/srv/irclogs.ubuntu.com/2008/05/15/#ubuntu-bugs.txt

wolfgerBug 180076, is there a reason for this bug to exist, rather than use LP's "mark as duplicate" feature?00:02
ubottuLaunchpad bug 180076 in ubuntu-meta "Meta-bug for Texas Instruments Card reader(s)" [Undecided,New] https://launchpad.net/bugs/18007600:02
hggdhwolfger: ask Duncan00:04
hggdh(from https://launchpad.net/~duncan-lithgow) email is dlithgow at gmail dot com00:05
wolfgerk00:07
wolfgerwas just wondering if it was a process like workflow bugs that I simply wasn't aware of.00:07
hggdhwolfger: well... given the discussions we have had here the last few days, I expect we will have some definitions for workflow bugs at UDS end00:08
wolfger:-)00:08
wolfgergood00:08
hggdhindeed...00:09
nickellerywhere would u package bugs related to non-working laptop keys?00:14
=== iceman_ is now known as iceman
hggdhperhaps under X, if they are seem under it00:24
nickelleryhggdh, this issue relates to brightness control using Fn+F7/F800:25
hggdhnickellery: hum, I dimly remember a package that would deal with that... let me see if I can find it00:26
nickelleryhggdh, alright, thanks for helping00:27
hggdhnickellery: perhaps hotkey-setup00:34
nickelleryhggdh, okay ill do that then00:35
nickellerythanks for helping00:35
hggdhor kmilo for KDE00:35
hggdhnickellery: go to synaptic, and do a search on "laptop key"00:35
hggdhthere are some options there00:35
nickelleryok00:35
MilkmanDanAfter my 7.10 to 8.04 upgrade squid stopped sending some of my web traffic to privoxy (as it was configured to do).  Now only "some" of it goes to privoxy; some is sent as TCP_MISS/302 and DIRECT.01:36
MilkmanDanI think this is a bug but would like to talk it through with someone before making my first ever submission....01:36
=== yuriy_ is now known as yuriy
christozhello...would you like to see my error message?I'm having problems on upgrading03:55
christozplease,check this out @ http://img409.imageshack.us/img409/8562/screenshothardygk6.png03:55
christozi think there is smth wrong with the souftware channels...03:57
christozplease help me03:57
secretlondonchristoz what are you trying to do?03:58
christozto upgrade gutsy to hardy03:58
secretlondonokay03:59
secretlondondo you have any programs installed that are not from the official repositories?03:59
christozwhat else can i do to be more specific?03:59
christozwould you like to upload ane\yother files i 'll do it03:59
christozhmm...such as?03:59
secretlondonchristos: it's easier if you make a bug04:00
secretlondoni'd like to see your /etc/apt/sources.list04:00
christozok wait please04:00
christozthere you are friend look @ http://www.pastebin.ca/101865104:01
christozi used to have feisty04:02
christozgutsy came from upgrading feisty04:03
secretlondonI can see04:03
christozanyting abnormal?04:03
secretlondonThere is nothing in there that looks bad, normally thisis caused by people installing things from other repositories04:03
christozhmmm..i have a quaestion ready for you about it04:04
christozfrom which server should i update main server or from my country's nearest mirror?04:05
secretlondonok04:05
secretlondonyou _might_ find that changing to the main mirror fixes it04:05
secretlondonif it's a problem with that mirror04:05
secretlondonhave you run sudo pat-get update before you start04:05
secretlondonto make sure your gutsy is up to date04:06
secretlondonapt-get not pat-get04:06
secretlondonhttps://wiki.ubuntu.com/DebuggingUpdateManager04:07
christozfrom my nearest mirror is up to date...please let me do it the same from the main server04:08
christozmy system is up to date04:09
secretlondonyou've done sudo apt-get upgrade04:10
christozyep..Reading state information... Done04:11
christoz0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.04:11
secretlondonand then tried to dist-upgrade again?04:11
christozsame message04:12
christoz:(04:12
secretlondonok04:12
christozthis is weird eh?04:13
secretlondonI have go now, I suggest you either file a bug or a request on the support tracker, add the files requested on the DebuggingUpdateManager link I posted above04:13
