**** BEGIN LOGGING AT Tue Jun 14 02:59:59 2016 Jun 14 05:14:43 vectis: keep in mind software support is work in progress, ie. for android you have to swap image to something working, and for linux you still have to use legacy kernel on h3 based boards (which means chroots not working as expected, but that will change with mainline) Jun 14 08:40:08 pgp question (i probably should be asking elsewhere, but i guess you can help too) - i'm attending debconf, and there is apparently a key-signing party. i've never used PGP before, but would like to take advantage of this opportunity. is GnuPG the best way to go? what are the common gotchas i need to be aware of? Jun 14 08:51:23 ah, deadline is not as soon as i thought it was .. still have a full week to read about this :) Jun 14 10:06:18 hi Sicelo - do you already have a key? Jun 14 10:07:55 not yet. will go throught the links on Anibal's mail. For some reason I thought the deadline was today, but have now realized it's next week Jun 14 10:08:05 *through Jun 14 10:10:57 i *think* anibal's mail assumes you already have a key and want to participate in the key signing party Jun 14 10:11:18 do you have a debian or ubuntu computer to work from? Jun 14 10:11:23 ah Jun 14 10:11:37 yes, i use debian on my main pc Jun 14 10:12:19 that is the correct answer ;) Jun 14 10:12:38 https://keyring.debian.org/creating-key.html Jun 14 10:15:46 yes, been looking at that. seems easy enough Jun 14 10:16:05 is it of any use though for a non-dev? :-) Jun 14 10:17:00 you can put 'keyserver hkp://keyserver.leg.uct.ac.za' in ~/.gnupg/gpg.conf or specify 'keyserver.leg.uct.ac.za' when you upload your key - it will replicate to the rest of the world eventually Jun 14 10:17:33 nice. will use that one ;) Jun 14 10:17:44 remember to bring a passport or some kind of identity document with you Jun 14 10:18:31 will do. Jun 14 10:19:35 Sicelo: even non-devs need keys to sign or encrypt mail if they want Jun 14 10:20:45 you could generate a key and use it without ever being signed by other people Jun 14 10:21:29 but it's better if your key has been signed by other people (and the more the merrier) Jun 14 10:22:59 Does the fremantle repo have fremantle1.2 in it? or do they have different stuff in them? I'm tring to mirror them to a local server, trying to figure out what I can get rid of to save space (just want n900 repos, ovi, community, extras, devel, testing) Jun 14 10:24:18 azkay, different stuff Jun 14 10:24:41 in the sense that deps are different, so its not good idea to mix them Jun 14 10:25:03 you only want fremantle not older things Jun 14 10:26:37 ginggs: i'll participate. i may never get a similar opportunity ever (carpe diem) ;) Jun 14 10:27:42 Sicelo: \o/ Jun 14 10:28:26 Thanks :) Jun 14 10:31:14 also, bpi-m3 power req of only 2A is looking unrealistic Jun 14 10:33:18 i think tkaiser is biased because they didnt answer his bug reports Jun 14 10:33:46 and requests for schematics/info Jun 14 11:39:49 ginggs: does that keyserver support hkps:// ? Jun 14 13:12:46 Sicelo: ur comment reminded me of seeing a boat named "carpe diem 2" at weekend. and i thought what happened to first one :) Jun 14 13:13:04 lol Jun 14 13:13:13 'wife took it' Jun 14 13:13:14 ;) Jun 14 13:14:04 hehe that or some quote from titanic "but this ship can't sink" Jun 14 13:14:32 :) Jun 14 14:23:14 Sicelo: no, i don't think it does hkps Jun 14 14:42:32 hkps is overrated Jun 14 14:43:23 even way more than https is overrated for public websites Jun 14 14:45:10 when some MITM spy can sniff your traffic to the hktp server, they also can sniff all your pop/imap/smtp traffic and thus already know which mails and from whom you received Jun 14 14:46:21 they however invariably can _not_ fake signatures or decrypt mails Jun 14 14:47:50 or rather, they can fake signatures just like they could by uploading them to the hktp key server Jun 14 14:48:19 unless you verify the signature, it's worth nothing Jun 14 14:48:46 that's what keysigning parties are all about Jun 14 14:48:59 and fingerprints, published out of band Jun 14 14:50:22 and signatures on a bazillion of