On Wed, 07 Jan 2015 19:14:00 +0100, Sandro Mani wrote:
> So what I'm planning to do is to retire the iax package in Fedora, and
> have add to the iaxclient package the subpackages -libiax and
> -libiax-devel, containing the iaxclient bundled libiax2, with appropriate
>
> Obsoletes: iax < 0.2.
On 2015-01-08, 03:36 GMT, Richard Shaw wrote:
> In the specific case I ran into one of the package suites I've been working
> on technically bundles a modified copy of xmlrpcpp. However, it is quite
> modified, upstream is dead, it's not already in Fedora, and the author I'm
> working with only use
On 08.01.2015 09:06, Michael Schwendt wrote:
On Wed, 07 Jan 2015 19:14:00 +0100, Sandro Mani wrote:
So what I'm planning to do is to retire the iax package in Fedora, and
have add to the iaxclient package the subpackages -libiax and
-libiax-devel, containing the iaxclient bundled libiax2, with
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Dne 7.1.2015 v 21:14 Stephen Gallagher napsal(a):
>
> * Tentative date for side-tag merge is 2015-01-28 (sgallagh,
> 19:09:55)
>
What does it mean actually? Does it mean that if I plan to do rebuild of
Ruby packages in side-tag, I am supposed
Hi,
Dne 7.1.2015 v 21:14 Stephen Gallagher napsal(a):
> * #1379 F22 System Wide Change: Change xorg input stack to use libinput
> - https://fedoraproject.org/wiki/Changes/LibinputForXorg (sgallagh,
> 19:51:28)
> * AGREED: Approved with two caveats: 1) Both GNOME and KDE must be
> upd
On Wed, 7 Jan 2015, Till Maas wrote:
> On Wed, Jan 07, 2015 at 08:30:03AM -0500, Josh Boyer wrote:
>
> > We just went over something very much like this for x86_64 packages
> > with FESCo ticket 1113:
> >
> > https://fedorahosted.org/fesco/ticket/1113
> >
> > Could you perhaps review that and elab
Am 08.01.2015 um 00:17 schrieb Rahul Sundaram:
> That is kind of a basic requirement. We need to do more. We need to inform
> people when their release is going EOL and we also need to automatically
> prompt users to upgrade whenever there is a new release (ie) some integration
> between GNOME
Dne 8.1.2015 v 12:30 Felix Schwarz napsal(a):
> Am 08.01.2015 um 00:17 schrieb Rahul Sundaram:
>> That is kind of a basic requirement. We need to do more. We need to inform
>> people when their release is going EOL and we also need to automatically
>> prompt users to upgrade whenever there is a n
Compose started at Thu Jan 8 05:15:03 UTC 2015
Broken deps for i386
--
[InsightToolkit]
InsightToolkit-4.7.0-2.fc22.i686 requires libhdf5_cpp.so.8
InsightToolkit-4.7.0-2.fc22.i686 requires libhdf5.so.8
[Sprog]
Sprog-0.
Hi everyone!
Fedora 22 and especially Changes submission deadline [1] is coming pretty
soon - in less than two weeks on January 20th. With Alpha release in March.
Please, submit your System Wide Changes by this deadline, earlier better.
There's one significant change FESCo agreed at yesterday's me
- Original Message -
> = Proposed System Wide Change: Change xorg input stack to use libinput =
> https://fedoraproject.org/wiki/Changes/LibinputForXorg
>
> Change owner(s): Hans de Goede
>
> Replace the current (low-level) input xorg drivers with libinput using the
> xorg-x11-drv-libinp
commit db555c569ad447497f7f0ed772d9f4594a29edc7
Author: Ralf Corsépius
Date: Thu Jan 8 13:31:46 2015 +0100
Upstream update.
.gitignore |2 +-
perl-Test-CheckManifest.spec |7 +--
sources |2 +-
3 files changed, 7 insertions(+), 4 dele
= Proposed System Wide Change: Set sshd(8) PermitRootLogin=no =
https://fedoraproject.org/wiki/Changes/SSHD_PermitRootLogin_no
Change owner(s): P J P and Fedora Security Team
To disable remote root login facility in sshd(8) by default.