christozok,,,but what files should i postr there?04:13
secretlondonIt probably is your machine and not the mirrors, but it could be caused by the openssh stuf we have atm04:13
secretlondonhttps://wiki.ubuntu.com/DebuggingUpdateManager04:13
secretlondontells you04:13
christozi know i'm a member04:13
christoza ok04:14
christozthanks04:14
christozfor your time04:14
secretlondonsorry I couldn't fix (most of those are caused by problems in sources.list)04:14
christozi have to solve this...thanks04:14
secretlondongood luck!04:15
yuriyheh nice "Bug #175785 also links to the added bug watch (kde-bugs #150006)."04:17
ubottuLaunchpad bug 175785 in kdebase "Konqueror crashes when clicking certain sites" [Undecided,Confirmed] https://launchpad.net/bugs/17578504:17
ubottuLaunchpad bug 150006 in openldap2 "After upgrading my server to Gutsy booting hangs at "Starting kernel log daemon"" [Medium,Confirmed] https://launchpad.net/bugs/15000604:17
yuriylaunchpad just keeps gettig nicer04:17
=== asac_ is now known as asac
=== mdz_ is now known as mdz
LimCorehello08:36
LimCoreusers are not informed enough about how to fix _consequences_ of dsa/rsa/ssh problem.  Should this be fixed?08:36
LimCoreanyone here now? (as in, active) ?08:58
sectechOkay I have come to the conclusion that I am not triaging anymore bugs until I know for sure what trace I need for certain situations...09:31
sectechsome of my traige comments are getting pretty pathetic...09:33
LimCorelike?09:35
sectechOh I'll give an example... hang on09:41
sectechbug #23043909:41
ubottuLaunchpad bug 230439 in yelp "yelp_document_get_page: assertion failed: (document != NULL && YELP_IS_DOCUMENT (document)) (dup-of: 218537)" [Undecided,Triaged] https://launchpad.net/bugs/23043909:41
ubottuLaunchpad bug 218537 in yelp "yelp_document_get_page: assertion failed: (document != NULL && YELP_IS_DOCUMENT (document)) Aborted (core dumped)" [Medium,New] https://launchpad.net/bugs/21853709:41
sectechI thought an apport report might give more information... someone else ended up asking for a valgrind.log09:42
sectechAlthough it appears as I am throwing out generic answers to the reporters I actually am _trying_ to get the right kind of information...09:43
sectechI'm not triaging to annoy the reporters lol09:44
sectechand I won't apply and get accepted to bugcontrol while still asking for the wrong traces09:48
techno_freaksectech, stop your rants and try to improve from next time if you feel your comments are pathetic09:49
sectechok ok....09:49
sectechtechno_freak,  point taken....09:50
\shplease, we had this discussion yesterday evening...no need to come back to the topic...09:53
sectechwe did? I didn't think I was here yesterday evening09:54
\shsectech, see the log from yesterday evening :)09:56
sectech\sh,  great,  didn't know the channel had a main log...  how do I view it?09:57
sectech\sh,  no point in going in circles, your right09:57
\shsectech, http://irclogs.ubuntu.com/2008/05/14/%23ubuntu-bugs.html09:58
sectech\sh,  Thank you :)09:58
\shsectech, to summarize: seb128 and I have a different meaning .. he agreed with you in general, I disagreed because of tools, which are not running properly on stable releases etc. for it was enough to see the first report...so I'll go and try to fix this bugger...so every dev has a different meaning what's necessary...i for myself, I'm a bit more careful, because we can't expect special things from users with less technical background...that's all..10:01
\sh.quite difficult to solve10:01
\shs/for it/for me/10:01
sectechOh \sh are you talking about that specific bug I quoted or triaging in general?10:02
\shsectech, yes..the yelp bug :)10:02
sectechAhhh.... ok10:03
sectechI wasn't taking that one too personally,  overall I need to have a PM with someone about what to ask for,  usually if I don't see an apport crash and I have no idea what platform or hardware the person is running I would ask for more info manually... Recently I was told to request an apport report...10:04
