doe wrote:
On 2/8/2018 7:54 PM, Jude DaShiell wrote:
Yes, I imported the debian signing key and I have MD5SUMS and
MD5SUMS.sign sha256SUMS SHA256SUMS.sign SHA512SUMS and SHA512SUMS.sign
SHA1SUMS SHA1SUMS.sign.
From which URL did you get the files?
For testing
Feb 2018 07:12:27
From: john doe
To: debian-accessibility@lists.debian.org
Subject: Re: debian unofficial website hacked
Resent-Date: Thu, 8 Feb 2018 12:12:39 + (UTC)
Resent-From: debian-accessibility@lists.debian.org
On 2/8/2018 12:34 PM, Jude DaShiell wrote:
running gpg --verify *.sign on
b disk and the
computer is old enough it doesn't know anything about uefi.
On Thu, 8 Feb 2018, john doe wrote:
Date: Thu, 8 Feb 2018 07:12:27
From: john doe
To: debian-accessibility@lists.debian.org
Subject: Re: debian unofficial website hacked
Resent-Date: Thu, 8 Feb 2018 12:12:39 +00
: Re: debian unofficial website hacked
Resent-Date: Thu, 8 Feb 2018 12:12:39 + (UTC)
Resent-From: debian-accessibility@lists.debian.org
On 2/8/2018 12:34 PM, Jude DaShiell wrote:
running gpg --verify *.sign on all sign files found where debian-buster is
downloaded returns bad key and [unknown
On 2/8/2018 12:34 PM, Jude DaShiell wrote:
running gpg --verify *.sign on all sign files found where debian-buster
is downloaded returns bad key and [unknown] on those files. I think the
website has got dirty.
- Did you import the Debian signing key?
- Which files did you verify (URL used,
running gpg --verify *.sign on all sign files found where debian-buster is
downloaded returns bad key and [unknown] on those files. I think the
website has got dirty.
--
10 matches
Mail list logo