== Detailed Description ==
Sshd(8) daemon allows remote us
Hi,
On 08-01-15 13:31, Jaroslav Reznik wrote:
- Original Message -
= Proposed System Wide Change: Change xorg input stack to use libinput =
https://fedoraproject.org/wiki/Changes/LibinputForXorg
Change owner(s): Hans de Goede
Replace the current (low-level) input xorg drivers with li
On Thu, 8 Jan 2015, Jaroslav Reznik wrote:
= Proposed System Wide Change: Set sshd(8) PermitRootLogin=no =
https://fedoraproject.org/wiki/Changes/SSHD_PermitRootLogin_no
Change owner(s): P J P and Fedora Security Team
To disable remote root login facility in sshd(8) by default.
I still disa
On Thu, 2015-01-08 at 13:42 +0100, Jaroslav Reznik wrote:
> = Proposed System Wide Change: Set sshd(8) PermitRootLogin=no =
> https://fedoraproject.org/wiki/Changes/SSHD_PermitRootLogin_no
>
> Change owner(s): P J P and Fedora Security Team
>
> To disable remote root login facility in sshd(8)
On Thu, 2015-01-08 at 13:59 +0100, Hans de Goede wrote:
> Hi,
>
> On 08-01-15 13:31, Jaroslav Reznik wrote:
> > - Original Message -
> >> = Proposed System Wide Change: Change xorg input stack to use libinput =
> >> https://fedoraproject.org/wiki/Changes/LibinputForXorg
> >>
> >> Change
On Thu, 8 Jan 2015, Dhiru Kholia wrote:
| Your package accepts/processes untrusted input.
This seems to be about every package that I use, because I most if not
all tools process untrusted data from the Internet.
+1. This view is rapidly gaining traction and visibility in recent times.
On Thu, 2015-01-08 at 08:47 -0500, Paul Wouters wrote:
> On Thu, 8 Jan 2015, Dhiru Kholia wrote:
>
> >> | Your package accepts/processes untrusted input.
> >>
> >> This seems to be about every package that I use, because I most if not
> >> all tools process untrusted data from the Internet.
On Thu, Jan 08, 2015 at 08:43:48AM -0500, Stephen Gallagher wrote:
> Can we clarify something here? Is this a request to change the defaults
> globally for all Products/nonproduct installs?
>
> I would argue that it could be sensible to do this for Workstation and
> non-product installs, but not f
- Original Message -
> Thanks, Hans. We wanted to make sure that we didn't have another
> instance of the bluetooth fiasco from a couple releases ago, where GNOME
> changed the Bluetooth stack and broke things underneath KDE. If this is
> already addressed (or at least irrelevant), that'
On Thu, 8 Jan 2015, Stephen Gallagher wrote:
Can we throw prelink out as well when we do this?
Prelink is already gone. We haven't been running it since F19, IIRC.
Oh. Spending too much time on RHEL, and not enough time to upgrade my
desktop to a non-EOL fedora :)
Thanks,
Paul
--
devel mai
On Thu, 2015-01-08 at 08:48 -0500, Chuck Anderson wrote:
> On Thu, Jan 08, 2015 at 08:43:48AM -0500, Stephen Gallagher wrote:
> > Can we clarify something here? Is this a request to change the defaults
> > globally for all Products/nonproduct installs?
> >
> > I would argue that it could be sen
Hi guys,
as the new BerkeleyDB 6.x has a more restrictive license than the
previous versions (AGPLv3 vs. LGPLv2), and due to that many projects
cannot use it, perhaps it is time to get rid of it from Fedora for good
- or at least trim down the list of packages dependent on it as much as
possible.