sectechI'll deal with this when I get home.... I should get ready for work...10:05
james_wsectech: if you are ever unsure you can ask here for some advice10:05
james_wyou won't always get consistent advice though :-)10:05
LimCoreany thought about https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/230632 ?10:06
ubottuLaunchpad bug 230632 in openssh "ssh-vulnkey doesnt check all keys. Also, it would be nice to extend the warning message." [Undecided,New]10:06
sectechjames_w, and I do... bdmurry, pedro and a few others have helped me a long.... I'll just keep asking, maybe before I make any comments on bugs for a while10:06
james_wLimCore: I would say to just leave that one alone10:08
james_wit's not really great for a bug report to be a mix of things, and a lot of that is more like policy that faults with the package10:08
james_whowever, I wouldn't really want to take a stance on it, as it's very much the opinion of the maintainer.10:09
sectechOh wow, I see what you guys mean.... you guys had quite the discussion on the yelp bug yesterday10:10
LimCorejames_w: you dont thing we should informs users about this problem?10:11
LimCorethink.10:11
james_wwhich problem?10:11
\shsectech, yeah..snow from yesterday :)10:12
LimCorejames_w: that just upgrading ssh doesnt close all problems10:12
james_wLimCore: yes, we should, but I'm not sure what the right way to do that is.10:12
LimCorejames_w: then whats the better idea?10:13
\shjames_w, erich schubert wrote a nice blog article about it10:13
james_w\sh: yes, he did.10:13
james_wLimCore: ah, I see you are the reporter now, sorry, I thought you were asking about triaging it.10:13
leo_1_2ciao10:37
thekornhi all!10:48
=== fdd-0 is now known as fdd
LimCorehello12:26
LimCorewhy ubuntu fails again?12:26
LimCorehttp://stats.denyhosts.net/stats.html12:26
\shLimCore, hmm?12:30
LimCore\sh: guess why the increase in ssh attacks12:32
\shLimCore, because of bored scriptkiddies?12:39
LimCore\sh: because ubuntu users dont remove their weak keys from authorized keys and bad people try to take advantage12:41
\shLimCore, most users don't even know what "authorized_keys" is, most people don't even know, that you have to install openssh-server for open their boxes12:41
LimCoreI dont think authorized_keys are some marginal system not used by anyone, in all my work/projects/teams we use it all the time for example12:42
\shLimCore, you can blame overworked sysadmins, wannabe sysadmins, rootserver providers etc. but not ubuntu or debian...12:43
PiciLimCore: What does that websiet have to do with Ubuntu?12:43
Piciwebsite rather.12:43
* pochu can't believe there's so many people receiving bugmail for *all* Ubuntu bugs...12:43
\shLimCore, yes, I#m using them also every day...but I do work in this business so I know how dangerous public available servers are12:43
\shLimCore, and comparing the sum of servers running ubuntu and debian, believe me, debian still wins...12:44
\shI would even think rhel and sles installs are even more spreaded in the world then ubuntu server installations...12:44
LimCorePici: it shows hackers taking advantage of fact that people dont know they have to fix servers they loged into using weak key12:44
LimCoreanyway, the point is12:45
\shLimCore, again, it doesn#t say anything about ubuntu12:45
LimCore...about ubuntu (or debian) users that logged into servers...12:45
=== _neversfelde is now known as neversfelde
LimCoreok the point:  how about adding more clear warning that "contact admin of servers, and if your own box accepted pub key logins then to be 100% sure you have to reinstall"12:46
LimCorethis is unfortunate, but if your box allowed pubkey (from any IP) then it was possible to exploit it between discovery of bug and the fix.... right?12:48
