Hi,
The next point release for "bookworm" (12.10) is scheduled for Saturday,
March 15th 2025. Processing of new uploads into bookworm-proposed-updates
will be frozen during the preceding weekend.
--
Jonathan Wiltshire j...@debian.org
Debian
Hi,
As previously advised, the next point release for "bookworm" (12.9) is
scheduled for Saturday, January 11th 2025. Processing of new uploads into
bookworm-proposed-updates will be frozen during the preceeding (i.e.
coming) weekend.
--
Jonathan Wiltshire
due course.
--
Jonathan Wiltshire j...@debian.org
Debian Developer http://people.debian.org/~jmw
4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51
ed25519/0x196418AAEB74C8A1: CA619D65A72A7BADFC96D280196418AAEB74C8A1
Hi,
The next and final point release for "bullseye" (11.11) is scheduled for
Saturday, August 31st. Processing of new uploads into
bullseye-proposed-updates will be frozen during the preceeding weekend.
--
Jonathan Wiltshire j...@debian.org
Debian
Hi,
The next point release for "bookworm" (12.7) is scheduled for Saturday,
August 31st. Processing of new uploads into bookworm-proposed-updates will
be frozen during the preceeding weekend.
--
Jonathan Wiltshire j...@debian.org
Debian
Package: ftp.debian.org
Severity: normal
User: ftp.debian@packages.debian.org
Usertags: remove
X-Debbugs-Cc: debian-security@lists.debian.org, j...@debian.org
salt was removed from oldstable in 11.10 and needs cleaning up from the
security repo please.
Thanks,
Package: ftp.debian.org
Severity: normal
User: ftp.debian@packages.debian.org
Usertags: remove
X-Debbugs-Cc: debian-security@lists.debian.org, j...@debian.org
snort was removed from oldstable in 11.10 and needs cleaning up from the
security repo please.
Thanks,
On Wed, Jun 12, 2024 at 09:11:32PM +0100, Jonathan Wiltshire wrote:
> The next point release for "bullseye" (11.10) is scheduled for Saturday,
> February 10th. Processing of new uploads into bullseye-proposed-updates
> will be frozen during the preceding weekend.
The correc
cipated in approximately two months time, after which
"bullseye" will adopted by the LTS team.
--
Jonathan Wiltshire j...@debian.org
Debian Developer http://people.debian.org/~jmw
4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3
Hi,
The next point release for "bookworm" (the delayed 12.6 release) is
scheduled for Saturday, 29th June 2024. Processing of new uploads into
bookworm-proposed-updates will be frozen during the preceding weekend.
--
Jonathan Wiltshire j...@debian.
Hi,
The next point release for "bookworm" (12.6) is scheduled for Saturday,
April 6th. Processing of new uploads into bookworm-proposed-updates will be
frozen during the preceeding weekend.
--
Jonathan Wiltshire j...@debian.org
Debian
On Fri, Sep 01, 2023 at 05:57:20PM +0100, Jonathan Wiltshire wrote:
> The next point releases for "bookworm" (12.2) and "bullseye" (11.8) will
> take place on Saturday, October 7th 2023. Processing of new uploads into
> the relevant queues will be frozen the preceding
The next point releases for "bookworm" (12.2) and "bullseye" (11.8) will
take place on Saturday, October 7th 2023. Processing of new uploads into
the relevant queues will be frozen the preceding weekend.
--
Jonathan Wiltshire j...@debian.
On Wed, Jun 28, 2023 at 08:24:31PM +0100, Jonathan Wiltshire wrote:
> The first point release for "bookworm" (12.1) is scheduled for Saturday,
> July 22nd. Processing of new uploads into bookworm-proposed-updates will be
> frozen during the preceding weekend.
The archive side o
Hi,
The first point release for "bookworm" (12.1) is scheduled for Saturday,
July 22nd. Processing of new uploads into bookworm-proposed-updates will be
frozen during the preceding weekend.
--
Jonathan Wiltshire j...@debian.org
Debian
You won't find it there, and it doesn't matter. You only need to verify that
the signature is by the trusted key, which your output indicates that it was
(although you have to rely on a CA trust path).
--
Jonathan Wiltshire j...@debian.org
Debian Developer http://people.debian.org/~jmw
4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51
80D 6294 BE9B
>
>[1] : https://www.debian.org/CD/verify, e. g. 2011-01-05 [SC]
>
You're comparing the timestamp of a signature with the creation time of the key
which generated it. They're different things.
--
Jonathan Wiltshire j...@debian.org
Debian Developer http://people.debian.org/~jmw
4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51
Hi,
Debian 11, codename bullseye, was release on 14th August 2021 and synced to
mirrors around 21:05 UTC. You should expect the mappings for stable and
oldstable to update on your local mirrors very shortly.
Thanks,
--
Jonathan Wiltshire j...@debian.org
The next release of Debian, version 10 (code name 'buster') is being
released. The mirror sync is in progress and package indexes will update
shortly.
Thanks,
--
Jonathan Wiltshire j...@debian.org
Debian Developer
of the Release Team.
--
Jonathan Wiltshire j...@debian.org
Debian Developer http://people.debian.org/~jmw
4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51
signature.asc
Description: PGP signature
aded during the update and so forwarding became disabled. Restarting
shorewall of course fixes this by setting ip_forward back to 1.
All our other machines without ip_forward=0 in the configuration were
unaffected.