On Thu, 2015-01-08 at 08:54 -0500, Bastien Nocera wrote:
>
> - Original Message -
>
> > Thanks, Hans. We wanted to make sure that we didn't have another
> > instance of the bluetooth fiasco from a couple releases ago, where GNOME
> > changed the Bluetooth stack and broke things underne
On Thu, 2015-01-08 at 10:40 +0100, Vít Ondruch wrote:
> Dne 7.1.2015 v 21:14 Stephen Gallagher napsal(a):
> >
> > * Tentative date for side-tag merge is 2015-01-28 (sgallagh,
> > 19:09:55)
> >
>
> What does it mean actually? Does it mean that if I plan to do rebuild of
> Ruby packages in
Once upon a time, Jan Staněk said:
> The topic of BerkeleyDB v6 in Fedora was already discussed at this list
> [1], and it turned out that peaceful cooperation of multiple libdb
> versions in system is very problematic. As some packages cannot use
> newer versions, we are basically stuck with v5 -
On 08/01/15 13:56, Jan Staněk wrote:
However, as I have only very hazy ideas on how some of the dependent
packages are used or why they need libdb, I would like to ask for
cooperation, ideally from the package maintainers themselves. The
information on how to remove dependency, what would need t
On Thu, Jan 8, 2015 at 9:18 AM, Chris Adams wrote:
> Once upon a time, Jan Staněk said:
>> The topic of BerkeleyDB v6 in Fedora was already discussed at this list
>> [1], and it turned out that peaceful cooperation of multiple libdb
>> versions in system is very problematic. As some packages cann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Dne 8.1.2015 v 15:03 Stephen Gallagher napsal(a):
>
>
>
> On Thu, 2015-01-08 at 10:40 +0100, Vít Ondruch wrote:
>> Dne 7.1.2015 v 21:14 Stephen Gallagher napsal(a):
>>>
>>> * Tentative date for side-tag merge is 2015-01-28 (sgallagh,
>>> 19:09:
Am 08.01.2015 um 15:18 schrieb Chris Adams:
Once upon a time, Jan Staněk said:
The topic of BerkeleyDB v6 in Fedora was already discussed at this list
[1], and it turned out that peaceful cooperation of multiple libdb
versions in system is very problematic. As some packages cannot use
newer ve
On Thu, Jan 8, 2015 at 8:43 AM, Stephen Gallagher wrote:
>
>
>
> On Thu, 2015-01-08 at 13:42 +0100, Jaroslav Reznik wrote:
>> = Proposed System Wide Change: Set sshd(8) PermitRootLogin=no =
>> https://fedoraproject.org/wiki/Changes/SSHD_PermitRootLogin_no
>>
>> Change owner(s): P J P and Fedora S
Le Thursday 08 January 2015 08:42:45 Paul Wouters a écrit :
> If you want to fight that, you need to set PasswordAuthentication no and
> insist that people start using ssh keypairs instead.
Would not the following satisfy everybody?
Match User root
PasswordAuthentication no
--
Laurent Rineau
ht
On 01/08/2015 02:56 PM, Jan Staněk wrote:
Hi guys,
as the new BerkeleyDB 6.x has a more restrictive license than the
previous versions (AGPLv3 vs. LGPLv2), and due to that many projects
cannot use it, perhaps it is time to get rid of it from Fedora for good
- or at least trim down the list of pac
Once upon a time, Laurent Rineau said:
> Le Thursday 08 January 2015 08:42:45 Paul Wouters a écrit :
> > If you want to fight that, you need to set PasswordAuthentication no and
> > insist that people start using ssh keypairs instead.
>
> Would not the following satisfy everybody?
>
> Match User
- Original Message -
>
>
>
> On Thu, 2015-01-08 at 08:54 -0500, Bastien Nocera wrote:
> >
> > - Original Message -
> >
> > > Thanks, Hans. We wanted to make sure that we didn't have another
> > > instance of the bluetooth fiasco from a couple releases ago, where GNOME
> > > cha
On Thu, Jan 08, 2015 at 09:32:04AM -0500, Josh Boyer wrote:
> On Thu, Jan 8, 2015 at 9:18 AM, Chris Adams wrote:
> > Once upon a time, Jan Staněk said:
> >> The topic of BerkeleyDB v6 in Fedora was already discussed at this list
> >> [1], and it turned out that peaceful cooperation of multiple li
On 01/08/2015 08:42 AM, Paul Wouters wrote:
On Thu, 8 Jan 2015, Jaroslav Reznik wrote:
== Detailed Description ==
Sshd(8) daemon allows remote users to login as 'root' by default. This
provides remote attackers an option to brute force their way into a
system.