\shLimCore, every person running a public connectable, especially via ssh, host, server is responsible for the safetiness of this server...people not caring you can't even fix with a warning...I mean people still drive cars, but most of the people know, that a car can kill them more faster then smoking 30 cigarettes per day..blame irresponsible admins...not any OS involved, and this topic is also wrong in here...12:50
Pici\sh: took the words right out of my mouth (or is it fingers?)12:51
LimCoreonly users that do not care12:51
LimCoreand users that do care, and fully understand implications of this bug.12:51
PiciAnd we should be concerned about them because?12:51
LimCoreAre you sure there is exacly 0 users that care, but just didnt thought about this possibility12:52
LimCorePici: because ubuntu created this problem in the first place (well, debian) and we are good/kind/etc so we want to help12:53
PiciLimCore: There already is a big warning on the update itself, if an admin doesnt care to read that, there isnt much we can do.12:53
\shLimCore, we did already with pushing the fix out...but we can't fix people12:54
LimCoreoh ok then12:54
LimCoredoes this warning include info about need to check also the SERVERS to which you logged in?12:54
\shLimCore, no...it's the duty of the person who runs the server to inform his/her customers12:55
LimCoreit's too much work for too little benefit to just inform users that there are implications of this bug even after they applied the patch? well I dont agree12:57
\shbut again...this is not the place to discuss. it's a social problem...not a technical problem...we fix technical issues, we can't fix social issues...I wish we could do that...but it's simply impossible12:58
LimCoreI thought ubuntu was for human beings, not for androids that will do all flawlessy so they dont need friendly help...12:59
Hobbseeoh, LimCore again.13:05
LimCoreagain thinking about the end users, damn him.13:06
HobbseeLimCore: there *wasn't* an exploit time before the public discovery of the bug, and the fix.13:06
Hobbseethat's exactly why they have embargoes.13:06
LimCoreif bob uses pubkey do login to his ubuntu desktop from his ubuntu laptop, and he left them turned on and will get back from work tommorow, can he be exploited today?13:07
Hobbseeturned on?13:08
Hobbseeoh, the computers turned on13:08
LimCoreand connected to internet13:08
Hobbseei presume that he could be brute forced.13:09
LimCorei.e. using already existing scripts like http://packetstormsecurity.org/0805-exploits/debian-sploit.txt13:09
Hobbseemind you, the numbers of ubuntu machines around make the probability that he in particular might get attacked woudl be quite low13:09
LimCorepeople using this script say it takes around half hour to find and exploit13:10
\shthere are more broken torrent apps running then ubuntu users using ssh ;)13:10
LimCoreso I thought, it would be nice to bring this fact to people that generated keys on Ubuntu,  but apparently its so much work, its better to not do it13:10
HobbseeLimCore: once you have a predefined machine that you want to target.13:10
HobbseeLimCore: plus, he's also likely behind nat.13:10
\shLimCore, you forget debian itself...http://security.debian.org/project/extra/dowkd/dowkd.pl.gz or metasploit: http://metasploit.com/users/hdm/tools/debian-openssl/13:11
Hobbseealso, people like cjwatson are on this from both debian and ubuntu sides, and i'll choose to trust him that he knows what he's doing13:11
Hobbseepity i deleted the old compromised keys for one of my users.  i might have tried that script on that account.13:11
LimCoreyou realize fix takes 10 minutes?   + Also, all servers to which you loged using public key are now EXPLOITABLE. Contact server admins, delete own keys, reinstall system is possible/important.13:12
Hobbseedefine the 'fix' here?13:12
* Hobbsee thought it was running dpkg-reconfigure openssh-server when upgrading.13:12
LimCoreappent the information above to the warning13:12
\shLimCore, that's why I don't use keys at all...because all servers I know having real passwords, no open root accounts...PermitRootLogin no setting and I have a good brain to know passwords with at least 8 chars + I have a good passwordsafe on my usb stick which I walk around every day13:13