emails on public ML that all should be identical to the one you just evaluate Jun 14 14:52:06 I consider the latter one a stronger "verification" that a keysigning party where somebody allegedly checked your identity by looking at a random possibly fake document Jun 14 14:52:18 ML posts are historic evidence Jun 14 15:00:10 okay Jun 14 15:13:08 ginggs: it's done, and uploaded to that keyserver :) Jun 14 15:19:25 send me a signed mail Jun 14 15:21:53 what's your email address? :) Jun 14 15:22:57 /ns info DocScrutinizer05 Jun 14 15:23:15 also share your fingerprint in here Jun 14 15:24:11 you're logged in so I consider that as sufficent authentication to believe you are Sicelo Jun 14 15:25:24 let me see how encrypted mail works for mutt (first time) Jun 14 15:26:00 only sign, not encrypt, please Jun 14 15:27:17 btw your key is already public Jun 14 15:27:55 that was quick Jun 14 15:27:58 also gmail really now? Jun 14 15:28:33 it sets the standards :p Jun 14 15:29:00 it has the failtards Jun 14 15:29:36 nevermind, I don't care Jun 14 15:30:03 anyway with gmail I'd also want to receive and send only encrypted mail ;-P Jun 14 15:30:23 :) Jun 14 15:32:54 share your fingerürint! Jun 14 15:32:59 print even Jun 14 15:33:10 C47E979291E3357710767378C91D0E98B18C7117 Jun 14 15:33:13 ta Jun 14 15:33:36 * Sicelo is new to this mumbo-jumbo Jun 14 15:34:48 and mutt has lots of stuff to set, it seems Jun 14 15:37:03 yeah, configuring email clients for PGP is a mess Jun 14 15:39:25 anyway mit.edu hkp has a signed version of your key, according to my kgpg Jun 14 15:39:58 I verified correctness of the key by comparing fingerprint out of band Jun 14 15:40:33 I can't verify identity Jun 14 15:40:52 for that please join a signing party Jun 14 15:42:03 hence, ginggs ... signing party as part of DebConf16 Jun 14 15:43:23 it's quite likely this is the only signing party i'll ever be in, so trying to use the opportunity to the ful Jun 14 15:43:29 :) Jun 14 15:43:36 dont forget party hat Jun 14 15:43:57 Sicelo: aren't you planning to going to debconf17 in canada? :) Jun 14 15:43:57 and bassblaster connected to your n900 Jun 14 15:44:00 sure Jun 14 15:44:26 I never got around to it, then otoh I never needed that sort of verification either Jun 14 15:45:42 the whole "bring your key so we can sign it" was too much hassle for every event I ever met, had other more important things to pack ;-) Jun 14 15:46:17 and other more interesting talks to join on the event Jun 14 15:46:29 canada is enticing yes, haha .. will see i'f i'm rich enough by then ;) Jun 14 15:47:26 canada?= Jun 14 15:48:09 did you already re-download your own key? Jun 14 15:49:05 I'm no expert on that stuff either, but it should have a signature by me Jun 14 15:50:08 i see that there's extra signature. thanks Jun 14 15:50:26 nb you technically don't need to download your own pubkey, the signatures are relevant for everybody but you Jun 14 15:51:53 i sent you a gmail .. did i sign correctly at least? Jun 14 15:54:57 I don't know, kmail sucks at inline signatures Jun 14 15:58:23 okay. anyway, got to get some RL stuff done here in the meantime Jun 14 16:02:59 https://userbase.kde.org/KMail/PGP_MIME >>KMail no longer does in-line signatures. OpenGPG has to be used instead.<< whatever that means Jun 14 16:06:05 fwiw, i sign mail with gpg and then copy-paste into gmail web interface Jun 14 19:37:35 My phone stays in headset mode after unpugging them, any way to fix this other than a restart? Jun 14 19:39:30 N900? Jun 14 19:45:36 Sicelo: Yes, N900 Jun 14 19:47:59 maybe the more knowledgeable will chime in .. but headphone switching on N900 is through software afaict .. am sure there's some /sys node somewhere which detects the HP Jun 14 20:04:20 yes indeed Jun 14 20:05:06 the problem isn't unheard of, and the easy fix is to plug and unplug again the headphones Jun 14 20:06:38 there are however lockups cause by fancy sequences like "plug wired hp, connect BT HP, unplug wired HP, plug wired HP again" or the like, which need a reboot for all I know Jun 14 20:08:28 also keeping hold button pressed while connecting the