If you want to fight that, you ne
On Thu, Jan 8, 2015 at 6:56 AM, Jan Staněk wrote:
> However, as I have only very hazy ideas on how some of the dependent
> packages are used or why they need libdb, I would like to ask for
> cooperation, ideally from the package maintainers themselves. The
> information on how to remove dependency
On 01/08/2015 04:10 PM, David Cantrell wrote:
It's not a drop-in replacement, but I have seen sqlite be a viable option
for projects wanting some database library and wanting a stable API. Many
upstream projects that can use berkdb have grown sqlite support as an
option.
And SQLite shares one
Am 08.01.2015 um 16:10 schrieb David Cantrell:
On Thu, Jan 08, 2015 at 09:32:04AM -0500, Josh Boyer wrote:
On Thu, Jan 8, 2015 at 9:18 AM, Chris Adams wrote:
Why does v6 having an incompatible license mean we should get rid of v5?
BerkeleyDB is widely used because it meets a need, and v5 meet
On 01/08/2015 06:56 AM, Jan Staněk wrote:
Hi guys,
as the new BerkeleyDB 6.x has a more restrictive license than the
previous versions (AGPLv3 vs. LGPLv2), and due to that many projects
cannot use it, perhaps it is time to get rid of it from Fedora for good
- or at least trim down the list of pac
Am 08.01.2015 um 15:52 schrieb Chris Adams:
Once upon a time, Laurent Rineau said:
Le Thursday 08 January 2015 08:42:45 Paul Wouters a écrit :
If you want to fight that, you need to set PasswordAuthentication no and
insist that people start using ssh keypairs instead.
Would not the followin
On Thu, 8 Jan 2015, Przemek Klosowski wrote:
If you want to fight that, you need to set PasswordAuthentication no and
insist that people start using ssh keypairs instead.
Singling out root is not affective against system compromises caused by
brutce forcing passwords.
T
On Thu, 2015-01-08 at 15:31 +0100, Vít Ondruch wrote:
> Dne 8.1.2015 v 15:03 Stephen Gallagher napsal(a):
> >
> >
> >
> > On Thu, 2015-01-08 at 10:40 +0100, Vít Ondruch wrote:
> >> Dne 7.1.2015 v 21:14 Stephen Gallagher napsal(a):
> >>>
> >>> * Tentative date for side-tag merge is 2015-01-28
On Thu, 2015-01-08 at 08:43 -0500, Stephen Gallagher wrote:
> In the Server case, nearly every deployment is headless. Disabling root
> login to ssh by default would mean that many people would have no way to
> get into the system at all. (Yes, we could force the creation of a
> non-root user at i
On Thu, 2015-01-08 at 11:10 -0500, Adam Jackson wrote:
> On Thu, 2015-01-08 at 08:43 -0500, Stephen Gallagher wrote:
>
> > In the Server case, nearly every deployment is headless. Disabling root
> > login to ssh by default would mean that many people would have no way to
> > get into the system
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Dne 8.1.2015 v 17:08 Stephen Gallagher napsal(a):
>
>
>
> On Thu, 2015-01-08 at 15:31 +0100, Vít Ondruch wrote:
>> Dne 8.1.2015 v 15:03 Stephen Gallagher napsal(a):
>>>
>>>
>>>
>>> On Thu, 2015-01-08 at 10:40 +0100, Vít Ondruch wrote:
Dne 7.1.201
> Dne 7.1.2015 v 21:14 Stephen Gallagher napsal(a):
> > * #1379 F22 System Wide Change: Change xorg input stack to use libinput
> > - https://fedoraproject.org/wiki/Changes/LibinputForXorg (sgallagh,
> > 19:51:28)
> > * AGREED: Approved with two caveats: 1) Both GNOME and KDE must be
> >
hi,
I am trying to package aerospike. It uses some of libraries as modules /
git sub-modules.
https://github.com/aerospike/aerospike-server/tree/master/modules
Do the jansson, jemalloc and luajit fall under the purview of "bundled
libraries" ?
https://fedoraproject.org/wiki/Packaging:No_Bundled
On 08/01/15 18:07, Anshu Prateek wrote:
hi,
I am trying to package aerospike. It uses some of libraries as modules /
git sub-modules.
https://github.com/aerospike/aerospike-server/tree/master/modules
Do the jansson, jemalloc and luajit fall under the purview of "bundled
libraries" ?