LimCore\sh: ok but many people do use13:14
HobbseeLimCore: anyway, talk to cjwatson on #ubuntu-devel, as he's hte one that's ultimately going to deal with it13:14
\shLimCore, most people don't know the usage of ssh-keygen in general13:14
PiciLimCore: No one is doubting the severity of this problem, but there is a certain level of responsibility that we need to leave with the system administrators.  If they choose not to read the warnings that were bundled with the update then theres nothing we can do.13:15
Hobbsee    - Automatically regenerate known-compromised host keys, with a13:15
Hobbsee      critical-priority debconf note. (I regret that there was no time to13:15
Hobbsee      gather translations.)13:15
Hobbsee  * added README.compromised-keys thanks to Colin Watson13:15
* Hobbsee notes that most sysadmins probably got that.13:15
LimCorePici: I assume they do read the warning, but the warning should be more verbose and more obvious13:15
* Hobbsee makes a warning that smashes people through their computer screens.13:16
* LimCore googles for a graphs of number os people smashed through their computer screens... odd, it seems to be a rare problem.13:16
\shHobbsee, make it poison green ,-)13:16
Hobbsee\sh:13:16
Hobbsee\sh: exactly.13:16
Hobbsee\sh: and i'd have to make one for the dangers of putting server stuff on your machine at all, of course.13:17
\shHobbsee, and don't forget to shut down all your users windows desktops...13:17
LimCoreHobbsee: not server stuff.  your box generates key, no server there13:17
HobbseeLimCore: openssh-server is server stuff.13:18
\shbecause there are more people with windows running malware and trojans without knowing it..and even MS doesn't warn about it with a bit sign saying that their OS is insecure13:18
LimCorebug affects also desktops that are only clients of ssh right?13:18
\shLimCore, not for ubuntu13:18
\shLimCore, ubutnu needs to be explicitly trained to have an openssh server running13:18
LimCorethis bug did not affect people that where only clients of ssh (that is, generated own keys)?13:18
PiciLimCore: The warning interrupted the update process and was full screen on my cli updates, I'm not sure how much more obvious you could get.13:19
Hobbseeif you generate your own keys, and use them, and ther'es a big warning in the update manager about compromised keys, and a big debconf prompt....if you failed to actually notice after any of the above, you deserve to be compromised13:19
LimCorePici: does it say that you need to also attend the servers INTO WHICH you logged in?13:19
LimCoreHobbsee: there is this warning already? ok then perhaps its already how I imagined it13:20
HobbseeLimCore: but Joe Random User doesn't have to worry abou thtat.13:20
HobbseeLimCore: the sysadmins of the servers themselves do.13:20
Hobbseeas it is, any responsible sysadmin will throw out the keys that are compromised, which are on their servers.13:20
LimCoremhm13:20
PiciLimCore: I dont remember what the exact text said. I attended to my servers, and the servers I log into also took care of theirs.13:20
LimCorewe could add more warnings in ssh client as well etc13:21
* Hobbsee didn't happen to have bad keys, so didn't see the update, but Pici says it was there, as does the changelog.13:21
LimCoreI know its stupid, but so are avarage users I guess.. or not13:21
HobbseeLimCore: because a big screen on the updater wasn't enough?13:21
Hobbseemay as well steal focus, and stick an all black screen behind it.  *shrug*13:21
Hobbseedon't let it go back to normal till the user has fixed it13:21
Hobbseebut i'd bet that won't go down well13:21
LimCoressh could refuse to connect with comrpomised key13:22
PiciIt was one of those full screen ncurses style warning.13:22
LimCorejust an idea13:22
HobbseeLimCore: that's oh so wrong, on so many levels.13:22
LimCoreHobbsee: or ask for type YES in upper case13:22
LimCorelike reisfers fsck13:22
Hobbseereally, the ones who have to worry are the sysadmins.13:23