headset will result in faulty detection of headset type and you can't recover from that with other means than a re-mating Jun 14 20:12:18 plug/unplug isn't fixing it unfortunately. These are standard earphones btw, not bluetooth. Jun 14 20:14:00 when plugged in, do you get audio through them? Jun 14 20:15:04 I recall an issue where my headset /sys value increased on every mate cycle leaving the device stuck in headset mode. I believe a reboot and cleaning the jack with isoproyl fixed it. Jun 14 20:17:02 Yes, sounds working headphones. Jun 14 20:17:43 working *through* headphones Jun 14 20:18:51 reboot is likely quickest 'fix' :) Jun 14 20:20:00 Ok, thanks. Jun 14 20:20:27 i don't know the daemo that keeps track of hp Jun 14 20:21:06 and my N900 is currently switched off .. can't even check Jun 14 20:21:43 thats ok, it's not a big problem. Jun 14 22:16:17 Sicelo: kernel stuff to start with Jun 14 22:16:44 nokia_av.ko or somesuch Jun 14 22:19:25 watch -d -n1 'for f in /sys/devices/platform/nokia-av/type /sys/devices/platform/nokia-av/detect /sys/devices/platform/nokia-av/autodetect /sys/devices/platform/nokia-av/eci* /sys/devices/platform/soc-audio/eci_mode /sys/devices/platform/nokia-av/madc; do echo "$f: `cat $f`"; done' Jun 14 22:37:49 anyway dbus system bus is your best friend here, I guess (whoever is sender 1.9) http://paste.opensuse.org/36168680 Jun 14 22:38:33 I'd almost bet 1.9 is HAL Jun 14 22:39:56 1.19 prolly PED Jun 14 22:42:01 a slightly more comprehensive log of a plug event: http://paste.opensuse.org/95991905 Jun 15 00:53:18 Is there a way to ask sysklogd to log slightly less? Like, I am worrying about RootFS space, so either log at home, or log less? | And is there something better for debian packaging than debhelper? Like, I want to pack not-binary package, smilies theme, to create an alternative to user/default of rtcom-messaging-ui and chat_smiley_* of osso-icons-default Jun 15 00:54:59 Seriously, the default-Nokia's-smilies should have been in their own package, it's atrocious how many pictures are pushed into osso-icons-default, and the configs referring to these pictures are in entirely different package(s) Jun 15 01:30:18 Oksana: rsyslog config allows arbitrary log destinations for arbitrary (sub)sets of logline types Jun 15 01:31:52 Oksana: see /etc/syslog.conf the line >>*.*;auth,authpriv.none -/var/log/syslog<< Jun 15 01:32:57 *.* means "log all to..." - you could reduce the amount that gets logged by excluding stuff you don't want to get logged Jun 15 01:34:04 or you change the file spec (-/var/log/syslog) to e.g. -/home/user/syslog Jun 15 01:34:20 Yes, have seen it. Could probably tell it to use different location. Does it need to be restarted to know the changes in config? And, I would mostly want to know how-why it shutdowns and reboots. And why the filesystem is called BCM2048B0 Initialization Configuration, instead of Nokia N900 Jun 15 01:35:01 err prolly kill sighup rsyslogd or somesuch, but reboot is simpler I guess Jun 15 01:48:07 man syslog.conf is an insult Jun 15 01:48:22 typos and blabla Jun 15 01:50:42 anyway nota bene: >> You may prefix each entry with the minus ‘‘-’’ sign to omit syncing the file after every logging. Note that you might lose information if the system crashes right behind a write attempt. Nevertheless this might give you back some performance, especially if you run programs that use logging in a very verbose manner.<< Jun 15 01:52:30 you probably might want to define a generic logging rule with "-" and a special logging rule for e.g. .err etc, or just for kernel crashes etc, without "-" for the same destination file Jun 15 01:55:48 but honestly, what a manpage is that, stating stuff like >> Don’t think a mail would be sent, that might be too late.<< Jun 15 01:57:36 (( "-" syncing)) *.=crit;kern.none /var/log/syslog Jun 15 01:58:11 *.* -/var/log/syslog Jun 15 01:59:48 oops Jun 15 02:00:10 (( "-" syncing)) *.crit /var/log/syslog Jun 15 02:17:16 also see this abomination that systemd gives you nowadays: http://paste.opensuse.org/87343490 **** ENDING LOGGING AT Wed Jun 15 02:59:58 2016