Well, g
Cool, thanks. Will try using the packages.
On Thu, 8 Jan 2015 at 10:55 pm Alec Leamas wrote:
> On 08/01/15 18:07, Anshu Prateek wrote:
> > hi,
> >
> > I am trying to package aerospike. It uses some of libraries as modules /
> > git sub-modules.
> >
> > https://github.com/aerospike/aerospike-serve
On Thu, 08 Jan 2015 11:10:36 -0500
Adam Jackson wrote:
> > The only other approach I could see for the headless
> > servers would be mandating the enrollment in an identity domain at
> > installation time (such as to FreeIPA or Active Directory).
>
> And in this scenario we should absolutely d
Hello,
> = Proposed System Wide Change: Harden all packages with position-independent
> code =
>
> Harden all packages with position-independent code to limit the damage from
> certain security vulnerabilities.
So this proposal is for _all_ architectures, including the register-starved
32-bit i?8
> > > The only other approach I could see for the headless
> > > servers would be mandating the enrollment in an identity domain at
> > > installation time (such as to FreeIPA or Active Directory).
> >
> > And in this scenario we should absolutely disable PermitRootLogin.
>
> So that if you have
- Original Message -
> > = Proposed System Wide Change: Set sshd(8) PermitRootLogin=no =
> > https://fedoraproject.org/wiki/Changes/SSHD_PermitRootLogin_no
> In the Server case, nearly every deployment is headless. Disabling root
> login to ssh by default would mean that many people would
Am 08.01.2015 um 19:45 schrieb Miloslav Trmač:
= Proposed System Wide Change: Harden all packages with position-independent
code =
Harden all packages with position-independent code to limit the damage from
certain security vulnerabilities.
So this proposal is for _all_ architectures, includi
On Thu, 2015-01-08 at 13:52 -0500, Miloslav Trmač wrote:
> > > > The only other approach I could see for the headless > > >
> servers would be mandating the enrollment in an identity domain at > >
> > installation time (such as to FreeIPA or Active Directory). > > > >
> And in this scenario we s
On Tue, Dec 30, 2014 at 06:09:41PM +0200, Alexander Ploumistos wrote:
> Would it make sense to include Firefox Aurora / Developer Edition in
> rawhide?
I'd love to see it not just in Rawhide -- I think it fits nicely with
the developer target idea. But Rawhide is a good first step.
--
Matthew M
On 8 January 2015 at 11:52, Miloslav Trmač wrote:
> > > > The only other approach I could see for the headless
> > > > servers would be mandating the enrollment in an identity domain at
> > > > installation time (such as to FreeIPA or Active Directory).
> > >
> > > And in this scenario we should
On Thursday 08 January 2015 08:52:22 Chris Adams wrote:
> Simpler version (if the change is desired):
> PermitRootLogin without-password
BTW, Debian introduced this default for the upcoming Debian/jessie.
Ref: Review for "PermitRootLogin without-password" change
[https://lists.debian.org/de
Am 08.01.2015 um 21:34 schrieb Stephen John Smoogen:
In most of the cases, we end up requiring someone to go to the system
physically and doing some initial work if we run into any of 0-3. Of
course that works great if you have a physical server. We virtualize
most of our servers which ends up w
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, 30 Dec 2014 17:09:02 +0200
Yanko Kaneti wrote:
> On Tue, 2014-12-30 at 14:53 +0100, Marianne Lombard wrote:
> > Hi,
> >
> > A bug is open for perl-XML-TreePP since July (for opening a epel 7
> > branch) with no reaction
> > (https://bugzill
On 8 January 2015 at 15:19, Reindl Harald wrote:
>
> Am 08.01.2015 um 21:34 schrieb Stephen John Smoogen:
>
>> In most of the cases, we end up requiring someone to go to the system
>> physically and doing some initial work if we run into any of 0-3. Of