Hobbseeand anyone who hasn't fixed their systems, as sysadmins by now, deserve to have their systems rooted.13:23
LimCoreguy with laptop and desktop13:23
Hobbseeas for user compromised keys, well, it's the server's problem if it's accepting them, not the user.13:23
\shLimCore, no one responsible uses reiserfs ... all suse user are going to die if they still using it13:23
Hobbseethe guy who should know about server-based stuff opening ports, and possibly having attacks from that.13:24
LimCoreI think its a mean thing to say that they derve to have system rooted... ;) noone is perfect13:24
* Hobbsee suggests LimCore block port 80 by default on all machines, too.13:24
LimCoreHobbsee: incoming? obviously13:24
Hobbseewhy?  the issue has been out for days, the fix is out, the updates are out, the only people who have been living under a rock, and refuse to see reality.  *shrug*13:25
HobbseeLimCore: both ways.13:25
Hobbseetrojans and all that go over http.  could get rooted.  big scary warnings, and don't open port 80.13:25
Hobbseein terms of windows machines, anyway13:25
pedro_hello14:59
james_whi pedro_, are you in Prague?15:04
pedro_james_w: yeah!, are you coming right?15:05
james_wyep, I'll be there on Sunday.15:05
pedro_aham, great15:06
=== mdz_ is now known as mdz
=== lakin_ is now known as lakin
greg-gif someone could help with bug 229489 that'd be great.  I'm sure it is something simple that needs to be done but I don't know what.  The telling log is the last one attached.16:52
ubottuLaunchpad bug 229489 in ubuntu "package libghc6-mtl-dev 1.0.1-1 failed to install/upgrade: Package is in a very bad inconsistent state - you should" [Undecided,Incomplete] https://launchpad.net/bugs/22948916:52
\shgreg-g, ask someone in -motu...we have some haskell pros and somehow I have the thought, that it has something to do with timing of the package installation...16:58
Hobbseeouch16:59
\shPreparing to replace libghc6-gtkglext-dev 0.9.12-0ubuntu1.1 (using .../libghc6-gtkglext-dev_0.9.12.1-1ubuntu2_i386.deb) ...16:59
\sh/var/lib/dpkg/info/libghc6-gtkglext-dev.prerm: line 5: ghc-pkg: command not found16:59
\shdpkg: warning - old pre-removal script returned error exit status 12716:59
\shdpkg - trying script from the new package instead ...16:59
\sh/var/lib/dpkg/tmp.ci/prerm: line 5: ghc-pkg: command not found16:59
\shthat sounds really like a timing problem17:00
\shyes...it's timing17:01
\shthe package tries to install it first, but it needs ghc6 package really as first package to be installed17:01
\shstrange that the ghc6 6.6.1 package failes for this...17:02
\shbecause it should be still there during upgrade17:02
* \sh heads home17:05
askandPlease reopen bug 183136 as it is still present17:41
ubottuLaunchpad bug 183136 in evolution "Error while Storing folder 'INBOX'" [Low,Invalid] https://launchpad.net/bugs/18313617:41
greg-gaskand: what error are you receiving?17:45
askandgreg-g: the same as the person who first reported it; 'Error while Storing folder 'INBOX''17:45
greg-gaskand: ok, just making sure since a couple other people incorrectly thought they had the same issue17:46
askandgreg-g: Ah ok, I am using gmail over pop3 and Im using swedish language in Ubuntu Hardy17:46
greg-gaskand: could you please post a comment on that bug stating what you are experiencing, anything you have tried to diagnose the issue, and what version of ubuntu you are running?17:46
greg-gyou could try creating a new user on your system and seeing if the problem is still present then, or mv'ing your .evolution folder to .evolution-backup and seeing if it is still an issue17:47
greg-gthose are two good tests to see if it is caused by a user-defined setting or not17:48
askandgreg-g: Ok, I did mv evolution thing17:49
askandand it made it work..propably cause Ive got no mails...ill try to mail one to myself17:50
greg-gok17:51
greg-gaskand: I'm heading out, post whatever you have tested to that bug and I'll take a look when I get back.  Thanks17:52
sportman1280_hello17:54