--
Jonathan Wiltshire
Red Hat Certified Engineer (#170-281-083)
Tiger Computi
Hi,
The second point release for "stretch" (9.2) is scheduled for Saturday,
October 7th. Processing of new uploads into stretch-proposed-updates will
be frozen during the preceding weekend.
--
Jonathan Wiltshire j...@debian.org
Debian
e such as
'stretch' to avoid surprising upgrades.
Thanks,
--
Jonathan Wiltshire j...@debian.org
Debian Developer http://people.debian.org/~jmw
4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51
Hi,
On 2017-01-28 22:00, Lupe Christoph wrote:
This problem may affect many other backups too. Did anybody research
backup programs before this was introduced to Debian?
I do not consider this an acceptable attitude on Debian lists.
Thanks,
--
Jonathan Wiltshire
not actually release it, but a leaf package like this is trivially
removed again.
(Strictly speaking use of Stretch is still 'at own risk' and
unsupported, so this is overkill, but it's small effort to be nice.)
--
Jonathan Wiltshire
e costs as much as a light bulb being
turned on for an hour
[citation needed]
--
Jonathan Wiltshire j...@debian.org
Debian Developer http://people.debian.org/~jmw
4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C5
On 2015-06-11 15:42, Nikolai Lusan wrote:
On Thu, 2015-06-11 at 14:54 +0100, Jonathan Wiltshire wrote:
See https://tracker.debian.org/pkg/mod-gnutls
I removed it from Jessie in November 2014 with the following comments:
#20141031
Bug #750857: FTBFS on many architectures, test suite errors
many architectures, test suite errors
# blocks gnutls28/libgcrypt20 transition
Since then it didn't build on all supported architectures, so it has not
migrated (even now) and therefore wasn't in Jessie.
--
Jonathan Wiltshire j...@debian.org
D
On Fri, May 01, 2015 at 11:23:49AM -0700, Theodore Alcapotaxis wrote:
> I would appreciate it if you could update the site backports.debian.org at
> your earliest convenience.
Well, you probably want to contact the backports team then.
http://backports.debian.org/Mailinglists/
--
Jo
security fixes are a reasonable justification for an unblock request,
when that time does come.
A Jessie security archive is up to the security team and FTP masters.
--
Jonathan Wiltshire j...@debian.org
Debian Developer http
to true up. I
will create a mops ticket to contain the pertinent info. Our regular
upgrade cycle will begin October 6th.
Good to know, thanks.
--
Jonathan Wiltshire j...@debian.org
Debian Developer http://people.debian.org/~jmw
upstream releases in sid regardless of
the rationale.
Sid has no security support and no user support, and this is made
abundantly clear in the documentation.
--
Jonathan Wiltshire j...@debian.org
Debian Developer http://people.debian.org
hold some evidence for this claim, please declare it
or withdraw your libel.
--
Jonathan Wiltshire j...@debian.org
Debian Developer http://people.debian.org/~jmw
4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C
ust also reach an age of 10 days
before it will be considered.
--
Jonathan Wiltshire j...@debian.org
Debian Developer http://people.debian.org/~jmw
4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51
i have six ye
?
In any case I do not think this is the right place to discuss it.
Although your motives are clearly security-related, the implications on
the distribution are much wider than this and consensus should be sought
accordingly.
--
Jonathan Wiltshire j.
ty-tracker.debian.org/tracker/CVE-2012-0217
--
Jonathan Wiltshire j...@debian.org
Debian Developer http://people.debian.org/~jmw
4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51
i have six years of solaris sysa
other things, I can volunteer some of my
daily time to help with moderation, if so needed.
this is up to listmasters, please contact them as in the footer.
--
Jonathan Wiltshire j...@debian.org
Debian Developer http://people.debian.org
than one question like this, copying to a
public list.
--
Jonathan Wiltshire j...@debian.org
Debian Developer http://people.debian.org/~jmw
4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51
--
To UNSUBSCRIBE
So that
> ip6tables is restored on a cold start in a proper way.
> An entry like 'ip6tables-restore < /etc/iptables/rules6'
> in /etc/rc.local would be an ugly solution.
Either ip6tables-save > /etc/iptables/rules.v6 or dpkg-reconfigure
iptables-persistent will sav
nly on one of them (squeeze, amd64),
> and not on the others (squeeze/lenny, i386). I do not use nntp, so I feel
> safe, but it might indicate some build problems.
There are indeed problems with this build; security team and ftp masters
are aware and investigating.
ers;
it's being investigated as we speak.
--
Jonathan Wiltshire j...@debian.org
Debian Developer http://people.debian.org/~jmw
4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51
--
To UNSUBSCRIBE, email to d
http://cdimage.debian.org/cdimage/archive/
--
Jonathan Wiltshire j...@debian.org
Debian Developer http://people.debian.org/~jmw
4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51
signature.asc
Description: Digital signature
appropriate for this list:
"debian-security: Discussion about security issues, including
cryptographic issues, that are of interest to all parts of the Debian
community."
If you want your software in Debian, follow the WNPP process[1].
1: http://www.debian.org/
o they do not get security support. They will
be in the next point release for Squeeze in a few weeks [1].
1: http://release.debian.org/proposed-updates/stable.html
--
Jonathan Wiltshire j...@debian.org
Debian Developer http://people.debia
ght this is because the BIOS handles everything day-to-day,
but to {re}configure it you need an OS-dependent tool.
--
Jonathan Wiltshire j...@debian.org
Debian Developer http://people.debian.org/~jmw
4096R: 0xD3524C51 / 0A55 B7C5 12
45 matches
Mail list logo