>> course that works great if you have a phy
On 8 January 2015 at 15:54, Dennis Gilmore wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On Tue, 30 Dec 2014 17:09:02 +0200
> Yanko Kaneti wrote:
>
> > On Tue, 2014-12-30 at 14:53 +0100, Marianne Lombard wrote:
> > > Hi,
> > >
> > > A bug is open for perl-XML-TreePP since July (fo
Am 08.01.2015 um 23:54 schrieb Stephen John Smoogen:
On 8 January 2015 at 15:19, Reindl Harald wrote:
Am 08.01.2015 um 21:34 schrieb Stephen John Smoogen:
In most of the cases, we end up requiring someone to go to the
system
physically and doing some initial work
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Thu, 08 Jan 2015 20:25:36 +0100
Reindl Harald wrote:
>
> Am 08.01.2015 um 19:45 schrieb Miloslav Trmač:
> >> = Proposed System Wide Change: Harden all packages with
> >> position-independent code =
> >>
> >> Harden all packages with position-inde
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Thu, 08 Jan 2015 08:43:48 -0500
Stephen Gallagher wrote:
>
>
>
> On Thu, 2015-01-08 at 13:42 +0100, Jaroslav Reznik wrote:
> > = Proposed System Wide Change: Set sshd(8) PermitRootLogin=no =
> > https://fedoraproject.org/wiki/Changes/SSHD_Permi
Am 09.01.2015 um 00:16 schrieb Dennis Gilmore:
On Thu, 08 Jan 2015 20:25:36 +0100
Reindl Harald wrote:
Am 08.01.2015 um 19:45 schrieb Miloslav Trmač:
= Proposed System Wide Change: Harden all packages with
position-independent code =
Harden all packages with position-independent code to lim
On Fri, Jan 9, 2015 at 12:16 AM, Dennis Gilmore wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On Thu, 08 Jan 2015 20:25:36 +0100
> Reindl Harald wrote:
>
>>
>> Am 08.01.2015 um 19:45 schrieb Miloslav Trmač:
>> >> = Proposed System Wide Change: Harden all packages with
>> >> positio
Am 09.01.2015 um 00:35 schrieb drago01:
On Fri, Jan 9, 2015 at 12:16 AM, Dennis Gilmore wrote:
On Thu, 08 Jan 2015 20:25:36 +0100
Reindl Harald wrote:
Am 08.01.2015 um 19:45 schrieb Miloslav Trmač:
= Proposed System Wide Change: Harden all packages with
position-independent code =
Harden
On 01/08/2015 04:37 PM, Paul Wouters wrote:
So if we truly want to address this feature, we should also disallow
non-root user password based ssh logins.
Do I get this right? You want to disallow any remote logins (which
nowadays means using ssh)?
How are people supposed to perform remote dis
Sorry to say, but this is like the hundredth time this topic came up.
https://lists.fedoraproject.org/pipermail/devel/2014-July/200860.html
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/co
> > So if we truly want to address this feature, we should also disallow
> > non-root user password based ssh logins.
>
> Do I get this right? You want to disallow any remote logins (which
> nowadays means using ssh)?
No, he means that ssh connections should require a pre-shared key. My
systems
P4 2.8G, no hyperthreading, with i865G video.
F20 and F21 work normally.
Kernel 3.19.0-0.rc3.git1.2.fc22.i686+PAE on an i686
xorg-x11-drv-intel-2.99.917-2.fc22.i686
xorg-x11-server-Xorg-1.16.2.901-1.fc22.i686
Installing libinput didn't help.
Chmod 4711 /usr/bin/Xorg didn't help.
KDE in F22 work
On Thu, 2015-01-08 at 16:54 -0600, Dennis Gilmore wrote:
> On Tue, 30 Dec 2014 17:09:02 +0200
> Yanko Kaneti wrote:
>
> > On Tue, 2014-12-30 at 14:53 +0100, Marianne Lombard wrote:
> > > Hi,
> > >
> > > A bug is open for perl-XML-TreePP since July (for opening a epel
> > > 7 branch) with no re
On Fri, Jan 9, 2015 at 12:44 AM, Reindl Harald wrote:
>
> Am 09.01.2015 um 00:35 schrieb drago01:
>>
>> On Fri, Jan 9, 2015 at 12:16 AM, Dennis Gilmore wrote:
>>>
>>> On Thu, 08 Jan 2015 20:25:36 +0100
>>> Reindl Harald wrote:
Am 08.01.2015 um 19:45 schrieb Miloslav Trmač:
>>
77 matches
Mail list logo