sportman1280_i was just curious as to why apport was disabled by default in hardy17:55
askandgreg-g:  will do, thanks to you17:56
al_hello18:18
sportman1280_hello18:26
sportman1280_what are the packages you need to install in order to have the debug symbols?18:26
james_wsportman1280_: https://wiki.ubuntu.com/DebuggingProgramCrash should help18:32
sportman1280_well actually18:32
sportman1280_they were listed there18:32
sportman1280_libglib2.0-0-dbgsym libgtk2.0-0-dbgsym18:32
sportman1280_i was told those yesterday, here... just forgot what they were :(18:32
greg-goh, sportman1280_, regarding why apport is disabled by default in stable releases (ie: Hardy) is because the versions of the programs in stable (Hardy) are now probably outdated compared to "upstream" (the place the actual program comes from) so the crashes are "less" useful (not useless, just less useful).  Also, I think it is an "appearance" thing to, not having the message pop up for things that don't matter (for instance a crash of compiz that 19:03
=== thekorn_ is now known as thekorn
sportman1280_greg-g: Thanks for the info19:23
askandgreg-g: I have now added a comment to the bugreport19:28
greg-gaskand: I've replied.19:38
askandI am curios whats need to be done for bug 89936 to arrive to hardy-proposed, is it just a question of time?19:54
ubottuLaunchpad bug 89936 in gmail-notify "Gmail notifier crashes when new e-mail is found and the user are supposed to be alerted about it" [Medium,Fix released] https://launchpad.net/bugs/8993619:54
Fallenouhi19:56
Fallenoubdmurray , just to say that my bug (about nvidia nforce network controller) is solved : https://bugs.launchpad.net/ubuntu/+source/linux/+bug/230099  it was a duplicate of another bug , thank you :)19:57
ubottuLaunchpad bug 230099 in linux "nForce nvidia network driver can't link up when plugin wire (dup-of: 136836)" [Undecided,New]19:57
ubottuLaunchpad bug 136836 in linux "Ethernet (nVidia MCP55) not working [ gutsy, hardy]" [Undecided,Confirmed]19:57
Fallenouand the solution explained in the bug 136836 worked for me !19:58
ubottuLaunchpad bug 136836 in linux "Ethernet (nVidia MCP55) not working [ gutsy, hardy]" [Undecided,Confirmed] https://launchpad.net/bugs/13683619:58
Fallenouubottu ok we got it :D19:58
ubottuFactoid ok we got it :d not found19:58
Fallenouthank you guys19:58
greg-gaskand: regarding the gmail notifier, yeah, time20:05
=== gnomefre1k is now known as gnomefreak
=== gnomefre1k is now known as gnomefreak
=== gnomefre1k is now known as gnomefreak
askandHas any fix been released to the hardy freezing bug?22:36
greg-gaskand: A) what bug are you referring to? and B) if you are referring to a specific bug, any and all information about it will be found on its Launchpad page22:47
hggdhhum, thing are slow here...23:47
sectechseems to be23:52
sectechTell me something.... how to characters like this https://bugs.launchpad.net/~sportember get away with bugs being marked critical even though they are not real bug reports23:53
ffmsectech: It's bug #123:54
ubottuLaunchpad bug 1 in ubuntu "Microsoft has a majority market share" [Critical,Confirmed] https://launchpad.net/bugs/123:54
sectechIt's a valid issue... but not a software bug....23:54
greg-gsectech: read who wrote that bug23:55
greg-gand, it is bug number 1, as in, the first bug in the system23:55
sectechGregery Mate....23:55
sectechrather Gergely Mate23:56
sectech... indeed.....23:56
sectechcreator of launchpad?23:56
greg-gsectech: who wrote the bug, not the commenter.  "bugs related to.." people list bugs that you have commented on also, just just bugs you have reported23:57
greg-gthe actual bug, who wrote the actual bug report for bug number 123:57
sectechOhhhh...23:58
greg-g:)23:58
sectech*bows*23:58
sectechlol23:58
greg-ggood example to showcase that the "bugs related to" someone are just bugs they have commented on23:59
sectechindeed....23:59
greg-gnot JUST bugs they have commented on, of course, but yeah23:59

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!